IN2014DN03029A - - Google Patents

Info

Publication number
IN2014DN03029A
IN2014DN03029A IN3029DEN2014A IN2014DN03029A IN 2014DN03029 A IN2014DN03029 A IN 2014DN03029A IN 3029DEN2014 A IN3029DEN2014 A IN 3029DEN2014A IN 2014DN03029 A IN2014DN03029 A IN 2014DN03029A
Authority
IN
India
Prior art keywords
user data
dap
access
browser
providing device
Prior art date
Application number
Inventor
Per Persson
Song Yuan
Magnus Olsson
Original Assignee
Ericsson Telefon Ab L M
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ericsson Telefon Ab L M filed Critical Ericsson Telefon Ab L M
Publication of IN2014DN03029A publication Critical patent/IN2014DN03029A/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/84Protecting input, output or interconnection devices output devices, e.g. displays or monitors
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/85Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/16Arrangements for providing special services to substations
    • H04L12/18Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
    • H04L12/1813Arrangements for providing special services to substations for broadcast or conference, e.g. multicast for computer conferences, e.g. chat rooms
    • H04L12/1822Conducting the conference, e.g. admission, detection, selection or grouping of participants, correlating users to one or more conference sessions, prioritising transmission
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2123Dummy operation
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2127Bluffing

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Human Computer Interaction (AREA)
  • Computing Systems (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

In a web browser (100) access is controlled with respect to at least one user data providing device (102) the web browser comprising a browser engine (106) a browser application (104) and a device access proxy DAP (108). Access is acquired in the DAP to at least one user data providing device and a request is received from a web application (110) for user data from a first user data providing device. In response to the request default data (112) is transmitted from the DAP to the web application. A user data access confirmation signal is obtained and in response to the user data access confirmation signal the transmission of the default data is discontinued and the requested user data is transmitted from the DAP to the web application.
IN3029DEN2014 2011-10-28 2012-10-18 IN2014DN03029A (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
EP11187029.1A EP2587397A1 (en) 2011-10-28 2011-10-28 Browser device access proxy
US201161553754P 2011-10-31 2011-10-31
PCT/EP2012/004366 WO2013060432A1 (en) 2011-10-28 2012-10-18 Browser device access proxy

Publications (1)

Publication Number Publication Date
IN2014DN03029A true IN2014DN03029A (en) 2015-05-08

Family

ID=44925356

Family Applications (1)

Application Number Title Priority Date Filing Date
IN3029DEN2014 IN2014DN03029A (en) 2011-10-28 2012-10-18

Country Status (6)

Country Link
US (1) US9692760B2 (en)
EP (1) EP2587397A1 (en)
KR (1) KR101932311B1 (en)
BR (1) BR112014009742A2 (en)
IN (1) IN2014DN03029A (en)
WO (1) WO2013060432A1 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2013242847A (en) * 2012-04-26 2013-12-05 Mitsubishi Electric Corp Image processing terminal and image processing method
KR102127720B1 (en) * 2014-04-22 2020-06-29 삼성전자주식회사 Method and apparatus for controlling accessing location information of user equipment implementing application
US9721121B2 (en) 2014-06-16 2017-08-01 Green Hills Software, Inc. Out-of-band spy detection and prevention for portable wireless systems
WO2016198229A1 (en) * 2015-06-10 2016-12-15 Deutsche Telekom Ag Method and system for protecting and/or anonymizing a user identity and/or user data of a subscriber of a data protection service, program and computer program product

Family Cites Families (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7111056B1 (en) * 1999-10-08 2006-09-19 Nortel Networks Limited Method, apparatus and article of manufacture for web-based control of a unified multi-service communication system
US20020078371A1 (en) * 2000-08-17 2002-06-20 Sun Microsystems, Inc. User Access system using proxies for accessing a network
US6970935B1 (en) * 2000-11-01 2005-11-29 International Business Machines Corporation Conversational networking via transport, coding and control conversational protocols
US6918113B2 (en) * 2000-11-06 2005-07-12 Endeavors Technology, Inc. Client installation and execution system for streamed applications
US20020083183A1 (en) * 2000-11-06 2002-06-27 Sanjay Pujare Conventionally coded application conversion system for streamed delivery and execution
US20020099829A1 (en) * 2000-11-27 2002-07-25 Richards Kenneth W. Filter proxy system and method
JP4064652B2 (en) * 2001-10-12 2008-03-19 株式会社シンクプラス Browser with proxy server and information copying system
US7734749B2 (en) * 2002-10-16 2010-06-08 Xerox Corporation Device model agent
US8392553B2 (en) * 2003-04-29 2013-03-05 University Of Strathclyde Remote monitoring by tracking, storing, and analyzing user interactions with an operating system of a data processing device
US7870202B2 (en) * 2004-12-03 2011-01-11 Clairmail Inc. Apparatus for executing an application function using a smart card and methods therefor
US20070094691A1 (en) * 2005-10-24 2007-04-26 Gazdzinski Robert F Method and apparatus for on-demand content transmission and control over networks
US8070059B2 (en) * 2006-02-07 2011-12-06 Hewlett-Packard Development Company, L.P. Authorization for device interaction with a remote service
US20070226304A1 (en) * 2006-03-27 2007-09-27 Teamon Systems, Inc. System and method for migrating user account data
US7664862B2 (en) * 2008-01-14 2010-02-16 International Business Machines Corporation Browser-based proxy server for customization and distribution of existing applications
KR100967337B1 (en) * 2008-08-20 2010-07-05 주식회사 컴퍼니원헌드레드 Web browser system of mobile communication terminal using proxy server
US8237771B2 (en) * 2009-03-26 2012-08-07 Eastman Kodak Company Automated videography based communications
US8340633B1 (en) * 2009-04-09 2012-12-25 Mobile Iron, Inc. Mobile activity intelligence
US9026952B2 (en) * 2009-12-17 2015-05-05 Microsoft Technology Licensing, Llc Creating awareness of accesses to privacy-sensitive devices
SG183332A1 (en) * 2010-03-01 2012-09-27 Silver Tail Systems System and method for network security including detection of attacks through partner websites
US9338494B2 (en) * 2011-02-11 2016-05-10 Sony Corporation Method and apparatus for providing recommended content playback on a display device
US8931041B1 (en) * 2011-07-29 2015-01-06 Symantec Corporation Method and system for visibility and control over access transactions between clouds using resource authorization messages

Also Published As

Publication number Publication date
KR20140093937A (en) 2014-07-29
BR112014009742A2 (en) 2017-04-18
US9692760B2 (en) 2017-06-27
EP2587397A1 (en) 2013-05-01
KR101932311B1 (en) 2018-12-24
US20140282862A1 (en) 2014-09-18
WO2013060432A1 (en) 2013-05-02

Similar Documents

Publication Publication Date Title
MX346689B (en) Application-driven cdn pre-caching.
BR112015012715A2 (en) mobile app and system tailored to provide multimedia content to a user
EP4246930A8 (en) Playback control of media presentation using media controls embedded in a webpage
WO2011060134A3 (en) Implementing customized control interfaces
GB201300185D0 (en) Detection and management of user interactions with foreground applications on a mobile device in distributed caching
IN2014CN04305A (en)
GB201000874D0 (en) Client-server system
WO2013074196A3 (en) Mobile and one-touch tasking and visualization of sensor data
IN2014CN03643A (en)
WO2014020418A3 (en) Terminal requested base station controlled terminal transmission throttling
WO2011115986A3 (en) Apparatus and method for context-aware mobile data management
BR112015009717A2 (en) establishing a wireless display session between a computing device and a vehicle head unit
MX2013014569A (en) Reception device, reception method, transmission device, transmission method, and program.
BR112014029475A2 (en) measuring device adapted for communicating with a monitoring device employing a bidirectional communication protocol, a communication method for a device communicating with a monitoring device employing a bidirectional communication protocol, and a computer program
WO2011034956A3 (en) Dynamic content packaging
WO2012092271A3 (en) Supporting intelligent user interface interactions
IN2014DN03053A (en)
MX2012001835A (en) Controlling placeshifted content.
WO2012060611A3 (en) Method for searching for device and communication device using same
WO2013070139A3 (en) A method and a device for collaborative computing
WO2008040918A3 (en) Display device for stereoscopic display
WO2012071498A3 (en) Securing sensitive information with a trusted proxy frame
BR112014009847A2 (en) method and system for using a second screen device to tune a set top box to display content by tapping the second screen device
WO2012060995A3 (en) Distributed caching in a wireless network of content delivered for a mobile application over a long-held request
GB2499534A (en) Caching adapted for mobile application behavior and network conditions