JP2014526728A - プロセス毎ネットワーキング機能 - Google Patents
プロセス毎ネットワーキング機能 Download PDFInfo
- Publication number
- JP2014526728A JP2014526728A JP2014529674A JP2014529674A JP2014526728A JP 2014526728 A JP2014526728 A JP 2014526728A JP 2014529674 A JP2014529674 A JP 2014529674A JP 2014529674 A JP2014529674 A JP 2014529674A JP 2014526728 A JP2014526728 A JP 2014526728A
- Authority
- JP
- Japan
- Prior art keywords
- network
- access
- computing device
- token
- functions
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 142
- 230000008569 process Effects 0.000 title claims abstract description 101
- 230000006855 networking Effects 0.000 title abstract description 13
- 230000006870 function Effects 0.000 claims abstract description 117
- 238000009434 installation Methods 0.000 claims description 10
- 238000013459 approach Methods 0.000 abstract description 9
- 238000004891 communication Methods 0.000 description 14
- 238000012545 processing Methods 0.000 description 7
- 238000010586 diagram Methods 0.000 description 4
- 239000000284 extract Substances 0.000 description 4
- 230000007246 mechanism Effects 0.000 description 4
- 230000003287 optical effect Effects 0.000 description 4
- 238000007726 management method Methods 0.000 description 3
- 230000008901 benefit Effects 0.000 description 2
- 230000001010 compromised effect Effects 0.000 description 2
- 238000004883 computer application Methods 0.000 description 2
- 230000004044 response Effects 0.000 description 2
- 230000015572 biosynthetic process Effects 0.000 description 1
- 230000000903 blocking effect Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 239000002131 composite material Substances 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 235000019580 granularity Nutrition 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000005236 sound signal Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 239000013598 vector Substances 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
- G06F21/335—User authentication using certificates for accessing specific resources, e.g. using Kerberos tickets
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2121—Chip on media, e.g. a disk or tape with a chip embedded in its case
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2145—Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/34—Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Description
図1は、概括的に100において1つ又は複数の実施例による動作環境を示す。環境100は、1つ又は複数のプロセッサ、メモリ106として示すコンピュータ読み取り可能な記憶媒体の例、オペレーティング・システム108、及び1つ又は複数のアプリケーション108を有するコンピュータ装置102を含む。コンピュータ装置102は、限定でなく、例示として、タブレット・コンピュータ、携帯電話機、携帯情報端末(PDA)などのハンドヘルド・コンピュータ、ポータブル・コンピュータ、デスクトップ・コンピュータ等などの何れかの適切なコンピュータ装置として実施することが可能である。コンピュータ装置102の種々の例を図6及び図7において示し、以下に説明する。
以下では、上述のシステム及び装置を利用して実現し得るプロセス毎のネットワーキング機能手法を説明する。手順それぞれの局面は、ハードウェア、ファームウェア、又は、ソフトウェア、又はそれらの組合せで実現し得る。上記手順は、1つ又は複数の装置によって行われる動作を規定するブロックの組として示し、それぞれのブロックによる動作の実行について示された順序に必ずしも制限されないものとする。以下の一部では、図1の環境100、並びに、図2及び図3のシステム200、300をそれぞれ参照する。
図7は、図1を参照して説明されたコンピュータ装置102を含む例示的なシステム700を示す。例示的なシステム700は、パソコン(PC)上、テレビジョン装置上、及び/又はモバイル装置上でアプリケーションが実行される場合のシームレスなユーザ体験のためのユビキタス環境を可能にする。サービス及びアプリケーションは、アプリケーションを利用し、ビデオ・ゲームをし、ビデオをみるなどの間に1つの装置から次の装置に移る際の共通のユーザ体験のために3つの環境全てにおいて実質的に同様に実行される。
本発明は、構造的な特徴及び/方法論的な動作に特有の文言で記載しているが、特許請求の範囲記載の本発明は、記載された特定の特徴又は動作に必ずしも制限されない。むしろ、上記特定の特徴及び動作は、本特許請求の範囲記載の発明を実現する例示的な形態として開示している。
Claims (10)
- コンピュータ装置によって実現される方法であって、
プロセスに関連付けられたトークンに基づいて前記コンピュータ装置上で実行される前記プロセスについてネットワーク機能へのアクセスが許可されるか否かを判定する工程であって、前記トークンは、マニフェストに記述された1つ又は複数のネットワーク機能を参照する1つ又は複数のセキュリティ識別子を有する工程と、
前記ネットワーク機能への前記アクセスを判定に基づいて管理する工程と
を含む方法。 - 請求項1に記載の方法であって、前記マニフェストは、実行されると、前記プロセスを実現する実行可能なコードのインストールの一部として前記コンピュータ装置上に記憶される方法。
- 請求項2記載の方法であって、前記ネットワーク機能の前記記述は、前記コンピュータ装置上の前記実行可能なコードのインストールの一部として耐タンパ性を有する場所に記憶される方法。
- 請求項1記載の方法であって、前記トークンは、前記プロセスにアクセス可能でない前記コンピュータ装置の耐タンパ性の場所に記憶された前記機能の記述にアクセスすることによって形成される方法。
- 請求項1記載の方法であって、前記判定する工程及び前記管理する工程は、前記コンピュータ装置上のオペレーティング・システムの実行を介して行われる方法。
- 請求項1記載の方法であって、前記マニフェストに記述された少なくとも1つの前記ネットワーク機能が、前記プロセスによるループバックが許可されるか否かを示す方法。
- 請求項1記載の方法であって、前記マニフェストに記述された少なくとも1つの前記ネットワーク機能は、前記プロセスによる使用に、ネットワークを介した発信接続が許可されるか否かを示す方法。
- 請求項1記載の方法であって、前記マニフェストに記述された少なくとも1つの前記ネットワーク機能は、前記プロセスによる使用に、ネットワークを介した着信及び発信の接続が許可されるか否かを示す方法。
- 請求項8記載の方法であって、前記着信接続は、前記プロセスが不招請接続を受け入れることを許可する方法。
- 請求項1記載の方法であって、前記マニフェストに記述された少なくとも1つの前記ネットワーク機能は、前記プロセスによる使用に、専用ネットワーク・アクセスに、前記プロセスによる使用が許可されるか否かを示す方法。
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/226,223 US9118686B2 (en) | 2011-09-06 | 2011-09-06 | Per process networking capabilities |
US13/226,223 | 2011-09-06 | ||
PCT/US2011/055538 WO2013036253A1 (en) | 2011-09-06 | 2011-10-09 | Per process networking capabilities |
Publications (3)
Publication Number | Publication Date |
---|---|
JP2014526728A true JP2014526728A (ja) | 2014-10-06 |
JP2014526728A5 JP2014526728A5 (ja) | 2014-11-13 |
JP6038924B2 JP6038924B2 (ja) | 2016-12-07 |
Family
ID=47483999
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2014529674A Active JP6038924B2 (ja) | 2011-09-06 | 2011-10-09 | プロセス毎ネットワーキング機能 |
Country Status (6)
Country | Link |
---|---|
US (1) | US9118686B2 (ja) |
EP (1) | EP2754084B1 (ja) |
JP (1) | JP6038924B2 (ja) |
KR (1) | KR101839647B1 (ja) |
CN (1) | CN102882855B (ja) |
WO (1) | WO2013036253A1 (ja) |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9773102B2 (en) | 2011-09-09 | 2017-09-26 | Microsoft Technology Licensing, Llc | Selective file access for applications |
US8990561B2 (en) | 2011-09-09 | 2015-03-24 | Microsoft Technology Licensing, Llc | Pervasive package identifiers |
US9800688B2 (en) | 2011-09-12 | 2017-10-24 | Microsoft Technology Licensing, Llc | Platform-enabled proximity service |
US10356204B2 (en) | 2012-12-13 | 2019-07-16 | Microsoft Technology Licensing, Llc | Application based hardware identifiers |
US9021574B1 (en) * | 2013-03-12 | 2015-04-28 | TrustPipe LLC | Configuration management for network activity detectors |
US9998536B2 (en) * | 2013-05-29 | 2018-06-12 | Microsoft Technology Licensing, Llc | Metered network synchronization |
US9900285B2 (en) | 2015-08-10 | 2018-02-20 | International Business Machines Corporation | Passport-controlled firewall |
US10536464B2 (en) * | 2016-06-22 | 2020-01-14 | Intel Corporation | Secure and smart login engine |
US11381575B2 (en) * | 2019-05-03 | 2022-07-05 | Microsoft Technology Licensing, Llc | Controlling access to resources of edge devices |
DE102022206744B3 (de) | 2022-07-01 | 2023-11-02 | Infineon Technologies Ag | Ressourcenschutz |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002517854A (ja) * | 1998-06-12 | 2002-06-18 | マイクロソフト コーポレイション | 制限付きのトークンを使用したセキュリティモデル |
JP2005528051A (ja) * | 2002-05-28 | 2005-09-15 | シンビアン リミテッド | セキュアな移動体無線装置 |
US20060193467A1 (en) * | 2005-02-16 | 2006-08-31 | Joseph Levin | Access control in a computer system |
JP2010176690A (ja) * | 1998-06-12 | 2010-08-12 | Microsoft Corp | 信頼できないコンテントを安全に実行するための方法およびシステム |
JP2013041370A (ja) * | 2011-08-12 | 2013-02-28 | Toshiba Corp | エネルギー管理装置および電力管理システム |
Family Cites Families (129)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5956715A (en) | 1994-12-13 | 1999-09-21 | Microsoft Corporation | Method and system for controlling user access to a resource in a networked computing environment |
EP0880840A4 (en) * | 1996-01-11 | 2002-10-23 | Mrj Inc | DEVICE FOR CONTROLLING ACCESS AND DISTRIBUTION OF DIGITAL PROPERTY |
US6151643A (en) | 1996-06-07 | 2000-11-21 | Networks Associates, Inc. | Automatic updating of diverse software products on multiple client computer systems by downloading scanning application to client computer and generating software list on client computer |
EP0862124A3 (en) | 1997-02-28 | 2003-03-26 | Fujitsu Limited | File access system for efficiently accessing a file having encrypted data within a storage device |
US5974549A (en) | 1997-03-27 | 1999-10-26 | Soliton Ltd. | Security monitor |
US6117187A (en) | 1997-09-30 | 2000-09-12 | Hewlett-Packard Company | Automatic generation of a software installation package |
US6101607A (en) | 1998-04-24 | 2000-08-08 | International Business Machines Corporation | Limit access to program function |
US6697569B1 (en) | 1998-09-11 | 2004-02-24 | Telefonaktiebolaget Lm Ericsson (Publ) | Automated conversion of a visual presentation into digital data format |
US7151832B1 (en) | 1999-11-18 | 2006-12-19 | International Business Machines Corporation | Dynamic encryption and decryption of a stream of data |
US7398532B1 (en) | 2000-03-02 | 2008-07-08 | Hewlett-Packard Development Company, L.P. | System and method for establishing a secure execution environment for a software process |
US6725452B1 (en) | 2000-06-01 | 2004-04-20 | Aduoa, Inc. | Method for resolving dependency conflicts among multiple operative entities within a computing environment |
US20040030926A1 (en) | 2000-06-20 | 2004-02-12 | Clark James R. | Multi-session secured digital transmission process |
US7669238B2 (en) * | 2000-06-21 | 2010-02-23 | Microsoft Corporation | Evidence-based application security |
AU2001280490A1 (en) | 2000-07-10 | 2002-01-21 | Critical Devices, Inc. | Method and system for software inventory management using a global central repository |
US20030084134A1 (en) | 2000-09-01 | 2003-05-01 | Pace Charles P. | System and method for bridging assets to network nodes on multi-tiered networks |
JP3776705B2 (ja) | 2000-09-28 | 2006-05-17 | 株式会社東芝 | 通信システム、移動端末装置、ゲートウェイ装置及び通信制御方法 |
US6604209B1 (en) | 2000-09-29 | 2003-08-05 | Sun Microsystems, Inc. | Distributed component testing in an enterprise computer system |
JP2003044297A (ja) | 2000-11-20 | 2003-02-14 | Humming Heads Inc | コンピュータリソースの制御を行なう情報処理方法および装置、情報処理システム及びその制御方法並びに記憶媒体、プログラム |
US20030037237A1 (en) | 2001-04-09 | 2003-02-20 | Jean-Paul Abgrall | Systems and methods for computer device authentication |
US7069330B1 (en) | 2001-07-05 | 2006-06-27 | Mcafee, Inc. | Control of interaction between client computer applications and network resources |
US7401235B2 (en) | 2002-05-10 | 2008-07-15 | Microsoft Corporation | Persistent authorization context based on external authentication |
US6865659B2 (en) | 2002-06-07 | 2005-03-08 | Sun Microsystems, Inc. | Using short references to access program elements in a large address space |
US7542988B1 (en) | 2006-01-03 | 2009-06-02 | Symantec Corporation | File type associative application layered system |
US7152243B2 (en) | 2002-06-27 | 2006-12-19 | Microsoft Corporation | Providing a secure hardware identifier (HWID) for use in connection with digital rights management (DRM) system |
US7401352B2 (en) | 2002-08-30 | 2008-07-15 | International Business Machines Corporation | Secure system and method for enforcement of privacy policy and protection of confidentiality |
EP1420323A1 (en) | 2002-11-18 | 2004-05-19 | Koninklijke KPN N.V. | Method and system for distribution of software components |
US7337442B2 (en) | 2002-12-03 | 2008-02-26 | Microsoft Corporation | Methods and systems for cooperative scheduling of hardware resource elements |
US20040199787A1 (en) * | 2003-04-02 | 2004-10-07 | Sun Microsystems, Inc., A Delaware Corporation | Card device resource access control |
US7478094B2 (en) | 2003-06-11 | 2009-01-13 | International Business Machines Corporation | High run-time performance method for setting ACL rule for content management security |
US7392383B2 (en) * | 2003-09-25 | 2008-06-24 | International Business Machines Corporation | Method and apparatus for providing process-based access controls on computer resources |
US20050091658A1 (en) | 2003-10-24 | 2005-04-28 | Microsoft Corporation | Operating system resource protection |
US20050091535A1 (en) | 2003-10-24 | 2005-04-28 | Microsoft Corporation | Application identity for software products |
US8590032B2 (en) | 2003-12-10 | 2013-11-19 | Aventail Llc | Rule-based routing to resources through a network |
US7568195B2 (en) | 2003-12-16 | 2009-07-28 | Microsoft Corporation | Determining a maximal set of dependent software updates valid for installation |
US7480655B2 (en) | 2004-01-09 | 2009-01-20 | Webroor Software, Inc. | System and method for protecting files on a computer from access by unauthorized applications |
US7698393B2 (en) | 2004-03-23 | 2010-04-13 | Microsoft Corporation | Method and system for shadowing information between computing devices |
US20050246762A1 (en) * | 2004-04-29 | 2005-11-03 | International Business Machines Corporation | Changing access permission based on usage of a computer resource |
US20050256859A1 (en) | 2004-05-13 | 2005-11-17 | Internation Business Machines Corporation | System, application and method of providing application programs continued access to frozen file systems |
US7650627B1 (en) | 2004-05-28 | 2010-01-19 | Sap Ag | Abstract configuration files for efficient implementation of security services |
US7540013B2 (en) * | 2004-06-07 | 2009-05-26 | Check Point Software Technologies, Inc. | System and methodology for protecting new computers by applying a preconfigured security update policy |
US7509497B2 (en) * | 2004-06-23 | 2009-03-24 | Microsoft Corporation | System and method for providing security to an application |
US20100081375A1 (en) | 2008-09-30 | 2010-04-01 | Apple Inc. | System and method for simplified control of electronic devices |
US7703090B2 (en) | 2004-08-31 | 2010-04-20 | Microsoft Corporation | Patch un-installation |
US7676835B2 (en) * | 2004-08-31 | 2010-03-09 | International Business Machines Corporation | System and method for regulating access to objects in a content repository |
US8499337B1 (en) | 2004-10-06 | 2013-07-30 | Mcafee, Inc. | Systems and methods for delegation and notification of administration of internet access |
WO2006055838A2 (en) | 2004-11-18 | 2006-05-26 | America Online, Inc. | Runtime environment |
US7774753B1 (en) | 2004-11-18 | 2010-08-10 | Adobe Systems Incorporated | System and method for communicating data among two or more programs |
US7475396B2 (en) | 2004-12-03 | 2009-01-06 | International Business Machines Corporation | Method and apparatus for defining, building and deploying pluggable and independently configurable install components |
CN100490387C (zh) | 2004-12-28 | 2009-05-20 | 北京邮电大学 | 用于应用服务器的基于令牌的细粒度访问控制系统及方法 |
US7472377B2 (en) | 2005-01-18 | 2008-12-30 | International Business Machines Corporation | Systems and methods for determining software package identity during a system build |
US7802294B2 (en) * | 2005-01-28 | 2010-09-21 | Microsoft Corporation | Controlling computer applications' access to data |
US7650501B1 (en) | 2005-02-15 | 2010-01-19 | Sun Microsystems, Inc. | System and methods for construction, fusion, prosecution, and maintenance of minimized operating environments |
US7877091B2 (en) | 2005-04-18 | 2011-01-25 | Research In Motion Limited | Method and system for executing a container managed application on a processing device |
US20060259980A1 (en) * | 2005-05-16 | 2006-11-16 | Microsoft Corporation | Method and system for limiting rights of services |
US7716734B2 (en) | 2005-05-19 | 2010-05-11 | Microsoft Corporation | Systems and methods for pattern matching on principal names to control access to computing resources |
US7580933B2 (en) * | 2005-07-28 | 2009-08-25 | Microsoft Corporation | Resource handling for taking permissions |
US8073442B2 (en) | 2005-10-05 | 2011-12-06 | Microsoft Corporation | Binding a device to a provider |
US20070083620A1 (en) | 2005-10-07 | 2007-04-12 | Pedersen Bradley J | Methods for selecting between a predetermined number of execution methods for an application program |
CN1959631B (zh) | 2005-11-04 | 2016-09-21 | 上海启明软件股份有限公司 | 一种基于itron的应用软件自主装配系统及方法 |
US7664924B2 (en) | 2005-12-01 | 2010-02-16 | Drive Sentry, Inc. | System and method to secure a computer system by selective control of write access to a data storage medium |
US20100153671A1 (en) | 2005-12-01 | 2010-06-17 | Drive Sentry Inc. | System and method to secure a computer system by selective control of write access to a data storage medium |
US7779265B2 (en) | 2005-12-13 | 2010-08-17 | Microsoft Corporation | Access control list inheritance thru object(s) |
US8972449B2 (en) * | 2005-12-29 | 2015-03-03 | Nextlabs, Inc. | Preventing conflicts of interests between two or more groups |
US8621549B2 (en) * | 2005-12-29 | 2013-12-31 | Nextlabs, Inc. | Enforcing control policies in an information management system |
US8209747B2 (en) * | 2006-01-03 | 2012-06-26 | Cisco Technology, Inc. | Methods and systems for correlating rules with corresponding event log entries |
US20070192500A1 (en) | 2006-02-16 | 2007-08-16 | Infoexpress, Inc. | Network access control including dynamic policy enforcement point |
US20070208857A1 (en) | 2006-02-21 | 2007-09-06 | Netiq Corporation | System, method, and computer-readable medium for granting time-based permissions |
EP1833222A1 (en) | 2006-03-10 | 2007-09-12 | Abb Research Ltd. | Access control protocol for embedded devices |
US20070240194A1 (en) * | 2006-03-28 | 2007-10-11 | Hargrave Bentley J | Scoped permissions for software application deployment |
US20070234412A1 (en) | 2006-03-29 | 2007-10-04 | Smith Ned M | Using a proxy for endpoint access control |
US8001528B2 (en) | 2006-03-30 | 2011-08-16 | Microsoft Corporation | Organization of application state and configuration settings |
US9489109B2 (en) | 2006-03-30 | 2016-11-08 | Sony Ericsson Mobile Communication Ab | Data communication in an electronic device |
US8166472B2 (en) | 2006-10-12 | 2012-04-24 | Apple Inc. | Installation utility system and method |
US20080120707A1 (en) | 2006-11-22 | 2008-05-22 | Alexander Ramia | Systems and methods for authenticating a device by a centralized data server |
US7934087B2 (en) | 2006-11-29 | 2011-04-26 | Novell, Inc. | Techniques for secure event recording and processing |
US7925875B2 (en) | 2006-12-31 | 2011-04-12 | Sandisk Corporation | Systems and methods for identifying and booting a computer architecture |
CN100483352C (zh) | 2007-02-13 | 2009-04-29 | 华为技术有限公司 | Idl调用装置及调用方法 |
US20080201705A1 (en) | 2007-02-15 | 2008-08-21 | Sun Microsystems, Inc. | Apparatus and method for generating a software dependency map |
CN101616719A (zh) | 2007-02-23 | 2009-12-30 | 高通股份有限公司 | 用以基于接近度创建或加入游戏会话的方法和设备 |
US7797743B2 (en) | 2007-02-26 | 2010-09-14 | Microsoft Corporation | File conversion in restricted process |
US20080244723A1 (en) | 2007-03-27 | 2008-10-02 | Microsoft Corporation | Firewall Restriction Using Manifest |
US8239954B2 (en) | 2007-05-07 | 2012-08-07 | Microsoft Corporation | Access control based on program properties |
CN102006333B (zh) | 2007-06-11 | 2012-12-26 | 华为技术有限公司 | 安装软件组件的方法、系统及装置 |
US8185889B2 (en) | 2007-06-19 | 2012-05-22 | Red Hat, Inc. | Methods and systems for porting software packages from one format to another |
GB2455059A (en) | 2007-10-09 | 2009-06-03 | Symbian Software Ltd | Transmitting device pairing information over multiple available out of band channels/interfaces |
US8978028B2 (en) | 2007-10-10 | 2015-03-10 | Microsoft Technology Licensing, Llc | Transactional multi-package installation |
US8356335B2 (en) * | 2007-10-30 | 2013-01-15 | Apple Inc. | Techniques for authentication via network connections |
KR101474561B1 (ko) | 2007-11-27 | 2014-12-19 | 삼성전자주식회사 | 이동통신 단말기에서의 어플리케이션 실행방법 및 장치 |
US8107879B2 (en) | 2007-12-31 | 2012-01-31 | Intel Corporation | Device, system, and method of establishing multiple wireless connections |
US20090193507A1 (en) | 2008-01-28 | 2009-07-30 | Wael Ibrahim | Authentication messaging service |
EP2086206A1 (en) | 2008-01-31 | 2009-08-05 | Alcatel Lucent | System for operating a peer-to-peer network taking into account access network subscriber information |
JP4613969B2 (ja) | 2008-03-03 | 2011-01-19 | ソニー株式会社 | 通信装置、及び通信方法 |
EP2107458A1 (en) | 2008-03-31 | 2009-10-07 | Jatho Investments | Modelling software appliance |
US7930760B2 (en) | 2008-04-01 | 2011-04-19 | Microsoft Corporation | Centralized enforcement of name-based computer system security rules |
US8090852B2 (en) * | 2008-06-04 | 2012-01-03 | Sophos Plc | Managing use of proxies to access restricted network locations |
US8407693B2 (en) | 2008-06-09 | 2013-03-26 | International Business Machines Corporation | Managing package dependencies |
US20090327900A1 (en) | 2008-06-26 | 2009-12-31 | Microsoft Corporation | Indicating resources to which there are access rights |
US8204969B2 (en) | 2008-08-05 | 2012-06-19 | Canon Kabushiki Kaisha | Method for retrieving updates via the internet |
US20100058320A1 (en) | 2008-09-04 | 2010-03-04 | Microsoft Corporation | Managing Distributed System Software On A Gaming System |
US9043919B2 (en) | 2008-10-21 | 2015-05-26 | Lookout, Inc. | Crawling multiple markets and correlating |
US8146134B2 (en) * | 2008-10-28 | 2012-03-27 | Yahoo! Inc. | Scalable firewall policy management platform |
US20100174599A1 (en) | 2009-01-05 | 2010-07-08 | Apple Inc. | System and method for providing content associated with a product or service |
US9288210B2 (en) * | 2009-01-26 | 2016-03-15 | Microsoft Technology Licensing, Llc | Revocable object access |
US8131214B2 (en) | 2009-03-02 | 2012-03-06 | Motorola Mobility, Inc. | Method for selecting content for transfer or synchronization between devices |
US8375377B2 (en) | 2009-03-06 | 2013-02-12 | International Business Machines Corporation | Controlling java virtual machine component behavior on a per-classloader basis |
US8468608B1 (en) | 2009-03-30 | 2013-06-18 | Symantec Corporation | Enforcing digital rights management in a heterogeneous environment |
US20100287513A1 (en) | 2009-05-05 | 2010-11-11 | Microsoft Corporation | Multi-device gesture interactivity |
KR101590188B1 (ko) | 2009-05-08 | 2016-01-29 | 삼성전자주식회사 | 휴대단말기에서 소프트웨어 패키지의 무결성을 검증하는 방법 |
US9270683B2 (en) | 2009-05-15 | 2016-02-23 | Amazon Technologies, Inc. | Storage device authentication |
US8826269B2 (en) | 2009-06-15 | 2014-09-02 | Microsoft Corporation | Annotating virtual application processes |
US20110066851A1 (en) * | 2009-09-14 | 2011-03-17 | International Business Machines Corporation | Secure Route Discovery Node and Policing Mechanism |
US20110070827A1 (en) | 2009-09-24 | 2011-03-24 | Research In Motion Limited | Communications device and method for initiating communications at a communications device |
US20110098030A1 (en) | 2009-10-27 | 2011-04-28 | Nokia Corporation | Method and apparatus for activating services |
US8838644B2 (en) | 2009-11-25 | 2014-09-16 | International Business Machines Corporation | Extensible access control list framework |
CN102129364B (zh) | 2010-01-14 | 2013-09-25 | 中国电信股份有限公司 | 应用程序中嵌入微件工具栏的方法和快速访问微件的方法 |
US8745239B2 (en) | 2010-04-07 | 2014-06-03 | Limelight Networks, Inc. | Edge-based resource spin-up for cloud computing |
US8782106B2 (en) | 2010-07-02 | 2014-07-15 | Code Systems Corporation | Method and system for managing execution of virtual applications |
US20120194534A1 (en) | 2011-02-02 | 2012-08-02 | Alcatel-Lucent Usa Inc. | System and Method for Managing Cache Storage in Adaptive Video Streaming System |
US20120297288A1 (en) | 2011-05-16 | 2012-11-22 | Edward Mansouri | Method and System for Enhancing Web Content |
US9319406B2 (en) | 2011-07-12 | 2016-04-19 | Apple Inc. | System and method for linking pre-installed software to a user account on an online store |
US20130054734A1 (en) | 2011-08-23 | 2013-02-28 | Microsoft Corporation | Migration of cloud applications between a local computing device and cloud |
CN103765427B (zh) | 2011-09-07 | 2017-02-15 | 英特尔公司 | 检验设备的固件完整性 |
US20130067459A1 (en) | 2011-09-09 | 2013-03-14 | Microsoft Corporation | Order-Independent Deployment Collections with Dependency Package Identifiers |
US8990561B2 (en) | 2011-09-09 | 2015-03-24 | Microsoft Technology Licensing, Llc | Pervasive package identifiers |
US9800688B2 (en) | 2011-09-12 | 2017-10-24 | Microsoft Technology Licensing, Llc | Platform-enabled proximity service |
CN103188797A (zh) | 2011-12-28 | 2013-07-03 | 北京三星通信技术研究有限公司 | 一种改变tdd上下行配置的方法 |
US9152784B2 (en) | 2012-04-18 | 2015-10-06 | Mcafee, Inc. | Detection and prevention of installation of malicious mobile applications |
US10356204B2 (en) | 2012-12-13 | 2019-07-16 | Microsoft Technology Licensing, Llc | Application based hardware identifiers |
US9858247B2 (en) | 2013-05-20 | 2018-01-02 | Microsoft Technology Licensing, Llc | Runtime resolution of content references |
-
2011
- 2011-09-06 US US13/226,223 patent/US9118686B2/en active Active
- 2011-10-09 JP JP2014529674A patent/JP6038924B2/ja active Active
- 2011-10-09 KR KR1020147006056A patent/KR101839647B1/ko active IP Right Grant
- 2011-10-09 EP EP11872101.8A patent/EP2754084B1/en active Active
- 2011-10-09 WO PCT/US2011/055538 patent/WO2013036253A1/en active Application Filing
-
2012
- 2012-09-06 CN CN201210326881.7A patent/CN102882855B/zh active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002517854A (ja) * | 1998-06-12 | 2002-06-18 | マイクロソフト コーポレイション | 制限付きのトークンを使用したセキュリティモデル |
JP2010176690A (ja) * | 1998-06-12 | 2010-08-12 | Microsoft Corp | 信頼できないコンテントを安全に実行するための方法およびシステム |
JP2005528051A (ja) * | 2002-05-28 | 2005-09-15 | シンビアン リミテッド | セキュアな移動体無線装置 |
US20060193467A1 (en) * | 2005-02-16 | 2006-08-31 | Joseph Levin | Access control in a computer system |
JP2013041370A (ja) * | 2011-08-12 | 2013-02-28 | Toshiba Corp | エネルギー管理装置および電力管理システム |
Also Published As
Publication number | Publication date |
---|---|
KR20140068935A (ko) | 2014-06-09 |
KR101839647B1 (ko) | 2018-03-16 |
US9118686B2 (en) | 2015-08-25 |
EP2754084A4 (en) | 2015-05-06 |
EP2754084B1 (en) | 2016-11-30 |
CN102882855A (zh) | 2013-01-16 |
WO2013036253A1 (en) | 2013-03-14 |
US20130061309A1 (en) | 2013-03-07 |
CN102882855B (zh) | 2016-06-29 |
EP2754084A1 (en) | 2014-07-16 |
JP6038924B2 (ja) | 2016-12-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6038924B2 (ja) | プロセス毎ネットワーキング機能 | |
KR101951973B1 (ko) | 자원 액세스 허가 기법 | |
KR102146034B1 (ko) | 네트워크 종점들의 보안 보호와 원격 관리를 위한 사용자 인터페이스 | |
JP6072792B2 (ja) | ウェブランタイムシステムのためのサンドボクシング技術 | |
CN109923522A (zh) | 匿名容器 | |
US8533811B2 (en) | Developer phone registration | |
CN107431924B (zh) | 将设备标识符和用户标识符相关联的设备盗窃防护 | |
Petracca et al. | {AWare}: Preventing Abuse of {Privacy-Sensitive} Sensors via Operation Bindings | |
KR102076878B1 (ko) | 안티 멀웨어 프로세스를 보호하는 기법 | |
KR20150129739A (ko) | 자동적인 거짓 디지털 인증서 검출 기법 | |
EP2859487A1 (en) | Evaluating whether to block or allow installation of a software application | |
Sze et al. | Hardening openstack cloud platforms against compute node compromises | |
Neisse et al. | A privacy enforcing framework for Android applications | |
US20130061316A1 (en) | Capability Access Management for Processes | |
KR20140068940A (ko) | 애플리케이션용 콘텐츠 핸들링 기법 | |
Gupta et al. | A risk-driven model to minimize the effects of human factors on smart devices | |
CN113687925B (zh) | 设备操作处理方法及装置、存储介质、计算机设备 | |
Petracca et al. | Aware: Controlling app access to I/O devices on mobile platforms | |
US10552626B2 (en) | System and method for selecting a data entry mechanism for an application based on security requirements | |
US9240988B1 (en) | Computer system employing dual-band authentication | |
US20170201546A1 (en) | Method and apparatus for controlling functionality using codes | |
Friesen | PLOX: A Secure Serverless Framework for the Smart Home | |
Obser | User-controlled Internet Connections in Android | |
Resource Squatting Hazards in Modern Operating Systems: Analyses and Mitigations |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20140925 |
|
A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20140925 |
|
A711 | Notification of change in applicant |
Free format text: JAPANESE INTERMEDIATE CODE: A711 Effective date: 20150523 |
|
A977 | Report on retrieval |
Free format text: JAPANESE INTERMEDIATE CODE: A971007 Effective date: 20150828 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20150929 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20151224 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20160607 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20160906 |
|
TRDD | Decision of grant or rejection written | ||
A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20161004 |
|
A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20161102 |
|
R150 | Certificate of patent or registration of utility model |
Ref document number: 6038924 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |