JP5635993B2 - モバイル装置とコンピュータを組み合わせ、安全な個人ごとの環境を生成する装置および方法 - Google Patents
モバイル装置とコンピュータを組み合わせ、安全な個人ごとの環境を生成する装置および方法 Download PDFInfo
- Publication number
- JP5635993B2 JP5635993B2 JP2011536380A JP2011536380A JP5635993B2 JP 5635993 B2 JP5635993 B2 JP 5635993B2 JP 2011536380 A JP2011536380 A JP 2011536380A JP 2011536380 A JP2011536380 A JP 2011536380A JP 5635993 B2 JP5635993 B2 JP 5635993B2
- Authority
- JP
- Japan
- Prior art keywords
- mobile device
- trusted
- user
- policy
- code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims description 9
- 230000006870 function Effects 0.000 claims description 9
- 238000012795 verification Methods 0.000 claims description 8
- 230000015654 memory Effects 0.000 claims description 7
- 238000012545 processing Methods 0.000 claims description 5
- 230000002093 peripheral effect Effects 0.000 description 4
- 238000010586 diagram Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000003993 interaction Effects 0.000 description 3
- 230000001010 compromised effect Effects 0.000 description 2
- 238000002955 isolation Methods 0.000 description 2
- 238000012544 monitoring process Methods 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 241000700605 Viruses Species 0.000 description 1
- 230000004913 activation Effects 0.000 description 1
- 230000002155 anti-virotic effect Effects 0.000 description 1
- 230000008878 coupling Effects 0.000 description 1
- 238000010168 coupling process Methods 0.000 description 1
- 238000005859 coupling reaction Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
- 230000036541 health Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000005259 measurement Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000003032 molecular docking Methods 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 230000001568 sexual effect Effects 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2153—Using hardware token as a secondary aspect
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Storage Device Security (AREA)
- Telephone Function (AREA)
Description
Claims (15)
- 動作可能にPCに結合されると、ユーザーのための安全なコンピューティング環境を生成するように前記PCとともに使用するために構成されたモバイル装置であって、
1つまたは複数のプロセッサを含むCPUと、
前記1つまたは複数のプロセッサにより実行されると、前記モバイル装置にOSを実装する命令を格納するコンピュータ可読媒体と、
前記CPUの一部および前記OSの一部を使用して実装されたトラスティッドコアであって、前記PCのインテグリティを検証するように構成され、前記トラスティッドコアが前記PCに常駐する実行可能コードが信頼されるとの検証を実行できるように、前記PC上での処理をサスペンドし、前記PCの機能の制御を引き継ぐように更に構成される、トラスティッドコアと
を備えることを特徴とするモバイル装置。 - 前記1つまたは複数のプロセッサにより実行されると、前記PC上で実行するソフトウェアが適用されるライセンス条項を実行することを目的として構成されたライセンス実行モジュールを実装する命令を前記コンピュータ可読媒体はさらに格納すること、又は、該命令を格納する別のコンピュータ可読媒体を前記モバイル装置はさらに備えることを特徴とする請求項1に記載のモバイル装置。
- 前記1つまたは複数のプロセッサにより実行されると、前記ユーザーによる前記PCの使用が適用されるポリシーを実行することを目的として構成されたポリシー実行モジュールを実装する命令を前記コンピュータ可読媒体はさらに格納すること、又は、該命令を格納する別のコンピュータ可読媒体を前記モバイル装置はさらに備えることを特徴とする請求項1に記載のモバイル装置。
- 前記ポリシーは、安全性ポリシー、アプリケーション使用ポリシー、生産性ポリシー、管理ポリシーの少なくともひとつを含むことを特徴とする請求項3に記載のモバイル装置。
- 前記検証は、前記PCにおいてコードが変更されておらず信頼できるものであることをチェックすることを含むことを特徴とする請求項1に記載のモバイル装置。
- 前記PCは、デスクトップPC、ラップトップPC、ワークステーションのうちの1つであることを特徴とする請求項1に記載のモバイル装置。
- 前記1つまたは複数のプロセッサにより実行されると、前記PCにおいて前記ユーザーに対し体験を個人化するために個人化データを前記PCに開示することを目的として構成された個人化モジュールを実装する命令を前記コンピュータ可読媒体はさらに格納すること、又は、該命令を格納する別のコンピュータ可読媒体を前記モバイル装置はさらに備えることを特徴とする請求項1に記載のモバイル装置。
- 前記個人化データは、ユーザーのプロファイル、設定、ユーザープリファレンス、証明書、データ、アプリケーション、デスクトップのうち少なくとも1つを含むことを特徴とする請求項7に記載のモバイル装置。
- 前記トラスティッドコアは、不変のコードを実行することを特徴とする請求項1に記載のモバイル装置。
- 携帯電話、PDA、スマートフォン、パーソナルメディアプレーヤー、携帯ゲーム機、デジタルカメラ、デジタルレコーダー、ポケットPCのうちの1つまたは複数により提供される機能をさらに備えたことを特徴とする請求項1に記載のモバイル装置。
- モバイル装置と動作可能に結合されると、保護されたコンピューティング環境を実装するようにPCを構成する方法であって、
前記モバイル装置中に配置される少なくとも1つのトラスティッドコアを含む1つまたは複数の機能と結合して動作する入力を構成するステップと、
前記トラスティッドコアが、前記PC内に常駐する実行可能コードが信頼されるとの検証を実行できるように、前記PC上での処理を前記トラスティッドコアがサスペンドし、前記PCの機能の制御を引き継ぐステップと
を備えたことを特徴とする方法。 - PCにおける個人化されたユーザーの体験を実現するために前記モバイル装置から個人化データをアクセスするステップであって、前記PCにおける前記実行可能コードが信頼できるとの検証の後に実行されるステップをさらに備えたことを特徴とする請求項11に記載の方法。
- 前記入力は、前記モバイル装置から前記PCに配置された1つまたは複数のメモリへの直接のアクセスを実装するインターフェースを使用して動作可能に前記モバイル装置に結合されることを特徴とする請求項11に記載の方法。
- 前記モバイル装置およびPCは、前記モバイル装置がPCに直接合体され、直接合わさると前記モバイル装置およびPCは動作可能に結合されるよう各々構成されることを特徴とする請求項11に記載の方法。
- 前記検証の実行は、前記実行可能コードが、当初の形式から変更しないかどうかを判定するステップまたは前記実行可能コードがマルウェアから影響を受けていないかを判定するステップを含むことを特徴とする請求項11に記載の方法。
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/270,920 US8595491B2 (en) | 2008-11-14 | 2008-11-14 | Combining a mobile device and computer to create a secure personalized environment |
US12/270,920 | 2008-11-14 | ||
PCT/US2009/062740 WO2010056552A2 (en) | 2008-11-14 | 2009-10-30 | Combining a mobile device and computer to create a secure personalized environment |
Publications (3)
Publication Number | Publication Date |
---|---|
JP2012508931A JP2012508931A (ja) | 2012-04-12 |
JP2012508931A5 JP2012508931A5 (ja) | 2014-08-07 |
JP5635993B2 true JP5635993B2 (ja) | 2014-12-03 |
Family
ID=42170638
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2011536380A Active JP5635993B2 (ja) | 2008-11-14 | 2009-10-30 | モバイル装置とコンピュータを組み合わせ、安全な個人ごとの環境を生成する装置および方法 |
Country Status (5)
Country | Link |
---|---|
US (1) | US8595491B2 (ja) |
EP (1) | EP2347542B1 (ja) |
JP (1) | JP5635993B2 (ja) |
CN (1) | CN102217226B (ja) |
WO (1) | WO2010056552A2 (ja) |
Families Citing this family (62)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8989705B1 (en) | 2009-06-18 | 2015-03-24 | Sprint Communications Company L.P. | Secure placement of centralized media controller application in mobile access terminal |
US8613087B2 (en) | 2010-12-06 | 2013-12-17 | Samsung Electronics Co., Ltd. | Computing system |
DE102011012227A1 (de) * | 2011-02-24 | 2012-08-30 | Giesecke & Devrient Gmbh | Verfahren zum Datenaustausch in einer gesicherten Laufzeitumgebung |
DE102011018431A1 (de) | 2011-04-21 | 2012-10-25 | Giesecke & Devrient Gmbh | Verfahren zur Anzeige von Informationen auf einer Anzeigeeinrichtung eines Endgeräts |
US8543841B2 (en) * | 2011-06-30 | 2013-09-24 | Oracle International Corporation | Secure hosted execution architecture |
DE102011115135A1 (de) | 2011-10-07 | 2013-04-11 | Giesecke & Devrient Gmbh | Mikroprozessorsystem mit gesicherter Laufzeitumgebung |
US9043918B2 (en) | 2011-10-13 | 2015-05-26 | Mcafee, Inc. | System and method for profile based filtering of outgoing information in a mobile environment |
JP2015527624A (ja) * | 2012-05-08 | 2015-09-17 | セレンティック エルティーディー. | 電子実体アーキテクチャの動的生成及び修正のための方法 |
US9027102B2 (en) | 2012-05-11 | 2015-05-05 | Sprint Communications Company L.P. | Web server bypass of backend process on near field communications and secure element chips |
US9282898B2 (en) | 2012-06-25 | 2016-03-15 | Sprint Communications Company L.P. | End-to-end trusted communications infrastructure |
CN103514411A (zh) * | 2012-06-25 | 2014-01-15 | 联想(北京)有限公司 | 启动电子设备的方法及电子设备安全系统 |
US9066230B1 (en) | 2012-06-27 | 2015-06-23 | Sprint Communications Company L.P. | Trusted policy and charging enforcement function |
US8649770B1 (en) | 2012-07-02 | 2014-02-11 | Sprint Communications Company, L.P. | Extended trusted security zone radio modem |
US8875253B2 (en) | 2012-07-03 | 2014-10-28 | Facebook, Inc. | Trust metrics on shared computers |
US8918638B2 (en) | 2012-07-03 | 2014-12-23 | Facebook, Inc. | Mobile-device-based trust computing |
US8667607B2 (en) | 2012-07-24 | 2014-03-04 | Sprint Communications Company L.P. | Trusted security zone access to peripheral devices |
US9183412B2 (en) | 2012-08-10 | 2015-11-10 | Sprint Communications Company L.P. | Systems and methods for provisioning and using multiple trusted security zones on an electronic device |
US8954588B1 (en) | 2012-08-25 | 2015-02-10 | Sprint Communications Company L.P. | Reservations in real-time brokering of digital content delivery |
US9215180B1 (en) | 2012-08-25 | 2015-12-15 | Sprint Communications Company L.P. | File retrieval in real-time brokering of digital content |
US9015068B1 (en) | 2012-08-25 | 2015-04-21 | Sprint Communications Company L.P. | Framework for real-time brokering of digital content delivery |
US9038179B2 (en) * | 2012-08-28 | 2015-05-19 | Lenovo Enterprise Solutions (Singapore) Pte. Ltd. | Secure code verification enforcement in a trusted computing device |
US9161227B1 (en) | 2013-02-07 | 2015-10-13 | Sprint Communications Company L.P. | Trusted signaling in long term evolution (LTE) 4G wireless communication |
US9578664B1 (en) | 2013-02-07 | 2017-02-21 | Sprint Communications Company L.P. | Trusted signaling in 3GPP interfaces in a network function virtualization wireless communication system |
US9104840B1 (en) | 2013-03-05 | 2015-08-11 | Sprint Communications Company L.P. | Trusted security zone watermark |
US9613208B1 (en) * | 2013-03-13 | 2017-04-04 | Sprint Communications Company L.P. | Trusted security zone enhanced with trusted hardware drivers |
US9049013B2 (en) | 2013-03-14 | 2015-06-02 | Sprint Communications Company L.P. | Trusted security zone containers for the protection and confidentiality of trusted service manager data |
US9049186B1 (en) | 2013-03-14 | 2015-06-02 | Sprint Communications Company L.P. | Trusted security zone re-provisioning and re-use capability for refurbished mobile devices |
US20140282984A1 (en) * | 2013-03-14 | 2014-09-18 | Microsoft Corporation | Service relationship and communication management |
US8984592B1 (en) | 2013-03-15 | 2015-03-17 | Sprint Communications Company L.P. | Enablement of a trusted security zone authentication for remote mobile device management systems and methods |
US9191388B1 (en) | 2013-03-15 | 2015-11-17 | Sprint Communications Company L.P. | Trusted security zone communication addressing on an electronic device |
US9374363B1 (en) | 2013-03-15 | 2016-06-21 | Sprint Communications Company L.P. | Restricting access of a portable communication device to confidential data or applications via a remote network based on event triggers generated by the portable communication device |
US9021585B1 (en) | 2013-03-15 | 2015-04-28 | Sprint Communications Company L.P. | JTAG fuse vulnerability determination and protection using a trusted execution environment |
US9324016B1 (en) | 2013-04-04 | 2016-04-26 | Sprint Communications Company L.P. | Digest of biographical information for an electronic device with static and dynamic portions |
US9454723B1 (en) | 2013-04-04 | 2016-09-27 | Sprint Communications Company L.P. | Radio frequency identity (RFID) chip electrically and communicatively coupled to motherboard of mobile communication device |
US9171243B1 (en) | 2013-04-04 | 2015-10-27 | Sprint Communications Company L.P. | System for managing a digest of biographical information stored in a radio frequency identity chip coupled to a mobile communication device |
US9838869B1 (en) | 2013-04-10 | 2017-12-05 | Sprint Communications Company L.P. | Delivering digital content to a mobile device via a digital rights clearing house |
US9443088B1 (en) | 2013-04-15 | 2016-09-13 | Sprint Communications Company L.P. | Protection for multimedia files pre-downloaded to a mobile device |
US9069952B1 (en) | 2013-05-20 | 2015-06-30 | Sprint Communications Company L.P. | Method for enabling hardware assisted operating system region for safe execution of untrusted code using trusted transitional memory |
US9560519B1 (en) | 2013-06-06 | 2017-01-31 | Sprint Communications Company L.P. | Mobile communication device profound identity brokering framework |
US9183606B1 (en) | 2013-07-10 | 2015-11-10 | Sprint Communications Company L.P. | Trusted processing location within a graphics processing unit |
US9894099B1 (en) * | 2013-07-12 | 2018-02-13 | Palo Alto Networks, Inc. | Automatically configuring mobile devices and applying policy based on device state |
US9705919B1 (en) | 2013-07-12 | 2017-07-11 | Palo Alto Networks, Inc. | Security policy enforcement for mobile devices based on device state |
US9208339B1 (en) | 2013-08-12 | 2015-12-08 | Sprint Communications Company L.P. | Verifying Applications in Virtual Environments Using a Trusted Security Zone |
US9185626B1 (en) | 2013-10-29 | 2015-11-10 | Sprint Communications Company L.P. | Secure peer-to-peer call forking facilitated by trusted 3rd party voice server provisioning |
US9191522B1 (en) | 2013-11-08 | 2015-11-17 | Sprint Communications Company L.P. | Billing varied service based on tier |
US9161325B1 (en) | 2013-11-20 | 2015-10-13 | Sprint Communications Company L.P. | Subscriber identity module virtualization |
US9118655B1 (en) | 2014-01-24 | 2015-08-25 | Sprint Communications Company L.P. | Trusted display and transmission of digital ticket documentation |
US9226145B1 (en) | 2014-03-28 | 2015-12-29 | Sprint Communications Company L.P. | Verification of mobile device integrity during activation |
US9230085B1 (en) | 2014-07-29 | 2016-01-05 | Sprint Communications Company L.P. | Network based temporary trust extension to a remote or mobile device enabled via specialized cloud services |
US9779232B1 (en) | 2015-01-14 | 2017-10-03 | Sprint Communications Company L.P. | Trusted code generation and verification to prevent fraud from maleficent external devices that capture data |
US9838868B1 (en) | 2015-01-26 | 2017-12-05 | Sprint Communications Company L.P. | Mated universal serial bus (USB) wireless dongles configured with destination addresses |
US9473945B1 (en) | 2015-04-07 | 2016-10-18 | Sprint Communications Company L.P. | Infrastructure for secure short message transmission |
US9819679B1 (en) | 2015-09-14 | 2017-11-14 | Sprint Communications Company L.P. | Hardware assisted provenance proof of named data networking associated to device data, addresses, services, and servers |
US10282719B1 (en) | 2015-11-12 | 2019-05-07 | Sprint Communications Company L.P. | Secure and trusted device-based billing and charging process using privilege for network proxy authentication and audit |
US9817992B1 (en) | 2015-11-20 | 2017-11-14 | Sprint Communications Company Lp. | System and method for secure USIM wireless network access |
US10002248B2 (en) | 2016-01-04 | 2018-06-19 | Bank Of America Corporation | Mobile device data security system |
US9912700B2 (en) | 2016-01-04 | 2018-03-06 | Bank Of America Corporation | System for escalating security protocol requirements |
US9723485B2 (en) | 2016-01-04 | 2017-08-01 | Bank Of America Corporation | System for authorizing access based on authentication via separate channel |
US9749308B2 (en) | 2016-01-04 | 2017-08-29 | Bank Of America Corporation | System for assessing network authentication requirements based on situational instance |
US10003686B2 (en) | 2016-01-04 | 2018-06-19 | Bank Of America Corporation | System for remotely controlling access to a mobile device |
CN108964883B (zh) * | 2017-05-27 | 2021-05-07 | 北京安软天地科技有限公司 | 一种以智能手机为介质的数字证书存储与签名方法 |
US10499249B1 (en) | 2017-07-11 | 2019-12-03 | Sprint Communications Company L.P. | Data link layer trust signaling in communication network |
Family Cites Families (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6610105B1 (en) * | 1997-12-09 | 2003-08-26 | Openwave Systems Inc. | Method and system for providing resource access in a mobile environment |
US6065120A (en) * | 1997-12-09 | 2000-05-16 | Phone.Com, Inc. | Method and system for self-provisioning a rendezvous to ensure secure access to information in a database from multiple devices |
US7139915B2 (en) * | 1998-10-26 | 2006-11-21 | Microsoft Corporation | Method and apparatus for authenticating an open system application to a portable IC device |
JP2001142563A (ja) * | 1999-11-09 | 2001-05-25 | Internatl Business Mach Corp <Ibm> | 機能補完型携帯情報装置 |
US7010634B2 (en) * | 1999-12-23 | 2006-03-07 | Intel Corporation | Notebook computer with independently functional, dockable core computer |
US6938164B1 (en) * | 2000-11-22 | 2005-08-30 | Microsoft Corporation | Method and system for allowing code to be securely initialized in a computer |
US6968453B2 (en) * | 2001-01-17 | 2005-11-22 | International Business Machines Corporation | Secure integrated device with secure, dynamically-selectable capabilities |
US7197584B2 (en) * | 2001-01-26 | 2007-03-27 | Dell Products L.P. | Removable personal digital assistant in a dual personal computer/personal digital assistant computer architecture |
US7065347B1 (en) * | 2001-06-27 | 2006-06-20 | Peoplenet Communications Corporation | System and method for over the air programming |
US6798647B2 (en) * | 2001-07-16 | 2004-09-28 | Hewlett-Packard Development Company, L.P. | Portable computer with integrated PDA I/O docking cradle |
US20030065734A1 (en) * | 2001-09-29 | 2003-04-03 | Sundaram Ramakesavan | Method and apparatus for an integrated computer and PDA |
EP1338939A1 (en) * | 2002-02-22 | 2003-08-27 | Hewlett-Packard Company | State validation device for a computer |
US7200758B2 (en) * | 2002-10-09 | 2007-04-03 | Intel Corporation | Encapsulation of a TCPA trusted platform module functionality within a server management coprocessor subsystem |
US7043572B2 (en) * | 2003-06-06 | 2006-05-09 | Microsoft Corporation | Method and system for providing a peripheral service to a host computing device |
US7500098B2 (en) * | 2004-03-19 | 2009-03-03 | Nokia Corporation | Secure mode controlled memory |
US7711942B2 (en) * | 2004-09-23 | 2010-05-04 | Hewlett-Packard Development Company, L.P. | Computer security system and method |
US8266676B2 (en) * | 2004-11-29 | 2012-09-11 | Harris Corporation | Method to verify the integrity of components on a trusted platform using integrity database services |
DE102004062203B4 (de) * | 2004-12-23 | 2007-03-08 | Infineon Technologies Ag | Datenverarbeitungseinrichtung, Telekommunikations-Endgerät und Verfahren zur Datenverarbeitung mittels einer Datenverarbeitungseinrichtung |
EP1866825A1 (en) * | 2005-03-22 | 2007-12-19 | Hewlett-Packard Development Company, L.P. | Methods, devices and data structures for trusted data |
BRPI0616699A2 (pt) * | 2005-09-28 | 2011-06-28 | Ontela Inc | método e sistema para estabelecer um ambiente de execução de serviço-aplicação em um sistema de computação distribuìda heterogênea e uma aplicação de serviço de transferência de dados amigável ao usuário dentro do ambiente de execução do serviço-aplicação |
JP2009518762A (ja) * | 2005-12-09 | 2009-05-07 | シグナサート, インコーポレイテッド | インテグリティデータベースサービスを用いた、トラステッドプラットフォーム上のコンポーンテントのインテグリティの検証方法 |
US20080034350A1 (en) * | 2006-04-05 | 2008-02-07 | Conti Gregory R | System and Method for Checking the Integrity of Computer Program Code |
US7890646B2 (en) * | 2006-04-27 | 2011-02-15 | Microsoft Corporation | Synchronization orchestration |
US8291480B2 (en) * | 2007-01-07 | 2012-10-16 | Apple Inc. | Trusting an unverified code image in a computing device |
-
2008
- 2008-11-14 US US12/270,920 patent/US8595491B2/en active Active
-
2009
- 2009-10-30 WO PCT/US2009/062740 patent/WO2010056552A2/en active Application Filing
- 2009-10-30 JP JP2011536380A patent/JP5635993B2/ja active Active
- 2009-10-30 CN CN200980145855.0A patent/CN102217226B/zh active Active
- 2009-10-30 EP EP09826556.4A patent/EP2347542B1/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN102217226B (zh) | 2015-05-20 |
WO2010056552A2 (en) | 2010-05-20 |
CN102217226A (zh) | 2011-10-12 |
US8595491B2 (en) | 2013-11-26 |
EP2347542A2 (en) | 2011-07-27 |
WO2010056552A3 (en) | 2010-08-12 |
US20100125904A1 (en) | 2010-05-20 |
EP2347542A4 (en) | 2012-11-21 |
EP2347542B1 (en) | 2018-10-17 |
JP2012508931A (ja) | 2012-04-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5635993B2 (ja) | モバイル装置とコンピュータを組み合わせ、安全な個人ごとの環境を生成する装置および方法 | |
US9424430B2 (en) | Method and system for defending security application in a user's computer | |
US10977381B2 (en) | Protection system and method against unauthorized data alteration | |
JP5510550B2 (ja) | ハードウェアトラストアンカー | |
JP6196393B2 (ja) | プリインストールアプリケーションのスキャンを最適化するためのシステム及び方法 | |
US8832778B2 (en) | Methods and apparatuses for user-verifiable trusted path in the presence of malware | |
EP2583410B1 (en) | Single-use authentication methods for accessing encrypted data | |
US20170359333A1 (en) | Context based switching to a secure operating system environment | |
EP3074907B1 (en) | Controlled storage device access | |
US20170132430A1 (en) | Apparatus for and Method of Preventing Unsecured Data Access | |
JP7146812B2 (ja) | 独立した復元領域を有する補助記憶装置およびこれを適用した機器 | |
US10210326B2 (en) | USB stack isolation for enhanced security | |
JP2014507043A (ja) | オペレーティングシステムのコンフィグレーション値の保護 | |
Mannan et al. | Unicorn: Two-factor attestation for data security | |
Stewin | Detecting peripheral-based attacks on the host memory | |
RU2592383C1 (ru) | Способ формирования антивирусной записи при обнаружении вредоносного кода в оперативной памяти | |
KR20100101769A (ko) | 컴퓨터용 데이터 보안시스템 및 데이터 보안방법 | |
KR20240107991A (ko) | 모바일 기기의 usb 장치 인증 시스템 및 방법 | |
Stumpf et al. | An architecture providing virtualization-based protection mechanisms against insider attacks | |
Ruan et al. | Intel’s Embedded Solutions: from Management to Security |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20121023 |
|
A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20121023 |
|
RD03 | Notification of appointment of power of attorney |
Free format text: JAPANESE INTERMEDIATE CODE: A7423 Effective date: 20130701 |
|
RD04 | Notification of resignation of power of attorney |
Free format text: JAPANESE INTERMEDIATE CODE: A7424 Effective date: 20130718 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20131030 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20140130 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20140317 |
|
A524 | Written submission of copy of amendment under article 19 pct |
Free format text: JAPANESE INTERMEDIATE CODE: A524 Effective date: 20140617 |
|
TRDD | Decision of grant or rejection written | ||
A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20140918 |
|
A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20141017 |
|
R150 | Certificate of patent or registration of utility model |
Ref document number: 5635993 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 |
|
S111 | Request for change of ownership or part of ownership |
Free format text: JAPANESE INTERMEDIATE CODE: R313113 |
|
R350 | Written notification of registration of transfer |
Free format text: JAPANESE INTERMEDIATE CODE: R350 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |