JP5676477B2 - プライバシー保護のためのデュアルスクリプトエンジンをもつブラウザ - Google Patents
プライバシー保護のためのデュアルスクリプトエンジンをもつブラウザ Download PDFInfo
- Publication number
- JP5676477B2 JP5676477B2 JP2011545822A JP2011545822A JP5676477B2 JP 5676477 B2 JP5676477 B2 JP 5676477B2 JP 2011545822 A JP2011545822 A JP 2011545822A JP 2011545822 A JP2011545822 A JP 2011545822A JP 5676477 B2 JP5676477 B2 JP 5676477B2
- Authority
- JP
- Japan
- Prior art keywords
- script
- script engine
- engine
- private
- runtime environment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000013515 script Methods 0.000 title claims description 272
- 230000009977 dual effect Effects 0.000 title description 2
- 238000004891 communication Methods 0.000 claims description 25
- 238000012545 processing Methods 0.000 claims description 20
- 238000004590 computer program Methods 0.000 claims description 3
- 230000006870 function Effects 0.000 description 8
- 238000000034 method Methods 0.000 description 7
- 244000035744 Hura crepitans Species 0.000 description 6
- 235000014510 cooky Nutrition 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 230000003993 interaction Effects 0.000 description 3
- 239000008186 active pharmaceutical agent Substances 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000002452 interceptive effect Effects 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 230000000007 visual effect Effects 0.000 description 2
- 238000013459 approach Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000002085 persistent effect Effects 0.000 description 1
- 238000009877 rendering Methods 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/2803—Home automation networks
- H04L12/2816—Controlling appliance services of a home automation network by calling their functionalities
- H04L12/2818—Controlling appliance services of a home automation network by calling their functionalities from a device located outside both the home and the home network
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/2803—Home automation networks
- H04L12/2807—Exchanging configuration information on appliance services in a home automation network
- H04L12/2814—Exchanging control software or macros for controlling appliance services in a home automation network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2105—Dual mode as a secondary aspect
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Automation & Control Theory (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Stored Programmes (AREA)
- Storage Device Security (AREA)
- Information Transfer Between Computers (AREA)
- Techniques For Improving Reliability Of Storages (AREA)
Description
Claims (6)
- スクリプトを実行するためのスクリプトエンジン手段を伴うランタイム環境を有するデータ処理システムであって、
前記スクリプトエンジン手段は、パブリックスクリプトエンジンとプライベートスクリプトエンジンとを実装し、
前記ランタイム環境は、前記スクリプトが当該システムでの予め決められたリソースへのアクセスを要求しない場合には、前記パブリックスクリプトエンジンにより実行される前記スクリプトをもつように構成され、
前記ランタイム環境は、前記スクリプトが前記予め決められたリソースへのアクセスを要求する場合には、前記プライベートスクリプトエンジンにより実行される前記スクリプトをもつように構成され、
前記プライベートスクリプトエンジンだけが、前記スクリプトが前記予め決められたリソースにアクセスすることを可能にするインタフェースをもち、
前記スクリプトエンジン手段は、前記プライベートスクリプトエンジンが、当該データ処理システムの外部のサーバに対する通信がユーザ又は前記ランタイム環境により承認されない限り、前記パブリックスクリプトエンジン又は前記サーバにデータを通信することを阻止するように構成される、データ処理システム。 - 前記スクリプトエンジン手段は、前記パブリックスクリプトエンジンとして動作する第1のスクリプトエンジンと、前記プライベートスクリプトエンジンとして動作する第2のスクリプトエンジンとを有する、請求項1に記載のデータ処理システム。
- 前記スクリプトエンジン手段は、第1のモードに設定されたときに前記パブリックスクリプトエンジンとして動作し、第2のモードに設定されたときに前記プライベートスクリプトエンジンとして動作する、設定可能なスクリプトエンジンを有する、請求項1に記載のデータ処理システム。
- 前記ランタイム環境は、ブラウザ、Java Virtual Machine及びオペレーティングシステムのうち少なくとも1つを有する、請求項1に記載のデータ処理システム。
- 請求項1に記載のデータ処理システムで使用するスクリプトエンジン手段を伴う、ランタイム環境。
- 前記データ処理システムの操作可能な使用の間、実行時に、請求項1に記載のランタイム環境を実装するように構成された、コンピュータで実行可能な命令を有する、コンピュータプログラム。
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14564609P | 2009-01-19 | 2009-01-19 | |
US61/145,646 | 2009-01-19 | ||
US17280109P | 2009-04-27 | 2009-04-27 | |
US61/172,801 | 2009-04-27 | ||
PCT/IB2010/050127 WO2010082161A1 (en) | 2009-01-19 | 2010-01-13 | Browser with dual scripting engine for privacy protection |
Publications (2)
Publication Number | Publication Date |
---|---|
JP2012515390A JP2012515390A (ja) | 2012-07-05 |
JP5676477B2 true JP5676477B2 (ja) | 2015-02-25 |
Family
ID=42027806
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2011545822A Active JP5676477B2 (ja) | 2009-01-19 | 2010-01-13 | プライバシー保護のためのデュアルスクリプトエンジンをもつブラウザ |
Country Status (8)
Country | Link |
---|---|
US (1) | US9258136B2 (ja) |
EP (1) | EP2387765B1 (ja) |
JP (1) | JP5676477B2 (ja) |
KR (1) | KR101786060B1 (ja) |
CN (1) | CN102282565B (ja) |
BR (1) | BRPI1004942B1 (ja) |
RU (1) | RU2556338C2 (ja) |
WO (1) | WO2010082161A1 (ja) |
Families Citing this family (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8225061B2 (en) | 2009-07-02 | 2012-07-17 | Apple Inc. | Method and apparatus for protected content data processing |
US8689181B2 (en) | 2010-11-23 | 2014-04-01 | Axeda Corporation | Scripting web services |
US8464350B2 (en) * | 2011-03-14 | 2013-06-11 | International Business Machines Corporation | System and method for in-private browsing |
US10466989B2 (en) | 2011-09-02 | 2019-11-05 | Microsoft Technology Licensing, Llc. | Fast presentation of markup content having script code |
US9015851B2 (en) * | 2012-04-23 | 2015-04-21 | Google Inc. | Electronic book content protection |
CN102842006A (zh) * | 2012-07-09 | 2012-12-26 | 华为软件技术有限公司 | 扩展脚本对象的访问控制方法及其访问控制系统和终端 |
US9898445B2 (en) * | 2012-08-16 | 2018-02-20 | Qualcomm Incorporated | Resource prefetching via sandboxed execution |
US20140053064A1 (en) | 2012-08-16 | 2014-02-20 | Qualcomm Incorporated | Predicting the usage of document resources |
US9589149B2 (en) * | 2012-11-30 | 2017-03-07 | Microsoft Technology Licensing, Llc | Combining personalization and privacy locally on devices |
CN103268442B (zh) * | 2013-05-14 | 2015-12-23 | 北京奇虎科技有限公司 | 一种实现安全访问视频网站的方法和装置 |
CN104239752A (zh) * | 2013-06-09 | 2014-12-24 | 腾讯科技(深圳)有限公司 | 使用浏览器保护隐私信息的方法和装置 |
RU2584507C1 (ru) * | 2014-12-19 | 2016-05-20 | Закрытое акционерное общество "Лаборатория Касперского" | Способ обеспечения безопасного выполнения файла сценария |
US10671760B2 (en) * | 2015-02-27 | 2020-06-02 | Arash Esmailzadeh | Secure and private data storage |
WO2016175764A1 (en) | 2015-04-28 | 2016-11-03 | Microsoft Technology Licensing, Llc | Operating system privacy mode |
CN105893863A (zh) * | 2015-11-30 | 2016-08-24 | 乐视致新电子科技(天津)有限公司 | 一种隐私信息保护方法及装置 |
US10462145B2 (en) | 2016-07-15 | 2019-10-29 | The Directv Group, Inc. | Method and apparatus for controlling access to custom browser functionality |
US10476900B2 (en) * | 2016-09-30 | 2019-11-12 | McAFEE, LLC. | Safe sharing of sensitive data |
US10481876B2 (en) | 2017-01-11 | 2019-11-19 | Microsoft Technology Licensing, Llc | Methods and systems for application rendering |
US10394584B2 (en) * | 2017-12-18 | 2019-08-27 | Atlassian Pty Ltd | Native execution bridge for sandboxed scripting languages |
US12026249B2 (en) * | 2021-02-19 | 2024-07-02 | Capital One Services, Llc | Methods, media, and systems for screening malicious content from a web browser |
US11972000B2 (en) | 2021-08-06 | 2024-04-30 | Arash Esmailzadeh | Information dispersal for secure data storage |
Family Cites Families (53)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6317742B1 (en) * | 1997-01-09 | 2001-11-13 | Sun Microsystems, Inc. | Method and apparatus for controlling software access to system resources |
US6308275B1 (en) * | 1998-07-10 | 2001-10-23 | At Home Corporation | Web host providing for secure execution of CGI programs and method of doing the same |
JP3563619B2 (ja) | 1998-12-04 | 2004-09-08 | 株式会社東芝 | アプリケーション機能指定装置及び記憶媒体 |
US6608634B1 (en) | 1999-12-23 | 2003-08-19 | Qwest Communications International, Inc. | System and method for demonstration of dynamic web sites with integrated database without connecting to a network |
US6931546B1 (en) * | 2000-01-28 | 2005-08-16 | Network Associates, Inc. | System and method for providing application services with controlled access into privileged processes |
US7051119B2 (en) * | 2001-07-12 | 2006-05-23 | Yahoo! Inc. | Method and system for enabling a script on a first computer to communicate and exchange data with a script on a second computer over a network |
US6978445B2 (en) * | 2001-09-28 | 2005-12-20 | Siebel Systems, Inc. | Method and system for supporting user navigation in a browser environment |
US7401235B2 (en) * | 2002-05-10 | 2008-07-15 | Microsoft Corporation | Persistent authorization context based on external authentication |
WO2003096669A2 (en) * | 2002-05-10 | 2003-11-20 | Reisman Richard R | Method and apparatus for browsing using multiple coordinated device |
US7343626B1 (en) * | 2002-11-12 | 2008-03-11 | Microsoft Corporation | Automated detection of cross site scripting vulnerabilities |
GB0227993D0 (en) | 2002-12-02 | 2003-01-08 | Ncr Int Inc | A system and method for enabling communication between a web browser and a software agent infrastructure |
DE602004011517T2 (de) | 2003-06-30 | 2009-02-05 | Koninklijke Philips Electronics N.V. | Einbetten einer upnp av mediaserverobjektidentifikation in einem uri |
WO2005031568A1 (en) | 2003-09-26 | 2005-04-07 | Opera Software Asa | Presenting remote and local information in a web browser |
US7676560B2 (en) * | 2003-10-24 | 2010-03-09 | Microsoft Corporation | Using URI's to identify multiple instances with a common schema |
US7444678B2 (en) * | 2003-10-28 | 2008-10-28 | Aol Llc | Securing resources from untrusted scripts behind firewalls |
JP2005148977A (ja) | 2003-11-13 | 2005-06-09 | Canon Software Inc | プログラム実行環境設定システムおよびプログラム提供サーバ装置およびクライアント装置および呼制御サーバ装置およびプログラム実行環境設定方法およびプログラムおよび記録媒体 |
US7401230B2 (en) * | 2004-03-31 | 2008-07-15 | Intel Corporation | Secure virtual machine monitor to tear down a secure execution environment |
CN100447736C (zh) * | 2004-05-08 | 2008-12-31 | 英特尔公司 | 包括固件接口运行时环境保护字段的设备和方法 |
US7908653B2 (en) * | 2004-06-29 | 2011-03-15 | Intel Corporation | Method of improving computer security through sandboxing |
KR100618375B1 (ko) * | 2004-08-30 | 2006-08-31 | 삼성전자주식회사 | 웹서비스가 가능한 디지털 영상/음향 처리장치, 그의웹서비스 제공방법 및 웹서비스 시스템 |
US7831995B2 (en) * | 2004-10-29 | 2010-11-09 | CORE, SDI, Inc. | Establishing and enforcing security and privacy policies in web-based applications |
US7593980B2 (en) * | 2004-11-30 | 2009-09-22 | Cisco Technology, Inc. | Application server system and method |
US20060248537A1 (en) | 2005-04-06 | 2006-11-02 | Nokia Corporation | System and method for domain security with script objects |
US8078740B2 (en) * | 2005-06-03 | 2011-12-13 | Microsoft Corporation | Running internet applications with low rights |
US7707635B1 (en) * | 2005-10-06 | 2010-04-27 | Trend Micro Incorporated | Script-based pattern for detecting computer viruses |
US7836303B2 (en) * | 2005-12-09 | 2010-11-16 | University Of Washington | Web browser operating system |
US7725922B2 (en) * | 2006-03-21 | 2010-05-25 | Novell, Inc. | System and method for using sandboxes in a managed shell |
KR101282117B1 (ko) | 2006-07-25 | 2013-07-03 | 삼성전자주식회사 | 공유 네트워크 환경에서 범용 플러그 앤 플레이 서비스를위한 장치 및 방법 |
US8353031B1 (en) * | 2006-09-25 | 2013-01-08 | Symantec Corporation | Virtual security appliance |
US8490117B1 (en) * | 2006-10-23 | 2013-07-16 | Adobe Systems Incorporated | Bridging script engines |
US7614003B2 (en) * | 2006-10-23 | 2009-11-03 | Adobe Systems Incorporated | Rendering hypertext markup language content |
WO2008073618A2 (en) * | 2006-11-06 | 2008-06-19 | Devicevm, Inc. | Instant on platform |
US20080133722A1 (en) * | 2006-12-04 | 2008-06-05 | Infosys Technologies Ltd. | Parallel dynamic web page section processing |
US20080148298A1 (en) * | 2006-12-18 | 2008-06-19 | Palm, Inc. | System and Methods for Providing Granular Security for Locally Running Scripted Environments and Web Applications |
US8484742B2 (en) * | 2007-01-19 | 2013-07-09 | Microsoft Corporation | Rendered image collection of potentially malicious web pages |
US20080189767A1 (en) * | 2007-02-01 | 2008-08-07 | Microsoft Corporation | Accessing file resources outside a security boundary |
EP2122508A1 (en) * | 2007-02-09 | 2009-11-25 | Novarra, Inc. | Method and apparatus for providing information content for display on a client device |
EP1975830A1 (en) * | 2007-03-30 | 2008-10-01 | British Telecommunications Public Limited Company | Distributed computer system |
US8024790B2 (en) * | 2007-04-11 | 2011-09-20 | Trend Micro Incorporated | Portable secured computing environment for performing online confidential transactions in untrusted computers |
US8001551B2 (en) * | 2007-04-24 | 2011-08-16 | Microsoft Corporation | Providing localized resources for client-side script execution |
US8763115B2 (en) * | 2007-08-08 | 2014-06-24 | Vmware, Inc. | Impeding progress of malicious guest software |
US7748609B2 (en) * | 2007-08-31 | 2010-07-06 | Gemalto Inc. | System and method for browser based access to smart cards |
US8160247B2 (en) * | 2007-09-27 | 2012-04-17 | Adobe Systems Incorporated | Providing local storage service to applications that run in an application execution environment |
US8307443B2 (en) * | 2007-09-28 | 2012-11-06 | Microsoft Corporation | Securing anti-virus software with virtualization |
US7979909B2 (en) * | 2007-12-03 | 2011-07-12 | Wells Fargo Bank | Application controlled encryption of web browser data |
US8635701B2 (en) * | 2008-03-02 | 2014-01-21 | Yahoo! Inc. | Secure browser-based applications |
US8272059B2 (en) * | 2008-05-28 | 2012-09-18 | International Business Machines Corporation | System and method for identification and blocking of malicious code for web browser script engines |
US8108912B2 (en) * | 2008-05-29 | 2012-01-31 | Red Hat, Inc. | Systems and methods for management of secure data in cloud-based network |
US8250666B2 (en) * | 2008-07-03 | 2012-08-21 | Sap Ag | Method and apparatus for improving security in an application level virtual machine environment |
US8136158B1 (en) * | 2008-07-21 | 2012-03-13 | Google Inc. | User-level segmentation mechanism that facilitates safely executing untrusted native code |
US8413139B2 (en) * | 2009-03-11 | 2013-04-02 | Microsoft Corporation | Programming model for application and data access and synchronization within virtual environments |
US8505084B2 (en) * | 2009-04-06 | 2013-08-06 | Microsoft Corporation | Data access programming model for occasionally connected applications |
US8839138B1 (en) * | 2009-12-21 | 2014-09-16 | Symantec Corporation | Systems and methods for transitioning between user interface environments |
-
2010
- 2010-01-13 EP EP10702348.3A patent/EP2387765B1/en active Active
- 2010-01-13 KR KR1020117019165A patent/KR101786060B1/ko active IP Right Grant
- 2010-01-13 JP JP2011545822A patent/JP5676477B2/ja active Active
- 2010-01-13 CN CN201080004895.6A patent/CN102282565B/zh active Active
- 2010-01-13 BR BRPI1004942A patent/BRPI1004942B1/pt active IP Right Grant
- 2010-01-13 WO PCT/IB2010/050127 patent/WO2010082161A1/en active Application Filing
- 2010-01-13 US US13/143,573 patent/US9258136B2/en active Active
- 2010-01-13 RU RU2011134494/08A patent/RU2556338C2/ru active
Also Published As
Publication number | Publication date |
---|---|
BRPI1004942B1 (pt) | 2020-04-07 |
EP2387765B1 (en) | 2018-05-23 |
US9258136B2 (en) | 2016-02-09 |
EP2387765A1 (en) | 2011-11-23 |
RU2556338C2 (ru) | 2015-07-10 |
RU2011134494A (ru) | 2013-03-10 |
WO2010082161A1 (en) | 2010-07-22 |
KR20110117171A (ko) | 2011-10-26 |
KR101786060B1 (ko) | 2017-10-16 |
JP2012515390A (ja) | 2012-07-05 |
CN102282565B (zh) | 2016-08-03 |
BRPI1004942A2 (ja) | 2017-08-08 |
US20110283363A1 (en) | 2011-11-17 |
CN102282565A (zh) | 2011-12-14 |
BRPI1004942A8 (pt) | 2017-10-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5676477B2 (ja) | プライバシー保護のためのデュアルスクリプトエンジンをもつブラウザ | |
Jackson et al. | Subspace: secure cross-domain communication for web mashups | |
US9923926B1 (en) | Seamless management of untrusted data using isolated environments | |
US9626204B1 (en) | Automated provisioning of secure virtual execution environment using virtual machine templates based on source code origin | |
US8291475B2 (en) | Secure cross-domain communication for web mashups | |
TWI420338B (zh) | 安全之瀏覽器基礎應用程式 | |
US9921860B1 (en) | Isolation of applications within a virtual machine | |
KR101549816B1 (ko) | 안전하고 확장 가능한 정책 기반 애플리케이션 플랫폼 | |
Crites et al. | Omash: enabling secure web mashups via object abstractions | |
RU2646332C2 (ru) | Ограниченная платформа драйверов, которая запускает драйверы в песочнице в пользовательском режиме | |
AU2010274979A1 (en) | Communicating information about a local machine to a browser application | |
TW201507416A (zh) | 授權網站之推播通知 | |
US9245108B1 (en) | Dynamic adjustment of the file format to identify untrusted files | |
US10986137B2 (en) | Clipboard hardening | |
CN101978674A (zh) | 用于显示由客户端生成的信息的方法 | |
KR20140068940A (ko) | 애플리케이션용 콘텐츠 핸들링 기법 | |
Cannon et al. | Enforcing security for desktop clients using authority aspects | |
Decat et al. | Towards building secure web mashups | |
US20210044657A1 (en) | Information processing apparatus, access control system, and non-transitory computer-readable storage medium for storing access control program | |
EP3432244A1 (en) | Anti adblock solution vpaid | |
Gomez et al. | BlackBerry PlayBook Security: Part one | |
Davidson | Enhancing Mobile Security and Privacy through App Splitting | |
Schultz | Extending browser platforms with native capabilities, enabling additional features in a media streaming context |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20130110 |
|
A977 | Report on retrieval |
Free format text: JAPANESE INTERMEDIATE CODE: A971007 Effective date: 20131225 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20140204 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20140501 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20140624 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20140922 |
|
TRDD | Decision of grant or rejection written | ||
A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20141202 |
|
A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20141225 |
|
R150 | Certificate of patent or registration of utility model |
Ref document number: 5676477 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |