JP5961708B2 - 集中型の操作管理 - Google Patents
集中型の操作管理 Download PDFInfo
- Publication number
- JP5961708B2 JP5961708B2 JP2014555552A JP2014555552A JP5961708B2 JP 5961708 B2 JP5961708 B2 JP 5961708B2 JP 2014555552 A JP2014555552 A JP 2014555552A JP 2014555552 A JP2014555552 A JP 2014555552A JP 5961708 B2 JP5961708 B2 JP 5961708B2
- Authority
- JP
- Japan
- Prior art keywords
- security
- module
- application
- document
- security evaluation
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Databases & Information Systems (AREA)
- Data Mining & Analysis (AREA)
- Storage Device Security (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Applications Claiming Priority (9)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US201261595021P | 2012-02-03 | 2012-02-03 | |
| US61/595,021 | 2012-02-03 | ||
| US13/624,836 US9137261B2 (en) | 2012-02-03 | 2012-09-21 | Centralized operation management |
| US13/624,832 US8966574B2 (en) | 2012-02-03 | 2012-09-21 | Centralized operation management |
| US13/624,836 | 2012-09-21 | ||
| US13/624,828 | 2012-09-21 | ||
| US13/624,832 | 2012-09-21 | ||
| US13/624,828 US8978094B2 (en) | 2012-02-03 | 2012-09-21 | Centralized operation management |
| PCT/US2012/072191 WO2013115927A1 (en) | 2012-02-03 | 2012-12-28 | Centralized operation management |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| JP2015509252A JP2015509252A (ja) | 2015-03-26 |
| JP5961708B2 true JP5961708B2 (ja) | 2016-08-02 |
Family
ID=48904078
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2014555552A Active JP5961708B2 (ja) | 2012-02-03 | 2012-12-28 | 集中型の操作管理 |
Country Status (9)
| Country | Link |
|---|---|
| US (4) | US8978094B2 (enExample) |
| EP (1) | EP2810210A1 (enExample) |
| JP (1) | JP5961708B2 (enExample) |
| KR (3) | KR101677576B1 (enExample) |
| CN (1) | CN104137114B (enExample) |
| AU (1) | AU2012368190B2 (enExample) |
| BR (1) | BR112014018837B1 (enExample) |
| MX (1) | MX353868B (enExample) |
| WO (1) | WO2013115927A1 (enExample) |
Families Citing this family (37)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8695060B2 (en) | 2011-10-10 | 2014-04-08 | Openpeak Inc. | System and method for creating secure applications |
| US8978094B2 (en) | 2012-02-03 | 2015-03-10 | Apple Inc. | Centralized operation management |
| US9455879B1 (en) * | 2013-03-04 | 2016-09-27 | Amazon Technologies, Inc. | Validating changes to attributes for computing resources |
| US9754392B2 (en) | 2013-03-04 | 2017-09-05 | Microsoft Technology Licensing, Llc | Generating data-mapped visualization of data |
| US9137237B2 (en) | 2013-09-03 | 2015-09-15 | Microsoft Technology Licensing, Llc | Automatically generating certification documents |
| US9253212B2 (en) * | 2013-09-24 | 2016-02-02 | Microsoft Technology Licensing, Llc | Automated production of certification controls by translating framework controls |
| US9361432B2 (en) * | 2014-01-15 | 2016-06-07 | Hewlett-Packard Development Company, L.P. | Configuring a security setting for a set of devices using a security policy |
| US9158909B2 (en) * | 2014-03-04 | 2015-10-13 | Amazon Technologies, Inc. | Authentication of virtual machine images using digital certificates |
| US10789300B2 (en) * | 2014-04-28 | 2020-09-29 | Red Hat, Inc. | Method and system for providing security in a data federation system |
| US10061808B2 (en) * | 2014-06-03 | 2018-08-28 | Sap Se | Cached views |
| US8938547B1 (en) | 2014-09-05 | 2015-01-20 | Openpeak Inc. | Method and system for data usage accounting in a computing device |
| US20160071040A1 (en) | 2014-09-05 | 2016-03-10 | Openpeak Inc. | Method and system for enabling data usage accounting through a relay |
| US9350818B2 (en) | 2014-09-05 | 2016-05-24 | Openpeak Inc. | Method and system for enabling data usage accounting for unreliable transport communication |
| US9100390B1 (en) | 2014-09-05 | 2015-08-04 | Openpeak Inc. | Method and system for enrolling and authenticating computing devices for data usage accounting |
| US9232013B1 (en) | 2014-09-05 | 2016-01-05 | Openpeak Inc. | Method and system for enabling data usage accounting |
| US10445505B2 (en) * | 2014-09-22 | 2019-10-15 | Mcafee, Llc | Process vulnerability assessment |
| US9881159B1 (en) * | 2014-11-14 | 2018-01-30 | Quest Software Inc. | Workload execution systems and methods |
| GB2534556B (en) * | 2015-01-21 | 2019-12-25 | F Secure Corp | Preventing misuse of code signing certificates |
| CN104680061A (zh) * | 2015-02-28 | 2015-06-03 | 国鼎网络空间安全技术有限公司 | 一种Android环境下应用程序启动中代码签名验证的方法和系统 |
| US9232078B1 (en) | 2015-03-16 | 2016-01-05 | Openpeak Inc. | Method and system for data usage accounting across multiple communication networks |
| CN106407830B (zh) * | 2015-07-29 | 2020-01-21 | 阿里巴巴集团控股有限公司 | 一种基于云的数据库的检测方法和装置 |
| US10402584B1 (en) * | 2015-10-01 | 2019-09-03 | Hrl Laboratories, Llc | System and method for translating security objectives of computer software to properties of software code |
| EP3200037A1 (en) * | 2016-01-26 | 2017-08-02 | Basf Se | System and method for risk based control of a process performed by production equipment |
| CN107766453A (zh) * | 2017-09-26 | 2018-03-06 | 上海策赢网络科技有限公司 | 基于区块链的数据库管理方法、装置及存储介质 |
| US11429794B2 (en) | 2018-09-06 | 2022-08-30 | Daniel L. Coffing | System for providing dialogue guidance |
| US11743268B2 (en) * | 2018-09-14 | 2023-08-29 | Daniel L. Coffing | Fact management system |
| US11973745B2 (en) * | 2018-12-04 | 2024-04-30 | Journey.ai | Performing concealed transactions using a zero-knowledge data management network |
| KR102089688B1 (ko) * | 2019-04-12 | 2020-04-24 | 주식회사 이글루시큐리티 | 준지도학습을 통한 인공지능 기반 보안이벤트 분석시스템 및 그 방법 |
| US11138328B2 (en) | 2019-05-30 | 2021-10-05 | Bank Of America Corporation | Controlling access to secure information resources using rotational datasets and dynamically configurable data containers |
| US11153315B2 (en) | 2019-05-30 | 2021-10-19 | Bank Of America Corporation | Controlling access to secure information resources using rotational datasets and dynamically configurable data containers |
| US11165777B2 (en) | 2019-05-30 | 2021-11-02 | Bank Of America Corporation | Controlling access to secure information resources using rotational datasets and dynamically configurable data containers |
| US12153633B2 (en) * | 2019-06-14 | 2024-11-26 | Salesforce, Inc. | Prepackaged data ingestion from various data sources |
| US11838429B2 (en) * | 2019-07-18 | 2023-12-05 | Itron, Inc. | Certificate chain compression to extend node operational lifetime |
| US12437115B2 (en) | 2022-08-22 | 2025-10-07 | Microsoft Technology Licensing, Llc | Remote configuration changes over a security layer |
| WO2024044005A1 (en) * | 2022-08-22 | 2024-02-29 | Microsoft Technology Licensing, Llc | Remote management over security layer |
| JP2024046373A (ja) * | 2022-09-22 | 2024-04-03 | 株式会社日立製作所 | トラスト管理システム、システム管理方法 |
| US20250335582A1 (en) * | 2024-04-29 | 2025-10-30 | Crowdstrike, Inc. | Machine Learned Contextual Cybersecurity Threat Prioritization |
Family Cites Families (34)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CA1270339A (en) * | 1985-06-24 | 1990-06-12 | Katsuya Nakagawa | System for determining a truth of software in an information processing apparatus |
| JPH08137686A (ja) * | 1994-09-16 | 1996-05-31 | Toshiba Corp | 著作物データ管理方法及び著作物データ管理装置 |
| EP1643340B1 (en) | 1995-02-13 | 2013-08-14 | Intertrust Technologies Corp. | Secure transaction management |
| US8079086B1 (en) | 1997-11-06 | 2011-12-13 | Finjan, Inc. | Malicious mobile code runtime monitoring system and methods |
| JP4808850B2 (ja) | 1999-05-19 | 2011-11-02 | ディジマーク コーポレイション | 物理的/電子的オブジェクトからコンピュータ制御する、即ちインターネットリソースへリンクする方法およびシステム |
| EP1185967A4 (en) | 1999-05-19 | 2004-11-03 | Digimarc Corp | METHODS AND SYSTEMS FOR CONTROLLING OR CONNECTING PHYSICAL OR ELECTRONIC OBJECTS TO INTERNET RESOURCES |
| AU1329601A (en) | 1999-10-01 | 2001-05-10 | Infraworks Corporation | System and method for providing data security |
| US7185192B1 (en) | 2000-07-07 | 2007-02-27 | Emc Corporation | Methods and apparatus for controlling access to a resource |
| US20040194027A1 (en) | 2002-12-27 | 2004-09-30 | Akira Suzuki | Computerized electronic document producing, editing and accessing system for maintaining high-security |
| JP2004213181A (ja) * | 2002-12-27 | 2004-07-29 | Ricoh Co Ltd | カプセル化文書構造、記憶媒体、情報処理装置、カプセル化文書作成編集装置及び起動プログラム |
| WO2004097584A2 (en) * | 2003-04-28 | 2004-11-11 | P.G.I. Solutions Llc | Method and system for remote network security management |
| MXPA04007406A (es) * | 2003-05-17 | 2005-02-17 | Microsoft Corp | Mecanismo para evaluar riesgos de seguridad. |
| US8607299B2 (en) * | 2004-04-27 | 2013-12-10 | Microsoft Corporation | Method and system for enforcing a security policy via a security virtual machine |
| US7657925B2 (en) | 2004-10-14 | 2010-02-02 | Oracle International Corporation | Method and system for managing security policies for databases in a distributed system |
| US7698744B2 (en) * | 2004-12-03 | 2010-04-13 | Whitecell Software Inc. | Secure system for allowing the execution of authorized computer program code |
| US7624111B2 (en) * | 2005-06-27 | 2009-11-24 | Microsoft Corporation | Active content trust model |
| US20070083930A1 (en) * | 2005-10-11 | 2007-04-12 | Jim Dumont | Method, telecommunications node, and computer data signal message for optimizing virus scanning |
| US7805752B2 (en) | 2005-11-09 | 2010-09-28 | Symantec Corporation | Dynamic endpoint compliance policy configuration |
| JP4745858B2 (ja) | 2006-02-20 | 2011-08-10 | 富士通株式会社 | セキュリティ管理プログラム、およびセキュリティ管理方法 |
| EP1998269A4 (en) | 2006-02-21 | 2012-02-29 | Nec Corp | PROGRAM EXECUTION MONITORING SYSTEM, EXECUTION MONITORING METHOD, COMPUTER CONTROL PROGRAM |
| US8272048B2 (en) | 2006-08-04 | 2012-09-18 | Apple Inc. | Restriction of program process capabilities |
| US8375458B2 (en) * | 2007-01-05 | 2013-02-12 | Apple Inc. | System and method for authenticating code executing on computer system |
| KR100884200B1 (ko) * | 2007-06-29 | 2009-02-18 | 이화여자대학교 산학협력단 | 태그의 의미 식별자에 기초하여 콘텐츠를 관리하는 콘텐츠관리 시스템 및 방법 |
| CN101414327B (zh) * | 2007-10-15 | 2012-09-12 | 北京瑞星信息技术有限公司 | 文件保护的方法 |
| JP4645644B2 (ja) | 2007-12-25 | 2011-03-09 | 富士ゼロックス株式会社 | セキュリティポリシー管理装置、セキュリティポリシー管理システム及びセキュリティポリシー管理プログラム |
| KR101239012B1 (ko) * | 2008-03-04 | 2013-03-11 | 애플 인크. | 적어도 하나의 설치된 프로파일에 기초하여 소프트웨어 코드의 실행을 인가하는 시스템 및 방법 |
| KR101018435B1 (ko) | 2008-08-14 | 2011-02-28 | 한국전자통신연구원 | 사용자 단말기의 보안 관리 장치 및 방법 |
| CN101350034B (zh) * | 2008-09-10 | 2012-05-23 | 普天信息技术研究院有限公司 | 一种移动存储设备及文件访问的方法 |
| US8272028B2 (en) | 2008-10-15 | 2012-09-18 | Ricoh Company, Ltd. | Approach for managing access to electronic documents on network devices using document retention policies and document security policies |
| JP5434322B2 (ja) | 2009-07-10 | 2014-03-05 | 富士ゼロックス株式会社 | 処理決定装置、画像処理装置、処理決定システム、及びプログラム |
| JP5460215B2 (ja) * | 2009-09-29 | 2014-04-02 | キヤノン株式会社 | 情報処理装置及びその方法 |
| CN101853363B (zh) * | 2010-05-07 | 2012-08-08 | 飞天诚信科技股份有限公司 | 一种文件保护方法及系统 |
| US9465935B2 (en) | 2010-06-11 | 2016-10-11 | D2L Corporation | Systems, methods, and apparatus for securing user documents |
| US8978094B2 (en) | 2012-02-03 | 2015-03-10 | Apple Inc. | Centralized operation management |
-
2012
- 2012-09-21 US US13/624,828 patent/US8978094B2/en active Active
- 2012-09-21 US US13/624,832 patent/US8966574B2/en active Active
- 2012-09-21 US US13/624,836 patent/US9137261B2/en active Active
- 2012-12-28 JP JP2014555552A patent/JP5961708B2/ja active Active
- 2012-12-28 BR BR112014018837-8A patent/BR112014018837B1/pt active IP Right Grant
- 2012-12-28 EP EP12816625.3A patent/EP2810210A1/en not_active Withdrawn
- 2012-12-28 AU AU2012368190A patent/AU2012368190B2/en not_active Ceased
- 2012-12-28 WO PCT/US2012/072191 patent/WO2013115927A1/en not_active Ceased
- 2012-12-28 MX MX2014009046A patent/MX353868B/es active IP Right Grant
- 2012-12-28 KR KR1020147023375A patent/KR101677576B1/ko not_active Expired - Fee Related
- 2012-12-28 KR KR1020177034559A patent/KR101941398B1/ko not_active Expired - Fee Related
- 2012-12-28 KR KR1020167031725A patent/KR101804996B1/ko not_active Expired - Fee Related
- 2012-12-28 CN CN201280070895.5A patent/CN104137114B/zh not_active Expired - Fee Related
-
2015
- 2015-08-14 US US14/827,166 patent/US10122759B2/en active Active
Also Published As
| Publication number | Publication date |
|---|---|
| US8966574B2 (en) | 2015-02-24 |
| BR112014018837A8 (pt) | 2017-07-11 |
| KR20160134867A (ko) | 2016-11-23 |
| BR112014018837B1 (pt) | 2021-10-05 |
| CN104137114B (zh) | 2017-03-08 |
| AU2012368190A1 (en) | 2014-08-21 |
| KR20140114060A (ko) | 2014-09-25 |
| EP2810210A1 (en) | 2014-12-10 |
| KR101804996B1 (ko) | 2017-12-06 |
| US20130205364A1 (en) | 2013-08-08 |
| CN104137114A (zh) | 2014-11-05 |
| US20160142441A1 (en) | 2016-05-19 |
| WO2013115927A1 (en) | 2013-08-08 |
| JP2015509252A (ja) | 2015-03-26 |
| KR101677576B1 (ko) | 2016-11-18 |
| MX2014009046A (es) | 2014-10-24 |
| US20130205363A1 (en) | 2013-08-08 |
| BR112014018837A2 (enExample) | 2017-06-20 |
| AU2012368190B2 (en) | 2015-10-22 |
| US20130205362A1 (en) | 2013-08-08 |
| US8978094B2 (en) | 2015-03-10 |
| MX353868B (es) | 2018-02-01 |
| KR20170137216A (ko) | 2017-12-12 |
| KR101941398B1 (ko) | 2019-01-22 |
| US10122759B2 (en) | 2018-11-06 |
| US9137261B2 (en) | 2015-09-15 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP5961708B2 (ja) | 集中型の操作管理 | |
| US8122256B2 (en) | Secure bytecode instrumentation facility | |
| US8196213B2 (en) | Verification of un-trusted code for consumption on an insecure device | |
| JP5900911B2 (ja) | 1つ以上のサンドボックス化されたアプリケーションのためのファイルシステムアクセス | |
| KR102873469B1 (ko) | 정책 적용을 위한 가상 환경 유형 검증 | |
| WO2015124018A1 (zh) | 基于智能终端设备的应用程序访问方法与装置 | |
| JP2007265404A (ja) | ソフトウェア・アプリケーション配布のための範囲を制限された許可 | |
| EP3195551B1 (en) | Method and system for managing fine-grained policies for requiring user approval of device management operations | |
| CN118013586A (zh) | 保护计算机系统上的选定磁盘 | |
| JP2024174895A (ja) | ファイルのデジタル署名を検証するためのシステム及び方法 | |
| JP2020119503A (ja) | ファイルのデジタル署名の検証における攻撃に対するレジリエンスのためのシステム及び方法 | |
| JP5126495B2 (ja) | 安全度評価と連動するセキュリティの方針設定装置、そのプログラムおよびその方法 | |
| HK40068985A (en) | Virtual environment type validation for policy enforcement |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| A977 | Report on retrieval |
Free format text: JAPANESE INTERMEDIATE CODE: A971007 Effective date: 20150820 |
|
| A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20150928 |
|
| A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20151224 |
|
| A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20160125 |
|
| TRDD | Decision of grant or rejection written | ||
| A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20160530 |
|
| A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20160627 |
|
| R150 | Certificate of patent or registration of utility model |
Ref document number: 5961708 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |