MX2014002785A - Manejo de contenido para aplicaciones. - Google Patents
Manejo de contenido para aplicaciones.Info
- Publication number
- MX2014002785A MX2014002785A MX2014002785A MX2014002785A MX2014002785A MX 2014002785 A MX2014002785 A MX 2014002785A MX 2014002785 A MX2014002785 A MX 2014002785A MX 2014002785 A MX2014002785 A MX 2014002785A MX 2014002785 A MX2014002785 A MX 2014002785A
- Authority
- MX
- Mexico
- Prior art keywords
- content handling
- content
- applications
- application
- handling policies
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/629—Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Signal Processing (AREA)
- Virology (AREA)
- Bioethics (AREA)
- Information Transfer Between Computers (AREA)
- Storage Device Security (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
Se describen técnicas para manejo de contenido para aplicaciones. En una o más implementaciones, se impone un primer grupo de políticas de manejo de contenido para una primera porción de una aplicación que se permite para invocar elementos de código del dispositivo de cómputo y se impone un segundo grupo de políticas de manejo de contenido para una segunda porción de la aplicación que no se permite para invocar los elementos de código. Además, se hace una determinación sobre si se aplica el primer grupo de políticas de manejo de contenido o el segundo grupo de políticas de manejo de contenido al contenido basándose en que porción de la solicitud está solicitando el contenido.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/227,201 US10445528B2 (en) | 2011-09-07 | 2011-09-07 | Content handling for applications |
PCT/US2012/053620 WO2013036470A1 (en) | 2011-09-07 | 2012-09-04 | Content handling for applications |
Publications (2)
Publication Number | Publication Date |
---|---|
MX2014002785A true MX2014002785A (es) | 2014-06-05 |
MX351857B MX351857B (es) | 2017-10-31 |
Family
ID=47754187
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
MX2014002785A MX351857B (es) | 2011-09-07 | 2012-09-04 | Manejo de contenido para aplicaciones. |
Country Status (11)
Country | Link |
---|---|
US (1) | US10445528B2 (es) |
EP (1) | EP2754082B1 (es) |
JP (1) | JP2014525638A (es) |
KR (1) | KR101977428B1 (es) |
CN (1) | CN103765431B (es) |
AU (1) | AU2012304788B2 (es) |
BR (1) | BR112014005052B1 (es) |
CA (1) | CA2846877C (es) |
MX (1) | MX351857B (es) |
RU (1) | RU2626658C2 (es) |
WO (1) | WO2013036470A1 (es) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103117992A (zh) * | 2012-09-10 | 2013-05-22 | 微软公司 | 应用的内容处理 |
US10009379B2 (en) * | 2014-12-23 | 2018-06-26 | Peter W. J. Jones | Systems and methods for sterilizing email attachments and other communications delivered by email |
US9785721B2 (en) * | 2014-12-30 | 2017-10-10 | Yahoo Holdings, Inc. | System and method for programmatically creating resource locators |
EP3286641A4 (en) * | 2015-08-20 | 2018-11-21 | Google LLC | Device-based filtering of content items associated with mobile applications |
US12019733B2 (en) * | 2022-03-11 | 2024-06-25 | Intel Corporation | Compartment isolation for load store forwarding |
Family Cites Families (39)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6505300B2 (en) * | 1998-06-12 | 2003-01-07 | Microsoft Corporation | Method and system for secure running of untrusted content |
US6981281B1 (en) * | 2000-06-21 | 2005-12-27 | Microsoft Corporation | Filtering a permission set using permission requests associated with a code assembly |
US7051366B1 (en) * | 2000-06-21 | 2006-05-23 | Microsoft Corporation | Evidence-based security policy manager |
US7047562B2 (en) * | 2001-06-21 | 2006-05-16 | Lockheed Martin Corporation | Conditioning of the execution of an executable program upon satisfaction of criteria |
US7743407B2 (en) | 2001-08-13 | 2010-06-22 | Qualcomm Incorporated | Using permissions to allocate device resources to an application |
US7216160B2 (en) * | 2001-10-31 | 2007-05-08 | Sun Microsystems, Inc. | Server-based application monitoring through collection of application component and environmental statistics |
US7242773B2 (en) * | 2002-09-09 | 2007-07-10 | Sony Corporation | Multiple partial encryption using retuning |
US7308648B1 (en) * | 2002-11-27 | 2007-12-11 | Microsoft Corporation | Method, system, and computer-readable medium for filtering harmful HTML in an electronic document |
JP3823925B2 (ja) | 2003-02-05 | 2006-09-20 | ソニー株式会社 | 情報処理装置、ライセンス情報記録媒体、および情報処理方法、並びにコンピュータ・プログラム |
US20040260754A1 (en) * | 2003-06-20 | 2004-12-23 | Erik Olson | Systems and methods for mitigating cross-site scripting |
US7694328B2 (en) * | 2003-10-21 | 2010-04-06 | Google Inc. | Systems and methods for secure client applications |
US7774620B1 (en) * | 2004-05-27 | 2010-08-10 | Microsoft Corporation | Executing applications at appropriate trust levels |
US8037527B2 (en) * | 2004-11-08 | 2011-10-11 | Bt Web Solutions, Llc | Method and apparatus for look-ahead security scanning |
US20060236100A1 (en) * | 2005-04-19 | 2006-10-19 | Guruprasad Baskaran | System and method for enhanced layer of security to protect a file system from malicious programs |
US7624111B2 (en) | 2005-06-27 | 2009-11-24 | Microsoft Corporation | Active content trust model |
US20070107057A1 (en) * | 2005-11-10 | 2007-05-10 | Docomo Communications Laboratories Usa, Inc. | Method and apparatus for detecting and preventing unsafe behavior of javascript programs |
US8045958B2 (en) * | 2005-11-21 | 2011-10-25 | Research In Motion Limited | System and method for application program operation on a wireless device |
US20070156871A1 (en) * | 2005-12-30 | 2007-07-05 | Michael Braun | Secure dynamic HTML pages |
US9356935B2 (en) | 2006-09-12 | 2016-05-31 | Adobe Systems Incorporated | Selective access to portions of digital content |
US7895296B1 (en) | 2006-12-29 | 2011-02-22 | Google, Inc. | Local storage for web based native applications |
US8584232B2 (en) * | 2007-04-23 | 2013-11-12 | Sap Ag | Enhanced cross-site attack prevention |
JP4395178B2 (ja) * | 2007-05-29 | 2010-01-06 | インターナショナル・ビジネス・マシーンズ・コーポレーション | コンテンツ処理システム、方法及びプログラム |
US10019570B2 (en) | 2007-06-14 | 2018-07-10 | Microsoft Technology Licensing, Llc | Protection and communication abstractions for web browsers |
US8181246B2 (en) * | 2007-06-20 | 2012-05-15 | Imperva, Inc. | System and method for preventing web frauds committed using client-scripting attacks |
US20090064337A1 (en) * | 2007-09-05 | 2009-03-05 | Shih-Wei Chien | Method and apparatus for preventing web page attacks |
US9906549B2 (en) * | 2007-09-06 | 2018-02-27 | Microsoft Technology Licensing, Llc | Proxy engine for custom handling of web content |
US20090119769A1 (en) * | 2007-11-05 | 2009-05-07 | Microsoft Corporation | Cross-site scripting filter |
US8650648B2 (en) * | 2008-03-26 | 2014-02-11 | Sophos Limited | Method and system for detecting restricted content associated with retrieved content |
US8220050B2 (en) * | 2008-03-31 | 2012-07-10 | Sophos Plc | Method and system for detecting restricted content associated with retrieved content |
US8806618B2 (en) * | 2008-03-31 | 2014-08-12 | Microsoft Corporation | Security by construction for distributed applications |
US9058483B2 (en) | 2008-05-08 | 2015-06-16 | Google Inc. | Method for validating an untrusted native code module |
US8387152B2 (en) | 2008-06-27 | 2013-02-26 | Microsoft Corporation | Attested content protection |
US20100058467A1 (en) | 2008-08-28 | 2010-03-04 | International Business Machines Corporation | Efficiency of active content filtering using cached ruleset metadata |
JP2010092376A (ja) | 2008-10-10 | 2010-04-22 | Softbank Mobile Corp | 情報処理装置、情報処理方法及び情報処理プログラム |
CN101788982B (zh) * | 2009-01-22 | 2013-03-06 | 国际商业机器公司 | 在未修改浏览器上保护Web应用的跨域交互的方法和系统 |
EP2222081A1 (en) | 2009-02-19 | 2010-08-25 | Thomson Licensing | Methods and devices for digital content protection |
US8413139B2 (en) | 2009-03-11 | 2013-04-02 | Microsoft Corporation | Programming model for application and data access and synchronization within virtual environments |
KR101651283B1 (ko) | 2009-11-13 | 2016-08-26 | 삼성전자 주식회사 | 컨텐츠제공시스템 및 그 컨텐츠제공방법, 디스플레이장치 및 그 제어방법 |
US8719939B2 (en) | 2009-12-31 | 2014-05-06 | Mcafee, Inc. | Malware detection via reputation system |
-
2011
- 2011-09-07 US US13/227,201 patent/US10445528B2/en active Active
-
2012
- 2012-09-04 MX MX2014002785A patent/MX351857B/es active IP Right Grant
- 2012-09-04 JP JP2014529792A patent/JP2014525638A/ja active Pending
- 2012-09-04 AU AU2012304788A patent/AU2012304788B2/en active Active
- 2012-09-04 CA CA2846877A patent/CA2846877C/en active Active
- 2012-09-04 EP EP12829988.0A patent/EP2754082B1/en active Active
- 2012-09-04 WO PCT/US2012/053620 patent/WO2013036470A1/en active Application Filing
- 2012-09-04 KR KR1020147006153A patent/KR101977428B1/ko active IP Right Grant
- 2012-09-04 BR BR112014005052-0A patent/BR112014005052B1/pt active IP Right Grant
- 2012-09-04 CN CN201280043111.XA patent/CN103765431B/zh active Active
- 2012-09-04 RU RU2014108837A patent/RU2626658C2/ru active
Also Published As
Publication number | Publication date |
---|---|
WO2013036470A1 (en) | 2013-03-14 |
US10445528B2 (en) | 2019-10-15 |
EP2754082A1 (en) | 2014-07-16 |
AU2012304788B2 (en) | 2016-12-08 |
RU2626658C2 (ru) | 2017-07-31 |
MX351857B (es) | 2017-10-31 |
CA2846877A1 (en) | 2013-03-14 |
BR112014005052A2 (pt) | 2017-03-21 |
US20130061282A1 (en) | 2013-03-07 |
AU2012304788A1 (en) | 2014-03-20 |
JP2014525638A (ja) | 2014-09-29 |
EP2754082A4 (en) | 2015-05-27 |
RU2014108837A (ru) | 2015-09-20 |
EP2754082B1 (en) | 2020-09-23 |
BR112014005052A8 (pt) | 2018-02-06 |
KR20140068940A (ko) | 2014-06-09 |
CA2846877C (en) | 2020-08-04 |
CN103765431A (zh) | 2014-04-30 |
CN103765431B (zh) | 2016-11-16 |
KR101977428B1 (ko) | 2019-08-28 |
BR112014005052B1 (pt) | 2021-09-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2016060742A8 (en) | Role based access control for connected consumer devices | |
MX336148B (es) | Superposicion de datos sociales. | |
GB2529104A (en) | Context-aware permission control of hybrid mobile applications | |
MX2017008742A (es) | Metodos y sistemas para gestion de permisos para acceder a recursos de dispositivo movil. | |
WO2014055372A3 (en) | Secure computer architectures, systems, and applications | |
WO2011123713A3 (en) | Tablet computing device system | |
IN2015DN00920A (es) | ||
WO2014150277A3 (en) | Methods and systems for providing secure transactions | |
GB2497451A (en) | Gate insulator layer for electronic devices | |
MX2017004806A (es) | Pestañasde aplicacion heterogeneas. | |
TWD156868S (zh) | 具有輸入裝置之電子平板電腦 | |
IN2014CN04888A (es) | ||
NZ727109A (en) | Facilitating single sign-on to software applications | |
EP2529288A4 (en) | GESTURES OF EDGE | |
MX366285B (es) | Agregado y presentacion de informacion de evento. | |
GB201312856D0 (en) | Malware Detection | |
MX2014013295A (es) | Sistemas y metodos para el procesamiento seguro con unidad criptografica incorporada. | |
WO2012094332A3 (en) | Smart grid device authenticity verification | |
MX2016006736A (es) | Metodo y sistema que proporcionan interfaz mejorada de usuario de lealtad en entorno de distribucion de combustible. | |
GB2549650A (en) | Techniques for sharing applications | |
MX2017003524A (es) | Presentacion de aplicacion dividida a traves de dispositivos. | |
IL236822B (en) | Method, device and media for neutralizing attacks | |
WO2011129988A3 (en) | Shared resource computing | |
MX2014002785A (es) | Manejo de contenido para aplicaciones. | |
IN2013DE03292A (es) |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
GB | Transfer or rights |
Owner name: MICROSOFT TECHNOLOGY LICENSING, LLC |
|
FG | Grant or registration |