MX2022008427A - Metodo y aparato para control de autoridad, dispositivo informatico y medio de almacenamiento. - Google Patents

Metodo y aparato para control de autoridad, dispositivo informatico y medio de almacenamiento.

Info

Publication number
MX2022008427A
MX2022008427A MX2022008427A MX2022008427A MX2022008427A MX 2022008427 A MX2022008427 A MX 2022008427A MX 2022008427 A MX2022008427 A MX 2022008427A MX 2022008427 A MX2022008427 A MX 2022008427A MX 2022008427 A MX2022008427 A MX 2022008427A
Authority
MX
Mexico
Prior art keywords
container
user instruction
configuration file
user
authorities
Prior art date
Application number
MX2022008427A
Other languages
English (en)
Inventor
Yun Xie
Original Assignee
Envision Digital Int Pte Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Envision Digital Int Pte Ltd filed Critical Envision Digital Int Pte Ltd
Publication of MX2022008427A publication Critical patent/MX2022008427A/es

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/629Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/468Specific access rights for resources, e.g. using capability register
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Automation & Control Theory (AREA)
  • Storage Device Security (AREA)
  • Stored Programmes (AREA)

Abstract

La presente invención se refiere a un método y un aparato para el control de autoridad, a un dispositivo informático y a un medio de almacenamiento, y se relaciona con el campo de las tecnologías de Internet. El método incluye: adquirir un archivo de configuración de acuerdo con un escenario comercial cuando se inicialice un contenedor, en donde el archivo de configuración se gestiona fuera del contenedor; validar el archivo de configuración en el contenedor; recibir una instrucción de usuario; identificar un tipo de instrucción de usuario cuando la instrucción de usuario sea una instrucción ejecutable; adquirir contenido de script de un archivo de script cuando el tipo de instrucción de usuario indique que la instrucción de usuario es el archivo de script, en donde el contenido de script incluye al menos una declaración de comando; y llevar a cabo una verificación de validez en la por lo menos una declaración de comando con base en el archivo de configuración. Mediante el método anterior, durante el uso del contenedor, las autorizaciones de usuario en el contenedor se controlan de acuerdo con el escenario comercial, y las autorizaciones de usuario se controlan desde el punto de vista de una granularidad más pequeña, mejorando así la seguridad de uso del contenedor mientras se logra la adaptabilidad de las autoridades.
MX2022008427A 2020-01-09 2021-01-08 Metodo y aparato para control de autoridad, dispositivo informatico y medio de almacenamiento. MX2022008427A (es)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202010022017.2A CN111259412B (zh) 2020-01-09 2020-01-09 权限控制方法、装置、计算机设备及存储介质
PCT/SG2021/050016 WO2021141543A1 (en) 2020-01-09 2021-01-08 Method and apparatus for authority control, computer device and storage medium

Publications (1)

Publication Number Publication Date
MX2022008427A true MX2022008427A (es) 2022-10-20

Family

ID=70948631

Family Applications (1)

Application Number Title Priority Date Filing Date
MX2022008427A MX2022008427A (es) 2020-01-09 2021-01-08 Metodo y aparato para control de autoridad, dispositivo informatico y medio de almacenamiento.

Country Status (12)

Country Link
US (1) US11599654B2 (es)
EP (1) EP4088212A4 (es)
JP (1) JP7228751B2 (es)
KR (1) KR102502181B1 (es)
CN (1) CN111259412B (es)
AU (1) AU2021206497B2 (es)
BR (1) BR112022013674A2 (es)
CA (1) CA3167549A1 (es)
CL (1) CL2022001864A1 (es)
MX (1) MX2022008427A (es)
WO (1) WO2021141543A1 (es)
ZA (1) ZA202208348B (es)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112445576B (zh) * 2020-11-30 2024-04-16 中国人寿保险股份有限公司 一种屏蔽业务差异的设备调用方法及相关设备
CN112989324A (zh) * 2021-03-10 2021-06-18 中国民航信息网络股份有限公司 数据交互的方法、装置、电子设备及存储介质
CN113849819B (zh) * 2021-09-24 2023-07-14 苏州浪潮智能科技有限公司 命令行指令的处理方法、装置、计算机设备和存储介质
CN114531443B (zh) * 2022-02-18 2024-05-17 京东科技信息技术有限公司 基于集群的容器控制方法及系统
CN114756454A (zh) * 2022-03-29 2022-07-15 润芯微科技(江苏)有限公司 一种嵌入式软件开发的代码管理、持续集成和交付的工作方法及系统
CN115883536B (zh) * 2022-11-28 2024-06-18 中国联合网络通信集团有限公司 文件传递方法、装置、系统及存储介质
CN117573243B (zh) * 2024-01-17 2024-05-10 杭州实在智能科技有限公司 用于信创体系的rpa文件操作和管理方法及系统

Family Cites Families (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2001296394A1 (en) 2000-09-27 2002-04-15 Conducive Technology Corp Scripting business logic in a distributed object oriented environment
JP4643204B2 (ja) * 2004-08-25 2011-03-02 株式会社エヌ・ティ・ティ・ドコモ サーバ装置
US7475235B1 (en) * 2005-06-15 2009-01-06 Unisys Corporation Real-time management of a configuration of a computer system
US7673028B2 (en) * 2005-09-28 2010-03-02 Sap Ag Method and system for container-managed configuration and administration
CN101640787B (zh) * 2009-08-24 2011-10-26 中兴通讯股份有限公司 一种层次化控制访问组播组的方法和装置
KR20120055371A (ko) * 2010-11-23 2012-05-31 한국전자통신연구원 디지털 공간정보의 보호 방법 및 장치
US9047442B2 (en) * 2012-06-18 2015-06-02 Microsoft Technology Licensing, Llc Provisioning managed devices with states of arbitrary type
US8898769B2 (en) * 2012-11-16 2014-11-25 At&T Intellectual Property I, Lp Methods for provisioning universal integrated circuit cards
US20150007142A1 (en) * 2012-12-12 2015-01-01 Google Inc. Branch destination tables
US20150363437A1 (en) * 2014-06-17 2015-12-17 Ims Health Incorporated Data collection and cleaning at source
US9641529B2 (en) 2014-11-10 2017-05-02 Coastal Federal Credit Union Methods, systems and computer program products for an application execution container for managing secondary application protocols
US10404708B2 (en) * 2015-06-03 2019-09-03 Secure Circle, Llc System for secure file access
US10353726B2 (en) * 2015-09-29 2019-07-16 NeuVector, Inc. Transparent network security for application containers
US10223534B2 (en) * 2015-10-15 2019-03-05 Twistlock, Ltd. Static detection of vulnerabilities in base images of software containers
KR20170072552A (ko) * 2015-12-17 2017-06-27 에스케이텔레콤 주식회사 클라우드 개발 환경을 위한 컨테이너 서비스 방법 및 그 장치
CN108090345B (zh) * 2016-11-21 2021-08-17 腾讯科技(深圳)有限公司 linux系统外部命令执行方法及装置
CN108268324A (zh) * 2016-12-30 2018-07-10 航天信息股份有限公司 一种远程多业务管理方法和系统
US10691816B2 (en) 2017-02-24 2020-06-23 International Business Machines Corporation Applying host access control rules for data used in application containers
KR101796205B1 (ko) * 2017-04-17 2017-11-13 주식회사 넷앤드 보안 강화를 위해 입력된 명령어 학습 기반 이상 사용자를 탐지하는 서버 접근 통제 시스템
US10467424B2 (en) * 2017-10-12 2019-11-05 International Business Machines Corporation File system content based security
CN109343934A (zh) * 2018-09-17 2019-02-15 北京北信源信息安全技术有限公司 一种基于容器的私服架构及其搭建和可视化方法
US10515005B1 (en) * 2018-12-20 2019-12-24 Atlassian Pty Ltd Systems and methods for testing source code
US11514340B2 (en) * 2019-11-08 2022-11-29 International Business Machines Corporation Machine learning for technical tool selection

Also Published As

Publication number Publication date
EP4088212A1 (en) 2022-11-16
US11599654B2 (en) 2023-03-07
BR112022013674A2 (pt) 2022-09-13
CA3167549A1 (en) 2021-07-15
EP4088212A4 (en) 2023-06-28
CN111259412A (zh) 2020-06-09
JP2023500166A (ja) 2023-01-04
US20230036357A1 (en) 2023-02-02
AU2021206497B2 (en) 2023-05-04
CN111259412B (zh) 2023-12-05
KR102502181B1 (ko) 2023-02-21
AU2021206497A1 (en) 2022-08-04
CL2022001864A1 (es) 2022-11-25
WO2021141543A1 (en) 2021-07-15
ZA202208348B (en) 2022-10-26
JP7228751B2 (ja) 2023-02-24
KR20220116341A (ko) 2022-08-22

Similar Documents

Publication Publication Date Title
MX2022008427A (es) Metodo y aparato para control de autoridad, dispositivo informatico y medio de almacenamiento.
US11514431B2 (en) Using on-demand applications to generate virtual numbers for a contactless card to securely autofill forms
US11164271B2 (en) Systems and methods of delayed authentication and billing for on-demand products
MY193713A (en) Payment method, apparatus and system
TWI541669B (zh) Detection systems and methods for static detection applications, and computer program products
AU2014318966A1 (en) Authentication systems and methods for on-demand products
CN106357694A (zh) 一种访问请求处理方法及装置
Kuhn et al. It doesn’t have to be like this: Cybersecurity vulnerability trends
SG10201702968TA (en) A fraud monitoring apparatus
CN110021291B (zh) 一种语音合成文件的调用方法及装置
CN108599959A (zh) 授权证书校验方法、装置及可读存储介质、应用设备
CN105045801B (zh) 一种登录时头像的显示方法、装置及系统
US10176314B2 (en) Authentication system and method
CN106161373B (zh) 一种安全防护信息提示方法、安全监控装置以及系统
CN107133539B (zh) 智能卡个人化方法及相关装置与系统
US9780951B2 (en) Prevention of forgery of web requests to a server
CN109726540A (zh) 一种为Qemu中虚拟可信根颁发背书证书的方法与系统
CN105991575A (zh) 云桌面的登陆方法及系统
CN108549821B (zh) 数据权限管理方法及系统
Nolan Bulletproof Android: practical advice for building secure apps
CN113742008B (zh) 接口调用方法、装置、电子设备及存储介质
Chiboora et al. Evaluating Mobile Banking Application Security Posture Using the OWASP’s MASVS Framework
CN112235255B (zh) 一种语音数据处理方法、装置及服务端
TWI804968B (zh) 線上證明資料防偽系統及線上證明資料防偽方法
CN108733340B (zh) 移动终端声音功能的动态访问控制系统