MY150910A - System and method for virtual on-demand application - Google Patents

System and method for virtual on-demand application

Info

Publication number
MY150910A
MY150910A MYPI2010002427A MY150910A MY 150910 A MY150910 A MY 150910A MY PI2010002427 A MYPI2010002427 A MY PI2010002427A MY 150910 A MY150910 A MY 150910A
Authority
MY
Malaysia
Prior art keywords
virtual
application
attestation
storage
operating system
Prior art date
Application number
Inventor
Mohd Azuddin Parman
Zharfan Hamdan
Wira Zanoramy Ansiry Zakaria
Mohd Saufy Rohmad
Mohd Anuar Mat Isa
Original Assignee
Mimos Berhad
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mimos Berhad filed Critical Mimos Berhad
Priority to MYPI2010002427 priority Critical patent/MY150910A/en
Priority to PCT/MY2010/000266 priority patent/WO2011149326A1/en
Publication of MY150910A publication Critical patent/MY150910A/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Information Transfer Between Computers (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

A SYSTEM FOR VIRTUAL ON-DEMAND APPLICATION (100) COMPRISING OF A SECURED APPLICATION SERVER (10) FOR ATTESTATION AND SECURE APPLICATION SERVICES, A VIRTUAL STORAGE SERVER (35) FOR MEMORY LOCATION, A VIRTUAL MACHINE MONITOR STORAGE (30) FOR HOLDING VIRTUAL MACHINE MONITOR ENGINE, A SECURE APPLICATION AND OPERATING SYSTEM IMAGE STORAGE (25) FOR STORING APPLICATION AND OPERATING SYSTEM AND A CLIENT?S INFORMATION DATABASE (15) FOR AUTHENTICATION AND ATTESTATION. THE MOST ILLUSTRATIVE DRAWING:
MYPI2010002427 2010-05-25 2010-05-25 System and method for virtual on-demand application MY150910A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
MYPI2010002427 MY150910A (en) 2010-05-25 2010-05-25 System and method for virtual on-demand application
PCT/MY2010/000266 WO2011149326A1 (en) 2010-05-25 2010-11-10 System and method for virtual on-demand application

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
MYPI2010002427 MY150910A (en) 2010-05-25 2010-05-25 System and method for virtual on-demand application

Publications (1)

Publication Number Publication Date
MY150910A true MY150910A (en) 2014-03-14

Family

ID=45004144

Family Applications (1)

Application Number Title Priority Date Filing Date
MYPI2010002427 MY150910A (en) 2010-05-25 2010-05-25 System and method for virtual on-demand application

Country Status (2)

Country Link
MY (1) MY150910A (en)
WO (1) WO2011149326A1 (en)

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7313793B2 (en) * 2002-07-11 2007-12-25 Microsoft Corporation Method for forking or migrating a virtual machine
US7203944B1 (en) * 2003-07-09 2007-04-10 Veritas Operating Corporation Migrating virtual machines among computer systems to balance load caused by virtual machines
EP2249511A1 (en) * 2008-02-25 2010-11-10 Panasonic Corporation Information security device and information security system

Also Published As

Publication number Publication date
WO2011149326A1 (en) 2011-12-01

Similar Documents

Publication Publication Date Title
WO2013002833A3 (en) Binding of cryptographic content using unique device characteristics with server heuristics
PH12017500192B1 (en) Methods and systems for distributing orders
EP2996060A3 (en) Methods and systems for distributing cryptographic data to authenticated recipients
EP2624123A3 (en) Information processing system, information processing apparatus, and authentication method
EP2209077A3 (en) Apparatus, method, program, and system for information processing
EP2506488A3 (en) Secure dynamic on-chip key programming
IN2015DN02657A (en)
EP2639996A3 (en) Collusion-resistant outsourcing of private set intersection
EP2696300A3 (en) Network based font subset management
EP2827266A3 (en) Information distribution system, and server, on-board terminal and communication terminal used therefor
GB2530972A (en) Encrypted purging of data from content node storage
WO2012058639A8 (en) Method and system for processing transactions using a token
EP2706520A3 (en) Security chip, program, information processing apparatus, and information processing system
EP4307695A3 (en) Systems and methods for performing transport i/o
WO2013003611A3 (en) Systems and methods for identifying consumer electronic products using a playback device with a product identifier
GB2494819A (en) Method and system for providing continued access to authentication and encryption services
WO2016022501A3 (en) Secure mobile contact system (smcs)
BR112013019236A2 (en) server system to provide secure access to a data record, hardware token for use with a user terminal in communication with the server system, system, method of providing secure access to a data record, and computer program product
EP2728556A3 (en) Electronic key registration method, electronic key registration system, and controller
WO2014081867A3 (en) Secure data transmission
EP2264639A3 (en) Securing executable code integrity using auto-derivative key
WO2014022555A3 (en) Image repository systems and methods
MX2009006825A (en) Systems and methods for providing remote access to interactive media guidance applications.
EP2521065A3 (en) Memory device and method for accessing the same
EP2669837A3 (en) Cooperation system, cooperation method threreof, information processing system, and program thereof