RU2637878C2 - Аутентификация процессов и разрешения на ресурсы - Google Patents
Аутентификация процессов и разрешения на ресурсы Download PDFInfo
- Publication number
- RU2637878C2 RU2637878C2 RU2015155272A RU2015155272A RU2637878C2 RU 2637878 C2 RU2637878 C2 RU 2637878C2 RU 2015155272 A RU2015155272 A RU 2015155272A RU 2015155272 A RU2015155272 A RU 2015155272A RU 2637878 C2 RU2637878 C2 RU 2637878C2
- Authority
- RU
- Russia
- Prior art keywords
- level
- levels
- access
- dimension
- digital signature
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2113—Multi-level security, e.g. mandatory access control
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2145—Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US13/925,703 US9515832B2 (en) | 2013-06-24 | 2013-06-24 | Process authentication and resource permissions |
| US13/925,703 | 2013-06-24 | ||
| PCT/US2013/061080 WO2014209416A1 (en) | 2013-06-24 | 2013-09-21 | Process authentication and resource permissions |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| RU2015155272A RU2015155272A (ru) | 2017-07-28 |
| RU2637878C2 true RU2637878C2 (ru) | 2017-12-07 |
Family
ID=49293916
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| RU2015155272A RU2637878C2 (ru) | 2013-06-24 | 2013-09-21 | Аутентификация процессов и разрешения на ресурсы |
Country Status (7)
| Country | Link |
|---|---|
| US (1) | US9515832B2 (enExample) |
| EP (1) | EP3014511A1 (enExample) |
| JP (1) | JP6286034B2 (enExample) |
| CN (1) | CN105408912B (enExample) |
| BR (1) | BR112015031853A8 (enExample) |
| RU (1) | RU2637878C2 (enExample) |
| WO (1) | WO2014209416A1 (enExample) |
Families Citing this family (27)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9489390B2 (en) | 2012-12-20 | 2016-11-08 | Bank Of America Corporation | Reconciling access rights at IAM system implementing IAM data model |
| US9189644B2 (en) | 2012-12-20 | 2015-11-17 | Bank Of America Corporation | Access requests at IAM system implementing IAM data model |
| US9483488B2 (en) | 2012-12-20 | 2016-11-01 | Bank Of America Corporation | Verifying separation-of-duties at IAM system implementing IAM data model |
| US9477838B2 (en) | 2012-12-20 | 2016-10-25 | Bank Of America Corporation | Reconciliation of access rights in a computing system |
| US9537892B2 (en) | 2012-12-20 | 2017-01-03 | Bank Of America Corporation | Facilitating separation-of-duties when provisioning access rights in a computing system |
| US9639594B2 (en) | 2012-12-20 | 2017-05-02 | Bank Of America Corporation | Common data model for identity access management data |
| US9495380B2 (en) | 2012-12-20 | 2016-11-15 | Bank Of America Corporation | Access reviews at IAM system implementing IAM data model |
| US9529629B2 (en) * | 2012-12-20 | 2016-12-27 | Bank Of America Corporation | Computing resource inventory system |
| US9542433B2 (en) | 2012-12-20 | 2017-01-10 | Bank Of America Corporation | Quality assurance checks of access rights in a computing system |
| US9407638B2 (en) | 2013-08-26 | 2016-08-02 | The Boeing Company | System and method for trusted mobile communications |
| US9344439B2 (en) * | 2014-01-20 | 2016-05-17 | The Boeing Company | Executing unprotected mode services in a protected mode environment |
| KR101671989B1 (ko) * | 2014-02-10 | 2016-11-03 | 한국전자통신연구원 | 전자 서명 제공 장치 및 방법 |
| US10776457B1 (en) * | 2014-07-22 | 2020-09-15 | Epic Games, Inc. | System and method for preventing execution of unauthorized code |
| CN105404819A (zh) * | 2014-09-10 | 2016-03-16 | 华为技术有限公司 | 一种数据访问控制方法、装置以及终端 |
| US10049218B2 (en) | 2016-12-07 | 2018-08-14 | Google Llc | Rollback resistant security |
| US10432407B2 (en) * | 2016-12-19 | 2019-10-01 | Arris Enterprises Llc | Secure provisioning of unique time-limited certificates to virtual application instances in dynamic and elastic systems |
| US10805080B2 (en) * | 2017-01-06 | 2020-10-13 | Microsoft Technology Licensing, Llc | Strong resource identity in a cloud hosted system |
| US10853471B2 (en) * | 2017-01-15 | 2020-12-01 | Apple Inc. | Managing permissions for different wireless devices to control a common host device |
| EP3376464A1 (en) * | 2017-03-14 | 2018-09-19 | Electronics and Telecommunications Research Institute | Trust-based resource sharing method and system |
| US10572680B2 (en) * | 2017-03-21 | 2020-02-25 | Microsoft Technology Licensing, Llc | Automated personalized out-of-the-box and ongoing in-application settings |
| CN107688730A (zh) * | 2017-07-28 | 2018-02-13 | 宁波保税区攀峒信息科技有限公司 | 一种可执行文件安全运行方法 |
| EP3756085A4 (en) * | 2018-10-18 | 2021-10-27 | Hewlett-Packard Development Company, L.P. | GENERATION OF STATISTICAL ANALYSIS OF DATA FOR TRANSFER TO SERVER |
| EP3786826B1 (en) * | 2019-08-30 | 2025-09-17 | Barclays Execution Services Limited | Secure validation pipeline in a third party cloud environment |
| US10812272B1 (en) | 2020-01-13 | 2020-10-20 | Cyberark Software Ltd. | Identifying computing processes on automation servers |
| IL275954A (en) | 2020-07-09 | 2022-02-01 | Google Llc | Anonymous event confirmation with group signatures |
| IL275947A (en) * | 2020-07-09 | 2022-02-01 | Google Llc | Anonymous Event Confirmation |
| CN114238997B (zh) * | 2022-02-23 | 2022-05-10 | 国汽智控(北京)科技有限公司 | 基于车辆应用权限的资源调用方法、装置和电子设备 |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20080022093A1 (en) * | 2006-06-20 | 2008-01-24 | Microsoft Corporation | Integrating security protection tools with computer device integrity and privacy policy |
| US20080201766A1 (en) * | 2007-02-16 | 2008-08-21 | Microsoft Corporation | Efficient data structures for multi-dimensional security |
| US20130042101A1 (en) * | 2011-08-10 | 2013-02-14 | Helmut Neumann | System and method for using digital signatures to assign permissions |
Family Cites Families (12)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6023765A (en) * | 1996-12-06 | 2000-02-08 | The United States Of America As Represented By The Secretary Of Commerce | Implementation of role-based access control in multi-level secure systems |
| EP1119813A1 (en) * | 1998-09-28 | 2001-08-01 | Argus Systems Group, Inc. | Trusted compartmentalized computer operating system |
| US6981281B1 (en) | 2000-06-21 | 2005-12-27 | Microsoft Corporation | Filtering a permission set using permission requests associated with a code assembly |
| CN101694687B (zh) | 2000-09-21 | 2017-04-12 | 黑莓有限公司 | 代码签字系统及方法 |
| EP1225512A1 (en) | 2001-01-19 | 2002-07-24 | Eyal Dotan | Method for protecting computer programs and data from hostile code |
| FR2901038A1 (fr) * | 2006-05-15 | 2007-11-16 | France Telecom | Procede et dispositif de configuration securisee d'un terminal au moyen d'un dispositif de stockage de donnees de demarrage |
| US8381306B2 (en) | 2006-05-30 | 2013-02-19 | Microsoft Corporation | Translating role-based access control policy to resource authorization policy |
| CN101231712A (zh) * | 2007-01-23 | 2008-07-30 | 上海宝信软件股份有限公司 | 业务授权模型及其在具体业务应用中的设定方法 |
| US8433927B2 (en) | 2007-05-29 | 2013-04-30 | International Business Machines Corporation | Cryptographically-enabled privileged mode execution |
| JP5043786B2 (ja) * | 2008-09-10 | 2012-10-10 | Kddi株式会社 | アクセス制御システム、アクセス制御方法 |
| US8973158B2 (en) | 2011-07-20 | 2015-03-03 | Microsoft Technology Licensing Llc | Trust level activation |
| CN102354356B (zh) * | 2011-09-29 | 2014-06-04 | 用友软件股份有限公司 | 数据权限管理装置和方法 |
-
2013
- 2013-06-24 US US13/925,703 patent/US9515832B2/en active Active
- 2013-09-21 JP JP2016521395A patent/JP6286034B2/ja not_active Expired - Fee Related
- 2013-09-21 WO PCT/US2013/061080 patent/WO2014209416A1/en not_active Ceased
- 2013-09-21 BR BR112015031853A patent/BR112015031853A8/pt not_active Application Discontinuation
- 2013-09-21 RU RU2015155272A patent/RU2637878C2/ru not_active IP Right Cessation
- 2013-09-21 EP EP13771337.6A patent/EP3014511A1/en not_active Ceased
- 2013-09-21 CN CN201380077757.4A patent/CN105408912B/zh not_active Expired - Fee Related
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20080022093A1 (en) * | 2006-06-20 | 2008-01-24 | Microsoft Corporation | Integrating security protection tools with computer device integrity and privacy policy |
| US20080201766A1 (en) * | 2007-02-16 | 2008-08-21 | Microsoft Corporation | Efficient data structures for multi-dimensional security |
| US20130042101A1 (en) * | 2011-08-10 | 2013-02-14 | Helmut Neumann | System and method for using digital signatures to assign permissions |
Also Published As
| Publication number | Publication date |
|---|---|
| JP6286034B2 (ja) | 2018-02-28 |
| JP2016527608A (ja) | 2016-09-08 |
| RU2015155272A (ru) | 2017-07-28 |
| WO2014209416A1 (en) | 2014-12-31 |
| CN105408912B (zh) | 2018-09-14 |
| US9515832B2 (en) | 2016-12-06 |
| US20140380058A1 (en) | 2014-12-25 |
| BR112015031853A2 (pt) | 2017-07-25 |
| CN105408912A (zh) | 2016-03-16 |
| BR112015031853A8 (pt) | 2019-12-31 |
| EP3014511A1 (en) | 2016-05-04 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| RU2637878C2 (ru) | Аутентификация процессов и разрешения на ресурсы | |
| EP3887979B1 (en) | Personalized and cryptographically secure access control in operating systems | |
| JP7545419B2 (ja) | 統合された隔離されたアプリケーションにおけるランサムウェアの被害の軽減 | |
| KR101861401B1 (ko) | 장치 기능과 애플리케이션의 결합 | |
| US8769305B2 (en) | Secure execution of unsecured apps on a device | |
| EP1946238B1 (en) | Operating system independent data management | |
| JP6397500B2 (ja) | 仮想マシン・マネージャーによって支援される選択的コード完全性強制 | |
| US9576147B1 (en) | Security policy application through data tagging | |
| RU2631136C2 (ru) | Способ защищенного доступа и устройство защищенного доступа прикладной программы | |
| Krupp et al. | SPE: security and privacy enhancement framework for mobile devices | |
| WO2016065636A1 (zh) | 用于终端的数据管理方法、数据管理装置和终端 | |
| JP5211716B2 (ja) | ファイルアクセス制御方法、ファイルアクセス制御プログラム、およびファイルアクセス制御装置 | |
| Cho et al. | Vulnerabilities of android data sharing and malicious application to leaking private information | |
| WO2022068322A1 (en) | Software access through heterogeneous encryption | |
| CN114900324A (zh) | 基于odin的数据交互方法及相关设备 | |
| Schiffman et al. | Dauth: Fine-grained authorization delegation for distributed web application consumers | |
| JP2013008397A (ja) | 制御プログラム、方法および機器 | |
| Bente et al. | On remote attestation for google chrome os | |
| KR20160102915A (ko) | 모바일 가상화 기반의 스마트워크용 보안 플랫폼 관리 장치 | |
| KR101616702B1 (ko) | 코드사인을 이용한 소프트웨어 관리방법 | |
| Choi et al. | Hardware-assisted credential management scheme for preventing private data analysis from cloning attacks | |
| Melara | Intra-Process Least Privilege and Isolation for Emerging Applications | |
| Chauhan et al. | Security Risk Associated with Android Applications | |
| Verma | A security analysis of smartphones | |
| HK40060449A (en) | Personalized and cryptographically secure access control in operating systems |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| MM4A | The patent is invalid due to non-payment of fees |
Effective date: 20190922 |