TW318230B - Support for portable trusted software - Google Patents

Support for portable trusted software Download PDF

Info

Publication number
TW318230B
TW318230B TW085115111A TW85115111A TW318230B TW 318230 B TW318230 B TW 318230B TW 085115111 A TW085115111 A TW 085115111A TW 85115111 A TW85115111 A TW 85115111A TW 318230 B TW318230 B TW 318230B
Authority
TW
Taiwan
Prior art keywords
code
resources
certificate
patent application
program
Prior art date
Application number
TW085115111A
Other languages
English (en)
Inventor
Dan Asit
Ramaswami Rajiv
Sitaram Dinkar
Original Assignee
Ibm
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ibm filed Critical Ibm
Application granted granted Critical
Publication of TW318230B publication Critical patent/TW318230B/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F13/00Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/54Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2211/00Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
    • G06F2211/009Trust
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]

Description

S230 A7 B7 五、發明説明(1 ) 1 .發明背景 a.發明領域 本發明概言之係關於經由配 的傳送。 无例如網路,之敕體 b .相關技術 軟體配送目前是一主要事業。 θ CD-ROM且愈來愈多經由網路 里疋經由磁碟, 網路⑽自遠端位置下載程式碼以外,二 ㈣器下載並執行_et’而這i;a。式語言或其他二 s,例如Telescript,所提議之環.境。 〇 自其他地方取得之程式碼的-大顧慮是安全性。例如, 在㈣作業系統中,該程式碼將在客户層之下執行並具有 茲客尸(所有權利.,包括對於其之所有檔案的存取,以及 可能傳送郵件,嘗試不合法之侵入,等等。一嘗試藉由 在一非常局限之環境下執行applet來替applet解決此種問題 。結果,Java applet之適用性與功能性受到限制。另—方 面Java應用程式依賴作業系統所提供之安全性且未具有任 何程度之鑑別。因此他們與任何其他程式碼導致相同之安 全性問題。 經濟部中央標準局貝工消費合作社印装 I---------\裝------訂 (請先閱讀背面之注意事項再填寫本頁) A· D. Rubin之論文"Trusted Distribution of Software Over the Internet , Internet Society Symposium on Network and Distributed Security, 1995,提出一種鑑別方法,在此種鑑 別方法中,一受信託之第三者簽署一證件以辨識一程式之 作者並確保該程式碼之完整性。雖然如此使得客户可驗證 -4 本紙佚尺度適用中國國家標準(CNS ) A4規格(210X29*7公釐) 31S230 A7 五、發明説明( 經濟部中央搞準局貝工消費合作社印製 气馬之眞貫f生’此種方法無法指定相關於該程 組彈性斗可H .,土 4m 、巧之一 等許/。 …4供-種自動化方法以供客户來實施該 11 .發明摘要 、Μ幻文而„本發明提供一種鎩別方法,其中—受信託 :罘二者僉署一證件以辨識—程式之作者並確保該程式之 疋正〖生。这私式碼受到封裝或者相關於該證件與—存取控 制表列(ACL)。1¾存取控制表列説明該程式碼户斤需之許可 與資源。本發明4接址 „ 一- — P 也彳疋供一種貫施機制而該種實施機制根據 ACL來指配系統許可與資源。 , 幸人佳κ例中,一程式碼產生系統與一證明代理者 行L Λ而。玄拉明代理者爲一受信託之第三者。證明代 者發出該& ^碼之證件與該彳以碼之存取表列&證件。一 -發出3 α件’則任_方皆無法在不使該證件變成無效之 下1U ?文这私式碼或存取表列。該程式碼與其之ACL,連 他:之證件儲存於-伺服器。-下載該程式碼或存取表 之各户可知也忒私式碼/存取表列之完整性且該系統可 施該存取表列以確保未超出許可與資源。 III.附圖簡短説明 圖1展示一根據本發明之較佳實例之程式碼傳送與證 系統的方塊圖: 圖2展示客户系統之不同組件如何—起運作來執行該 例所述之功能; 圖3展示存取控制表列(ACL); 進 理 同 實 明 實
In---I-I. 裝-- 11-I ^ (請先閔讀背面之注意事項再填寫本頁)
-5- S紙張尺纽用t ϋg家標ITcNS ) A4規格(210X297公着) 318230 A7 經濟部令央橾準局貝工消費合作杜印製 五、發明説明(3 ) 圖4展示ACL實施程式所使用之資料結構; 圖5展示似實施程式如何實施邏輯資源許可; 圖6展示ACL實施程戎4 y 一 __ 式如何貫施實體資源限制; 圖7展示用於客户系玆 a ‘、,"无疋元整性、驗證,執行與實施啓動 運作的虛擬碼; 圖8展示ACL管理程式之虛擬碼;且 圖9展示ACL實施程式之虛擬碼。 IV.較佳實例之詳細説明 圖1展π根據本發明之一較佳實例之程式碼傳送與證 明系統的方塊圖。該系統包含一或更多程式碼產生系統 (CPS) 1〇,.一證明代理者WA} U ’ 一或更多伺服器2〇與一 或更夕卷·户系統J 〇。客户系統可藉由一傳統之廣域網路 (WAN)或藉由區域網路(LAN)來耦接至伺服器。cps具有一 段程式碼(code) 140與該程式碼之一存取表列(ACL) 150且 CPS想要讓證明代理者證明存取表列15〇。CA提供一到處 可得並爲客户系統所知之公開金鑰κ。此外CA具有一只有 其本身知道之私人金鑰P。若要提供程式碼之證件,CA產 生一包含程式碼名稱與程式碼之加密雜亂的證件並利用其 之私人金鑰來簽署該證件。現在無法在不使該CA之簽名 無效化之下更改該證件》同樣地CA產生並簽署相關於該 程式碼之ACL的另一證件(如果想要的話,程式碼與其之存 取表列可只具有單一證件)。在圖1之實例中,客户系統是 經由WAN或LAN來接收證件,ACL與程式碼。但是,應可 瞭解客户系統也可或另外藉由一爲本地輸入裝置,例如软 6- 木紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐) I I — I ! - 一 -- I —I 1..... 1 I (请先閱讀背*之注意事項真填寫本萸) 4 318230 發明説明( 碟機或光碟機,所讀取之可 之程式碼。 云式儲存媒體來接收經證明 圖2所展示之客户系統包 尤匕。釦證孝主式110, ACL·管理程式 1)0,執行程式17〇,ACl會说 乙只把淨王式180與客户介面19〇。該 客尸系統也包含—傳統之中本 _ 處理早兀(CPU)與相關之控 1邏輯192’通訊控制器/網路介面194, cd_r〇m及域軟 碟’人系統196與其他資源,例如網路存取模組,顯示次系 ..无只各種特殊用途轉接II。熟悉本技術領域者應可認知客 户系統包含一些本文不會詳加説:月之額,外,傳統元件。 ACL官理程式130與ACL實施程式18〇最好是實現成爲程 式碼’而下文將更詳細説明該等程式碼之運作。執行程式 疋客户之作業系統(未加以展示)的傳統組件且是用以在 客户系統執行輸入之程式碼。客户介面19〇可實現成爲— 螢幕圖形使用者介面之前端裝置且該前端裝置提供客户與 ACL官理程式之間的通訊(例如其使得客户可告知acl管理 程式13 0以允許或不允許或控制程式對於指定之資源的存 取)。驗證程式110最好實現成爲包含一解密模組之程式碼 而該解密模組是用以驗證輸入之程式碼,包括存取控制表 列’的眞貫性。驗證程式也包含一檢查輸入之程式碼與 A C L之冗整性的雜亂模組。 一旦下載程式碼/ACL與其之證件(1〇〇),驗證程式(11〇: 首先檢查是否該證件之CA簽名爲有效的(利用該CA之已知 公開金鑰)。驗證程式然後計算程式碼/ACL之加密雜亂碼 並驗證是否該雜亂碼匹配證件之値。如果簽名是無效的或 本紙張尺度適用中國國家標準(CNS ) Α4規格(210Χ 297公釐〉 I---- — ^----- 裝—— (請先閱讀背面之注意事項再填寫本頁)
、1T 經濟部中央標準局員工消費合作社印製 經濟部中央標準局員工消費合作衽印製 五、發明説明(5 ) 者雜亂碼不匹配,則該程式碼與ACL受到拒絕(12〇)。如果 驗證無誤,則ACL管理程式(13〇)受到啓動。ACL管理程式 經由客户介面(190)來顯示ACL(説明如下)给客户並確定^ 否客户想要允許或不允許該ACL之個別項目。ACL管理程 式依照客户之指示經由客户介面來儲存程式碼(14〇)並儲^ ACL(150)以及許可旗標(16〇)。 一可使他們之存取受到ACL實施程式控制之資源包含邏輯 貧源,例如檔案系統,特定檔案與系統呼叫,以及實體資 源,而實體資源包含例如磁碟空、,磁*碟存取,主記憶體 分配與對於各種系統控制器及轉.接器之存取。就對於邏^ 貪源(各尸系統設備)之存取而言,許可旗標顯示是否個 別項目受到允許;就實體資源之存取而言,許可旗標可用 以顯示最大允許之消耗數量或消耗率。 圖2也展示客户系統之不同組件如何一起運作。在一多 使用者客尸系統中’每—使用者皆可擁有他們自己之許可 旗標的集合。ACL也可与本提 j I D %境邊數;在執行期間改變環 =數使得個別使用者可特別指定存取權利。机與許可 旗標儲存於一安全區域;镑& + φ , ,°賣或更新此區域是由ACL實施 私式(180)所實施之—權利。 ' 一 ACL官理程式可由客户在任何時間來啓動以顯示或更改 二°程式碼是由執行程式(m)來執行。在允許 進行存取之前,執行程式啓動似實施 以檢查茲存取之有效性。沪θ 疋楮由執行程式】70插入陷阱 料式碼成爲-啓動ACL實施程式之驗證常式來達成。下 8- 本紙張尺奴财- -----------一.裝-- (請先鬩讀背面之注意事項再填寫本頁) 訂------Τ ---------- • I I II · 318230 一 A 7 __ m 五、發明説明(6 ) '---- 文將更加詳細説明ACL實施程式之運作。 該系統使得程式碼與其之ACL可依所需分別或共同受 下載。例如,CPS可能想要免費提供ACL給所有客户作θ 對於實際程式碼則要收費。 义 圖3展示存取控制表列。ACL包含二部份:包含程式碼所 需之實體資源的實體資源表(PRT) 200與包含程式碼所需之 許可與邏輯資源的邏輯資源表(LRT) 250。 PRT 200對於每一種資源皆包含一列’而該列包括實炉 資源名稱(?1^) 205,資源屬性2;*0,最1消耗率215與最大 數量220。資源屬性2 1 〇是用於當一實體裝置或資源磁碟具 有多重屬性時,例如儲存裝置之空間與輸入/輸出之數目 。最大消耗率21 5與最大數量220分別是資源與屬性之最大 允許消耗率與最大充許消耗。 LRT 250對於程式碼所需之一外部常式(稱爲邏輯資源)之 每—呼叫皆包含一列。每一列包含邏輯資源名稱(LRN) 255,則一指向一參數項目表列的參數表列26〇。每一參數 項目265指定一组有效之參數範圍;亦即每一參數之一组 可用於組合之値,以及一指向下一參數項目之欄位nextPE 2 80。每一參數之參數範圍包含二欄位-參數型式27〇與指 定該參數之有效範圍的參數値275。對於字串參數,參數 型式270是STR而參數値275是一指定該字串之有效型式之 一規則表示表列。對於整數參數,參數型式270是INT而參 數値275是一整數範圍之表列。參數値275可包含環境變數 之名稱,在該種情形之下環境變數是假設成爲包含一在執 本紙張尺度適用中國國家標準(CNS ) A4規格(210x297公董) .^ < 裝— (碕先閱讀背面之注意事項再填寫本頁} J-e 經濟部中央標準局員工消費合作社印製 五、發明説明(7 ) 行時間代入之値。 客户之ACL實施程式確保裎式 資源獲得提供JL不允許額外之許可/資源◊所指定之許可與 ACL實施可爲靜態或動態的。在靜能'' 程式碼執行之前完全實施而在程式碼行:中:實施可在 。在動態實施中,實施必須當執::間則-需實施 果CA本身驗證ACL且保證程式碼不會_ =可=二 統可能無需ACL實施功能。 d客尸系 次圖4展示ACL實施程式所使用^資^構。執行時間實體 貝源表(RPRT) 300對於每一資源皆包含—列。資 3〇〇’資源屬性310,最大消耗率315與最大數量32〇是pRT 謂之對應欄位旳拷貝。實際消耗率奶與實際使用33〇棚 訂 疋用以在執行時間分別追蹤程式碼之實際消耗率與實際消 耗。執行時間邏輯資源表(RLRT) 35〇 經濟部中央標準局員工消費合作社印製 資源皆包含-列,RLRT是LRT之一拷貝,且具 一有效之參數組合的額外旗標,無論該组合是否爲ACl管 理程式所允許。邏輯資源名稱355是LRT 25〇之對應欄位的 一拷貝而且參數表列360指向一執行時間參數項目(RPE)之 表列365。執行時間參數項目之參數型式37〇,參數値375 之値是1^11丁之對應欄位的拷貝。1^?^?[380指向下一執行 時間參數項目365而允許欄3 85可設定成爲YES或NO以顯示 此執行時間參數項目365是否受到允許。ACL實施程式也 追縱程式碼啓始時間3 9 5。 圖5展示ACL實施程式如何實施邏輯資源許可。無論何時 -10- 本紙張尺度逋用中國國家標準(CNS )八4^_格(210X297公釐) 經濟部中央橾準局貝工消費合作社印製 A7 ______ &?_ 五、發明説明(8 ) 程式碼呼叫一外邵功能則啓動此路徑。在步驟41 〇,ACL 實施程式定址參數之數目,他們之値,與受到啓動之功能 的名稱。用以冗成此工作之確切方法視建構而定;例如, 在Java中’前述諸項是位於運算元堆疊。在步碟415,ACL 實施程式定址用於此功能之RLRT 3 50列並定址許可欄設爲 YES之第一 RPE 365。如果未發現該功能名稱,或無此種 RPE 365’則ACL貫施程式前進至步驟455,其中ACL·實施 程式離開以顯示該呼叫未獲允許。在步驟420,ACL實施 程式定址第一參數之値並使第一參數成爲目前之參數。在 步骤425 ’ ACL貫施程式檢查是否目前參數之値爲rpe 365 所允許。如果該値受到允許,則ACL實施程式在步驟430 檢查是否還有參數。如果還有參數,ACL實施程式在步驟 435設定目前參數成爲下一參數並返回至步驟425。如果在 步驟430未發現還有其他參數,則acL實施程式前進至步 驟4 5 0並返回且送回一該呼叫受到允許之顯示。 如果步驟425之允許性測試失敗,ACL實施程式前進至步 驟445而步驟445檢查RLRT 350以尋找另一 rpe 365且該 RPE 365之允許〇85設爲YES。如果無此種rpe,acL實施 程式削進至步驟4 5 5並離開以顯示該呼叫未獲允許。如果 存在此種RPE 365,ACL實施程式前進至步驟42〇。 圖6展不ACL實施程式如何實施實體需求。在步驟5〇〇 ’ ACL貫施程式是在指配資源之前受到啓動,二參數,要求 資源數量(REOAMT)與估計消耗時間(c〇MpT),獲得提供 。對於磁碟輸入/輸出,RE〇AMT是磁碟輸入/輸出之數量 -11 - 本纸張尺度適用中ii"家標準(CNS )罐^ 21GX297公楚) H 11- - I -I I 1^1 n --- In n^i i n I - (請先閱讀背面之注意事項再填寫本頁) 經濟部中央標準局員工消費合作社印製 A7 _____ Bf 五、發明説明(9 ) 而COMP丁是完成輸入/輸出之估計時間。在步驟505,ACL 實施程式定址用於此資源之RPRT 300列並檢查是否最大數 量3 20受到指定且實際使用300加上REOAMT超過最大數量 320。如果是的話,其在步驟527送回一失敗以顯示該消耗 未獲允許。如果未超過最大數量320,則ACL實施程式在 步驟510計算此資源之預計消耗率爲(實際使用 330+REOAMT)/(目前時間-程式碼啓始時間395 + COMPT)。 在步驟515,ACL實施程式檢查是否最大消耗率315受到指 定且是否預計消耗率大於最大消7^耗率3*15。如果最大消耗 率3 15未受到指定或者預計之消耗率未較大,則a c L實抱 程式返回並送回一該消耗獲得允許之顯示。如果預計之消 耗率較大,則ACL實施程式在步驟530計算用以執行此運 作之所需延遲爲(實際使用300+REOAMT)/最大消耗率315-( 目前時間-程式碼啓始時間395-C〇MPT)並送回所需之延遲 與一該消耗將要延後所計算之延遲的顯示。 在步驟550,ACL實施程式是在資源消耗以後利用一指定 消耗之資源數量(C〇NSAMT)之參數來加以啓動。ACL實掩 程式然後更新實際消耗率325與實際使用330。 在客户系統中對於相同程式碼也可指配不同之資源與許 可給不同之使用者。此可在安裝該程式碼之時執行,由 ACL管理程式藉由觀察給與不同使用者之權利並結合該等 權利及允許給與該程式碼之資源及許可來完成。在此種情 形之下’每一使用者之資源與許可的集合必須分別加以儲 存。在程式碼執行期間,該等資源與許可將以使用者爲單 -12- 本纸張尺度適用中國國家297公董) ^^^1. 1 ! ml 1 1 士 ^^^1 n I— -1 1^1^1 、le-°J (請先閲讀背面之注意事項再填寫本頁}
318230 五、發明説明(1(3) 位來^施。此外該等資源與許可可在程式碼執行期間由 CL貫施程式藉由觀察给與不同使用者之權利並社入核等 權利及允許給與純式狀制及許可來加以決定…^ 圖7展π用於客户系統之完整性驗證,執行與實施啓動 運作的虛擬碼。應可瞭解本文所説明之各種表,表列,旗 標與其他資料結構實現於客户系統之記憶體(例如揮發性 隨機存取記憶體,磁碟或二者之一組合)。如前所討論, ACL實施程式與ACL管ί里程式最好實現成爲程式碼且該程 式碼爲客户系統之作業系統所連~接或;入。圖8展示 管理程式之虛擬碼。圖9展示ACL實施程式之虛擬碼。 既然本發明已藉由較佳實例來加以説明,熟悉本技術領 域者應可想出各種修改與改良。因此,應可瞭解較佳實例 只是做爲範例而非限制。本發明之範疇是由附加之申請 利範圍來加以定義。 .-1— H —--- n —i,-衣 _ I (請先閱讀背面之注意事項再填寫本頁) 訂 經濟部中央標準局貝工消费合作社印製 -13- 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐)

Claims (1)

  1. 六、申請專利範圍 ABCD …用以配送程式碼之方法,該種方法包含 提供-受信託之第三者之證明給—客户系統,受作:: 弟二者的證明包含該程式碼之經驗證無破壞性 = 之資源與許可的電腦可讀取式說明。 斤兩 2. 根據申請專利範圍第Η之方法,其中該驗 利用程式碼來封裝證明之步驟。 己。 3. 根據申請專利範圍第丨項之方法,該方法進—步勺本 列步驟:用客户系統來讀取證明;以及分配客户= 資源與許可以致不會超過該證$所指i之資=4. 根據中請專利範園第2項之方法,該方法進―步^ 列步驟:進_步根據使用者所選之相關於該證明= 來拒絕或給與對於客户系統之資源的程式碼存取與許 下 之 下 項 可 I HI ! I —II - -11 - V I - I I Is— (請先閎讀背面之注意事項再填寫本頁} 經濟部中央標準局員工消費合作社印製 5. 根據中請專利範圍第Η之方法,其中資源與許 腦可讀取式説明是以一加密型式來提供給客户系统 6. 根據申請專利範圍第β之方法,其中該證明進1 含加密之驗證資料且其中客户系統解密該驗證資料以 證資源與許可之説明的完整性。 7. 根據申請專利範圍第3項之方法,其中所需之資源、的 明包含資料且該資料説明該程式碼所要使用之每二資 的數量與該程式碼對於每一資源的最大消耗率。 8. 根據申請專利範圍第3項之方法,其中所需之許可 明包含資料且該資料説明該程式碼所要存取之客户 的特定設施。 包 說 的說 系統 -14- 本紙浪尺度適用中國國家標準(CNS ) Α4規洛(21〇)<297公羞) 申請專利範圍 A8 B8 C8 D8 根據申请專利範圍第i項之方法,其一 絲兮笛—& 升肀罘二者證明包含 ._·二召罘二者驗證之該程式碼之功能的說明。 10·根據:請專利範圍第!項之方法,其中程式碼是—自一 伺服器下載做爲一程式物件的applet。 U·根據申請專利範圍第Η之方法,其中在客户系統中對 於相同之程式碼分配不同之資源與許可給不同之使用者 經濟部中央標準局員工消費合作社印震 根據申請專利範圍第1丨項之方法,其 用去——欠.nc t — 二甲允5午给與不同使 用者〈資源與許可的集合是在程式碼安裝期間決定。 U·根據中請專利範圍第丨丨項之方法,丨中允許給與不同使 用者I資源與許可的集合是在程式碼執行期間決定。 14·-,用以配送程式碼之方法,該種方法包含下列步驟: 提供一程式碼之加密受信託之第三者證明给客户1統 ,受信託之第三者證明是利用該程式碼來加以封裝並包 含該程式碼之經驗證無破壞性運作所需之資源可: 一電腦可讀取式説明; 由客户系統來讀取該證明; 由客户系統來決定該證明之完整性;及 只有在完整性獲得驗證之後, 根據使用者所選之選項來分配客户手 命r尔,.无 < 資源與許 可以致不會超過該證明所指定之許可:及 根據該分配來執行程式碼; 其中所需足資源的説明包含資料且該資料說明該程 式碼所要使用之每一資源的煞量與該程式碼對於^二 1厶 -15- 尺度適用中g國家標準"(CNST A4規格(2^7797公螯) ----^- (請先閱讀背面之注意事項再填寫本貢) 装. 訂 « m · • - - I f I I- -, 申請專利範圍
    15 資源的最大消耗率,且並士 且其中所需之許可的說 料且該資料説明該程式碼 l u資 設施。 尸乐,死的特定 .種計算系統,該種計算系統包含: -用以輸人程式與資料於計算系統之輸入裝置. -用以控制計算系統之運作的作業系統;匕’ 存取邏輯,該存取邏輯是用以自資料摘取且相關於_ 給定程式之該程式碼之經驗證無破壞性運作所资 的-電腦可讀取式説明,該存^邏“一步包含完敕: 知:查邏輯而冗整性檢查邏輯是用以逄味矣_ ^ 疋用以屋生表不茲電腦可讀 取式説明之完整性的驗證資料;及 實施邏輯,而該實施邏輯轉接至作業系統並回應於驗 證資料以追蹤並分配客户系統以内之一些資源之每—資 源的消耗與消耗率以致不會超過該説明所指明之分配; 及 , 一用以根據該分配來執行程式碼之處理器。 16.根據申請專利範圍第丨5項之系統,該系統進一步包含一 儲存於一隨機存取記憶體並耦接至實施邏輯之資料結構 ,該資料結構包含用以追蹤實際消耗之資源的至少一第 一欄與用以追蹤資源之消耗率的第二欄,用以儲存利用 該説明推導而得之資源消耗之限制的第三欄與用以儲存 利用該説明推導而得之資源消耗率之限制的第四襴。 Π.根據申請專利範圍第1 5項之系統,其中該存取管理程式 包含用以拆除一包含該程式碼之封裝以取得該説明之裝 -16- 本,氏匕尺度適用中國國家襟準(CNS ) A4说格(210X 297公釐) --------.赛------# f請先閎讀背面之注意事項再填寫本頁) 經濟部中央操準局員工消費合作社印製 318230 8 8 8 0^ ABCS 六、申請專利範圍置與用以解密該説明之裝置。18.根據申請專利範圍第1 5項之系統,其中該實施邏輯包含 進一步根據相關於該説明之使用者所選之選項來拒絕或 給與該計算系統之資源之程式碼存取與許可的裝置。 m .^m ^^^1 ! !-- - 士1 g I ml HI---1 m 0¾ 、v6 (請先閨讀背面之注意事項再填寫本頁) 經濟部中央榇準局員工消費合作社印製 本纸張尺度適用中國國家標準(CNS ) A4規格(210 X 297公釐)
TW085115111A 1996-06-11 1996-12-06 Support for portable trusted software TW318230B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US08/661,517 US5825877A (en) 1996-06-11 1996-06-11 Support for portable trusted software

Publications (1)

Publication Number Publication Date
TW318230B true TW318230B (en) 1997-10-21

Family

ID=24653934

Family Applications (1)

Application Number Title Priority Date Filing Date
TW085115111A TW318230B (en) 1996-06-11 1996-12-06 Support for portable trusted software

Country Status (6)

Country Link
US (1) US5825877A (zh)
EP (1) EP0813132B1 (zh)
JP (1) JP3701773B2 (zh)
KR (1) KR100267872B1 (zh)
DE (1) DE69732323T2 (zh)
TW (1) TW318230B (zh)

Families Citing this family (267)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6604118B2 (en) 1998-07-31 2003-08-05 Network Appliance, Inc. File system image transfer
US5963962A (en) 1995-05-31 1999-10-05 Network Appliance, Inc. Write anywhere file-system layout
DE69434381T2 (de) 1993-06-04 2006-01-19 Network Appliance, Inc., Sunnyvale Verfahren zur Paritätsdarstellung in einem Raid-Untersystem unter Verwendung eines nichtflüchtigen Speichers
US5978484A (en) * 1996-04-25 1999-11-02 Microsoft Corporation System and method for safety distributing executable objects
US5987123A (en) * 1996-07-03 1999-11-16 Sun Microsystems, Incorporated Secure file system
US8079086B1 (en) 1997-11-06 2011-12-13 Finjan, Inc. Malicious mobile code runtime monitoring system and methods
US9219755B2 (en) 1996-11-08 2015-12-22 Finjan, Inc. Malicious mobile code runtime monitoring system and methods
US7058822B2 (en) 2000-03-30 2006-06-06 Finjan Software, Ltd. Malicious mobile code runtime monitoring system and methods
US6148401A (en) * 1997-02-05 2000-11-14 At&T Corp. System and method for providing assurance to a host that a piece of software possesses a particular property
US6167522A (en) * 1997-04-01 2000-12-26 Sun Microsystems, Inc. Method and apparatus for providing security for servers executing application programs received via a network
US6108420A (en) * 1997-04-10 2000-08-22 Channelware Inc. Method and system for networked installation of uniquely customized, authenticable, and traceable software application
US6381698B1 (en) 1997-05-21 2002-04-30 At&T Corp System and method for providing assurance to a host that a piece of software possesses a particular property
JPH1131105A (ja) * 1997-07-10 1999-02-02 Fuji Xerox Co Ltd データカプセル生成装置および方法
US6275938B1 (en) * 1997-08-28 2001-08-14 Microsoft Corporation Security enhancement for untrusted executable code
US6032257A (en) * 1997-08-29 2000-02-29 Compaq Computer Corporation Hardware theft-protection architecture
US6167521A (en) * 1997-08-29 2000-12-26 International Business Machines Corporation Securely downloading and executing code from mutually suspicious authorities
KR100246608B1 (ko) * 1997-11-13 2000-03-15 이계철 웹 인포샵 서비스 시스템의 대체 인증 및 대체 과금 방법
US6516351B2 (en) 1997-12-05 2003-02-04 Network Appliance, Inc. Enforcing uniform file-locking for diverse file-locking protocols
US6457130B2 (en) * 1998-03-03 2002-09-24 Network Appliance, Inc. File access control in a multi-protocol file server
US6317844B1 (en) 1998-03-10 2001-11-13 Network Appliance, Inc. File server storage arrangement
JPH11282672A (ja) * 1998-03-31 1999-10-15 Hitachi Software Eng Co Ltd オンラインプログラム転送方法およびオンラインプログラム実行システム
US6298443B1 (en) * 1998-04-24 2001-10-02 Dell Usa, L.P. Method and system for supplying a custom software image to a computer system
AU4568299A (en) * 1998-06-15 2000-01-05 Dmw Worldwide, Inc. Method and apparatus for assessing the security of a computer system
US6279011B1 (en) 1998-06-19 2001-08-21 Network Appliance, Inc. Backup and restore for heterogeneous file server environment
US6138235A (en) * 1998-06-29 2000-10-24 Sun Microsystems, Inc. Controlling access to services between modular applications
US6574591B1 (en) 1998-07-31 2003-06-03 Network Appliance, Inc. File systems image transfer between dissimilar file systems
US6119244A (en) * 1998-08-25 2000-09-12 Network Appliance, Inc. Coordinating persistent status information with multiple file servers
US6343984B1 (en) 1998-11-30 2002-02-05 Network Appliance, Inc. Laminar flow duct cooling system
US6694434B1 (en) * 1998-12-23 2004-02-17 Entrust Technologies Limited Method and apparatus for controlling program execution and program distribution
JP3873624B2 (ja) * 1999-01-13 2007-01-24 株式会社日立製作所 モバイルコードの実行方法およびそのシステム
JP4294142B2 (ja) 1999-02-02 2009-07-08 株式会社日立製作所 ディスクサブシステム
EP1762958A1 (en) * 1999-03-08 2007-03-14 Spyrus, Inc. Method and system for enforcing access to a computing resource using a licensing certificate
JP3098513B1 (ja) 1999-04-14 2000-10-16 インターナショナル・ビジネス・マシーンズ・コーポレ−ション 改変判定装置およびその方法
US6449720B1 (en) * 1999-05-17 2002-09-10 Wave Systems Corp. Public cryptographic control unit and system therefor
US6816965B1 (en) 1999-07-16 2004-11-09 Spyrus, Inc. Method and system for a policy enforcing module
US6954777B1 (en) * 1999-07-29 2005-10-11 International Business Machines Corporation Method for extending capabilities of an arbitrary web server
US6961749B1 (en) 1999-08-25 2005-11-01 Network Appliance, Inc. Scalable file server with highly available pairs
US7406603B1 (en) * 1999-08-31 2008-07-29 Intertrust Technologies Corp. Data protection systems and methods
KR100367094B1 (ko) * 1999-10-22 2003-01-06 한국전자통신연구원 컴퓨터 프로그램 온라인 유통 방법
CA2287871C (en) * 1999-11-01 2007-07-31 Ibm Canada Limited-Ibm Canada Limitee Secure document management system
US6882765B1 (en) 1999-11-02 2005-04-19 Xros, Inc. Connection protection between clients and optical cross-connect switches
US6792174B1 (en) 1999-11-02 2004-09-14 Nortel Networks Limited Method and apparatus for signaling between an optical cross-connect switch and attached network equipment
US6597826B1 (en) 1999-11-02 2003-07-22 Xros, Inc. Optical cross-connect switching system with bridging, test access and redundancy
US6571030B1 (en) 1999-11-02 2003-05-27 Xros, Inc. Optical cross-connect switching system
US6650803B1 (en) * 1999-11-02 2003-11-18 Xros, Inc. Method and apparatus for optical to electrical to optical conversion in an optical cross-connect switch
FR2801451B1 (fr) * 1999-11-22 2002-02-08 Cit Alcatel Procede de validation de donnees dans un terminal
US6883120B1 (en) 1999-12-03 2005-04-19 Network Appliance, Inc. Computer assisted automatic error detection and diagnosis of file servers
JP2001175467A (ja) * 1999-12-07 2001-06-29 Kizna.Com Inc コンピュータのセキュリティー確保方法及びそのプログラムを記録した媒体
US6715034B1 (en) 1999-12-13 2004-03-30 Network Appliance, Inc. Switching file system request in a mass storage system
JP3546787B2 (ja) * 1999-12-16 2004-07-28 インターナショナル・ビジネス・マシーンズ・コーポレーション アクセス制御システム、アクセス制御方法、及び記憶媒体
US6928550B1 (en) 2000-01-06 2005-08-09 International Business Machines Corporation Method and system for generating and using a virus free file certificate
DE10008974B4 (de) * 2000-02-25 2005-12-29 Bayerische Motoren Werke Ag Signaturverfahren
DE10008973B4 (de) 2000-02-25 2004-10-07 Bayerische Motoren Werke Ag Autorisierungsverfahren mit Zertifikat
EP1132796A1 (en) * 2000-03-08 2001-09-12 Universite Catholique De Louvain Mobile code and method for resource management for mobile code
GB2366640B (en) * 2000-03-30 2004-12-29 Ibm Distribution of activation information
EP1292892A4 (en) * 2000-04-14 2006-11-15 Goahead Software Inc SYSTEM AND METHOD FOR UPGRADING NETWORKED EQUIPMENT
US7093135B1 (en) * 2000-05-11 2006-08-15 Cybersoft, Inc. Software virus detection methods and apparatus
US20040158353A1 (en) * 2000-05-30 2004-08-12 Poterek Michael G. Inspection equipment integrity enhancement system
JP4095232B2 (ja) * 2000-05-31 2008-06-04 日本電信電話株式会社 アプリケーション管理・運用方法及びシステム及びコンピュータ読み取り可能な記録媒体
US6714930B1 (en) 2000-05-31 2004-03-30 International Business Machines Corporation Lightweight directory access protocol, (LDAP) trusted processing of unique identifiers
AU2000252248A1 (en) * 2000-06-14 2001-12-24 Smarttrust Systems Oy Interpretation of the identity of an entity
US7360082B1 (en) * 2000-06-19 2008-04-15 International Business Machines Corporation System and method for downloading security context elements governing execution of downloadable and distributable agents
US7219304B1 (en) * 2000-06-19 2007-05-15 International Business Machines Corporation System and method for developing and administering web applications and services from a workflow, enterprise, and mail-enabled web application server and platform
US6981281B1 (en) * 2000-06-21 2005-12-27 Microsoft Corporation Filtering a permission set using permission requests associated with a code assembly
US7699699B2 (en) 2000-06-23 2010-04-20 Igt Gaming device having multiple selectable display interfaces based on player's wagers
DE10035171A1 (de) 2000-07-19 2002-02-07 Siemens Ag Verfahren zur Bereitstellung eines Programmoduls in einem Kommunikationssystem
JP4503794B2 (ja) * 2000-07-19 2010-07-14 株式会社日立製作所 コンテンツ提供方法及び装置
US6948060B1 (en) * 2000-08-11 2005-09-20 Intel Corporation Method and apparatus for monitoring encrypted communication in a network
DE10043499A1 (de) 2000-09-01 2002-03-14 Bosch Gmbh Robert Verfahren zur Datenübertragung
US20020144122A1 (en) * 2001-04-03 2002-10-03 S.W.I.F.T. System and method for facilitating trusted transactions between businesses
US6807577B1 (en) 2000-09-14 2004-10-19 International Business Machines Corporation System and method for network log-on by associating legacy profiles with user certificates
US6883098B1 (en) 2000-09-20 2005-04-19 International Business Machines Corporation Method and computer system for controlling access by applications to this and other computer systems
JP2002132585A (ja) * 2000-10-20 2002-05-10 Sony Corp 情報記録装置、情報再生装置、情報記録媒体、および情報記録方法、情報再生方法、並びにプログラム提供媒体
TW584801B (en) * 2000-12-11 2004-04-21 Ntt Docomo Inc Terminal and repeater
JP2002182983A (ja) * 2000-12-13 2002-06-28 Sharp Corp データベースへのアクセス制御方法、データベース装置、リソースへのアクセス制御方法、情報処理装置
US20020078380A1 (en) * 2000-12-20 2002-06-20 Jyh-Han Lin Method for permitting debugging and testing of software on a mobile communication device in a secure environment
JP3910915B2 (ja) 2001-01-31 2007-04-25 株式会社エヌ・ティ・ティ・ドコモ 移動体端末の記憶モジュールにプログラムを配信するシステム
FR2820848B1 (fr) 2001-02-13 2003-04-11 Gemplus Card Int Gestion dynamique de listes de droits d'acces dans un objet electronique portable
WO2002093365A1 (en) 2001-05-11 2002-11-21 Sospita As Sequence numbering mechanism to ensure execution order integrity of inter-dependent smart card applications
US7320027B1 (en) * 2001-05-14 2008-01-15 At&T Corp. System having generalized client-server computing
EP2261796A3 (en) 2001-05-14 2011-02-23 NTT DoCoMo, Inc. System for managing program stored in storage block of mobile terminal
JP2002351563A (ja) * 2001-05-30 2002-12-06 Canon Inc 情報処理装置、情報処理方法およびプログラム
US7099663B2 (en) 2001-05-31 2006-08-29 Qualcomm Inc. Safe application distribution and execution in a wireless environment
US20030167350A1 (en) * 2001-06-07 2003-09-04 Curl Corporation Safe I/O through use of opaque I/O objects
US7065783B2 (en) * 2001-07-06 2006-06-20 Aramira Corporation Mobile application access control list security system
US7421411B2 (en) 2001-07-06 2008-09-02 Nokia Corporation Digital rights management in a mobile communications environment
US7380271B2 (en) * 2001-07-12 2008-05-27 International Business Machines Corporation Grouped access control list actions
GB0119629D0 (en) 2001-08-10 2001-10-03 Cryptomathic As Data certification method and apparatus
US6687638B2 (en) * 2001-08-10 2004-02-03 General Hills, Inc. Inspection equipment integrity enhancement system
DE10140721A1 (de) * 2001-08-27 2003-03-20 Bayerische Motoren Werke Ag Verfahren zur Bereitstellung von Software zur Verwendung durch ein Steuergerät eines Fahrzeugs
EP1289326A1 (en) * 2001-08-30 2003-03-05 Motorola, Inc. Method of verifying downloaded software and corresponding device
JP2003202929A (ja) 2002-01-08 2003-07-18 Ntt Docomo Inc 配信方法および配信システム
CN1992724B (zh) * 2002-04-03 2012-05-09 株式会社Ntt都科摩 管理服务器和终端单元
JP3818504B2 (ja) * 2002-04-15 2006-09-06 ソニー株式会社 情報処理装置および方法、並びにプログラム
US7900048B2 (en) * 2002-05-07 2011-03-01 Sony Ericsson Mobile Communications Ab Method for loading an application in a device, device and smart card therefor
EP1361527A1 (en) * 2002-05-07 2003-11-12 Sony Ericsson Mobile Communications AB Method for loading an application in a device, device and smart card therefor
JP2003337716A (ja) 2002-05-20 2003-11-28 Ntt Docomo Inc 電子機器、データ共用方法、プログラム及び記憶媒体
US8155314B2 (en) 2002-06-24 2012-04-10 Microsoft Corporation Systems and methods for securing video card output
EP1532766A2 (en) * 2002-07-16 2005-05-25 Haim Engler Automated network security system and method
GB2391341A (en) * 2002-07-31 2004-02-04 Hewlett Packard Co A method of validating the rights of a user to participate in an interactive computer environment
US7162744B2 (en) * 2002-08-27 2007-01-09 Micron Technology, Inc. Connected support entitlement system and method of operation
JP4073284B2 (ja) * 2002-10-03 2008-04-09 大日本印刷株式会社 通信管理システム、携帯端末装置および通信管理プログラム
KR100499669B1 (ko) * 2002-10-18 2005-07-05 한국과학기술정보연구원 자원할당 시스템 및 방법
EP1420323A1 (en) * 2002-11-18 2004-05-19 Koninklijke KPN N.V. Method and system for distribution of software components
AU2003283322A1 (en) 2002-11-28 2004-06-18 International Business Machines Corporation Method and systems for hyperlinking files
FI20022278A (fi) 2002-12-27 2004-06-28 Nokia Corp Menetelmä ja järjestelmä ohjelman testaamiseksi ja laite
WO2004062243A2 (en) * 2002-12-31 2004-07-22 Motorola, Inc, A Corporation Of The State Of Delaware System and method for distributed authorization for access to communications device
US7401105B2 (en) 2003-10-02 2008-07-15 International Business Machines Corporation Method, system, and program product for retrieving file processing software
US7370212B2 (en) 2003-02-25 2008-05-06 Microsoft Corporation Issuing a publisher use license off-line in a digital rights management (DRM) system
DE10309507A1 (de) * 2003-03-05 2004-09-16 Volkswagen Ag Verfahren und Einrichtung zur Wartung von sicherheitsrelevanten Programmcode eines Kraftfahrzeuges
GB2399902A (en) * 2003-03-28 2004-09-29 Hewlett Packard Development Co Security in trusted computing systems
JP4176533B2 (ja) 2003-03-31 2008-11-05 株式会社エヌ・ティ・ティ・ドコモ 端末装置及びプログラム
JP4248913B2 (ja) * 2003-03-31 2009-04-02 株式会社エヌ・ティ・ティ・ドコモ 端末装置、プログラムおよび通信システム
GB2400933B (en) * 2003-04-25 2006-11-22 Messagelabs Ltd A method of, and system for, heuristically detecting viruses in executable code by detecting files which have been maliciously altered
JP2005122474A (ja) * 2003-10-16 2005-05-12 Fujitsu Ltd 情報漏洩防止プログラムおよびその記録媒体並びに情報漏洩防止装置
US20050091535A1 (en) * 2003-10-24 2005-04-28 Microsoft Corporation Application identity for software products
US20050091658A1 (en) * 2003-10-24 2005-04-28 Microsoft Corporation Operating system resource protection
WO2005079038A1 (fr) * 2004-01-14 2005-08-25 France Telecom Procede, terminal mobile, systeme et equipement pour la fourniture d’un service de proximite accessible par l’intermediaire d’un terminal mobile
US8046763B1 (en) * 2004-02-20 2011-10-25 Oracle America, Inc. Regulation of resource requests to control rate of resource consumption
US20050229004A1 (en) 2004-03-31 2005-10-13 Callaghan David M Digital rights management system and method
KR101006322B1 (ko) * 2004-04-08 2011-01-06 인터내셔널 비지네스 머신즈 코포레이션 파일 처리 방법 및 파일 인증 방법 장치와 컴퓨터 판독가능한 매체 및 시스템
US20060242406A1 (en) 2005-04-22 2006-10-26 Microsoft Corporation Protected computing environment
EP1763744B1 (en) 2004-04-30 2017-07-19 BlackBerry Limited System and method of owner application control of electronic devices
US8074287B2 (en) * 2004-04-30 2011-12-06 Microsoft Corporation Renewable and individualizable elements of a protected environment
DE102004024869A1 (de) * 2004-05-19 2006-01-19 Siemens Ag Verfahren zur Priorisierung von Telekommunikations-Netzwerken in einem Telekommunikations-Endgerät
WO2006001524A1 (ja) * 2004-06-25 2006-01-05 Nec Corporation 移動端末、移動端末のリソースアクセス制御システムおよび移動端末におけるリソースアクセス制御方法
US8021230B2 (en) 2004-08-19 2011-09-20 Igt Gaming system having multiple gaming machines which provide bonus awards
US8251791B2 (en) 2004-08-19 2012-08-28 Igt Gaming system having multiple gaming machines which provide bonus awards
US7963847B2 (en) 2004-08-19 2011-06-21 Igt Gaming system having multiple gaming machines which provide bonus awards
US7587594B1 (en) 2004-08-30 2009-09-08 Microsoft Corporation Dynamic out-of-process software components isolation for trustworthiness execution
US8312431B1 (en) * 2004-09-17 2012-11-13 Oracle America, Inc. System and computer readable medium for verifying access to signed ELF objects
US8347078B2 (en) 2004-10-18 2013-01-01 Microsoft Corporation Device certificate individualization
US8336085B2 (en) 2004-11-15 2012-12-18 Microsoft Corporation Tuning product policy using observed evidence of customer behavior
FR2881854B1 (fr) * 2005-02-04 2008-01-11 Radiotelephone Sfr Procede de gestion securisee de l'execution d'une application
CN101853353B (zh) * 2005-02-14 2012-07-18 松下电器产业株式会社 应用程序执行装置、应用程序执行方法
US8438645B2 (en) 2005-04-27 2013-05-07 Microsoft Corporation Secure clock with grace periods
US8725646B2 (en) 2005-04-15 2014-05-13 Microsoft Corporation Output protection levels
US9363481B2 (en) 2005-04-22 2016-06-07 Microsoft Technology Licensing, Llc Protected media pipeline
US9436804B2 (en) 2005-04-22 2016-09-06 Microsoft Technology Licensing, Llc Establishing a unique session key using a hardware functionality scan
CN101458748B (zh) * 2005-04-22 2011-12-07 微软公司 载入内核组件以创建安全计算环境的方法
KR101265887B1 (ko) * 2005-04-22 2013-05-20 마이크로소프트 코포레이션 보호 컴퓨팅 환경을 제공하는 방법 및 장치 내에 보호 환경을 설정하는 방법
US7665098B2 (en) 2005-04-29 2010-02-16 Microsoft Corporation System and method for monitoring interactions between application programs and data stores
US7631198B2 (en) * 2005-05-10 2009-12-08 Seagate Technology Protocol scripting language for safe execution in embedded system
US20060265758A1 (en) 2005-05-20 2006-11-23 Microsoft Corporation Extensible media rights
US8137188B2 (en) 2005-09-09 2012-03-20 Igt Server based gaming system having multiple progressive awards
US7841939B2 (en) 2005-09-09 2010-11-30 Igt Server based gaming system having multiple progressive awards
US8128491B2 (en) 2005-09-09 2012-03-06 Igt Server based gaming system having multiple progressive awards
US8045958B2 (en) 2005-11-21 2011-10-25 Research In Motion Limited System and method for application program operation on a wireless device
US7664924B2 (en) * 2005-12-01 2010-02-16 Drive Sentry, Inc. System and method to secure a computer system by selective control of write access to a data storage medium
US9600661B2 (en) * 2005-12-01 2017-03-21 Drive Sentry Limited System and method to secure a computer system by selective control of write access to a data storage medium
US10503418B2 (en) 2005-12-01 2019-12-10 Drive Sentry Limited System and method to secure a computer system by selective control of write access to a data storage medium
JP4556857B2 (ja) * 2005-12-07 2010-10-06 セイコーエプソン株式会社 情報配信装置、情報配信装置の制御方法および制御プログラム
US7788181B2 (en) * 2005-12-27 2010-08-31 Microsoft Corporation Software licensing using certificate issued by authorized authority
US8332906B2 (en) 2006-02-27 2012-12-11 Research In Motion Limited Method of customizing a standardized IT policy
JP4419977B2 (ja) * 2006-03-31 2010-02-24 ブラザー工業株式会社 プログラム作成装置、及びプログラム
US8751946B2 (en) * 2006-04-05 2014-06-10 International Business Machines Corporation Enhanced display of properties for a program object
US7716653B2 (en) * 2006-04-06 2010-05-11 International Business Machines Corporation Configurable importers and resource writers for converting data into another format
US8812556B2 (en) * 2006-04-06 2014-08-19 International Business Machines Corporation Storing modification data for recreating modifications
US8512130B2 (en) 2006-07-27 2013-08-20 Igt Gaming system with linked gaming machines that are configurable to have a same probability of winning a designated award
US8615801B2 (en) * 2006-08-31 2013-12-24 Microsoft Corporation Software authorization utilizing software reputation
US7862430B2 (en) 2006-09-27 2011-01-04 Igt Server based gaming system having system triggered loyalty award sequences
US8616959B2 (en) 2006-09-27 2013-12-31 Igt Server based gaming system having system triggered loyalty award sequences
US7674180B2 (en) 2006-09-27 2010-03-09 Igt Server based gaming system having system triggered loyalty award sequences
WO2008135692A1 (fr) * 2007-03-30 2008-11-13 France Telecom Gestion d'acces a des ressources d'un systeme d'exploitation
US7900248B2 (en) * 2007-05-31 2011-03-01 Microsoft Corporation Access control negation using negative groups
US20080307486A1 (en) * 2007-06-11 2008-12-11 Microsoft Corporation Entity based access management
US8468579B2 (en) * 2007-06-15 2013-06-18 Microsoft Corporation Transformation of sequential access control lists utilizing certificates
US7985133B2 (en) 2007-07-30 2011-07-26 Igt Gaming system and method for providing an additional gaming currency
US8900053B2 (en) 2007-08-10 2014-12-02 Igt Gaming system and method for providing different bonus awards based on different types of triggered events
US9142097B2 (en) 2007-10-26 2015-09-22 Igt Gaming system and method for providing play of local first game and remote second game
JP2008123514A (ja) * 2007-10-29 2008-05-29 Ntt Docomo Inc 配信方法および配信システム
US8127235B2 (en) 2007-11-30 2012-02-28 International Business Machines Corporation Automatic increasing of capacity of a virtual space in a virtual world
US20090164919A1 (en) 2007-12-24 2009-06-25 Cary Lee Bates Generating data for managing encounters in a virtual world environment
KR20100126476A (ko) * 2008-03-04 2010-12-01 애플 인크. 보안 동작 환경에서의 소프트웨어 개발자들에 대한 코드 자격들의 관리
JP5159375B2 (ja) 2008-03-07 2013-03-06 インターナショナル・ビジネス・マシーンズ・コーポレーション メタバースにおけるオブジェクトの真贋判断システム、方法及びそのコンピュータ・プログラム
KR101590188B1 (ko) * 2009-05-08 2016-01-29 삼성전자주식회사 휴대단말기에서 소프트웨어 패키지의 무결성을 검증하는 방법
US9039516B2 (en) 2009-07-30 2015-05-26 Igt Concurrent play on multiple gaming machines
US8468609B2 (en) * 2009-08-27 2013-06-18 Cleversafe, Inc. Authenticating use of a dispersed storage network
EP2534604A4 (en) * 2010-02-11 2013-12-04 Hewlett Packard Development Co ACCESS OF FILE EXECUTABLE ON THE BASIS OF IDENTITY
US9205328B2 (en) 2010-02-18 2015-12-08 Activision Publishing, Inc. Videogame system and method that enables characters to earn virtual fans by completing secondary objectives
US9081888B2 (en) 2010-03-31 2015-07-14 Cloudera, Inc. Collecting and aggregating log data with fault tolerance
US8874526B2 (en) 2010-03-31 2014-10-28 Cloudera, Inc. Dynamically processing an event using an extensible data model
US9317572B2 (en) 2010-03-31 2016-04-19 Cloudera, Inc. Configuring a system to collect and aggregate datasets
US9082127B2 (en) 2010-03-31 2015-07-14 Cloudera, Inc. Collecting and aggregating datasets for analysis
US9682324B2 (en) 2010-05-12 2017-06-20 Activision Publishing, Inc. System and method for enabling players to participate in asynchronous, competitive challenges
JP5132730B2 (ja) * 2010-07-20 2013-01-30 株式会社エヌ・ティ・ティ・ドコモ 配信方法および配信システム
JP5429880B2 (ja) * 2010-08-10 2014-02-26 Necビッグローブ株式会社 アプリケーション配布システム、アプリケーション配布方法、端末及びプログラム
US8788815B1 (en) * 2011-01-31 2014-07-22 Gazzang, Inc. System and method for controlling access to decrypted data
US8880592B2 (en) 2011-03-31 2014-11-04 Cloudera, Inc. User interface implementation for partial display update
JP5734095B2 (ja) * 2011-05-30 2015-06-10 三菱電機株式会社 端末装置およびサーバ装置および電子証明書発行システムおよび電子証明書受信方法および電子証明書送信方法およびプログラム
US9128949B2 (en) 2012-01-18 2015-09-08 Cloudera, Inc. Memory allocation buffer for reduction of heap fragmentation
US9172608B2 (en) 2012-02-07 2015-10-27 Cloudera, Inc. Centralized configuration and monitoring of a distributed computing cluster
US9405692B2 (en) 2012-03-21 2016-08-02 Cloudera, Inc. Data processing performance enhancement in a distributed file system
US9338008B1 (en) 2012-04-02 2016-05-10 Cloudera, Inc. System and method for secure release of secret information over a network
US9842126B2 (en) 2012-04-20 2017-12-12 Cloudera, Inc. Automatic repair of corrupt HBases
US9753954B2 (en) 2012-09-14 2017-09-05 Cloudera, Inc. Data node fencing in a distributed file system
US10137376B2 (en) 2012-12-31 2018-11-27 Activision Publishing, Inc. System and method for creating and streaming augmented game sessions
US9342557B2 (en) 2013-03-13 2016-05-17 Cloudera, Inc. Low latency query engine for Apache Hadoop
US9477731B2 (en) 2013-10-01 2016-10-25 Cloudera, Inc. Background format optimization for enhanced SQL-like queries in Hadoop
JP5612748B2 (ja) * 2013-10-07 2014-10-22 ソフトバンクモバイル株式会社 通信端末装置
US9934382B2 (en) 2013-10-28 2018-04-03 Cloudera, Inc. Virtual machine image encryption
US9690671B2 (en) 2013-11-01 2017-06-27 Cloudera, Inc. Manifest-based snapshots in distributed computing environments
US10171635B2 (en) 2013-12-04 2019-01-01 Cloudera, Inc. Ensuring properly ordered events in a distributed computing environment
CN105940403B (zh) 2014-02-06 2019-09-06 索尼公司 信息处理设备、信息处理方法、程序和服务器
US9998914B2 (en) 2014-04-16 2018-06-12 Jamf Software, Llc Using a mobile device to restrict focus and perform operations at another mobile device
US10286326B2 (en) 2014-07-03 2019-05-14 Activision Publishing, Inc. Soft reservation system and method for multiplayer video games
US9875618B2 (en) 2014-07-24 2018-01-23 Igt Gaming system and method employing multi-directional interaction between multiple concurrently played games
US9647897B2 (en) 2014-08-20 2017-05-09 Jamf Software, Llc Dynamic grouping of managed devices
US9747333B2 (en) 2014-10-08 2017-08-29 Cloudera, Inc. Querying operating system state on multiple machines declaratively
US11351466B2 (en) 2014-12-05 2022-06-07 Activision Publishing, Ing. System and method for customizing a replay of one or more game events in a video game
US10118099B2 (en) 2014-12-16 2018-11-06 Activision Publishing, Inc. System and method for transparently styling non-player characters in a multiplayer video game
US10120904B2 (en) 2014-12-31 2018-11-06 Cloudera, Inc. Resource management in a distributed computing environment
US10148662B1 (en) * 2015-01-21 2018-12-04 EMC IP Holding Company LLC De-duplication of access control lists
US10286314B2 (en) 2015-05-14 2019-05-14 Activision Publishing, Inc. System and method for providing continuous gameplay in a multiplayer video game through an unbounded gameplay session
US10486068B2 (en) 2015-05-14 2019-11-26 Activision Publishing, Inc. System and method for providing dynamically variable maps in a video game
US10315113B2 (en) 2015-05-14 2019-06-11 Activision Publishing, Inc. System and method for simulating gameplay of nonplayer characters distributed across networked end user devices
US10213682B2 (en) 2015-06-15 2019-02-26 Activision Publishing, Inc. System and method for uniquely identifying physical trading cards and incorporating trading card game items in a video game
US10471348B2 (en) 2015-07-24 2019-11-12 Activision Publishing, Inc. System and method for creating and sharing customized video game weapon configurations in multiplayer video games via one or more social networks
US9972171B2 (en) 2015-09-24 2018-05-15 Igt Gaming system and method for providing a triggering event based on a collection of units from different games
US11185784B2 (en) 2015-10-08 2021-11-30 Activision Publishing, Inc. System and method for generating personalized messaging campaigns for video game players
US10099140B2 (en) 2015-10-08 2018-10-16 Activision Publishing, Inc. System and method for generating personalized messaging campaigns for video game players
US10245509B2 (en) 2015-10-21 2019-04-02 Activision Publishing, Inc. System and method of inferring user interest in different aspects of video game streams
US10376781B2 (en) 2015-10-21 2019-08-13 Activision Publishing, Inc. System and method of generating and distributing video game streams
US10232272B2 (en) 2015-10-21 2019-03-19 Activision Publishing, Inc. System and method for replaying video game streams
US10694352B2 (en) 2015-10-28 2020-06-23 Activision Publishing, Inc. System and method of using physical objects to control software access
US10226703B2 (en) 2016-04-01 2019-03-12 Activision Publishing, Inc. System and method of generating and providing interactive annotation items based on triggering events in a video game
US10226701B2 (en) 2016-04-29 2019-03-12 Activision Publishing, Inc. System and method for identifying spawn locations in a video game
US10179289B2 (en) 2016-06-21 2019-01-15 Activision Publishing, Inc. System and method for reading graphically-encoded identifiers from physical trading cards through image-based template matching
US10573065B2 (en) 2016-07-29 2020-02-25 Activision Publishing, Inc. Systems and methods for automating the personalization of blendshape rigs based on performance capture data
US10463964B2 (en) 2016-11-17 2019-11-05 Activision Publishing, Inc. Systems and methods for the real-time generation of in-game, locally accessible heatmaps
US10709981B2 (en) 2016-11-17 2020-07-14 Activision Publishing, Inc. Systems and methods for the real-time generation of in-game, locally accessible barrier-aware heatmaps
US10500498B2 (en) 2016-11-29 2019-12-10 Activision Publishing, Inc. System and method for optimizing virtual games
US10055880B2 (en) 2016-12-06 2018-08-21 Activision Publishing, Inc. Methods and systems to modify a two dimensional facial image to increase dimensional depth and generate a facial image that appears three dimensional
US10861079B2 (en) 2017-02-23 2020-12-08 Activision Publishing, Inc. Flexible online pre-ordering system for media
US11392716B2 (en) 2017-05-12 2022-07-19 Jamf Software, Llc Mobile device management at a healthcare facility
US10818060B2 (en) 2017-09-05 2020-10-27 Activision Publishing, Inc. Systems and methods for guiding motion capture actors using a motion reference system
US10561945B2 (en) 2017-09-27 2020-02-18 Activision Publishing, Inc. Methods and systems for incentivizing team cooperation in multiplayer gaming environments
US10974150B2 (en) 2017-09-27 2021-04-13 Activision Publishing, Inc. Methods and systems for improved content customization in multiplayer gaming environments
US11040286B2 (en) 2017-09-27 2021-06-22 Activision Publishing, Inc. Methods and systems for improved content generation in multiplayer gaming environments
US10537809B2 (en) 2017-12-06 2020-01-21 Activision Publishing, Inc. System and method for validating video gaming data
US10463971B2 (en) 2017-12-06 2019-11-05 Activision Publishing, Inc. System and method for validating video gaming data
US10981051B2 (en) 2017-12-19 2021-04-20 Activision Publishing, Inc. Synchronized, fully programmable game controllers
US10596471B2 (en) 2017-12-22 2020-03-24 Activision Publishing, Inc. Systems and methods for enabling audience participation in multi-player video game play sessions
US10864443B2 (en) 2017-12-22 2020-12-15 Activision Publishing, Inc. Video game content aggregation, normalization, and publication systems and methods
US11278813B2 (en) 2017-12-22 2022-03-22 Activision Publishing, Inc. Systems and methods for enabling audience participation in bonus game play sessions
US11263670B2 (en) 2018-11-19 2022-03-01 Activision Publishing, Inc. Systems and methods for dynamically modifying video game content based on non-video gaming content being concurrently experienced by a user
US11192028B2 (en) 2018-11-19 2021-12-07 Activision Publishing, Inc. Systems and methods for the real-time customization of video game content based on player data
US11115712B2 (en) 2018-12-15 2021-09-07 Activision Publishing, Inc. Systems and methods for indexing, searching for, and retrieving digital media
US11679330B2 (en) 2018-12-18 2023-06-20 Activision Publishing, Inc. Systems and methods for generating improved non-player characters
US11305191B2 (en) 2018-12-20 2022-04-19 Activision Publishing, Inc. Systems and methods for controlling camera perspectives, movements, and displays of video game gameplay
US10623520B1 (en) * 2019-06-13 2020-04-14 Sailpoint Technologies, Inc. System and method for tagging in identity management artificial intelligence systems and uses for same, including context based governance
US11344808B2 (en) 2019-06-28 2022-05-31 Activision Publishing, Inc. Systems and methods for dynamically generating and modulating music based on gaming events, player profiles and/or player reactions
US11097193B2 (en) 2019-09-11 2021-08-24 Activision Publishing, Inc. Methods and systems for increasing player engagement in multiplayer gaming environments
CN110620782A (zh) * 2019-09-29 2019-12-27 深圳市珍爱云信息技术有限公司 账户认证方法、装置、计算机设备和存储介质
US11423605B2 (en) 2019-11-01 2022-08-23 Activision Publishing, Inc. Systems and methods for remastering a game space while maintaining the underlying game simulation
US11712627B2 (en) 2019-11-08 2023-08-01 Activision Publishing, Inc. System and method for providing conditional access to virtual gaming items
US11537209B2 (en) 2019-12-17 2022-12-27 Activision Publishing, Inc. Systems and methods for guiding actors using a motion capture reference system
US11420122B2 (en) 2019-12-23 2022-08-23 Activision Publishing, Inc. Systems and methods for controlling camera perspectives, movements, and displays of video game gameplay
US11563774B2 (en) 2019-12-27 2023-01-24 Activision Publishing, Inc. Systems and methods for tracking and identifying phishing website authors
US11524234B2 (en) 2020-08-18 2022-12-13 Activision Publishing, Inc. Multiplayer video games with virtual characters having dynamically modified fields of view
US11351459B2 (en) 2020-08-18 2022-06-07 Activision Publishing, Inc. Multiplayer video games with virtual characters having dynamically generated attribute profiles unconstrained by predefined discrete values
US11724188B2 (en) 2020-09-29 2023-08-15 Activision Publishing, Inc. Methods and systems for selecting a level of detail visual asset during the execution of a video game
US11833423B2 (en) 2020-09-29 2023-12-05 Activision Publishing, Inc. Methods and systems for generating level of detail visual assets in a video game
US11717753B2 (en) 2020-09-29 2023-08-08 Activision Publishing, Inc. Methods and systems for generating modified level of detail visual assets in a video game
US11439904B2 (en) 2020-11-11 2022-09-13 Activision Publishing, Inc. Systems and methods for imparting dynamic and realistic movement to player-controlled avatars in video games
US11853439B2 (en) 2020-12-30 2023-12-26 Activision Publishing, Inc. Distributed data storage system providing enhanced security
US11794107B2 (en) 2020-12-30 2023-10-24 Activision Publishing, Inc. Systems and methods for improved collision detection in video games

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5005200A (en) * 1988-02-12 1991-04-02 Fischer Addison M Public key/signature cryptosystem with enhanced digital signature certification
JPH047659A (ja) * 1990-04-25 1992-01-13 Toshiba Corp 複合計算機システム
US5210872A (en) * 1991-06-28 1993-05-11 Texas Instruments Inc. Critical task scheduling for real-time systems
GB9126779D0 (en) * 1991-12-17 1992-02-12 Int Computers Ltd Security mechanism for a computer system
ATE177857T1 (de) * 1992-05-15 1999-04-15 Addison M Fischer Verfahren und vorrichtung zur sicherheit eines computersystem mit programmberechtigungsdatenstrukturen
US5412717A (en) * 1992-05-15 1995-05-02 Fischer; Addison M. Computer system security method and apparatus having program authorization information data structures
US5450593A (en) * 1992-12-18 1995-09-12 International Business Machines Corp. Method and system for controlling access to objects in a data processing system based on temporal constraints
AU683038B2 (en) * 1993-08-10 1997-10-30 Addison M. Fischer A method for operating computers and for processing information among computers
JPH0822393A (ja) * 1994-07-07 1996-01-23 Nec Corp 動的ローディング制御装置
US5757915A (en) * 1995-08-25 1998-05-26 Intel Corporation Parameterized hash functions for access control

Also Published As

Publication number Publication date
DE69732323D1 (de) 2005-03-03
JPH1083310A (ja) 1998-03-31
US5825877A (en) 1998-10-20
DE69732323T2 (de) 2005-12-22
EP0813132B1 (en) 2005-01-26
KR100267872B1 (ko) 2000-10-16
EP0813132A3 (en) 2003-01-15
JP3701773B2 (ja) 2005-10-05
EP0813132A2 (en) 1997-12-17
KR980004069A (ko) 1998-03-30

Similar Documents

Publication Publication Date Title
TW318230B (en) Support for portable trusted software
CN109074462B (zh) 使用分布式散列表和点对点分布式分类账验证数字资产所有权的方法和系统
US6412070B1 (en) Extensible security system and method for controlling access to objects in a computing environment
US6978366B1 (en) Secure document management system
EP1680727B1 (en) Distributed document version control
JP3965020B2 (ja) インテリジェントトラストマネジメントシステム
CN115391749A (zh) 使用分布式散列表和区块链保护计算机软件的方法及系统
US20030115143A1 (en) Identifying, managing, accessing, and tracking digital objects and associated rights and payments
US20150180853A1 (en) Extensible mechanism for securing objects using claims
CN107113300A (zh) 多面计算实例身份
DE10292364T5 (de) Sichere Maschinenplattform, die mit Betriebssystemen und awendungsspezifischen Steuerprogrammen eine Schnittstelle bildet
CN107690629A (zh) 地址转换
WO1997043717A1 (en) Identifying, managing, accessing, and tracking digital objects and associated rights and payments
GB2506074A (en) Information processing device, method, and program which administer secret information
JP2022522702A (ja) 複数のセキュリティ・ドメインにわたるセキュア・メモリの共用
CN106951795A (zh) 一种应用程序数据访问隔离方法及装置
Abdallah et al. A formal model for parameterized role-based access control
Weber et al. Access control for weakly consistent replicated information systems
AU2010336503B2 (en) Securing execution of computational resources
US20050081033A1 (en) Method and device for data protection
Varadharajan et al. A multilevel security model for a distributed object-oriented system
JP7388707B2 (ja) 情報処理装置、情報処理システム、情報処理方法、及びプログラム
JP2000306026A (ja) 電子帳票処理方法
Bacon et al. Access control for a modular, extensible storage service
Wittenberger Askemos-a distributed settlement

Legal Events

Date Code Title Description
MK4A Expiration of patent term of an invention patent