WO2001063385A1 - Controlling access to a resource by a program using a digital signature - Google Patents
Controlling access to a resource by a program using a digital signature Download PDFInfo
- Publication number
- WO2001063385A1 WO2001063385A1 PCT/GB2001/000688 GB0100688W WO0163385A1 WO 2001063385 A1 WO2001063385 A1 WO 2001063385A1 GB 0100688 W GB0100688 W GB 0100688W WO 0163385 A1 WO0163385 A1 WO 0163385A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- resource
- code
- signature
- access
- signatures
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/54—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
- Communication Control (AREA)
- Iron Core Of Rotating Electric Machines (AREA)
- Circuits Of Receivers In General (AREA)
- Electrophonic Musical Instruments (AREA)
Abstract
Description
Claims
Priority Applications (11)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2001562284A JP2003524252A (en) | 2000-02-21 | 2001-02-20 | Controlling access to resources by programs using digital signatures |
AT01905927T ATE429672T1 (en) | 2000-02-21 | 2001-02-20 | ACCESS CONTROL TO RESOURCES THROUGH A PROGRAM USING DIGITAL SIGNATURES |
DK01905927T DK1257892T3 (en) | 2000-02-21 | 2001-02-20 | Access control to a resource using a program that uses a digital signature |
PL01356340A PL356340A1 (en) | 2000-02-21 | 2001-02-20 | Controlling access to a resource by a program using a digital signature |
US10/204,645 US7900239B2 (en) | 2000-02-21 | 2001-02-20 | Controlling access to a resource by a program using a digital signature |
EP01905927A EP1257892B1 (en) | 2000-02-21 | 2001-02-20 | Controlling access to a resource by a program using a digital signature |
DE60138455T DE60138455D1 (en) | 2000-02-21 | 2001-02-20 | ACCESS CONTROL TO RESOURCES THROUGH A PROGRAM ASSISTED IN DIGITAL SIGNATURES |
HU0204161A HUP0204161A2 (en) | 2000-02-21 | 2001-02-20 | Method of controlling access to a resource in a computer system by a body of code and computer system for executing the method |
AU33892/01A AU3389201A (en) | 2000-02-21 | 2001-02-20 | Controlling access to a resource by a program using a digital signature |
CA002400940A CA2400940C (en) | 2000-02-21 | 2001-02-20 | Controlling access to a resource by a program using a digital signature |
NO20023964A NO20023964L (en) | 2000-02-21 | 2002-08-20 | Controlling a computer program's access to a resource using a digital signature |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GBGB0003920.6A GB0003920D0 (en) | 2000-02-21 | 2000-02-21 | Computer system |
GB0003920.6 | 2000-02-21 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2001063385A1 true WO2001063385A1 (en) | 2001-08-30 |
Family
ID=9885992
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/GB2001/000688 WO2001063385A1 (en) | 2000-02-21 | 2001-02-20 | Controlling access to a resource by a program using a digital signature |
Country Status (17)
Country | Link |
---|---|
US (1) | US7900239B2 (en) |
EP (1) | EP1257892B1 (en) |
JP (1) | JP2003524252A (en) |
AT (1) | ATE429672T1 (en) |
AU (1) | AU3389201A (en) |
CA (1) | CA2400940C (en) |
CY (1) | CY1109239T1 (en) |
CZ (1) | CZ20022659A3 (en) |
DE (1) | DE60138455D1 (en) |
DK (1) | DK1257892T3 (en) |
ES (1) | ES2323524T3 (en) |
GB (1) | GB0003920D0 (en) |
HU (1) | HUP0204161A2 (en) |
NO (1) | NO20023964L (en) |
PL (1) | PL356340A1 (en) |
PT (1) | PT1257892E (en) |
WO (1) | WO2001063385A1 (en) |
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2003337632A (en) * | 2002-03-19 | 2003-11-28 | Microsoft Corp | Safety digital data format and code-executing policy |
WO2004017185A1 (en) * | 2002-08-16 | 2004-02-26 | Intel Corporation | Hardware-assisted credential validation |
WO2004077203A2 (en) * | 2003-02-28 | 2004-09-10 | Ncipher Corporation Limited | A method and system of securely enforcing a computer policy |
WO2004019254A3 (en) * | 2002-08-20 | 2005-10-20 | Intel Corp | Hardware-based credential management |
WO2005029223A3 (en) * | 2003-09-18 | 2006-02-23 | Apple Computer | Method and apparatus for incremental code signing |
JP2006526219A (en) * | 2003-06-27 | 2006-11-16 | インテル・コーポレーション | Method and apparatus for providing secure firmware storage and service access |
EP2096569A1 (en) * | 2008-02-29 | 2009-09-02 | Research in Motion Limited | System and method for shared resource owner based access control |
US7801871B2 (en) | 2005-08-09 | 2010-09-21 | Nexsan Technologies Canada Inc. | Data archiving system |
US7882363B2 (en) | 2002-05-31 | 2011-02-01 | Fountain Venture As | Biometric authentication system |
WO2011072952A1 (en) * | 2009-12-16 | 2011-06-23 | Siemens Aktiengesellschaft | Device and method for ensuring access rights to a maintenance functionality |
US7996683B2 (en) | 2001-10-01 | 2011-08-09 | Genkey As | System, portable device and method for digital authenticating, crypting and signing by generating short-lived cryptokeys |
US8229177B2 (en) | 2001-05-31 | 2012-07-24 | Fountain Venture As | Data processing apparatus and method |
US8341715B2 (en) | 2008-02-29 | 2012-12-25 | Research In Motion Limited | System and method for shared resource owner based access control |
US8364965B2 (en) | 2006-03-15 | 2013-01-29 | Apple Inc. | Optimized integrity verification procedures |
US8375458B2 (en) | 2007-01-05 | 2013-02-12 | Apple Inc. | System and method for authenticating code executing on computer system |
US8572673B2 (en) | 2004-06-10 | 2013-10-29 | Dominic Gavan Duffy | Data processing apparatus and method |
US9672350B2 (en) | 2008-03-04 | 2017-06-06 | Apple Inc. | System and method of authorizing execution of software code based on at least one installed profile |
US11263840B2 (en) | 2017-02-24 | 2022-03-01 | Assa Abloy Ab | Delegation and auxiliary condition for physical access |
US11328543B2 (en) | 2016-09-02 | 2022-05-10 | Assa Abloy Ab | Key delegation for controlling access |
Families Citing this family (44)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040111625A1 (en) * | 2001-02-14 | 2004-06-10 | Duffy Dominic Gavan | Data processing apparatus and method |
US7882555B2 (en) * | 2001-03-16 | 2011-02-01 | Kavado, Inc. | Application layer security method and system |
US7328337B2 (en) * | 2001-05-25 | 2008-02-05 | America Online, Incorporated | Trust grant and revocation from a master key to secondary keys |
US20030079134A1 (en) * | 2001-10-23 | 2003-04-24 | Xerox Corporation | Method of secure print-by-reference |
IL149583A0 (en) | 2002-05-09 | 2003-07-06 | Kavado Israel Ltd | Method for automatic setting and updating of a security policy |
US7464270B2 (en) * | 2003-07-23 | 2008-12-09 | Microsoft Corporation | Application identification and license enforcement |
US7314261B2 (en) * | 2004-05-27 | 2008-01-01 | Silverbrook Research Pty Ltd | Printhead module for expelling ink from nozzles in groups, alternately, starting at outside nozzles of each group |
US7631190B2 (en) * | 2004-05-27 | 2009-12-08 | Silverbrook Research Pty Ltd | Use of variant and base keys with two entities |
US7377609B2 (en) * | 2004-05-27 | 2008-05-27 | Silverbrook Research Pty Ltd | Printer controller for at least partially compensating for erroneous rotational displacement |
US7243193B2 (en) * | 2004-05-27 | 2007-07-10 | Silverbrook Research Pty Ltd | Storage of program code in arbitrary locations in memory |
US7390071B2 (en) * | 2004-05-27 | 2008-06-24 | Silverbrook Research Pty Ltd | Printer controller for supplying data to a printhead module having a dropped row |
US7328956B2 (en) * | 2004-05-27 | 2008-02-12 | Silverbrook Research Pty Ltd | Printer comprising a printhead and at least two printer controllers connected to a common input of the printhead |
US7290852B2 (en) * | 2004-05-27 | 2007-11-06 | Silverbrook Research Pty Ltd | Printhead module having a dropped row |
US7448707B2 (en) * | 2004-05-27 | 2008-11-11 | Silverbrook Research Pty Ltd | Method of expelling ink from nozzels in groups, starting at outside nozzels of each group |
US7735944B2 (en) * | 2004-05-27 | 2010-06-15 | Silverbrook Research Pty Ltd | Printer comprising two printhead modules and at least two printer controllers |
US7484831B2 (en) * | 2004-05-27 | 2009-02-03 | Silverbrook Research Pty Ltd | Printhead module having horizontally grouped firing order |
US7188928B2 (en) * | 2004-05-27 | 2007-03-13 | Silverbrook Research Pty Ltd | Printer comprising two uneven printhead modules and at least two printer controllers, one of which sends print data to both of the printhead modules |
US20060004829A1 (en) * | 2004-05-27 | 2006-01-05 | Silverbrook Research Pty Ltd | Rolling keys |
US8011747B2 (en) * | 2004-05-27 | 2011-09-06 | Silverbrook Research Pty Ltd | Printer controller for controlling a printhead with horizontally grouped firing order |
US7549718B2 (en) * | 2004-05-27 | 2009-06-23 | Silverbrook Research Pty Ltd | Printhead module having operation controllable on basis of thermal sensors |
US7374266B2 (en) * | 2004-05-27 | 2008-05-20 | Silverbrook Research Pty Ltd | Method for at least partially compensating for errors in ink dot placement due to erroneous rotational displacement |
US20060294312A1 (en) * | 2004-05-27 | 2006-12-28 | Silverbrook Research Pty Ltd | Generation sequences |
US7600843B2 (en) * | 2004-05-27 | 2009-10-13 | Silverbrook Research Pty Ltd | Printer controller for controlling a printhead module based on thermal sensing |
US7517036B2 (en) * | 2004-05-27 | 2009-04-14 | Silverbrook Research Pty Ltd | Printhead module capable of printing a maximum of n channels of print data |
US20070083491A1 (en) * | 2004-05-27 | 2007-04-12 | Silverbrook Research Pty Ltd | Storage of key in non-volatile memory |
US7281777B2 (en) * | 2004-05-27 | 2007-10-16 | Silverbrook Research Pty Ltd | Printhead module having a communication input for data and control |
US7557941B2 (en) * | 2004-05-27 | 2009-07-07 | Silverbrook Research Pty Ltd | Use of variant and base keys with three or more entities |
US7607757B2 (en) * | 2004-05-27 | 2009-10-27 | Silverbrook Research Pty Ltd | Printer controller for supplying dot data to at least one printhead module having faulty nozzle |
US7427117B2 (en) * | 2004-05-27 | 2008-09-23 | Silverbrook Research Pty Ltd | Method of expelling ink from nozzles in groups, alternately, starting at outside nozzles of each group |
US7266661B2 (en) * | 2004-05-27 | 2007-09-04 | Silverbrook Research Pty Ltd | Method of storing bit-pattern in plural devices |
US8499337B1 (en) * | 2004-10-06 | 2013-07-30 | Mcafee, Inc. | Systems and methods for delegation and notification of administration of internet access |
JP2006221629A (en) * | 2005-02-07 | 2006-08-24 | Sony Computer Entertainment Inc | Content control method and device by resource management of processor |
US7908483B2 (en) * | 2005-06-30 | 2011-03-15 | Intel Corporation | Method and apparatus for binding TPM keys to execution entities |
US9246687B2 (en) * | 2007-02-28 | 2016-01-26 | Broadcom Corporation | Method for authorizing and authenticating data |
US7940543B2 (en) * | 2008-03-19 | 2011-05-10 | Nanya Technology Corp. | Low power synchronous memory command address scheme |
US20100262963A1 (en) * | 2009-04-09 | 2010-10-14 | Gary Michael Wassermann | Systems and methods for activating a network appliance |
EP2534604A4 (en) * | 2010-02-11 | 2013-12-04 | Hewlett Packard Development Co | Executable identity based file access |
US20110314293A1 (en) * | 2010-06-17 | 2011-12-22 | Yu Chun-Ta | Method of Handling a Server Delegation and Related Communication Device |
US8631460B2 (en) * | 2011-03-23 | 2014-01-14 | CipherPoint Software, Inc. | Systems and methods for implementing transparent encryption |
US8990266B2 (en) | 2011-10-18 | 2015-03-24 | CipherPoint Software, Inc. | Dynamic data transformations for network transmissions |
JP4941611B2 (en) * | 2011-11-21 | 2012-05-30 | ソニー株式会社 | Information processing apparatus and method, and computer program |
US8844026B2 (en) | 2012-06-01 | 2014-09-23 | Blackberry Limited | System and method for controlling access to secure resources |
US9058493B1 (en) * | 2013-01-16 | 2015-06-16 | Amdocs Software Systems Limited | System, method, and computer program for conditionally implementing protected content |
US10819586B2 (en) * | 2018-10-17 | 2020-10-27 | Servicenow, Inc. | Functional discovery and mapping of serverless resources |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5337360A (en) * | 1992-04-06 | 1994-08-09 | Fischer Addison M | Method and apparatus for creating, supporting, and using travelling programs |
WO1998019237A1 (en) * | 1996-10-25 | 1998-05-07 | Schlumberger Systemes | Using a high level programming language with a microcontroller |
EP0969366A1 (en) * | 1998-06-29 | 2000-01-05 | Sun Microsystems, Inc. | Controlling access to services between modular applications |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1762958A1 (en) * | 1999-03-08 | 2007-03-14 | Spyrus, Inc. | Method and system for enforcing access to a computing resource using a licensing certificate |
-
2000
- 2000-02-21 GB GBGB0003920.6A patent/GB0003920D0/en not_active Ceased
-
2001
- 2001-02-20 ES ES01905927T patent/ES2323524T3/en not_active Expired - Lifetime
- 2001-02-20 US US10/204,645 patent/US7900239B2/en not_active Expired - Lifetime
- 2001-02-20 DK DK01905927T patent/DK1257892T3/en active
- 2001-02-20 EP EP01905927A patent/EP1257892B1/en not_active Expired - Lifetime
- 2001-02-20 PL PL01356340A patent/PL356340A1/en unknown
- 2001-02-20 CA CA002400940A patent/CA2400940C/en not_active Expired - Lifetime
- 2001-02-20 HU HU0204161A patent/HUP0204161A2/en unknown
- 2001-02-20 DE DE60138455T patent/DE60138455D1/en not_active Expired - Lifetime
- 2001-02-20 WO PCT/GB2001/000688 patent/WO2001063385A1/en not_active Application Discontinuation
- 2001-02-20 AU AU33892/01A patent/AU3389201A/en not_active Abandoned
- 2001-02-20 JP JP2001562284A patent/JP2003524252A/en active Pending
- 2001-02-20 AT AT01905927T patent/ATE429672T1/en active
- 2001-02-20 CZ CZ20022659A patent/CZ20022659A3/en unknown
- 2001-02-20 PT PT01905927T patent/PT1257892E/en unknown
-
2002
- 2002-08-20 NO NO20023964A patent/NO20023964L/en not_active Application Discontinuation
-
2009
- 2009-07-20 CY CY20091100770T patent/CY1109239T1/en unknown
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5337360A (en) * | 1992-04-06 | 1994-08-09 | Fischer Addison M | Method and apparatus for creating, supporting, and using travelling programs |
WO1998019237A1 (en) * | 1996-10-25 | 1998-05-07 | Schlumberger Systemes | Using a high level programming language with a microcontroller |
EP0969366A1 (en) * | 1998-06-29 | 2000-01-05 | Sun Microsystems, Inc. | Controlling access to services between modular applications |
Non-Patent Citations (1)
Title |
---|
GONG L ET AL: "Going beyond the sandbox: an overview of the new security architecture in the JavaDevelopment Kit 1.2", PROCEEDINGS OF THE USENIX SYMPOSIUM ON INTERNET TECHNOLOGIES AND SYSTEMS, 8 December 1997 (1997-12-08), XP002100907 * |
Cited By (31)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8229177B2 (en) | 2001-05-31 | 2012-07-24 | Fountain Venture As | Data processing apparatus and method |
US7996683B2 (en) | 2001-10-01 | 2011-08-09 | Genkey As | System, portable device and method for digital authenticating, crypting and signing by generating short-lived cryptokeys |
JP2003337632A (en) * | 2002-03-19 | 2003-11-28 | Microsoft Corp | Safety digital data format and code-executing policy |
US7882363B2 (en) | 2002-05-31 | 2011-02-01 | Fountain Venture As | Biometric authentication system |
US7512975B2 (en) | 2002-08-16 | 2009-03-31 | Intel Corporation | Hardware-assisted credential validation |
WO2004017185A1 (en) * | 2002-08-16 | 2004-02-26 | Intel Corporation | Hardware-assisted credential validation |
WO2004019254A3 (en) * | 2002-08-20 | 2005-10-20 | Intel Corp | Hardware-based credential management |
US7546452B2 (en) | 2002-08-20 | 2009-06-09 | Intel Corporation | Hardware-based credential management |
GB2413880B (en) * | 2003-02-28 | 2006-05-24 | Ncipher Corp Ltd | A method and system of securely enforcing a computer policy |
GB2413880A (en) * | 2003-02-28 | 2005-11-09 | Ncipher Corp Ltd | A method and system of securely enforcing a computer policy |
WO2004077203A2 (en) * | 2003-02-28 | 2004-09-10 | Ncipher Corporation Limited | A method and system of securely enforcing a computer policy |
WO2004077203A3 (en) * | 2003-02-28 | 2004-11-11 | Ncipher Corp Ltd | A method and system of securely enforcing a computer policy |
JP2006526219A (en) * | 2003-06-27 | 2006-11-16 | インテル・コーポレーション | Method and apparatus for providing secure firmware storage and service access |
US8341422B2 (en) | 2003-09-18 | 2012-12-25 | Apple Inc. | Method and apparatus for incremental code signing |
US8880897B2 (en) | 2003-09-18 | 2014-11-04 | Apple Inc. | Method and apparatus for incremental code signing |
US7103779B2 (en) * | 2003-09-18 | 2006-09-05 | Apple Computer, Inc. | Method and apparatus for incremental code signing |
WO2005029223A3 (en) * | 2003-09-18 | 2006-02-23 | Apple Computer | Method and apparatus for incremental code signing |
US8572673B2 (en) | 2004-06-10 | 2013-10-29 | Dominic Gavan Duffy | Data processing apparatus and method |
US7801871B2 (en) | 2005-08-09 | 2010-09-21 | Nexsan Technologies Canada Inc. | Data archiving system |
US8843461B2 (en) | 2005-08-09 | 2014-09-23 | Nexsan Technologies Canada Inc. | Data archiving system |
US8086578B2 (en) | 2005-08-09 | 2011-12-27 | Nexsan Technologies Canada Inc. | Data archiving system |
US8364965B2 (en) | 2006-03-15 | 2013-01-29 | Apple Inc. | Optimized integrity verification procedures |
US8886947B2 (en) | 2006-03-15 | 2014-11-11 | Apple Inc. | Optimized integrity verification procedures |
US8375458B2 (en) | 2007-01-05 | 2013-02-12 | Apple Inc. | System and method for authenticating code executing on computer system |
US8782807B2 (en) | 2007-01-05 | 2014-07-15 | Apple Inc. | System and method for authenticating code executing on computer system |
US8341715B2 (en) | 2008-02-29 | 2012-12-25 | Research In Motion Limited | System and method for shared resource owner based access control |
EP2096569A1 (en) * | 2008-02-29 | 2009-09-02 | Research in Motion Limited | System and method for shared resource owner based access control |
US9672350B2 (en) | 2008-03-04 | 2017-06-06 | Apple Inc. | System and method of authorizing execution of software code based on at least one installed profile |
WO2011072952A1 (en) * | 2009-12-16 | 2011-06-23 | Siemens Aktiengesellschaft | Device and method for ensuring access rights to a maintenance functionality |
US11328543B2 (en) | 2016-09-02 | 2022-05-10 | Assa Abloy Ab | Key delegation for controlling access |
US11263840B2 (en) | 2017-02-24 | 2022-03-01 | Assa Abloy Ab | Delegation and auxiliary condition for physical access |
Also Published As
Publication number | Publication date |
---|---|
CA2400940A1 (en) | 2001-08-30 |
PT1257892E (en) | 2009-06-09 |
US7900239B2 (en) | 2011-03-01 |
NO20023964D0 (en) | 2002-08-20 |
EP1257892A1 (en) | 2002-11-20 |
ES2323524T3 (en) | 2009-07-20 |
US20050005112A1 (en) | 2005-01-06 |
CY1109239T1 (en) | 2014-07-02 |
HUP0204161A2 (en) | 2003-05-28 |
JP2003524252A (en) | 2003-08-12 |
GB0003920D0 (en) | 2000-04-05 |
CA2400940C (en) | 2009-09-01 |
NO20023964L (en) | 2002-10-21 |
PL356340A1 (en) | 2004-06-28 |
EP1257892B1 (en) | 2009-04-22 |
DE60138455D1 (en) | 2009-06-04 |
AU3389201A (en) | 2001-09-03 |
CZ20022659A3 (en) | 2003-06-18 |
DK1257892T3 (en) | 2009-08-17 |
ATE429672T1 (en) | 2009-05-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1257892B1 (en) | Controlling access to a resource by a program using a digital signature | |
US8402508B2 (en) | Delegated authentication for web services | |
US8984291B2 (en) | Access to a computing environment by computing devices | |
JP2686218B2 (en) | Alias detection method on computer system, distributed computer system and method of operating the same, and distributed computer system performing alias detection | |
US6253324B1 (en) | Server verification of requesting clients | |
CN101819612B (en) | Versatile content control with partitioning | |
US7979465B2 (en) | Data protection method, authentication method, and program therefor | |
US7844832B2 (en) | System and method for data source authentication and protection system using biometrics for openly exchanged computer files | |
US9600661B2 (en) | System and method to secure a computer system by selective control of write access to a data storage medium | |
US20070220274A1 (en) | Biometric authentication system | |
AU3299402A (en) | Methods and arrangements for controlling access to resources based on authentication method | |
JP4636607B2 (en) | How to protect sensitive files in security application | |
JP2007156959A (en) | Access control program, information processor, and access control method | |
CA2767115A1 (en) | Method for remotely controlling and monitoring the data produced on desktop software | |
US20090064273A1 (en) | Methods and systems for secure data entry and maintenance | |
KR20090052321A (en) | Content control system and method using versatile control structure | |
KR20010100011A (en) | Assuring data integrity via a secure counter | |
CN101324913B (en) | Method and apparatus for protecting computer file | |
US20040193874A1 (en) | Device which executes authentication processing by using offline information, and device authentication method | |
US20040243828A1 (en) | Method and system for securing block-based storage with capability data | |
US20070055478A1 (en) | System and method for active data protection in a computer system in response to a request to access to a resource of the computer system | |
CN113678129A (en) | Method, computer program product and field device for authorizing access to objects in a computerized system | |
US20130061312A1 (en) | Security token for securely executing an application on a host computer | |
CN109359450A (en) | Safety access method, device, equipment and the storage medium of linux system | |
RU2263950C2 (en) | Device for preventing unsanctioned access to information, stored on personal computer |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
WWE | Wipo information: entry into national phase |
Ref document number: PV2002-2659 Country of ref document: CZ |
|
WWE | Wipo information: entry into national phase |
Ref document number: 33892/01 Country of ref document: AU |
|
WWE | Wipo information: entry into national phase |
Ref document number: 520506 Country of ref document: NZ |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2400940 Country of ref document: CA |
|
ENP | Entry into the national phase |
Ref country code: JP Ref document number: 2001 562284 Kind code of ref document: A Format of ref document f/p: F |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2001905927 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 10204645 Country of ref document: US |
|
WWP | Wipo information: published in national office |
Ref document number: 2001905927 Country of ref document: EP |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
WWP | Wipo information: published in national office |
Ref document number: PV2002-2659 Country of ref document: CZ |
|
WWR | Wipo information: refused in national office |
Ref document number: PV2002-2659 Country of ref document: CZ |