ATE177857T1 - Verfahren und vorrichtung zur sicherheit eines computersystem mit programmberechtigungsdatenstrukturen - Google Patents

Verfahren und vorrichtung zur sicherheit eines computersystem mit programmberechtigungsdatenstrukturen

Info

Publication number
ATE177857T1
ATE177857T1 AT93303223T AT93303223T ATE177857T1 AT E177857 T1 ATE177857 T1 AT E177857T1 AT 93303223 T AT93303223 T AT 93303223T AT 93303223 T AT93303223 T AT 93303223T AT E177857 T1 ATE177857 T1 AT E177857T1
Authority
AT
Austria
Prior art keywords
program
pai
computer system
executed
limits
Prior art date
Application number
AT93303223T
Other languages
English (en)
Inventor
Addison M Fischer
Original Assignee
Addison M Fischer
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US07/883,868 external-priority patent/US5412717A/en
Application filed by Addison M Fischer filed Critical Addison M Fischer
Application granted granted Critical
Publication of ATE177857T1 publication Critical patent/ATE177857T1/de

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/54Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2211/00Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
    • G06F2211/007Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2145Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
  • Stored Programmes (AREA)
AT93303223T 1992-05-15 1993-04-26 Verfahren und vorrichtung zur sicherheit eines computersystem mit programmberechtigungsdatenstrukturen ATE177857T1 (de)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US88386792A 1992-05-15 1992-05-15
US07/883,868 US5412717A (en) 1992-05-15 1992-05-15 Computer system security method and apparatus having program authorization information data structures

Publications (1)

Publication Number Publication Date
ATE177857T1 true ATE177857T1 (de) 1999-04-15

Family

ID=27128706

Family Applications (1)

Application Number Title Priority Date Filing Date
AT93303223T ATE177857T1 (de) 1992-05-15 1993-04-26 Verfahren und vorrichtung zur sicherheit eines computersystem mit programmberechtigungsdatenstrukturen

Country Status (7)

Country Link
EP (1) EP0570123B1 (de)
JP (2) JP3784423B2 (de)
AT (1) ATE177857T1 (de)
AU (1) AU672786B2 (de)
CA (1) CA2095087C (de)
DE (1) DE69323926T2 (de)
ES (1) ES2128393T3 (de)

Families Citing this family (62)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1138927A (zh) * 1994-01-13 1996-12-25 银行家信托公司 具有密钥由第三方保存特性的密码系统和方法
US5553143A (en) * 1994-02-04 1996-09-03 Novell, Inc. Method and apparatus for electronic licensing
US5553139A (en) * 1994-04-04 1996-09-03 Novell, Inc. Method and apparatus for electronic license distribution
US5473692A (en) * 1994-09-07 1995-12-05 Intel Corporation Roving software license for a hardware agent
US5802275A (en) * 1994-06-22 1998-09-01 Lucent Technologies Inc. Isolation of non-secure software from secure software to limit virus infection
JPH08137686A (ja) * 1994-09-16 1996-05-31 Toshiba Corp 著作物データ管理方法及び著作物データ管理装置
US5715403A (en) * 1994-11-23 1998-02-03 Xerox Corporation System for controlling the distribution and use of digital works having attached usage rights where the usage rights are defined by a usage rights grammar
EP0717337B1 (de) * 1994-12-13 2001-08-01 International Business Machines Corporation Verfahren und System zur gesicherten Programmenverteilung
US5892900A (en) 1996-08-30 1999-04-06 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US5943422A (en) 1996-08-12 1999-08-24 Intertrust Technologies Corp. Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels
US7133846B1 (en) 1995-02-13 2006-11-07 Intertrust Technologies Corp. Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management
US6658568B1 (en) 1995-02-13 2003-12-02 Intertrust Technologies Corporation Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management
US7133845B1 (en) 1995-02-13 2006-11-07 Intertrust Technologies Corp. System and methods for secure transaction management and electronic rights protection
US7124302B2 (en) 1995-02-13 2006-10-17 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US7069451B1 (en) 1995-02-13 2006-06-27 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US7095854B1 (en) 1995-02-13 2006-08-22 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US6157721A (en) 1996-08-12 2000-12-05 Intertrust Technologies Corp. Systems and methods using cryptography to protect secure computing environments
US7143290B1 (en) 1995-02-13 2006-11-28 Intertrust Technologies Corporation Trusted and secure techniques, systems and methods for item delivery and execution
EP2110732A3 (de) 1995-02-13 2009-12-09 Intertrust Technologies Corporation Systeme und Verfahren für die sichere Transaktionsverwaltung und elektronischen Rechtsschutz
US7165174B1 (en) 1995-02-13 2007-01-16 Intertrust Technologies Corp. Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management
US6948070B1 (en) 1995-02-13 2005-09-20 Intertrust Technologies Corporation Systems and methods for secure transaction management and electronic rights protection
US5905860A (en) * 1996-03-15 1999-05-18 Novell, Inc. Fault tolerant electronic licensing system
CA2202118A1 (en) * 1996-04-29 1997-10-29 Mitel Corporation Protected persistent storage access for mobile applications
US5825877A (en) * 1996-06-11 1998-10-20 International Business Machines Corporation Support for portable trusted software
US5987123A (en) * 1996-07-03 1999-11-16 Sun Microsystems, Incorporated Secure file system
US6148083A (en) * 1996-08-23 2000-11-14 Hewlett-Packard Company Application certification for an international cryptography framework
US5841870A (en) * 1996-11-12 1998-11-24 Cheyenne Property Trust Dynamic classes of service for an international cryptography framework
US5920861A (en) * 1997-02-25 1999-07-06 Intertrust Technologies Corp. Techniques for defining using and manipulating rights management data structures
US7062500B1 (en) 1997-02-25 2006-06-13 Intertrust Technologies Corp. Techniques for defining, using and manipulating rights management data structures
US6167522A (en) * 1997-04-01 2000-12-26 Sun Microsystems, Inc. Method and apparatus for providing security for servers executing application programs received via a network
EP1000400A4 (de) * 1997-06-17 2005-04-06 Purdue Pharma Lp Selbstzerstörendes dokument- und e-mail-übermittlungssystem
US6000032A (en) * 1997-07-15 1999-12-07 Symantec Corporation Secure access to software modules
US6188995B1 (en) * 1997-07-28 2001-02-13 Apple Computer, Inc. Method and apparatus for enforcing software licenses
US6711611B2 (en) 1998-09-11 2004-03-23 Genesis Telecommunications Laboratories, Inc. Method and apparatus for data-linking a mobile knowledge worker to home communication-center infrastructure
US6985943B2 (en) 1998-09-11 2006-01-10 Genesys Telecommunications Laboratories, Inc. Method and apparatus for extended management of state and interaction of a remote knowledge worker from a contact center
US7092914B1 (en) 1997-11-06 2006-08-15 Intertrust Technologies Corporation Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information
IL123512A0 (en) 1998-03-02 1999-03-12 Security 7 Software Ltd Method and agent for the protection against hostile resource use access
US7233948B1 (en) 1998-03-16 2007-06-19 Intertrust Technologies Corp. Methods and apparatus for persistent control and protection of content
AU3722399A (en) 1998-05-06 1999-11-23 Jcp Computer Services Ltd Processing apparatus and method
US7243236B1 (en) 1999-07-29 2007-07-10 Intertrust Technologies Corp. Systems and methods for using cryptography to protect secure and insecure computing environments
US7430670B1 (en) 1999-07-29 2008-09-30 Intertrust Technologies Corp. Software self-defense systems and methods
JP2001127747A (ja) * 1999-10-25 2001-05-11 Toshiba Corp 情報暗号化復号化装置
US6757824B1 (en) * 1999-12-10 2004-06-29 Microsoft Corporation Client-side boot domains and boot rules
US6901386B1 (en) * 2000-03-31 2005-05-31 Intel Corporation Electronic asset lending library method and apparatus
US7263616B1 (en) 2000-09-22 2007-08-28 Ge Medical Systems Global Technology Company, Llc Ultrasound imaging system having computer virus protection
KR20020034862A (ko) * 2000-11-02 2002-05-09 권문상 컴퓨터의 응용프로그램의 비밀값 제어방법
US7099663B2 (en) 2001-05-31 2006-08-29 Qualcomm Inc. Safe application distribution and execution in a wireless environment
DE10140721A1 (de) * 2001-08-27 2003-03-20 Bayerische Motoren Werke Ag Verfahren zur Bereitstellung von Software zur Verwendung durch ein Steuergerät eines Fahrzeugs
JP3818504B2 (ja) * 2002-04-15 2006-09-06 ソニー株式会社 情報処理装置および方法、並びにプログラム
JP4222774B2 (ja) 2002-05-20 2009-02-12 株式会社エヌ・ティ・ティ・ドコモ 携帯端末およびプログラムの起動方法
EP1521174A4 (de) 2002-06-12 2006-05-10 Matsushita Electric Industrial Co Ltd Sichererweiterbare dienstplattform
JP2006504189A (ja) * 2002-10-25 2006-02-02 エクスパートン、ベッティーナ ネットワークアドレスおよびアプリケーションを自動起動しアクセスするためのシステムおよび方法(優先権)これは、特許協力条約(pct)に基づいて提出された国際特許出願である。この国際出願は、参照として組み込まれた、2002年10月25日に出願された米国仮出願第60/421,622号の優先権を主張する。
RU2234123C1 (ru) * 2002-11-21 2004-08-10 Щеглов Андрей Юрьевич Система разграничения прав доступа к файловым объектам
KR100493900B1 (ko) 2003-08-21 2005-06-10 삼성전자주식회사 사용자간 콘텐츠에 대한 권한정보의 공유방법
US20050091658A1 (en) * 2003-10-24 2005-04-28 Microsoft Corporation Operating system resource protection
KR101037006B1 (ko) * 2003-11-28 2011-05-25 파나소닉 주식회사 데이터 처리장치
US9008075B2 (en) 2005-12-22 2015-04-14 Genesys Telecommunications Laboratories, Inc. System and methods for improving interaction routing performance
JP4995590B2 (ja) 2007-02-14 2012-08-08 株式会社エヌ・ティ・ティ・ドコモ コンテンツ流通管理装置、通信端末、プログラム及びコンテンツ流通システム
US8646050B2 (en) * 2011-01-18 2014-02-04 Apple Inc. System and method for supporting JIT in a secure system with randomly allocated memory ranges
US9690945B2 (en) 2012-11-14 2017-06-27 International Business Machines Corporation Security analysis using relational abstraction of data structures
JP6236816B2 (ja) * 2013-03-15 2017-11-29 株式会社リコー 画像処理システム、情報処理装置及びプログラム
US10694352B2 (en) 2015-10-28 2020-06-23 Activision Publishing, Inc. System and method of using physical objects to control software access

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2059652B (en) 1979-09-29 1983-08-24 Plessey Co Ltd Memory protection system using capability registers
AU618056B2 (en) * 1987-11-10 1991-12-12 Acresso Software Inc. Computer program license management system
US5005200A (en) 1988-02-12 1991-04-02 Fischer Addison M Public key/signature cryptosystem with enhanced digital signature certification
JP3049749B2 (ja) * 1990-09-14 2000-06-05 富士通株式会社 ファイルアクセス制限処理装置
CA2093094C (en) 1992-04-06 2000-07-11 Addison M. Fischer Method and apparatus for creating, supporting, and using travelling programs

Also Published As

Publication number Publication date
AU672786B2 (en) 1996-10-17
JP2006099805A (ja) 2006-04-13
JP3784423B2 (ja) 2006-06-14
DE69323926T2 (de) 1999-09-30
CA2095087A1 (en) 1993-11-16
CA2095087C (en) 1999-06-01
ES2128393T3 (es) 1999-05-16
EP0570123A1 (de) 1993-11-18
AU3820993A (en) 1993-11-18
EP0570123B1 (de) 1999-03-17
JPH06103058A (ja) 1994-04-15
DE69323926D1 (de) 1999-04-22
JP3880607B2 (ja) 2007-02-14

Similar Documents

Publication Publication Date Title
ATE177857T1 (de) Verfahren und vorrichtung zur sicherheit eines computersystem mit programmberechtigungsdatenstrukturen
US7290279B2 (en) Access control method using token having security attributes in computer system
EP0891661B1 (de) Verfahren und vorrichtung zum schützen von daten mit mehreren auf datenelementebene anwendbaren verschlüsselungsstufen
DE60218996T3 (de) Verfahren und vorrichtung zur einrichtung von benutzungsrechten für in der zukunft zu erzeugenden digitalen inhalt
CA2025434A1 (en) Method for protecting against the unauthorized use of software in a computer network environment
ATE469476T1 (de) Verfahren und vorrichtung zum tarnen von daten, informationen und funktionstransformationen
KR860006731A (ko) 데이터 처리시스템 및 그 시스템파일의 보호방법
ATE450013T1 (de) Verfahren und vorrichtung zur dynamischen umwandlung von verschlüsselten daten
ATE386290T1 (de) Zugriffsystem und -verfahren zum geschützten inhalt in einem berechtigungverwaltungssystem
EP0729252A3 (de) Verwaltung kryptographischer Schlüssel
EP1389752A3 (de) System und Verfahren zur Delegierung und Kontrolle von Privilegien
ATE441897T1 (de) Systeme und verfahren zur verwaltung von gesicherten transaktionen und zum schutz von elektronischen rechten
ATE347131T1 (de) Verfahren zur zugriffsprüfung eines anwenders
US6253251B1 (en) Information handling system, method, and article of manufacture including integration of object security service authorization with a distributed computing environment
KR20030096249A (ko) 조건들의 검증에 의해 접근과 자원들 사용을 관리하기위한 방법 및 그와 함께 사용하기 위한 조건들
DE59306758D1 (de) Verfahren und Vorrichtung zur Überprüfung und Erlangung einer Zugangsberechtigung
DE60224297T2 (de) Vorrichtung und verfahren zum zugreifen auf material unter verwendung einer sicheren entitätsverriegelten registrierdatenbank
DE60211900D1 (de) Verfahren und vorrichtung zur bewahrung von sicherer dateneingabe und datenausgabe
JP4636040B2 (ja) ファイル管理システム及びファイル管理方法、並びにファイル管理プログラム
CN109522734B (zh) 一种安全应用商店系统
JPS62248048A (ja) フアイルの機密保護方式
Kapilow et al. Unix Security
Lloyd The Role of Risk Analysis in the Control of Major Hazards
El Analytical Study of the Accounting and Information Systems of Direct Labour Organisations
Novak A morphological study and microspectrophotometric analysis of DNA content of Hemocytes in Periplaneta americana (L.)

Legal Events

Date Code Title Description
UEP Publication of translation of european patent specification