WO1998044404A1 - Method and apparatus for providing security for servers executing application programs received via a network - Google Patents
Method and apparatus for providing security for servers executing application programs received via a network Download PDFInfo
- Publication number
- WO1998044404A1 WO1998044404A1 PCT/US1998/006116 US9806116W WO9844404A1 WO 1998044404 A1 WO1998044404 A1 WO 1998044404A1 US 9806116 W US9806116 W US 9806116W WO 9844404 A1 WO9844404 A1 WO 9844404A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- application program
- privileges
- server
- source identifier
- source
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 27
- 244000035744 Hura crepitans Species 0.000 description 7
- 238000012795 verification Methods 0.000 description 7
- 238000010586 diagram Methods 0.000 description 4
- 238000011160 research Methods 0.000 description 3
- 238000013459 approach Methods 0.000 description 2
- 230000007935 neutral effect Effects 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 230000007123 defense Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000005433 particle physics related processes and functions Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1458—Protection against unauthorised use of memory or access to memory by checking the subject access rights
- G06F12/1483—Protection against unauthorised use of memory or access to memory by checking the subject access rights using an access-table, e.g. matrix or list
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/033—Test or assess software
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2129—Authenticate client device independently of the user
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
Abstract
Description
Claims
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP98913219A EP0972234B1 (en) | 1997-04-01 | 1998-03-27 | Method and apparatus for providing security for servers executing application programs received via a network |
DE69838378T DE69838378T2 (en) | 1997-04-01 | 1998-03-27 | PROCEDURE AND DEVICE FOR SECURITY TO ENSURE THAT SERVER USERS PROGRAMS RECEIVED VIA THE NETWORK HAVE BEEN GUARANTEED |
JP54185698A JP2002503364A (en) | 1997-04-01 | 1998-03-27 | Method and apparatus for securing a server executing an application program received via a network |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US08/829,990 | 1997-04-01 | ||
US08/829,990 US6167522A (en) | 1997-04-01 | 1997-04-01 | Method and apparatus for providing security for servers executing application programs received via a network |
Publications (1)
Publication Number | Publication Date |
---|---|
WO1998044404A1 true WO1998044404A1 (en) | 1998-10-08 |
Family
ID=25256058
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US1998/006116 WO1998044404A1 (en) | 1997-04-01 | 1998-03-27 | Method and apparatus for providing security for servers executing application programs received via a network |
Country Status (5)
Country | Link |
---|---|
US (1) | US6167522A (en) |
EP (1) | EP0972234B1 (en) |
JP (1) | JP2002503364A (en) |
DE (1) | DE69838378T2 (en) |
WO (1) | WO1998044404A1 (en) |
Cited By (31)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2001117769A (en) * | 1999-10-20 | 2001-04-27 | Matsushita Electric Ind Co Ltd | Program executing device |
WO2001033340A2 (en) * | 1999-10-26 | 2001-05-10 | At Home Corporation | Method and system for restricting access to user resources |
JP2002517852A (en) * | 1998-06-12 | 2002-06-18 | マイクロソフト コーポレイション | Method and system for securely executing untrusted content |
WO2003050662A1 (en) * | 2001-12-13 | 2003-06-19 | Japan Science And Technology Agency | Software safety execution system |
US6678733B1 (en) | 1999-10-26 | 2004-01-13 | At Home Corporation | Method and system for authorizing and authenticating users |
US6732179B1 (en) | 1997-03-05 | 2004-05-04 | At Home Corporation | Method and system for restricting access to user resources |
EP1455501A2 (en) * | 2003-03-06 | 2004-09-08 | NTT DoCoMo, Inc. | Method and apparatus for controlling transfer of content |
WO2005106653A1 (en) | 2004-04-30 | 2005-11-10 | Research In Motion Limited | System and method of owner application control of electronic devices |
US8045958B2 (en) | 2005-11-21 | 2011-10-25 | Research In Motion Limited | System and method for application program operation on a wireless device |
US8103799B2 (en) | 1997-03-05 | 2012-01-24 | At Home Bondholders' Liquidating Trust | Delivering multimedia services |
WO2012015485A1 (en) * | 2010-07-28 | 2012-02-02 | Mcafee, Inc. | System and method for local protection against malicious software |
US8332906B2 (en) | 2006-02-27 | 2012-12-11 | Research In Motion Limited | Method of customizing a standardized IT policy |
US8463920B2 (en) | 2000-08-23 | 2013-06-11 | At Home Bondholders' Liquidating Trust | Sharing IP network resources |
US8694738B2 (en) | 2011-10-11 | 2014-04-08 | Mcafee, Inc. | System and method for critical address space protection in a hypervisor environment |
US8843496B2 (en) | 2010-09-12 | 2014-09-23 | Mcafee, Inc. | System and method for clustering host inventories |
US8869265B2 (en) | 2009-08-21 | 2014-10-21 | Mcafee, Inc. | System and method for enforcing security policies in a virtual environment |
US8938800B2 (en) | 2010-07-28 | 2015-01-20 | Mcafee, Inc. | System and method for network level protection against malicious software |
US8973146B2 (en) | 2012-12-27 | 2015-03-03 | Mcafee, Inc. | Herd based scan avoidance system in a network environment |
US8973144B2 (en) | 2011-10-13 | 2015-03-03 | Mcafee, Inc. | System and method for kernel rootkit protection in a hypervisor environment |
US9069586B2 (en) | 2011-10-13 | 2015-06-30 | Mcafee, Inc. | System and method for kernel rootkit protection in a hypervisor environment |
US9075993B2 (en) | 2011-01-24 | 2015-07-07 | Mcafee, Inc. | System and method for selectively grouping and managing program files |
US9112830B2 (en) | 2011-02-23 | 2015-08-18 | Mcafee, Inc. | System and method for interlocking a host and a gateway |
US9134998B2 (en) | 2006-02-02 | 2015-09-15 | Mcafee, Inc. | Enforcing alignment of approved changes and deployed changes in the software change life-cycle |
US9356909B2 (en) | 2011-10-17 | 2016-05-31 | Mcafee, Inc. | System and method for redirected firewall discovery in a network environment |
US9413785B2 (en) | 2012-04-02 | 2016-08-09 | Mcafee, Inc. | System and method for interlocking a host and a gateway |
US9424154B2 (en) | 2007-01-10 | 2016-08-23 | Mcafee, Inc. | Method of and system for computer system state checks |
US9552497B2 (en) | 2009-11-10 | 2017-01-24 | Mcafee, Inc. | System and method for preventing data loss using virtual machine wrapped applications |
US9578052B2 (en) | 2013-10-24 | 2017-02-21 | Mcafee, Inc. | Agent assisted malicious application blocking in a network environment |
US9576142B2 (en) | 2006-03-27 | 2017-02-21 | Mcafee, Inc. | Execution environment file inventory |
US9594881B2 (en) | 2011-09-09 | 2017-03-14 | Mcafee, Inc. | System and method for passive threat detection using virtual memory inspection |
US9864868B2 (en) | 2007-01-10 | 2018-01-09 | Mcafee, Llc | Method and apparatus for process enforced configuration management |
Families Citing this family (51)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5928323A (en) * | 1996-05-30 | 1999-07-27 | Sun Microsystems, Inc. | Apparatus and method for dynamically generating information with server-side software objects |
US7058822B2 (en) | 2000-03-30 | 2006-06-06 | Finjan Software, Ltd. | Malicious mobile code runtime monitoring system and methods |
US9219755B2 (en) | 1996-11-08 | 2015-12-22 | Finjan, Inc. | Malicious mobile code runtime monitoring system and methods |
US8079086B1 (en) | 1997-11-06 | 2011-12-13 | Finjan, Inc. | Malicious mobile code runtime monitoring system and methods |
US6453334B1 (en) * | 1997-06-16 | 2002-09-17 | Streamtheory, Inc. | Method and apparatus to allow remotely located computer programs and/or data to be accessed on a local computer in a secure, time-limited manner, with persistent caching |
US6275938B1 (en) * | 1997-08-28 | 2001-08-14 | Microsoft Corporation | Security enhancement for untrusted executable code |
US7047369B1 (en) * | 1997-09-25 | 2006-05-16 | Aladdin Knowledge Systems Ltd. | Software application environment |
US6584495B1 (en) * | 1998-01-30 | 2003-06-24 | Microsoft Corporation | Unshared scratch space |
IL123512A0 (en) * | 1998-03-02 | 1999-03-12 | Security 7 Software Ltd | Method and agent for the protection against hostile resource use access |
US6691230B1 (en) * | 1998-10-15 | 2004-02-10 | International Business Machines Corporation | Method and system for extending Java applets sand box with public client storage |
US20040030768A1 (en) * | 1999-05-25 | 2004-02-12 | Suban Krishnamoorthy | Unified system and method for downloading code to heterogeneous devices in distributed storage area networks |
US6510464B1 (en) * | 1999-12-14 | 2003-01-21 | Verizon Corporate Services Group Inc. | Secure gateway having routing feature |
US6631417B1 (en) * | 2000-03-29 | 2003-10-07 | Iona Technologies Plc | Methods and apparatus for securing access to a computer |
US7036146B1 (en) | 2000-10-03 | 2006-04-25 | Sandia Corporation | System and method for secure group transactions |
US7062567B2 (en) | 2000-11-06 | 2006-06-13 | Endeavors Technology, Inc. | Intelligent network streaming and execution system for conventionally coded applications |
US8831995B2 (en) | 2000-11-06 | 2014-09-09 | Numecent Holdings, Inc. | Optimized server for streamed applications |
US6965939B2 (en) * | 2001-01-05 | 2005-11-15 | International Business Machines Corporation | Method and apparatus for processing requests in a network data processing system based on a trust association between servers |
US7099663B2 (en) | 2001-05-31 | 2006-08-29 | Qualcomm Inc. | Safe application distribution and execution in a wireless environment |
US6996602B2 (en) * | 2001-06-18 | 2006-02-07 | Ford Global Technologies, Llc | Server-side page table framework for client application definition and execution |
US7392313B2 (en) * | 2001-10-18 | 2008-06-24 | International Business Machines Corporation | Method and apparatus for partitioned environment for web application servers |
US7653814B2 (en) | 2001-12-11 | 2010-01-26 | International Business Machines Corporation | System and method for securely hyperlinking graphic objects |
US7197530B2 (en) * | 2002-01-18 | 2007-03-27 | Bea Systems, Inc. | System and method for pluggable URL pattern matching for servlets and application servers |
US20030140100A1 (en) * | 2002-01-18 | 2003-07-24 | Sam Pullara | System and method for URL response caching and filtering in servlets and application servers |
US7552189B2 (en) * | 2002-01-18 | 2009-06-23 | Bea Systems, Inc. | System and method for using virtual directories to service URL requests URL requests in application servers |
AU2002326284A1 (en) * | 2002-03-28 | 2003-10-13 | Oleksiy Yuryevich Shevchenko | Method and device for computer memory protection against unauthorized access |
US6961813B2 (en) * | 2002-06-21 | 2005-11-01 | Hewlett-Packard Development Company, L.P. | System and method for providing multi-initiator capability to an ATA drive |
US6948036B2 (en) * | 2002-06-21 | 2005-09-20 | Hewlett-Packard Development Company, L.P. | System and method for providing multi-initiator capability to an ATA drive |
US20040123117A1 (en) * | 2002-12-18 | 2004-06-24 | Symantec Corporation | Validation for behavior-blocking system |
US7908653B2 (en) * | 2004-06-29 | 2011-03-15 | Intel Corporation | Method of improving computer security through sandboxing |
US7484247B2 (en) * | 2004-08-07 | 2009-01-27 | Allen F Rozman | System and method for protecting a computer system from malicious software |
US8819639B2 (en) * | 2004-09-15 | 2014-08-26 | Lakeside Software, Inc. | System for selectively blocking execution of applications on a computer system |
US20060123398A1 (en) * | 2004-12-08 | 2006-06-08 | Mcguire James B | Apparatus and method for optimization of virtual machine operation |
US20060156400A1 (en) * | 2005-01-06 | 2006-07-13 | Gbs Laboratories Llc | System and method for preventing unauthorized access to computer devices |
US8024523B2 (en) | 2007-11-07 | 2011-09-20 | Endeavors Technologies, Inc. | Opportunistic block transmission with time constraints |
JP2006323614A (en) * | 2005-05-18 | 2006-11-30 | Fujitsu Ltd | Fraud prevention apparatus, program and method |
US8346950B1 (en) * | 2005-05-19 | 2013-01-01 | Glam Media, Inc. | Hosted application server |
US7756945B1 (en) | 2005-08-02 | 2010-07-13 | Ning, Inc. | Interacting with a shared data model |
US8874477B2 (en) | 2005-10-04 | 2014-10-28 | Steven Mark Hoffberg | Multifactorial optimization system and method |
US8060916B2 (en) * | 2006-11-06 | 2011-11-15 | Symantec Corporation | System and method for website authentication using a shared secret |
US20090125977A1 (en) * | 2007-10-31 | 2009-05-14 | Docomo Communications Laboratories Usa, Inc. | Language framework and infrastructure for safe and composable applications |
US8892738B2 (en) | 2007-11-07 | 2014-11-18 | Numecent Holdings, Inc. | Deriving component statistics for a stream enabled application |
US8789159B2 (en) * | 2008-02-11 | 2014-07-22 | Microsoft Corporation | System for running potentially malicious code |
US20100058016A1 (en) * | 2008-08-26 | 2010-03-04 | Jari Nikara | Method, apparatus and software product for multi-channel memory sandbox |
JP2010092376A (en) * | 2008-10-10 | 2010-04-22 | Softbank Mobile Corp | Information processing apparatus, information processing method, and information processing program |
US8745361B2 (en) * | 2008-12-02 | 2014-06-03 | Microsoft Corporation | Sandboxed execution of plug-ins |
US9294479B1 (en) * | 2010-12-01 | 2016-03-22 | Google Inc. | Client-side authentication |
US8973158B2 (en) | 2011-07-20 | 2015-03-03 | Microsoft Technology Licensing Llc | Trust level activation |
US8832447B2 (en) | 2011-08-10 | 2014-09-09 | Sony Corporation | System and method for using digital signatures to assign permissions |
US11461456B1 (en) * | 2015-06-19 | 2022-10-04 | Stanley Kevin Miles | Multi-transfer resource allocation using modified instances of corresponding records in memory |
US11176240B1 (en) * | 2021-04-20 | 2021-11-16 | Stanley Kevin Miles | Multi-transfer resource allocation using modified instances of corresponding records in memory |
JP6901997B2 (en) | 2018-05-31 | 2021-07-14 | 富士フイルム株式会社 | Program execution control method, program, recording medium, web page, transmission server, client and web system |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0409397A2 (en) * | 1989-07-20 | 1991-01-23 | International Computers Limited | Distributed data processing system |
EP0570123A1 (en) * | 1992-05-15 | 1993-11-18 | Addison M. Fischer | Computer system security method and apparatus having program authorization information data structures |
EP0580350A1 (en) * | 1992-07-21 | 1994-01-26 | Digital Equipment Corporation | Access control subsystem and method for distributed computer system using locally cached authentication credentials |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5421006A (en) * | 1992-05-07 | 1995-05-30 | Compaq Computer Corp. | Method and apparatus for assessing integrity of computer system software |
US5720033A (en) * | 1994-06-30 | 1998-02-17 | Lucent Technologies Inc. | Security platform and method using object oriented rules for computer-based systems using UNIX-line operating systems |
US5692047A (en) * | 1995-12-08 | 1997-11-25 | Sun Microsystems, Inc. | System and method for executing verifiable programs with facility for using non-verifiable programs from trusted sources |
US5928323A (en) * | 1996-05-30 | 1999-07-27 | Sun Microsystems, Inc. | Apparatus and method for dynamically generating information with server-side software objects |
US5825877A (en) * | 1996-06-11 | 1998-10-20 | International Business Machines Corporation | Support for portable trusted software |
US5958051A (en) * | 1996-11-27 | 1999-09-28 | Sun Microsystems, Inc. | Implementing digital signatures for data streams and data archives |
US5892904A (en) * | 1996-12-06 | 1999-04-06 | Microsoft Corporation | Code certification for network transmission |
-
1997
- 1997-04-01 US US08/829,990 patent/US6167522A/en not_active Expired - Lifetime
-
1998
- 1998-03-27 EP EP98913219A patent/EP0972234B1/en not_active Expired - Lifetime
- 1998-03-27 JP JP54185698A patent/JP2002503364A/en active Pending
- 1998-03-27 DE DE69838378T patent/DE69838378T2/en not_active Expired - Lifetime
- 1998-03-27 WO PCT/US1998/006116 patent/WO1998044404A1/en active IP Right Grant
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0409397A2 (en) * | 1989-07-20 | 1991-01-23 | International Computers Limited | Distributed data processing system |
EP0570123A1 (en) * | 1992-05-15 | 1993-11-18 | Addison M. Fischer | Computer system security method and apparatus having program authorization information data structures |
EP0580350A1 (en) * | 1992-07-21 | 1994-01-26 | Digital Equipment Corporation | Access control subsystem and method for distributed computer system using locally cached authentication credentials |
Cited By (62)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8209427B2 (en) | 1997-03-05 | 2012-06-26 | At Home Bondholders' Liquidating Trust | Method and system for restricting access to user resources |
US6732179B1 (en) | 1997-03-05 | 2004-05-04 | At Home Corporation | Method and system for restricting access to user resources |
US8103799B2 (en) | 1997-03-05 | 2012-01-24 | At Home Bondholders' Liquidating Trust | Delivering multimedia services |
US9038145B2 (en) | 1997-03-05 | 2015-05-19 | At Home Bondholders' Liquidating Trust | Method and system for restricting access to user resources |
JP2002517852A (en) * | 1998-06-12 | 2002-06-18 | マイクロソフト コーポレイション | Method and system for securely executing untrusted content |
JP2001117769A (en) * | 1999-10-20 | 2001-04-27 | Matsushita Electric Ind Co Ltd | Program executing device |
WO2001033340A2 (en) * | 1999-10-26 | 2001-05-10 | At Home Corporation | Method and system for restricting access to user resources |
US6678733B1 (en) | 1999-10-26 | 2004-01-13 | At Home Corporation | Method and system for authorizing and authenticating users |
WO2001033340A3 (en) * | 1999-10-26 | 2002-07-11 | At Home Corp | Method and system for restricting access to user resources |
US8463920B2 (en) | 2000-08-23 | 2013-06-11 | At Home Bondholders' Liquidating Trust | Sharing IP network resources |
WO2003050662A1 (en) * | 2001-12-13 | 2003-06-19 | Japan Science And Technology Agency | Software safety execution system |
US7690023B2 (en) | 2001-12-13 | 2010-03-30 | Japan Science And Technology Agency | Software safety execution system |
US9033216B2 (en) | 2002-12-12 | 2015-05-19 | Blackberry Limited | System and method of owner application control of electronic devices |
US10474841B2 (en) | 2002-12-12 | 2019-11-12 | Blackberry Limited | System and method of owner application control of electronic devices |
US9542571B2 (en) | 2002-12-12 | 2017-01-10 | Blackberry Limited | System and method of owner application control of electronic devices |
EP1455501A2 (en) * | 2003-03-06 | 2004-09-08 | NTT DoCoMo, Inc. | Method and apparatus for controlling transfer of content |
EP1455501A3 (en) * | 2003-03-06 | 2005-02-16 | NTT DoCoMo, Inc. | Method and apparatus for controlling transfer of content |
US8887988B2 (en) | 2004-04-30 | 2014-11-18 | Blackberry Limited | System and method of owner application control of electronic devices |
US7815100B2 (en) | 2004-04-30 | 2010-10-19 | Research In Motion Limited | System and method of owner application control of electronic devices |
EP1763744A4 (en) * | 2004-04-30 | 2007-10-24 | Research In Motion Ltd | System and method of owner application control of electronic devices |
EP1763744A1 (en) * | 2004-04-30 | 2007-03-21 | Research In Motion Limited | System and method of owner application control of electronic devices |
WO2005106653A1 (en) | 2004-04-30 | 2005-11-10 | Research In Motion Limited | System and method of owner application control of electronic devices |
US7546956B2 (en) | 2004-04-30 | 2009-06-16 | Research In Motion Limited | System and method of operation control on an electronic device |
US8254884B2 (en) | 2005-11-21 | 2012-08-28 | Research In Motion Limited | System and method for application program operation on a wireless device |
US8045958B2 (en) | 2005-11-21 | 2011-10-25 | Research In Motion Limited | System and method for application program operation on a wireless device |
US9602515B2 (en) | 2006-02-02 | 2017-03-21 | Mcafee, Inc. | Enforcing alignment of approved changes and deployed changes in the software change life-cycle |
US9134998B2 (en) | 2006-02-02 | 2015-09-15 | Mcafee, Inc. | Enforcing alignment of approved changes and deployed changes in the software change life-cycle |
US8544057B2 (en) | 2006-02-27 | 2013-09-24 | Blackberry Limited | Method of customizing a standardized IT policy |
US8332906B2 (en) | 2006-02-27 | 2012-12-11 | Research In Motion Limited | Method of customizing a standardized IT policy |
US9621587B2 (en) | 2006-02-27 | 2017-04-11 | Blackberry Limited | Method of customizing a standardized IT policy |
US10360382B2 (en) | 2006-03-27 | 2019-07-23 | Mcafee, Llc | Execution environment file inventory |
US9576142B2 (en) | 2006-03-27 | 2017-02-21 | Mcafee, Inc. | Execution environment file inventory |
US9864868B2 (en) | 2007-01-10 | 2018-01-09 | Mcafee, Llc | Method and apparatus for process enforced configuration management |
US9424154B2 (en) | 2007-01-10 | 2016-08-23 | Mcafee, Inc. | Method of and system for computer system state checks |
US9652607B2 (en) | 2009-08-21 | 2017-05-16 | Mcafee, Inc. | System and method for enforcing security policies in a virtual environment |
US8869265B2 (en) | 2009-08-21 | 2014-10-21 | Mcafee, Inc. | System and method for enforcing security policies in a virtual environment |
US9552497B2 (en) | 2009-11-10 | 2017-01-24 | Mcafee, Inc. | System and method for preventing data loss using virtual machine wrapped applications |
US9467470B2 (en) | 2010-07-28 | 2016-10-11 | Mcafee, Inc. | System and method for local protection against malicious software |
US9832227B2 (en) | 2010-07-28 | 2017-11-28 | Mcafee, Llc | System and method for network level protection against malicious software |
US8938800B2 (en) | 2010-07-28 | 2015-01-20 | Mcafee, Inc. | System and method for network level protection against malicious software |
WO2012015485A1 (en) * | 2010-07-28 | 2012-02-02 | Mcafee, Inc. | System and method for local protection against malicious software |
US8925101B2 (en) | 2010-07-28 | 2014-12-30 | Mcafee, Inc. | System and method for local protection against malicious software |
US8843496B2 (en) | 2010-09-12 | 2014-09-23 | Mcafee, Inc. | System and method for clustering host inventories |
US9075993B2 (en) | 2011-01-24 | 2015-07-07 | Mcafee, Inc. | System and method for selectively grouping and managing program files |
US9112830B2 (en) | 2011-02-23 | 2015-08-18 | Mcafee, Inc. | System and method for interlocking a host and a gateway |
US9866528B2 (en) | 2011-02-23 | 2018-01-09 | Mcafee, Llc | System and method for interlocking a host and a gateway |
US9594881B2 (en) | 2011-09-09 | 2017-03-14 | Mcafee, Inc. | System and method for passive threat detection using virtual memory inspection |
US8694738B2 (en) | 2011-10-11 | 2014-04-08 | Mcafee, Inc. | System and method for critical address space protection in a hypervisor environment |
US8973144B2 (en) | 2011-10-13 | 2015-03-03 | Mcafee, Inc. | System and method for kernel rootkit protection in a hypervisor environment |
US9465700B2 (en) | 2011-10-13 | 2016-10-11 | Mcafee, Inc. | System and method for kernel rootkit protection in a hypervisor environment |
US9946562B2 (en) | 2011-10-13 | 2018-04-17 | Mcafee, Llc | System and method for kernel rootkit protection in a hypervisor environment |
US9069586B2 (en) | 2011-10-13 | 2015-06-30 | Mcafee, Inc. | System and method for kernel rootkit protection in a hypervisor environment |
US9882876B2 (en) | 2011-10-17 | 2018-01-30 | Mcafee, Llc | System and method for redirected firewall discovery in a network environment |
US9356909B2 (en) | 2011-10-17 | 2016-05-31 | Mcafee, Inc. | System and method for redirected firewall discovery in a network environment |
US10652210B2 (en) | 2011-10-17 | 2020-05-12 | Mcafee, Llc | System and method for redirected firewall discovery in a network environment |
US9413785B2 (en) | 2012-04-02 | 2016-08-09 | Mcafee, Inc. | System and method for interlocking a host and a gateway |
US10171611B2 (en) | 2012-12-27 | 2019-01-01 | Mcafee, Llc | Herd based scan avoidance system in a network environment |
US8973146B2 (en) | 2012-12-27 | 2015-03-03 | Mcafee, Inc. | Herd based scan avoidance system in a network environment |
US9578052B2 (en) | 2013-10-24 | 2017-02-21 | Mcafee, Inc. | Agent assisted malicious application blocking in a network environment |
US10205743B2 (en) | 2013-10-24 | 2019-02-12 | Mcafee, Llc | Agent assisted malicious application blocking in a network environment |
US10645115B2 (en) | 2013-10-24 | 2020-05-05 | Mcafee, Llc | Agent assisted malicious application blocking in a network environment |
US11171984B2 (en) | 2013-10-24 | 2021-11-09 | Mcafee, Llc | Agent assisted malicious application blocking in a network environment |
Also Published As
Publication number | Publication date |
---|---|
EP0972234A1 (en) | 2000-01-19 |
DE69838378T2 (en) | 2008-05-29 |
US6167522A (en) | 2000-12-26 |
JP2002503364A (en) | 2002-01-29 |
EP0972234B1 (en) | 2007-09-05 |
DE69838378D1 (en) | 2007-10-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6167522A (en) | Method and apparatus for providing security for servers executing application programs received via a network | |
US6754829B1 (en) | Certificate-based authentication system for heterogeneous environments | |
CA2448853C (en) | Methods and systems for authentication of a user for sub-locations of a network location | |
US8239954B2 (en) | Access control based on program properties | |
JP4164855B2 (en) | Server support method and system for pluggable authorization system | |
JP4916136B2 (en) | System and method for providing security to applications | |
US5958050A (en) | Trusted delegation system | |
US7085928B1 (en) | System and method for defending against malicious software | |
US20070186112A1 (en) | Controlling execution of computer applications | |
US6993588B2 (en) | System and methods for securely permitting mobile code to access resources over a network | |
Karnik et al. | A security architecture for mobile agents in Ajanta | |
JP4975127B2 (en) | Apparatus for providing tamper evidence to executable code stored on removable media | |
Jaeger et al. | Building systems that flexibly control downloaded executable content | |
Islam et al. | A flexible security system for using Internet content | |
US7308578B2 (en) | Method and apparatus for authorizing execution for applications in a data processing system | |
US20030126292A1 (en) | System and method for specifying access to resources in a mobile code system | |
Anderson | Java™ access control mechanisms | |
GB2365561A (en) | Conditional access control | |
Hartig et al. | Encapsulating mobile objects | |
Iliadis et al. | Towards secure downloadable executable content: The JAVA paradigm | |
Wong | PGP Enhancement to Java Applet | |
Jaeger et al. | Security requirements for the deployment of the linux kernel in enterprise systems | |
Iliadis | The JAVA Paradigm | |
Ke et al. | An Analysis of Mobile Code Security | |
EP1451996A2 (en) | System and method for specifying access to resources in a mobile code system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): JP |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE CH DE DK ES FI FR GB GR IE IT LU MC NL PT SE |
|
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
ENP | Entry into the national phase |
Ref country code: JP Ref document number: 1998 541856 Kind code of ref document: A Format of ref document f/p: F |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1998913219 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 1998913219 Country of ref document: EP |
|
WWG | Wipo information: grant in national office |
Ref document number: 1998913219 Country of ref document: EP |