SG11201505651WA - Secure interface for invoking privileged operations - Google Patents
Secure interface for invoking privileged operationsInfo
- Publication number
- SG11201505651WA SG11201505651WA SG11201505651WA SG11201505651WA SG11201505651WA SG 11201505651W A SG11201505651W A SG 11201505651WA SG 11201505651W A SG11201505651W A SG 11201505651WA SG 11201505651W A SG11201505651W A SG 11201505651WA SG 11201505651W A SG11201505651W A SG 11201505651WA
- Authority
- SG
- Singapore
- Prior art keywords
- invoking
- secure interface
- privileged operations
- privileged
- operations
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
- G06F21/335—User authentication using certificates for accessing specific resources, e.g. using Kerberos tickets
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/629—Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
- G06F2009/45587—Isolation or security of virtual machine instances
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/033—Test or assess software
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2115—Third party
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- Stored Programmes (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/746,737 US10063380B2 (en) | 2013-01-22 | 2013-01-22 | Secure interface for invoking privileged operations |
PCT/US2014/012604 WO2014116743A1 (en) | 2013-01-22 | 2014-01-22 | Secure interface for invoking privileged operations |
Publications (1)
Publication Number | Publication Date |
---|---|
SG11201505651WA true SG11201505651WA (en) | 2015-08-28 |
Family
ID=51208708
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG11201505651WA SG11201505651WA (en) | 2013-01-22 | 2014-01-22 | Secure interface for invoking privileged operations |
Country Status (9)
Country | Link |
---|---|
US (2) | US10063380B2 (zh) |
EP (1) | EP2948854B1 (zh) |
JP (1) | JP6092428B2 (zh) |
KR (1) | KR101735982B1 (zh) |
CN (1) | CN104969201B (zh) |
AU (1) | AU2014209470B2 (zh) |
CA (1) | CA2898906C (zh) |
SG (1) | SG11201505651WA (zh) |
WO (1) | WO2014116743A1 (zh) |
Families Citing this family (27)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9860274B2 (en) | 2006-09-13 | 2018-01-02 | Sophos Limited | Policy management |
US10063380B2 (en) | 2013-01-22 | 2018-08-28 | Amazon Technologies, Inc. | Secure interface for invoking privileged operations |
US9503268B2 (en) | 2013-01-22 | 2016-11-22 | Amazon Technologies, Inc. | Securing results of privileged computing operations |
US9729517B2 (en) | 2013-01-22 | 2017-08-08 | Amazon Technologies, Inc. | Secure virtual machine migration |
US8978122B1 (en) * | 2013-03-29 | 2015-03-10 | Emc Corporation | Secure cross-tenancy federation in software-as-a-service system |
GB2515536A (en) * | 2013-06-27 | 2014-12-31 | Ibm | Processing a guest event in a hypervisor-controlled system |
GB2518367B (en) * | 2013-09-18 | 2020-07-22 | Ibm | Authorized remote access to an operating system hosted by a virtual machine |
US9563419B2 (en) * | 2014-02-20 | 2017-02-07 | International Business Machines Corporation | Managing deployment of application pattern based applications on runtime platforms |
US9686356B2 (en) * | 2014-08-12 | 2017-06-20 | Eingot Llc | Zero-knowledge environment based social networking engine |
GB2532415A (en) | 2014-11-11 | 2016-05-25 | Ibm | Processing a guest event in a hypervisor-controlled system |
US9787478B2 (en) | 2015-06-10 | 2017-10-10 | Qualcomm Incorporated | Service provider certificate management |
US10110566B2 (en) * | 2015-07-21 | 2018-10-23 | Baffle, Inc. | Systems and processes for executing private programs on untrusted computers |
CN105262592A (zh) * | 2015-09-18 | 2016-01-20 | 浪潮(北京)电子信息产业有限公司 | 一种数据交互的方法及api接口 |
US9794292B2 (en) * | 2015-10-26 | 2017-10-17 | Amazon Technologies, Inc. | Providing fine-grained access remote command execution for virtual machine instances in a distributed computing environment |
CN106991298B (zh) * | 2016-01-21 | 2021-02-02 | 斑马智行网络(香港)有限公司 | 应用程序对接口的访问方法、授权请求方法及装置 |
US10044701B2 (en) * | 2016-05-24 | 2018-08-07 | Vantiv, Llc | Technologies for token-based authentication and authorization of distributed computing resources |
US10318311B2 (en) * | 2016-06-30 | 2019-06-11 | Amazon Technologies, Inc. | Memory allocation techniques at partially-offloaded virtualization managers |
US9887975B1 (en) | 2016-08-03 | 2018-02-06 | KryptCo, Inc. | Systems and methods for delegated cryptography |
WO2019005103A1 (en) * | 2017-06-30 | 2019-01-03 | Nokia Solutions And Networks Oy | SECURE CONNECTION CONTEXT SHARING THROUGH A TRUSTED AUTHORITY |
US10885211B2 (en) | 2017-09-12 | 2021-01-05 | Sophos Limited | Securing interprocess communications |
KR102515891B1 (ko) * | 2018-06-11 | 2023-03-29 | 삼성전자주식회사 | 전자장치, 그 제어방법 및 기록매체 |
US10853494B2 (en) * | 2018-07-23 | 2020-12-01 | Vmware, Inc. | Binding a trusted virtual machine to a trusted host computer |
WO2020140257A1 (en) * | 2019-01-04 | 2020-07-09 | Baidu.Com Times Technology (Beijing) Co., Ltd. | Method and system for validating kernel objects to be executed by a data processing accelerator of a host system |
US10574466B1 (en) * | 2019-07-11 | 2020-02-25 | Clover Network, Inc. | Authenticated external biometric reader and verification device |
US11336635B2 (en) * | 2019-11-18 | 2022-05-17 | Ciot | Systems and methods for authenticating device through IoT cloud using hardware security module |
CN111125597B (zh) * | 2019-12-18 | 2023-10-27 | 百度在线网络技术(北京)有限公司 | 网页加载方法、浏览器、电子设备及存储介质 |
KR20210112923A (ko) | 2020-03-06 | 2021-09-15 | 삼성전자주식회사 | 시스템 온 칩 및 이의 동작 방법 |
Family Cites Families (86)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH0692428A (ja) | 1992-09-11 | 1994-04-05 | Sony Corp | 搬送方法 |
US5410602A (en) | 1993-09-27 | 1995-04-25 | Motorola, Inc. | Method for key management of point-to-point communications |
KR0172003B1 (ko) | 1995-03-28 | 1999-03-30 | 김광호 | 컴퓨터 시스템 및 그 제어방법 |
US5638541A (en) | 1995-08-25 | 1997-06-10 | Intel Corporation | System and method for managing power on desktop systems |
US7020880B2 (en) | 1997-01-08 | 2006-03-28 | International Business Machines Corporation | Modular application collaborator for providing inter-operability between applications and monitoring errors to trigger execution of required compensating actions to undo interrupted transaction |
US6704871B1 (en) | 1997-09-16 | 2004-03-09 | Safenet, Inc. | Cryptographic co-processor |
CA2255285C (en) | 1998-12-04 | 2009-10-13 | Certicom Corp. | Enhanced subscriber authentication protocol |
US6826715B1 (en) | 1999-10-28 | 2004-11-30 | Hewlett-Packard Development Company, L.P. | Automatic capture and comparison of computer configuration data |
US6826690B1 (en) | 1999-11-08 | 2004-11-30 | International Business Machines Corporation | Using device certificates for automated authentication of communicating devices |
JP3938852B2 (ja) | 2001-06-20 | 2007-06-27 | 富士通株式会社 | 監視サービス価格提示方法,監視サービス価格提示プログラム,監視サービス価格提示装置 |
US6944300B2 (en) | 2001-06-22 | 2005-09-13 | International Business Machines Corporaton | Method for migrating a base chip key from one computer system to another |
JP2003051838A (ja) | 2001-08-07 | 2003-02-21 | Sony Corp | アドレス管理システム、インタフェースid設定処理装置、通信端末装置、およびアドレス管理方法、並びにコンピュータ・プログラム |
US7272832B2 (en) | 2001-10-25 | 2007-09-18 | Hewlett-Packard Development Company, L.P. | Method of protecting user process data in a secure platform inaccessible to the operating system and other tasks on top of the secure platform |
US7418596B1 (en) * | 2002-03-26 | 2008-08-26 | Cellco Partnership | Secure, efficient, and mutually authenticated cryptographic key distribution |
CA2431311C (en) | 2002-06-06 | 2004-05-04 | Dick C. Hardt | Distributed hierarchical identity management |
US20040064691A1 (en) * | 2002-09-26 | 2004-04-01 | International Business Machines Corporation | Method and system for processing certificate revocation lists in an authorization system |
JP2004254027A (ja) | 2003-02-19 | 2004-09-09 | Toshiba Corp | サーバ装置、鍵管理装置、暗号通信方法及びプログラム |
US20050044363A1 (en) * | 2003-08-21 | 2005-02-24 | Zimmer Vincent J. | Trusted remote firmware interface |
JP2005122561A (ja) | 2003-10-17 | 2005-05-12 | Canon Inc | アプリケーションプロテクトシステム |
US8295484B2 (en) * | 2004-12-21 | 2012-10-23 | Broadcom Corporation | System and method for securing data from a remote input device |
US8539587B2 (en) | 2005-03-22 | 2013-09-17 | Hewlett-Packard Development Company, L.P. | Methods, devices and data structures for trusted data |
US7636442B2 (en) | 2005-05-13 | 2009-12-22 | Intel Corporation | Method and apparatus for migrating software-based security coprocessors |
US8429630B2 (en) | 2005-09-15 | 2013-04-23 | Ca, Inc. | Globally distributed utility computing cloud |
US8364638B2 (en) | 2005-09-15 | 2013-01-29 | Ca, Inc. | Automated filer technique for use in virtualized appliances and applications |
US7797545B2 (en) * | 2005-09-29 | 2010-09-14 | Research In Motion Limited | System and method for registering entities for code signing services |
JP2007122303A (ja) | 2005-10-27 | 2007-05-17 | Hitachi Ltd | 論理区画式計算機システム |
JP5054317B2 (ja) | 2006-02-08 | 2012-10-24 | 株式会社アイ・オー・データ機器 | 暗号鍵設定方法、ネットワークシステム、管理装置、情報処理端末、および暗号鍵設定プログラム |
WO2007121587A1 (en) | 2006-04-25 | 2007-11-01 | Stephen Laurence Boren | Dynamic distributed key system and method for identity management, authentication servers, data security and preventing man-in-the-middle attacks |
US8130959B2 (en) | 2006-09-07 | 2012-03-06 | International Business Machines Corporation | Rekeying encryption for removable storage media |
US8407699B2 (en) * | 2008-03-10 | 2013-03-26 | Citrix Systems, Inc. | System and method for managing code isolation |
US20080134321A1 (en) * | 2006-12-05 | 2008-06-05 | Priya Rajagopal | Tamper-resistant method and apparatus for verification and measurement of host agent dynamic data updates |
US8380987B2 (en) | 2007-01-25 | 2013-02-19 | Microsoft Corporation | Protection agents and privilege modes |
US7913086B2 (en) * | 2007-06-20 | 2011-03-22 | Nokia Corporation | Method for remote message attestation in a communication system |
US9112681B2 (en) | 2007-06-22 | 2015-08-18 | Fujitsu Limited | Method and apparatus for secure information transfer to support migration |
US8453143B2 (en) | 2007-09-19 | 2013-05-28 | Vmware, Inc. | Reducing the latency of virtual interrupt delivery in virtual machines |
KR100953092B1 (ko) | 2007-11-06 | 2010-04-19 | 한국전자통신연구원 | Sso서비스 방법 및 시스템 |
US9363258B2 (en) * | 2007-12-17 | 2016-06-07 | International Business Machines Corporation | Secure digital signature system |
US8208637B2 (en) | 2007-12-17 | 2012-06-26 | Microsoft Corporation | Migration of computer secrets |
US8259948B2 (en) | 2007-12-29 | 2012-09-04 | Intel Corporation | Virtual TPM key migration using hardware keys |
US7882070B2 (en) | 2007-12-31 | 2011-02-01 | Sap Ag | System and method for UDDI data migration using standard UDDI v3 API |
US8353015B2 (en) * | 2008-01-09 | 2013-01-08 | Microsoft Corporation | Trusted internet identity |
EP2249511A1 (en) | 2008-02-25 | 2010-11-10 | Panasonic Corporation | Information security device and information security system |
WO2009151445A1 (en) * | 2008-06-10 | 2009-12-17 | Hewlett-Packard Development Company, L.P. | Method and apparatus for configuring a hypervisor during a downtime state |
AU2009259876A1 (en) | 2008-06-19 | 2009-12-23 | Servicemesh, Inc. | Cloud computing gateway, cloud computing hypervisor, and methods for implementing same |
US9075957B2 (en) | 2008-08-04 | 2015-07-07 | Sandisk Il Ltd. | Backing up digital content that is stored in a secured storage device |
US9715401B2 (en) | 2008-09-15 | 2017-07-25 | International Business Machines Corporation | Securing live migration of a virtual machine from a secure virtualized computing environment, over an unsecured network, to a different virtualized computing environment |
US20100082960A1 (en) * | 2008-09-30 | 2010-04-01 | Steve Grobman | Protected network boot of operating system |
US9559842B2 (en) * | 2008-09-30 | 2017-01-31 | Hewlett Packard Enterprise Development Lp | Trusted key management for virtualized platforms |
US8336079B2 (en) | 2008-12-31 | 2012-12-18 | Hytrust, Inc. | Intelligent security control system for virtualized ecosystems |
US8768843B2 (en) * | 2009-01-15 | 2014-07-01 | Igt | EGM authentication mechanism using multiple key pairs at the BIOS with PKI |
US8738932B2 (en) | 2009-01-16 | 2014-05-27 | Teleputers, Llc | System and method for processor-based security |
US9158912B2 (en) | 2009-04-01 | 2015-10-13 | Dell Products L.P. | Method and apparatus for a virtual machine hosting network with user devices |
US8392709B1 (en) * | 2009-04-28 | 2013-03-05 | Adobe Systems Incorporated | System and method for a single request—single response protocol with mutual replay attack protection |
US9768965B2 (en) * | 2009-05-28 | 2017-09-19 | Adobe Systems Incorporated | Methods and apparatus for validating a digital signature |
US8438256B2 (en) | 2009-06-26 | 2013-05-07 | Vmware, Inc. | Migrating functionality in virtualized mobile devices |
EP2449743B1 (en) | 2009-07-03 | 2016-09-07 | Telefonaktiebolaget LM Ericsson (publ) | Method and apparatus for use in an ip multimedia subsystem |
US9565207B1 (en) * | 2009-09-04 | 2017-02-07 | Amazon Technologies, Inc. | Firmware updates from an external channel |
US8386731B2 (en) | 2009-09-14 | 2013-02-26 | Vmware, Inc. | Method and system for optimizing live migration of persistent data of virtual machine using disk I/O heuristics |
KR20110035573A (ko) | 2009-09-30 | 2011-04-06 | 주식회사 케이티 | 클라우드 컴퓨팅 환경에서 안전한 가상 머신 설치를 제공하는 방법 |
US8631404B2 (en) | 2010-02-18 | 2014-01-14 | Red Hat Israel, Ltd. | Mechanism for downloading hypervisor updates via a virtual hardware device using existing virtual machine-host channels |
US8417885B2 (en) | 2010-02-24 | 2013-04-09 | Avaya Inc. | Method and apparatus for high availability (HA) protection of a running virtual machine (VM) |
JPWO2011114476A1 (ja) * | 2010-03-17 | 2013-06-27 | 富士通株式会社 | マルチコアプロセッサシステム、通知プログラム、および通知方法 |
JP2011211255A (ja) | 2010-03-26 | 2011-10-20 | Kyocera Corp | データ転送システム、通信機器及びデータ転送方法 |
US8300831B2 (en) | 2010-04-26 | 2012-10-30 | International Business Machines Corporation | Redundant key server encryption environment |
US8473557B2 (en) | 2010-08-24 | 2013-06-25 | At&T Intellectual Property I, L.P. | Methods and apparatus to migrate virtual machines between distributive computing networks across a wide area network |
US8800050B2 (en) | 2010-11-09 | 2014-08-05 | Microsoft Corporation | Security system for computing resources pre-releases |
KR20120050742A (ko) | 2010-11-11 | 2012-05-21 | 삼성에스디에스 주식회사 | 커널 네이티브 에이피아이의 후킹 처리를 통한 디지털 저작권 관리 장치 및 방법 |
US8880667B2 (en) | 2011-02-09 | 2014-11-04 | Microsoft Corporation | Self regulation of the subject of attestation |
JP5648544B2 (ja) | 2011-03-15 | 2015-01-07 | 富士通株式会社 | スケジューリングプログラム、および情報処理装置 |
US20120324446A1 (en) * | 2011-06-17 | 2012-12-20 | Microsoft Corporation | Virtual machine image composition and signing |
US8732462B2 (en) * | 2011-07-07 | 2014-05-20 | Ziptr, Inc. | Methods and apparatus for secure data sharing |
US8832447B2 (en) * | 2011-08-10 | 2014-09-09 | Sony Corporation | System and method for using digital signatures to assign permissions |
JP2013058006A (ja) | 2011-09-07 | 2013-03-28 | Fuji Xerox Co Ltd | 情報処理装置及び情報処理プログラム |
EP2587715B1 (en) * | 2011-09-20 | 2017-01-04 | BlackBerry Limited | Assisted certificate enrollment |
US8694786B2 (en) * | 2011-10-04 | 2014-04-08 | International Business Machines Corporation | Virtual machine images encryption using trusted computing group sealing |
US9069586B2 (en) | 2011-10-13 | 2015-06-30 | Mcafee, Inc. | System and method for kernel rootkit protection in a hypervisor environment |
US8788843B2 (en) * | 2011-10-28 | 2014-07-22 | LogMeln, Inc. | Storing user data in a service provider cloud without exposing user-specific secrets to the service provider |
US9413538B2 (en) | 2011-12-12 | 2016-08-09 | Microsoft Technology Licensing, Llc | Cryptographic certification of secure hosted execution environments |
US8914629B2 (en) | 2012-01-30 | 2014-12-16 | The Nielsen Company (Us), Llc | Intercepting encrypted network traffic for internet usage monitoring |
US8909939B1 (en) * | 2012-04-04 | 2014-12-09 | Google Inc. | Distribution of cryptographic host keys in a cloud computing environment |
US8688984B2 (en) * | 2012-04-27 | 2014-04-01 | Google Inc. | Providing content to a user across multiple devices |
US10255089B2 (en) * | 2012-07-31 | 2019-04-09 | Ca, Inc. | Self-deleting virtual machines |
US8924720B2 (en) * | 2012-09-27 | 2014-12-30 | Intel Corporation | Method and system to securely migrate and provision virtual machine images and content |
US9503268B2 (en) | 2013-01-22 | 2016-11-22 | Amazon Technologies, Inc. | Securing results of privileged computing operations |
US9729517B2 (en) | 2013-01-22 | 2017-08-08 | Amazon Technologies, Inc. | Secure virtual machine migration |
US10063380B2 (en) | 2013-01-22 | 2018-08-28 | Amazon Technologies, Inc. | Secure interface for invoking privileged operations |
-
2013
- 2013-01-22 US US13/746,737 patent/US10063380B2/en active Active
-
2014
- 2014-01-22 SG SG11201505651WA patent/SG11201505651WA/en unknown
- 2014-01-22 AU AU2014209470A patent/AU2014209470B2/en active Active
- 2014-01-22 EP EP14743515.0A patent/EP2948854B1/en active Active
- 2014-01-22 KR KR1020157022330A patent/KR101735982B1/ko active IP Right Grant
- 2014-01-22 JP JP2015555246A patent/JP6092428B2/ja active Active
- 2014-01-22 CA CA2898906A patent/CA2898906C/en active Active
- 2014-01-22 WO PCT/US2014/012604 patent/WO2014116743A1/en active Application Filing
- 2014-01-22 CN CN201480005603.9A patent/CN104969201B/zh active Active
-
2018
- 2018-08-27 US US16/113,471 patent/US11228449B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
US10063380B2 (en) | 2018-08-28 |
CA2898906C (en) | 2017-10-31 |
EP2948854B1 (en) | 2017-11-29 |
US20190068379A1 (en) | 2019-02-28 |
EP2948854A4 (en) | 2016-09-28 |
US20140208096A1 (en) | 2014-07-24 |
CA2898906A1 (en) | 2014-07-31 |
CN104969201B (zh) | 2019-06-28 |
AU2014209470B2 (en) | 2017-04-06 |
JP2016509725A (ja) | 2016-03-31 |
WO2014116743A1 (en) | 2014-07-31 |
KR101735982B1 (ko) | 2017-05-15 |
CN104969201A (zh) | 2015-10-07 |
AU2014209470A1 (en) | 2015-08-27 |
US11228449B2 (en) | 2022-01-18 |
JP6092428B2 (ja) | 2017-03-08 |
KR20150110652A (ko) | 2015-10-02 |
EP2948854A1 (en) | 2015-12-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
SG11201505651WA (en) | Secure interface for invoking privileged operations | |
HK1221301A1 (zh) | 受信任的裝置 | |
HK1223402A1 (zh) | 免疫溶瘤療法 | |
SG11201505654YA (en) | Securing results of privileged computing operations | |
SG11201507019QA (en) | Application marketplace for virtual desktops | |
GB2505564B (en) | Software development tool | |
SG11201600614SA (en) | System for subsea operations | |
EP2954792A4 (en) | PACKAGING | |
EP2979211A4 (en) | PROTECTION OF A SOFTWARE APPLICATION | |
GB201313618D0 (en) | Package | |
TWI561962B (en) | Computer system | |
EP2987086A4 (en) | SECURE DATA PROCESSING | |
IL240019A0 (en) | Estrogen receptor inhibitors | |
EP2985238A4 (en) | PACKAGING | |
EP2963676A4 (en) | SUSCEPTOR | |
GB2515286B (en) | Pressure-sensitive interface | |
PL2759993T3 (pl) | Ochrona płytki dotykowej | |
EP2960784A4 (en) | VIRTUALIZATION SYSTEM | |
GB201404271D0 (en) | Superforwarding processor | |
GB201310194D0 (en) | DAB interface | |
GB2510863B (en) | Package | |
AU352998S (en) | Package | |
AU350637S (en) | Excavator part | |
AU350636S (en) | Excavator part | |
AU350639S (en) | Excavator part |