摘要:
A server kernel processing system receives an input/output (I/O) request from a user mode computing environment. The I/O request is analyzed to determine whether it is a modification request to modify data in a target volume. If so, target analysis logic determines whether the request is for a target volume that is within a first or second protected volume. If the request is to modify data stored in the first protected volume, the request is blocked. If the request is to modify data in a second protected volume, then a whitelist is examined to determine whether the requesting process and user are on the whitelist. If not, the request is also blocked.
摘要:
The security of web widgets is improved by transferring a set of access control decisions conventionally handled by the Web Runtime system (WRT) to a more secure portion of the computing system, such as a kernel in the operating system. Access control rules are extracted and provided to the more secure portion. This may be performed during widget installation or at invocation of a widget. During runtime, the more secure portion performs security checking functions for the widget instead of the WRT.
摘要:
A system controls security during operation of a computerized device by enforcing a first security policy during first operational state of the computerized device. Enforcement of the first security policy provides a first level access to resources within the computerized device by processes operating in the computerized device. The system detects a transition operation of the computerized device that occurs during enforcement of the first security policy indicating that operation of the computerized device is transitioning from the first operational state to a second operational state and in response, enforces a second security policy corresponding to the second operational state to provide a level of access to the resources within the computerized device that corresponds to the second operational state during operation of the second operational state. This can be repeated for many different states including boot time, normal runtime, installation, shutdown, and a compromised state.
摘要:
A method for enabling data classification and′ or enforcement of Information Rights Management (IRM) capabilities and′or encryption in a software application according to which, an agent is installed on each terminal device that runs the application and a central management module which includes the IRM, encryption and classification policy to be enforced, communicates with agents that are installed on each terminal device. The central management module distributes the appropriate IRM and′or classification policy to each agent and applies the policy to any application that runs on the terminal device.
摘要:
A method for establishing a new cryptographic identity for an electronic device 2 comprises providing in the electronic device 2 at least one device key 62 for encryption or decryption of data or commands or for proving the identity of the electronic device 2 according to the new cryptographic identity; and uploading, to a public ledger 64 for tracking a chain of cryptographic identities established for said electronic device, information indicative of an identity of a stakeholder establishing the new cryptographic identity and an order in which the new cryptographic identity was established with respect to other cryptographic identities in said chain.
摘要:
Systems and methods for creating and managing per-application profiles are disclosed. A method may include receiving input designating at least a first profile policy and a second profile policy. At least a first application profile and a second application profile may be created based on the received first profile policy and the second profile policy. An application of the plurality of applications may be associated with both the first application profile and the second application profile. A first storage partition and a second storage partition may be created within a storage space of the computing device. The storage space may be associated with the application. The first storage partition may store application data while the application is running under the first application profile. The second storage partition may store application data while the application is running under the second application profile.
摘要:
When an application activation instruction is input, it is decided whether the application is expected to access a high-level protection resource or low-level protection resource (step S31). If the decision is affirmative, display is done to prompt the user to select whether to permit activation of the application (step S32). When the user inputs an activation permission instruction, the application is activated (steps S33 to S36). As a result, only when the user permits an application, which is expected to access a high-level protection resource or low-level protection resource, to access a predetermined resource immediately before its execution, the application is executed. Hence, the basic processing part and application can operate in cooperation with each other while limiting access to various kinds of resources by the application in a reasonable range.
摘要:
The present disclosure provides a method for protecting a dex file from being decompiled in an Android system. The method comprises the following content: 1) loading a dex file into an inaccessible memory of an Android system; and 2) during execution, by performing reference execution, preventing the dex file from being found. In the method for protecting a dex file from be ing decompiled in an Android system in the present disclosure, a dex file is loaded into an inaccessible memory by means of a reference method, so that the dex file is prevented from being locally downloaded tor being copied and propagated; during execution, by means of reference execution, a decompiling person is prevented from finding the dex file so that the decompiling person cannot perform reverse engineering, thereby protecting an Android program from being decompiled.