Abstract:
An information processing apparatus capable of non-interactively executing an application and an application execution method are disclosed. In response to an issuance request of an access control token, if a user type described in a definition file is included in user types defined in the information processing apparatus, the information processing apparatus issues an access control token in accordance with a user type and executes process by an application, in a case that the user type of the access control token is contained in the user types that have the execution authority for the process by the application.
Abstract:
In examples of the present invention, an executable seeks to access a data file. An executable identity based access control list is accessed to determine whether the executable should be allowed to access the data file.
Abstract:
Techniques for protecting resources of a client from theft or unauthorized access. A BIOS agent stores policy data within a BIOS of the client. The BIOS agent is one or more software modules operating in the BIOS of the client. The policy data describes one or more security policies which the client is to follow. In response to the client following at least one of the one or more security policies, a persistent storage medium of the client is locked by instructing a controller of the persistent storage medium to deny, to any entity, access to data stored on the persistent storage medium unless the entity supplies, to the controller, a recognized authentication credential. In this way, a malicious user without access to the recognized authentication credential cannot access the data stored on the persistent storage medium, even if the persistent storage medium is removed from the client.
Abstract:
A digital escrow pattern for data services can include selective access for obscured data at a remote site or in a cloud service, distributing trust across multiple entities to avoid a single point of data compromise. Based on the pattern, a "trustworthy envelope" for any kind of payload enables curtained access through a variety of decorations or seals placed on the envelope that allow for a gamut of trust ranging with guarantees such as, but not limited to, confidentiality, privacy, anonymity, tamper detection, integrity, etc. For instance, XML tags can be applied or augmented to create trust envelopes for structured XML data. Some examples of mathematical transformations or 'decorations' that can be applied to the XML data include, but are not limited to, size-preserving encryption, searchable-encryption, or Proof(s) of Application, blind fingerprints, Proof(s) of Retrievability, etc.
Abstract:
Virtuelle Maschinen werden bei der Nutzung von verteilten Rechnerinfrastrukturen eingesetzt, um die Rechenlast möglichst flexibel auf die einzelnen Rechner verteilen zu können. Hierbei besteht ein Bedarf durch regulative oder administrative Vorgaben gewünschte Beschränkungen für den Einsatz der virtuellen Maschinen robust durchsetzen zu können. Die vorliegende Erfindung schafft ein Verfahren, mit dem der Schutz einer virtuellen Maschine bei deren Migration, Speicherung oder Betrieb mittels einer digitalen Rechteverwaltung und Verschlüsselung umgesetzt wird. Hierzu wird der Hypervisor bzw. der Virtual Machine Monitor, sowie die virtuelle Maschine um entsprechende Funktionalitäten erweitert.
Abstract:
The present invention relates to a method for detecting use of unauthorized software in an engine control unit provided in a vehicle, said method comprising the steps of: calculating CVN each time the engine is started, comparing a last calculated CVN with a last stored CVN in a list of a plurality of CVN entries, storing said last calculated CVN if said last calculated CVN is different to the last stored CVN together with a date of an entry in said list of CVN and/or the current odometer status, removing entries in the list of CVN according to FIFO principle when said list of CVN is full, and to present this upon request from an on-board or off-board tool.
Abstract:
A system and method of secure copy and/or playback control of a usage protected frame-based work is disclosed. The method includes accessing serial copy management system information for the usage protected frame-based work. In addition, the method validates the serial copy management system information. Copy management information of the usage protected frame-based work is also accessed. In so doing, the copy management information is utilized to determine if a secure copy/playback application is authorized to generate a copy of the usage protected frame-based work. Thus the copy management information acts as a technological measure which "effectively controls access to a work" by requiring the application of information, with the authority of the copyright owner, to gain access to the work.
Abstract:
An electronic device may be reported as potentially compromised (e.g., by a user or by the electronic device itself). An instruction to initiate remediation of the electronic device may be queued. Upon reaching the end of the queue, the instruction is transmitted to the electronic device to initiate remediation of the electronic device. The instruction is received by the electronic device. The remediation policy is performed, which may include performing operations such as deleting an encryption key, deleting data, disabling a login capability, disabling a boot up functionality, disabling a function associated with the electronic device, transmitting data from the electronic device, transmitting a message from the electronic device, or generating information that indicates of a user of the electronic device.