[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

GB201019980D0 - Security system & method - Google Patents

Security system & method

Info

Publication number
GB201019980D0
GB201019980D0 GBGB1019980.0A GB201019980A GB201019980D0 GB 201019980 D0 GB201019980 D0 GB 201019980D0 GB 201019980 A GB201019980 A GB 201019980A GB 201019980 D0 GB201019980 D0 GB 201019980D0
Authority
GB
United Kingdom
Prior art keywords
security system
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GBGB1019980.0A
Other versions
GB2475787A (en
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CLOUD TECHNOLOGY Ltd
Original Assignee
CLOUD TECHNOLOGY Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CLOUD TECHNOLOGY Ltd filed Critical CLOUD TECHNOLOGY Ltd
Publication of GB201019980D0 publication Critical patent/GB201019980D0/en
Publication of GB2475787A publication Critical patent/GB2475787A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Storage Device Security (AREA)
GB1019980A 2009-11-25 2010-11-25 Accessing remote data or programs via a shell application from a portable memory device running in a virtual machine on a PC Withdrawn GB2475787A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GBGB0920653.3A GB0920653D0 (en) 2009-11-25 2009-11-25 Security system and method

Publications (2)

Publication Number Publication Date
GB201019980D0 true GB201019980D0 (en) 2011-01-05
GB2475787A GB2475787A (en) 2011-06-01

Family

ID=41572668

Family Applications (2)

Application Number Title Priority Date Filing Date
GBGB0920653.3A Ceased GB0920653D0 (en) 2009-11-25 2009-11-25 Security system and method
GB1019980A Withdrawn GB2475787A (en) 2009-11-25 2010-11-25 Accessing remote data or programs via a shell application from a portable memory device running in a virtual machine on a PC

Family Applications Before (1)

Application Number Title Priority Date Filing Date
GBGB0920653.3A Ceased GB0920653D0 (en) 2009-11-25 2009-11-25 Security system and method

Country Status (2)

Country Link
GB (2) GB0920653D0 (en)
WO (1) WO2011064539A1 (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2497055B1 (en) * 2009-11-05 2018-07-18 Trusted Logic Secure portable object
GB2507497B (en) 2012-10-30 2015-01-14 Barclays Bank Plc Device and method for secure memory access
GB2507596B (en) 2012-10-30 2014-09-17 Barclays Bank Plc Secure computing device and method
US10922445B2 (en) * 2014-12-02 2021-02-16 Bankvault Pty Ltd Computing systems and methods
CN106415491B (en) * 2015-03-20 2020-01-21 华为技术有限公司 Application protection method, server and terminal
CN109324801B (en) * 2018-09-18 2022-04-12 华为云计算技术有限公司 Algorithm downloading method, equipment and related product

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7743409B2 (en) * 2005-07-08 2010-06-22 Sandisk Corporation Methods used in a mass storage device with automated credentials loading
US7913252B2 (en) * 2006-04-11 2011-03-22 Installfree, Inc. Portable platform for executing software applications in a virtual environment
CA2663098A1 (en) * 2006-09-11 2008-03-20 Commonwealth Scientific And Industrial Research Organisation A portable device for use in establishing trust
US8024790B2 (en) * 2007-04-11 2011-09-20 Trend Micro Incorporated Portable secured computing environment for performing online confidential transactions in untrusted computers
CN100555298C (en) * 2007-06-08 2009-10-28 北京飞天诚信科技有限公司 The method and apparatus of virtulizing personal office environment
US20090164775A1 (en) * 2007-12-19 2009-06-25 Andrew Holmes Broadband computer system
US9594581B2 (en) * 2008-07-14 2017-03-14 Dell Products L.P. Modular virtual machine server
US20100011358A1 (en) * 2008-07-14 2010-01-14 Kettler Kevin A Virtualization Based Personalizable Consumer Electronics Platform

Also Published As

Publication number Publication date
GB2475787A (en) 2011-06-01
WO2011064539A1 (en) 2011-06-03
GB0920653D0 (en) 2010-01-13

Similar Documents

Publication Publication Date Title
ZA201107620B (en) Security system and method
EP2432957A4 (en) Remote-activation lock system and method
GB2475706B (en) Surveillance system and method
GB201012605D0 (en) Method & system
SG10201404184TA (en) Desalination system and method
EP2618317A4 (en) Security system
PT2482460E (en) Locking system and method thereof
GB0904874D0 (en) Smartcard security system
EP2456719A4 (en) Desalination system and method
HK1148566A1 (en) Security system
GB201019980D0 (en) Security system & method
GB0903274D0 (en) Fluoreence method and system
EP2387012A4 (en) Security sensor system
HK1173256A1 (en) Security system
GB2466721B (en) Security system
PL2430591T3 (en) System and method for using the system
GB2475578B (en) Security system
GB201013454D0 (en) Security system
GB2470951B (en) Door security system
GB201504196D0 (en) Method and system
GB201009029D0 (en) Security systems
GB0913373D0 (en) Security system
GB0813825D0 (en) Sleeptight international security system
GB0820703D0 (en) Security system
GB201019807D0 (en) Security system, method & apparatus

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)