WO2010097090A3 - Controlled computer environment - Google Patents

Controlled computer environment Download PDF

Info

Publication number
WO2010097090A3
WO2010097090A3 PCT/DK2010/050049 DK2010050049W WO2010097090A3 WO 2010097090 A3 WO2010097090 A3 WO 2010097090A3 DK 2010050049 W DK2010050049 W DK 2010050049W WO 2010097090 A3 WO2010097090 A3 WO 2010097090A3
Authority
WO
WIPO (PCT)
Prior art keywords
computer
operating system
system environment
verification server
authorized
Prior art date
Application number
PCT/DK2010/050049
Other languages
French (fr)
Other versions
WO2010097090A2 (en
Inventor
Christian Horsdal Gammelgaard
Sven Skyum
Søren Pingel DALSGAARD
Aksel Byskov JØRGENSEN
Original Assignee
Aarhus Universitet
Mjølner Informatics A/S
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Aarhus Universitet, Mjølner Informatics A/S filed Critical Aarhus Universitet
Publication of WO2010097090A2 publication Critical patent/WO2010097090A2/en
Publication of WO2010097090A3 publication Critical patent/WO2010097090A3/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/125Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
    • G06F21/126Interacting with the operating system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2103Challenge-response
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment

Abstract

The present invention relates to an authorized operating system environment and ensuring that a computer is running the authorized operating system environment. The invention provides a method that improves the security of virtual machines. A computer operating in the authorized operating system environment is adapted to send notification signals to a verification server. The signal comprises information identifying the computer. In case the verification server fails to receive a valid notification signal from the computer within a specified time, the verification server will provide a fault indication. The invention also provides an associated operating system environment and other aspects.
PCT/DK2010/050049 2009-02-25 2010-02-25 Controlled computer environment WO2010097090A2 (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US15538709P 2009-02-25 2009-02-25
DKPA200900265 2009-02-25
US61/155,387 2009-02-25
DKPA200900265 2009-02-25

Publications (2)

Publication Number Publication Date
WO2010097090A2 WO2010097090A2 (en) 2010-09-02
WO2010097090A3 true WO2010097090A3 (en) 2010-11-25

Family

ID=42136018

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/DK2010/050049 WO2010097090A2 (en) 2009-02-25 2010-02-25 Controlled computer environment

Country Status (1)

Country Link
WO (1) WO2010097090A2 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150370584A1 (en) * 2013-01-17 2015-12-24 Hitachi, Ltd. Computer system and program

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1997009667A1 (en) * 1995-09-05 1997-03-13 Daniel Danielsson Method of monitoring a computer system
WO2000072119A2 (en) * 1999-05-05 2000-11-30 Rabin Michael O Methods and apparatus for protecting information
US20030009687A1 (en) * 2001-07-05 2003-01-09 Ferchau Joerg U. Method and apparatus for validating integrity of software
US20030097422A1 (en) * 2001-11-21 2003-05-22 Dave Richards System and method for provisioning software
US20040003286A1 (en) * 2002-07-01 2004-01-01 Microsoft Corporation Distributed threat management
US20040193873A1 (en) * 1999-12-10 2004-09-30 Paul England Client-side boot domains and boot rules
US20050183143A1 (en) * 2004-02-13 2005-08-18 Anderholm Eric J. Methods and systems for monitoring user, application or device activity
US20060080567A1 (en) * 2004-06-16 2006-04-13 Frank Liebenow Grid computing power mode systems and methods
US20070180509A1 (en) * 2005-12-07 2007-08-02 Swartz Alon R Practical platform for high risk applications
US20080082813A1 (en) * 2000-01-06 2008-04-03 Chow David Q Portable usb device that boots a computer as a server with security measure
WO2008046101A2 (en) * 2006-10-13 2008-04-17 Ariel Silverstone Client authentication and data management system
US20080134176A1 (en) * 2006-10-17 2008-06-05 Managelq, Inc. Enforcement of compliance policies in managed virtual systems
WO2009018366A1 (en) * 2007-08-01 2009-02-05 Signacert. Inc. Method and apparatus for lifecycle integrity verification of virtual machines

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1997009667A1 (en) * 1995-09-05 1997-03-13 Daniel Danielsson Method of monitoring a computer system
WO2000072119A2 (en) * 1999-05-05 2000-11-30 Rabin Michael O Methods and apparatus for protecting information
US20040193873A1 (en) * 1999-12-10 2004-09-30 Paul England Client-side boot domains and boot rules
US20080082813A1 (en) * 2000-01-06 2008-04-03 Chow David Q Portable usb device that boots a computer as a server with security measure
US20030009687A1 (en) * 2001-07-05 2003-01-09 Ferchau Joerg U. Method and apparatus for validating integrity of software
US20030097422A1 (en) * 2001-11-21 2003-05-22 Dave Richards System and method for provisioning software
US20040003286A1 (en) * 2002-07-01 2004-01-01 Microsoft Corporation Distributed threat management
US20050183143A1 (en) * 2004-02-13 2005-08-18 Anderholm Eric J. Methods and systems for monitoring user, application or device activity
US20060080567A1 (en) * 2004-06-16 2006-04-13 Frank Liebenow Grid computing power mode systems and methods
US20070180509A1 (en) * 2005-12-07 2007-08-02 Swartz Alon R Practical platform for high risk applications
WO2008046101A2 (en) * 2006-10-13 2008-04-17 Ariel Silverstone Client authentication and data management system
US20080134176A1 (en) * 2006-10-17 2008-06-05 Managelq, Inc. Enforcement of compliance policies in managed virtual systems
WO2009018366A1 (en) * 2007-08-01 2009-02-05 Signacert. Inc. Method and apparatus for lifecycle integrity verification of virtual machines

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
CROFT B ET AL: "RFC 951 - Boostrap protocol (BOOTP)", INTERNET CITATION, 30 September 1985 (1985-09-30), XP002193185, Retrieved from the Internet <URL:http://www.ietf.org/rfc/rfc951.txt> [retrieved on 20020314] *

Also Published As

Publication number Publication date
WO2010097090A2 (en) 2010-09-02

Similar Documents

Publication Publication Date Title
WO2011072054A3 (en) Systems and methods for identification and reporting of ad delivery hierarchy
WO2011122845A3 (en) Mobile communication terminal having a behavior-based malicious code detection function and detection method thereof
WO2010129474A3 (en) Security system and method including alert messages
WO2010093683A3 (en) Web content access using a client device identifier
WO2010135359A8 (en) Providing a local device with computing services from a remote host
WO2012154664A3 (en) Methods, systems, and computer readable media for detecting injected machine code
WO2013034278A3 (en) Method for paying with at least one electronic payment means key
WO2012058639A8 (en) Method and system for processing transactions using a token
WO2013113025A3 (en) Authenticating entities engaging in automated or electronic transactions or activities
WO2011037766A3 (en) Sensor based logistics system
GB2472169A (en) System and method for providing a system management command
GB2505601A (en) Credential authentication methods and systems
WO2012096791A3 (en) Methods and systems for distributing cryptographic data to authenticated recipients
CA2816970A1 (en) Using power fingerprinting (pfp) to monitor the integrity and enhance security of computer based systems
WO2011146917A3 (en) Apparatuses, systems and methods for determining installed software applications on a computing device
WO2010039788A3 (en) Processor boot security device and methods thereof
WO2010147837A3 (en) Enhanced presence detection for routing decisions
MX2014004105A (en) Information processing device, method and program.
WO2008063899A3 (en) Method for exchanging message and verifying the authenticity of the messages in an ad hoc network
WO2012015615A3 (en) Device, system, and method forlocation-based payment authorization
WO2010144796A3 (en) Integrated cyber network security system and method
WO2007087194A3 (en) System and method for the automated processing of physical objects
GB2497366B (en) Phishing processing method and system and computer readable storage medium applying the method
WO2008117550A1 (en) Software ic card system, management server, terminal, service providing server, service providing method, and program
WO2011006864A3 (en) Method for reading attributes from an id token and one-time pass word generator

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 10707435

Country of ref document: EP

Kind code of ref document: A2

122 Ep: pct application non-entry in european phase

Ref document number: 10707435

Country of ref document: EP

Kind code of ref document: A2