Movatterモバイル変換


[0]ホーム

URL:


US20170132430A1 - Apparatus for and Method of Preventing Unsecured Data Access - Google Patents

Apparatus for and Method of Preventing Unsecured Data Access
Download PDF

Info

Publication number
US20170132430A1
US20170132430A1US14/762,282US201514762282AUS2017132430A1US 20170132430 A1US20170132430 A1US 20170132430A1US 201514762282 AUS201514762282 AUS 201514762282AUS 2017132430 A1US2017132430 A1US 2017132430A1
Authority
US
United States
Prior art keywords
domain
file
data
trusted
domains
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US14/762,282
Inventor
Neil Sikka
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by IndividualfiledCriticalIndividual
Priority to US14/762,282priorityCriticalpatent/US20170132430A1/en
Publication of US20170132430A1publicationCriticalpatent/US20170132430A1/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

Shown and depicted is preventing sensitive data from being exfiltrated from an organization using hypervisors. A Data Loss Prevention system is composed using virtual machines or domains to segment memory between domains which are assumed to be untrusted and domains which are known to be trusted. Sensitive data is cypher text when observed by software in Untrusted Domains, and clear text when observed by software in Trusted Domains. Sensitive data is unencrypted when it is in the address space of a protected process running inside a trusted domain.

Description

Claims (20)

US14/762,2822014-07-152015-06-17Apparatus for and Method of Preventing Unsecured Data AccessAbandonedUS20170132430A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US14/762,282US20170132430A1 (en)2014-07-152015-06-17Apparatus for and Method of Preventing Unsecured Data Access

Applications Claiming Priority (3)

Application NumberPriority DateFiling DateTitle
US201462024630P2014-07-152014-07-15
US14/762,282US20170132430A1 (en)2014-07-152015-06-17Apparatus for and Method of Preventing Unsecured Data Access
PCT/US2015/036123WO2016010665A1 (en)2014-07-152015-06-17Apparatus for and method of preventing unsecured data access

Publications (1)

Publication NumberPublication Date
US20170132430A1true US20170132430A1 (en)2017-05-11

Family

ID=55078908

Family Applications (3)

Application NumberTitlePriority DateFiling Date
US14/762,282AbandonedUS20170132430A1 (en)2014-07-152015-06-17Apparatus for and Method of Preventing Unsecured Data Access
US14/885,412Active2036-02-20US9934407B2 (en)2014-07-152015-10-16Apparatus for and method of preventing unsecured data access
US15/067,311AbandonedUS20160196449A1 (en)2014-07-152016-03-11Apparatus for and Method of Preventing Unsecured Data Access

Family Applications After (2)

Application NumberTitlePriority DateFiling Date
US14/885,412Active2036-02-20US9934407B2 (en)2014-07-152015-10-16Apparatus for and method of preventing unsecured data access
US15/067,311AbandonedUS20160196449A1 (en)2014-07-152016-03-11Apparatus for and Method of Preventing Unsecured Data Access

Country Status (2)

CountryLink
US (3)US20170132430A1 (en)
WO (1)WO2016010665A1 (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20170249465A1 (en)*2016-02-252017-08-31Red Hat Israel, Ltd.Host-driven application memory protection for virtual machines
US10152350B2 (en)*2016-07-012018-12-11Intel CorporationSecure domain manager
US20180375833A1 (en)*2015-12-152018-12-27Vmware, Inc.Techniques for communication in hybrid cloud system
US10592215B1 (en)*2017-08-172020-03-17NanoVMs, Inc.Unikernel cross-compilation
US10628177B1 (en)2018-04-112020-04-21NanoVMs, Inc.Unikernel provisioning
US11409619B2 (en)2020-04-292022-08-09The Research Foundation For The State University Of New YorkRecovering a virtual machine after failure of post-copy live migration
US11989569B2 (en)2018-04-112024-05-21NanoVMs, Inc.Unikernel provisioning

Families Citing this family (22)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9729572B1 (en)*2015-03-312017-08-08Juniper Networks, Inc.Remote remediation of malicious files
DE112016006178T5 (en)*2016-01-082018-09-20Hewlett-Packard Development Company, L.P. Startup modification
US12339979B2 (en)*2016-03-072025-06-24Crowdstrike, Inc.Hypervisor-based interception of memory and register accesses
US10460087B2 (en)2016-08-182019-10-29Telefonaktiebolaget Lm Ericsson (Publ)Method and apparatus to secure and protect data-centers and generalized utility-based cloud computing environments from uninvited guests in the form of both hardware and software
US10360402B2 (en)2016-11-152019-07-23International Business Machines CorporationIntercepting sensitive data using hashed candidates
US10169028B2 (en)*2016-12-132019-01-01Ciena CorporationSystems and methods for on demand applications and workflow management in distributed network functions virtualization
US10289844B2 (en)*2017-01-192019-05-14International Business Machines CorporationProtecting backup files from malware
EP3602377A1 (en)2017-03-302020-02-05McAfee, LLCSecure software defined storage
WO2018208669A1 (en)2017-05-082018-11-15KnowBe4, Inc.Systems and methods for providing user interfaces based on actions associated with untrusted emails
US10439987B2 (en)2017-06-122019-10-08Ca, Inc.Systems and methods for securing network traffic flow in a multi-service containerized application
US10157290B1 (en)*2017-10-112018-12-18Symantec CorporationSystems and methods for encrypting files
US10963349B2 (en)*2017-08-252021-03-30Vmware, Inc.Containerized application snapshots
CN108170516A (en)*2018-01-032018-06-15浪潮(北京)电子信息产业有限公司Create method, apparatus, equipment and the computer readable storage medium of vTPM
CN108985083A (en)*2018-07-122018-12-11江苏慧学堂系统工程有限公司A kind of Computer Data Security management system and method
US11429753B2 (en)*2018-09-272022-08-30Citrix Systems, Inc.Encryption of keyboard data to avoid being read by endpoint-hosted keylogger applications
GB2581161A (en)*2019-02-052020-08-12Trustonic LtdSoftware encryption
US20200326892A1 (en)*2019-04-102020-10-15Microsoft Technology Licensing, LlcMethods for encrypting and updating virtual disks
US11526613B2 (en)*2019-07-032022-12-13Microsoft Technology Licensing, LlcExecution environment and gatekeeper arrangement
CN111159716B (en)*2019-12-242022-03-25联想(北京)有限公司Safety protection method and electronic equipment
WO2021247390A1 (en)2020-06-012021-12-09Opswat Inc.Unidirectional gateway mediated delivery of data messages
WO2021247402A1 (en)2020-06-012021-12-09Opswat Inc.Unidirectional gateway mediated multiplexing of concurrent data message streams
US20240202289A1 (en)*2022-12-142024-06-20Advanced Micro Devices, Inc.Using Ownership Identifiers in Metadata in a Memory for Protecting Encrypted Data Stored in the Memory

Citations (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20110141124A1 (en)*2009-12-142011-06-16David HallsMethods and systems for securing sensitive information using a hypervisor-trusted client
US20140229739A1 (en)*2013-02-122014-08-14Amazon Technologies, Inc.Delayed data access

Family Cites Families (28)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8695066B1 (en)*2000-05-092014-04-08Paul ClarkSystem and method for secure communication between domains
US20030212604A1 (en)2002-05-092003-11-13Cullen Andrew A.System and method for enabling and maintaining vendor qualification
US7103914B2 (en)*2002-06-172006-09-05Bae Systems Information Technology LlcTrusted computer system
US7694328B2 (en)2003-10-212010-04-06Google Inc.Systems and methods for secure client applications
JP5203969B2 (en)*2006-01-172013-06-05キダロ (イスラエル) リミテッド Securing data in a networked environment
US8151262B2 (en)2007-03-302012-04-03Lenovo (Singapore) Pte. Ltd.System and method for reporting the trusted state of a virtual machine
US8661552B2 (en)2007-06-282014-02-25Microsoft CorporationProvisioning a computing system for digital rights management
US8918865B2 (en)*2008-01-222014-12-23Wontok, Inc.System and method for protecting data accessed through a network connection
WO2009125830A1 (en)2008-04-102009-10-15日本電気株式会社Information leak prevention device, and method and program thereof
US20090300599A1 (en)2008-05-302009-12-03Matthew Thomas PiotrowskiSystems and methods of utilizing virtual machines to protect computer systems
US8315760B2 (en)2008-12-032012-11-20Mitchell Repair Information Company LLCMethod and system for retrieving diagnostic information
US8868925B2 (en)*2008-12-092014-10-21Nvidia CorporationMethod and apparatus for the secure processing of confidential content within a virtual machine of a processor
US8135964B2 (en)*2008-12-092012-03-13Nvidia CorporationApparatus, system, method, and computer program product for executing a program utilizing a processor to generate keys for decrypting content
US8738932B2 (en)2009-01-162014-05-27Teleputers, LlcSystem and method for processor-based security
US8391494B1 (en)*2009-02-262013-03-05Symantec CorporationSystems and methods for protecting enterprise rights management keys
US8850428B2 (en)*2009-11-122014-09-30Trustware International LimitedUser transparent virtualization method for protecting computer programs and data from hostile code
US8977842B1 (en)2010-02-052015-03-10Symantec CorporationHypervisor enabled secure inter-container communications
US8869300B2 (en)2010-05-102014-10-21Citrix Sytems, Inc.Redirection of information from secure virtual machines to unsecure virtual machines
US8972980B2 (en)2010-05-282015-03-03Bromium, Inc.Automated provisioning of secure virtual execution environment using virtual machine templates based on requested activity
US9239909B2 (en)2012-01-252016-01-19Bromium, Inc.Approaches for protecting sensitive data within a guest operating system
US8752047B2 (en)2010-05-282014-06-10Bromium, Inc.Automated management of virtual machines to process untrusted data based on client policy information
US8839239B2 (en)2010-06-152014-09-16Microsoft CorporationProtection of virtual machines executing on a host device
US8584211B1 (en)*2011-05-182013-11-12Bluespace Software CorporationServer-based architecture for securely providing multi-domain applications
US8813240B1 (en)*2012-05-302014-08-19Google Inc.Defensive techniques to increase computer security
US8656482B1 (en)2012-08-202014-02-18Bitdefender IPR Management Ltd.Secure communication using a trusted virtual machine
US9389898B2 (en)*2012-10-022016-07-12Ca, Inc.System and method for enforcement of security controls on virtual machines throughout life cycle state changes
US9069766B2 (en)*2012-11-022015-06-30Microsoft Technology Licensing, LlcContent-based isolation for computing device security
CN105389513B (en)2015-11-262018-10-12华为技术有限公司A kind of credible execution method and apparatus of virtual credible platform module vTPM

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20110141124A1 (en)*2009-12-142011-06-16David HallsMethods and systems for securing sensitive information using a hypervisor-trusted client
US20140229739A1 (en)*2013-02-122014-08-14Amazon Technologies, Inc.Delayed data access

Cited By (11)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20180375833A1 (en)*2015-12-152018-12-27Vmware, Inc.Techniques for communication in hybrid cloud system
US10708232B2 (en)*2015-12-152020-07-07Vmware, Inc.Techniques for communication in hybrid cloud system
US20170249465A1 (en)*2016-02-252017-08-31Red Hat Israel, Ltd.Host-driven application memory protection for virtual machines
US10073710B2 (en)*2016-02-252018-09-11Red Hat Israel, Ltd.Host-driven application memory protection for virtual machines
US10152350B2 (en)*2016-07-012018-12-11Intel CorporationSecure domain manager
US10592215B1 (en)*2017-08-172020-03-17NanoVMs, Inc.Unikernel cross-compilation
US10628177B1 (en)2018-04-112020-04-21NanoVMs, Inc.Unikernel provisioning
US11061695B2 (en)2018-04-112021-07-13NanoVMs, Inc.Unikernel provisioning
US11989569B2 (en)2018-04-112024-05-21NanoVMs, Inc.Unikernel provisioning
US11409619B2 (en)2020-04-292022-08-09The Research Foundation For The State University Of New YorkRecovering a virtual machine after failure of post-copy live migration
US11983079B2 (en)2020-04-292024-05-14The Research Foundation For The State University Of New YorkRecovering a virtual machine after failure of post-copy live migration

Also Published As

Publication numberPublication date
US20160196449A1 (en)2016-07-07
WO2016010665A1 (en)2016-01-21
US9934407B2 (en)2018-04-03
US20160034702A1 (en)2016-02-04
WO2016010665A8 (en)2016-03-24

Similar Documents

PublicationPublication DateTitle
US9934407B2 (en)Apparatus for and method of preventing unsecured data access
JP7121112B2 (en) secure storage device
CN109923522B (en) anonymous container
US11163878B2 (en)Integrity, theft protection and cyber deception using a deception-based filesystem
US9246948B2 (en)Systems and methods for providing targeted data loss prevention on unmanaged computing devices
EP3111364B1 (en)Systems and methods for optimizing scans of pre-installed applications
US9319380B2 (en)Below-OS security solution for distributed network endpoints
US9575790B2 (en)Secure communication using a trusted virtual machine
US7506170B2 (en)Method for secure access to multiple secure networks
US9424430B2 (en)Method and system for defending security application in a user's computer
US10037429B1 (en)Copy protection for secured files
Tandon et al.A comprehensive survey on ransomware attack: A growing havoc cyberthreat
US20150019864A1 (en)Secure Virtual Machine
US11755753B2 (en)Mechanism to enable secure memory sharing between enclaves and I/O adapters
US11909735B2 (en)Multi-cloud framework for authentication of data requests
US9135436B2 (en)Execution stack securing process
DalzielHow to defeat advanced malware: new tools for protection and forensics
Banga et al.Trustworthy computing for the cloud-mobile era: A leap forward in systems architecture
Reza Memarian et al.Applications of trusted computing in cloud context
US10911486B1 (en)Systems and methods for utilizing custom tagging to protect against phishing attacks from malicious applications
HK40018996A (en)Secure storage device and computer security method
HalseyKeeping You, Your Files, and Your Computer Safe

Legal Events

DateCodeTitleDescription
STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp