Method and system for preventing and detecting security threats

A technology for security, security software, applied in the field of security threats

Inactive Publication Date: 2015-02-04
IRDETO ACCESS
View PDF9 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This comes with performance limitations and functional limitations - for example, apps are blocked from accessing OS features and resources considered "dangerous"

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for preventing and detecting security threats
  • Method and system for preventing and detecting security threats
  • Method and system for preventing and detecting security threats

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] While applicable to any mobile phone, game console, tablet, set-top box, television, or other consumer electronic device, the embodiments described herein will be based on such an device. In particular, the preferred embodiments will be shown and described with respect to the Android® OS for illustrative purposes only and should not be construed to limit the intended scope of the present disclosure. In fact, some of the advantages described in terms of preventing the installation of rootkits or probing the weaknesses of the OS are generally applicable to any device OS where there is a risk to any open device due to the inherently greater security risks associated with such an open device. special use.

[0046] refer to Figure 2A -C, an overall layer diagram 200 of the Android™ OS environment showing the basic structure of the layered execution stack. Base layer 219 involves typical system-on-chip (SOC) components, including the central processing unit (CPU), graphic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A system and method is provided for implementing platform security on a consumer electronic device having an open development platform. The device is of the type which includes an abstraction layer operable between device hardware and application software. A secured software agent is provided for embedding within the abstraction layer forming the operating system. The secured software agent is configured to limit access to the abstraction layer by either blocking loadable kernel modules from loading, blocking writing to the system call table or blocking requests to attach debug utilities to certified applications or kernel components.

Description

technical field [0001] The present disclosure generally relates to preventing and detecting security threats to operating systems and authenticated applications running on electronic devices. Background technique [0002] Devices (or simply "devices") such as mobile phones, tablets, game consoles, set-top boxes, televisions, personal navigation devices, and other consumer electronics devices are commonly purchased by consumers from retail distribution channels (e.g., consumer electronics stores) Purchased or may be sold or leased to consumers through a service provider (or simply "operator") - for example, a mobile network operator, broadcast television network provider or Internet video provider. Traditionally, such devices have been closed or embedded devices that are based on proprietary hardware and operating systems and do not support third-party software applications. However, such devices have increasingly become open devices. It should be understood that "open" in ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
CPCG06F21/54G06F21/55
Inventor R.范德吉斯特
Owner IRDETO ACCESS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products