Methods for configuring security restrictions of a data processing system

    公开(公告)号:US10754931B2

    公开(公告)日:2020-08-25

    申请号:US15001085

    申请日:2016-01-19

    Applicant: Apple Inc.

    Abstract: According to one embodiment, a security manager of a first operating system executed by a processor of a data processing system receives a request received from an application to modify a security settings of the data processing system. In response to the request, the data processing system is restarted into a second operating system, where the second operating system includes functionalities that are fewer than the first operating system. The security settings of the data processing system is modified within the second operating system. After the security settings of the data processing system has been modified, the data processing is rebooted back to the first operating system. A security measure within the first operating system is enforced based on the modified security settings.

    METHODS FOR RESTRICTING RESOURCES USED BY A PROGRAM BASED ON ENTITLEMENTS
    2.
    发明申请
    METHODS FOR RESTRICTING RESOURCES USED BY A PROGRAM BASED ON ENTITLEMENTS 审中-公开
    用于限制基于实施的程序使用的资源的方法

    公开(公告)号:US20130283344A1

    公开(公告)日:2013-10-24

    申请号:US13922188

    申请日:2013-06-19

    Applicant: Apple Inc.

    Abstract: In response to a request for launching a program, a list of one or more application frameworks to be accessed by the program during execution of the program is determined. Zero or more entitlements representing one or more resources entitled by the program during the execution are determined. A set of one or more rules based on the entitlements of the program is obtained from at least one of the application frameworks. The set of one or more rules specifies one or more constraints of resources associated with the at least one application framework. A security profile is dynamically compiled for the program based on the set of one or more rules associated with the at least one application framework. The compiled security profile is used to restrict the program from accessing at least one resource of the at least one application frameworks during the execution of the program.

    Abstract translation: 响应于启动程序的请求,确定在程序执行期间由程序访问的一个或多个应用程序框架的列表。 确定在执行期间表示由程序授权的一个或多个资源的零个或多个授权。 从应用程序框架中的至少一个获得基于程序的权利的一组或多个规则。 所述一个或多个规则的集合指定与所述至少一个应用框架相关联的资源的一个或多个约束。 基于与所述至少一个应用框架相关联的一个或多个规则的集合,为所述程序动态地编译安全简档。 编译的安全简档用于在程序执行期间限制程序访问至少一个应用程序框架的至少一个资源。

    Restricted resource classes of an operating system

    公开(公告)号:US11100242B2

    公开(公告)日:2021-08-24

    申请号:US14292705

    申请日:2014-05-30

    Applicant: Apple Inc.

    Abstract: Techniques for access control of a data processing system are described. In one embodiment, in response to a request from an application for accessing a resource of a data processing system, it is determined a first class of resources the requested resource belongs. A second class of resources the application is entitled to access is determined based on a resource entitlement encoded within the application and authorized by a predetermined authority. The application is allowed to access the resource if the first class and the second class of resources are matched. The application is denied from accessing the resource if the first class and the second class are not matched, regardless an operating privilege level of the application.

    Methods for restricting resources used by a program based on entitlements

    公开(公告)号:US11055438B2

    公开(公告)日:2021-07-06

    申请号:US15060837

    申请日:2016-03-04

    Applicant: Apple Inc.

    Abstract: In response to a request for launching a program, a list of one or more application frameworks to be accessed by the program during execution of the program is determined. Zero or more entitlements representing one or more resources entitled by the program during the execution are determined. A set of one or more rules based on the entitlements of the program is obtained from at least one of the application frameworks. The set of one or more rules specifies one or more constraints of resources associated with the at least one application framework. A security profile is dynamically compiled for the program based on the set of one or more rules associated with the at least one application framework. The compiled security profile is used to restrict the program from accessing at least one resource of the at least one application frameworks during the execution of the program.

    Storage volume protection using restricted resource classes

    公开(公告)号:US10032041B2

    公开(公告)日:2018-07-24

    申请号:US14874224

    申请日:2015-10-02

    Applicant: Apple Inc.

    Abstract: Techniques for restricting access to a storage volume attached to a data processing system are described. In one embodiment, a storage management and access control logic in the data processing system can receive a message indicating the attachment of a storage volume. The logic can apply access restrictions to the storage volume by creating an association between a restricted resource class and the storage volume to limit programmatic access to the storage volume. An evaluation of the storage volume can be requested and based on the result of the evaluation the access restrictions can be removed or retained on the storage volume.

    STORAGE VOLUME PROTECTION USING RESTRICTED RESOURCE CLASSES
    7.
    发明申请
    STORAGE VOLUME PROTECTION USING RESTRICTED RESOURCE CLASSES 审中-公开
    使用限制资源类别进行储存容量保护

    公开(公告)号:US20160357983A1

    公开(公告)日:2016-12-08

    申请号:US14874224

    申请日:2015-10-02

    Applicant: Apple Inc.

    CPC classification number: G06F21/6218 G06F9/545

    Abstract: Techniques for restricting access to a storage volume attached to a data processing system are described. In one embodiment, a storage management and access control logic in the data processing system can receive a message indicating the attachment of a storage volume. The logic can apply access restrictions to the storage volume by creating an association between a restricted resource class and the storage volume to limit programmatic access to the storage volume. An evaluation of the storage volume can be requested and based on the result of the evaluation the access restrictions can be removed or retained on the storage volume.

    Abstract translation: 描述了用于限制对连接到数据处理系统的存储卷的访问的技术。 在一个实施例中,数据处理系统中的存储管理和访问控制逻辑可以接收指示存储卷的附着的消息。 逻辑可以通过创建受限资源类和存储卷之间的关联来限制对存储卷的访问限制,以限制对存储卷的编程访问。 可以请求对存储卷的评估,并且基于评估结果,访问限制可被移除或保留在存储卷上。

    METHODS FOR CONFIGURING SECURITY RESTRICTIONS OF A DATA PROCESSING SYSTEM
    8.
    发明申请
    METHODS FOR CONFIGURING SECURITY RESTRICTIONS OF A DATA PROCESSING SYSTEM 审中-公开
    用于配置数据处理系统的安全限制的方法

    公开(公告)号:US20160357950A1

    公开(公告)日:2016-12-08

    申请号:US15001085

    申请日:2016-01-19

    Applicant: Apple Inc.

    CPC classification number: G06F21/126 G06F21/575 G06F21/6281 G06F2221/2105

    Abstract: According to one embodiment, a security manager of a first operating system executed by a processor of a data processing system receives a request received from an application to modify a security settings of the data processing system. In response to the request, the data processing system is restarted into a second operating system, where the second operating system includes functionalities that are fewer than the first operating system. The security settings of the data processing system is modified within the second operating system. After the security settings of the data processing system has been modified, the data processing is rebooted back to the first operating system. A security measure within the first operating system is enforced based on the modified security settings.

    Abstract translation: 根据一个实施例,由数据处理系统的处理器执行的第一操作系统的安全管理器接收从应用程序接收到的修改数据处理系统的安全设置的请求。 响应于该请求,数据处理系统重新启动到第二操作系统中,其中第二操作系统包括少于第一操作系统的功能。 在第二操作系统内修改数据处理系统的安全设置。 在数据处理系统的安全设置被修改之后,数据处理被重新引导回到第一操作系统。 第一个操作系统中的安全措施是基于修改后的安全设置实施的。

    METHODS FOR RESTRICTING RESOURCES USED BY A PROGRAM BASED ON ENTITLEMENTS

    公开(公告)号:US20160321471A1

    公开(公告)日:2016-11-03

    申请号:US15060837

    申请日:2016-03-04

    Applicant: Apple Inc.

    Abstract: In response to a request for launching a program, a list of one or more application frameworks to be accessed by the program during execution of the program is determined. Zero or more entitlements representing one or more resources entitled by the program during the execution are determined. A set of one or more rules based on the entitlements of the program is obtained from at least one of the application frameworks. The set of one or more rules specifies one or more constraints of resources associated with the at least one application framework. A security profile is dynamically compiled for the program based on the set of one or more rules associated with the at least one application framework. The compiled security profile is used to restrict the program from accessing at least one resource of the at least one application frameworks during the execution of the program.

Patent Agency Ranking