-
公开(公告)号:US09602520B2
公开(公告)日:2017-03-21
申请号:US14932877
申请日:2015-11-04
Applicant: Apple Inc.
Inventor: Oliver J. Hunt , Ivan Krstic
CPC classification number: H04L63/1408 , H04L63/1466 , H04L67/02
Abstract: Methods and apparatus are disclosed for detecting illegitimate or spoofed links on a web page. Illegitimate links can be detected by receiving a web link that includes link text and a link address, generating normalized link text based upon the link text, wherein characters in the link text that are visually similar are represented by a single normalized character identifier in the normalized text, determining whether the normalized link text is in the format of a link address, and determining that the text is safe when the normalized link text is not in the format of a link address. The techniques disclosed herein further involve determining whether the normalized link text matches the link address, determining that the text is safe when the normalized link text matches the link address, and determining that the text is unsafe when the normalized link text does not match the link address.
-
公开(公告)号:US20190272159A1
公开(公告)日:2019-09-05
申请号:US16147336
申请日:2018-09-28
Applicant: Apple Inc.
Inventor: Filip J. Pizlo , Oliver J. Hunt
Abstract: One embodiment provides for a computer-implemented method comprising receiving a request to compile a set of program instructions coded in a high-level language, the set of program instructions including a pointer to a virtual memory address, the pointer having a pointer encoding including a base address and a length; while compiling the set of program instructions, decoding the base address and length from the pointer, wherein the base address specifies a first boundary for a memory allocation, the length defines a second boundary for the memory allocation and the length is an encoding of a size of the memory allocation; and generating a set of compiled instructions which, when executed, enable access to a physical address associated with a virtual address between the first boundary and the second boundary.
-
公开(公告)号:US11025596B1
公开(公告)日:2021-06-01
申请号:US15907468
申请日:2018-02-28
Applicant: Apple Inc.
Inventor: Benoit Chevallier-Mames , Thomas Icart , Mathieu Ciet , Oliver J. Hunt , Yannick Sierra , Gokul Thirumalai , Roberto Garcia
Abstract: Data items such as files or database records associated with particular applications (such as messaging applications and other applications) can be stored in one or more remote locations, such as a cloud storage system, and synchronized with other devices. The remote storage can be configured such that each application executing on a client device can only view data items stored at the remote location to which the application has permission to access. An access manager on each client device enforces application specific access policies. Storage at the remote location can be secured for each application associated with a user or user account, for example, using isolated containers. The cloud storage of data can be anonymized and anonymous group data can be stored in the cloud storage.
-
公开(公告)号:US10303885B2
公开(公告)日:2019-05-28
申请号:US15275000
申请日:2016-09-23
Applicant: Apple Inc.
Inventor: Gregory D. Hughes , Ivan Krstic , Oliver J. Hunt
Abstract: Methods and systems for securely executing untrusted software are described. In one embodiment, two virtual memory mappings are used (one readable/writeable-RW and the other readable/executable-RX). In one embodiment, compiled software is used at run time through pointers to the RX virtual memory space and a compiler causes the storage of the compiled software in the RW virtual memory space through the use of an executable function (e.g. a memory copy like function) stored in an executable only memory region.
-
公开(公告)号:US09203849B2
公开(公告)日:2015-12-01
申请号:US14097140
申请日:2013-12-04
Applicant: Apple Inc.
Inventor: Oliver J. Hunt , Ivan Krstic
IPC: H04L29/06
CPC classification number: H04L63/1408 , H04L63/1466 , H04L67/02
Abstract: Methods and apparatus are disclosed for detecting illegitimate or spoofed links on a web page. Illegitimate links can be detected by receiving a web link that includes link text and a link address, generating normalized link text based upon the link text, wherein characters in the link text that are visually similar are represented by a single normalized character identifier in the normalized text, determining whether the normalized link text is in the format of a link address, and determining that the text is safe when the normalized link text is not in the format of a link address. The techniques disclosed herein further involve determining whether the normalized link text matches the link address, determining that the text is safe when the normalized link text matches the link address, and determining that the text is unsafe when the normalized link text does not match the link address.
Abstract translation: 公开了用于检测网页上的非法或欺骗性链接的方法和装置。 可以通过接收包括链接文本和链接地址的网络链接来检测非法链接,基于链接文本生成规范化的链接文本,其中在视觉上相似的链接文本中的字符由归一化的标准化字符标识符 确定标准化链接文本是否是链接地址的格式,并且当标准化链接文本不是链接地址的格式时确定文本是安全的。 本文公开的技术还涉及确定归一化链接文本是否与链接地址匹配,当标准化链接文本与链接地址匹配时确定文本是安全的,并且当标准化链接文本与链接不匹配时确定文本是不安全的 地址。
-
公开(公告)号:US10713021B2
公开(公告)日:2020-07-14
申请号:US16147336
申请日:2018-09-28
Applicant: Apple Inc.
Inventor: Filip J. Pizlo , Oliver J. Hunt
Abstract: One embodiment provides for a computer-implemented method comprising receiving a request to compile a set of program instructions coded in a high-level language, the set of program instructions including a pointer to a virtual memory address, the pointer having a pointer encoding including a base address and a length; while compiling the set of program instructions, decoding the base address and length from the pointer, wherein the base address specifies a first boundary for a memory allocation, the length defines a second boundary for the memory allocation and the length is an encoding of a size of the memory allocation; and generating a set of compiled instructions which, when executed, enable access to a physical address associated with a virtual address between the first boundary and the second boundary.
-
公开(公告)号:US20150156210A1
公开(公告)日:2015-06-04
申请号:US14097140
申请日:2013-12-04
Applicant: Apple Inc.
Inventor: Oliver J. Hunt , Ivan Krstic
IPC: H04L29/06
CPC classification number: H04L63/1408 , H04L63/1466 , H04L67/02
Abstract: Methods and apparatus are disclosed for detecting illegitimate or spoofed links on a web page. Illegitimate links can be detected by receiving a web link that includes link text and a link address, generating normalized link text based upon the link text, wherein characters in the link text that are visually similar are represented by a single normalized character identifier in the normalized text, determining whether the normalized link text is in the format of a link address, and determining that the text is safe when the normalized link text is not in the format of a link address. The techniques disclosed herein further involve determining whether the normalized link text matches the link address, determining that the text is safe when the normalized link text matches the link address, and determining that the text is unsafe when the normalized link text does not match the link address.
Abstract translation: 公开了用于检测网页上的非法或欺骗性链接的方法和装置。 可以通过接收包括链接文本和链接地址的网络链接来检测非法链接,基于链接文本生成规范化的链接文本,其中在视觉上相似的链接文本中的字符由归一化的标准化字符标识符 确定标准化链接文本是否是链接地址的格式,并且当标准化链接文本不是链接地址的格式时确定文本是安全的。 本文公开的技术还涉及确定归一化链接文本是否与链接地址匹配,当标准化链接文本与链接地址匹配时确定文本是安全的,并且当标准化链接文本与链接不匹配时确定该文本是不安全的 地址。
-
公开(公告)号:US12001579B1
公开(公告)日:2024-06-04
申请号:US17302539
申请日:2021-05-05
Applicant: Apple Inc.
Inventor: Benoit Chevallier-Mames , Thomas Icart , Mathieu Ciet , Oliver J. Hunt , Yannick Sierra , Gokul Thirumalai , Roberto Garcia
IPC: H04L9/40 , G06F16/174 , G06F21/62 , H04L9/08 , H04L9/14 , H04L9/30 , H04L9/32 , H04L51/04 , H04L51/08 , H04L67/1095 , H04L67/1097 , H04W12/02 , H04W12/04
CPC classification number: G06F21/6227 , G06F16/1752 , G06F21/6218 , H04L9/0847 , H04L9/14 , H04L9/30 , H04L9/3242 , H04L9/3247 , H04L9/3273 , H04L51/04 , H04L51/08 , H04L63/0428 , H04L63/0478 , H04L63/065 , H04L63/123 , H04L63/126 , H04L67/1095 , H04L67/1097 , H04W12/02 , H04W12/04
Abstract: Data items such as files or database records associated with particular applications (such as messaging applications and other applications) can be stored in one or more remote locations, such as a cloud storage system, and synchronized with other devices. The remote storage can be configured such that each application executing on a client device can only view data items stored at the remote location to which the application has permission to access. An access manager on each client device enforces application specific access policies. Storage at the remote location can be secured for each application associated with a user or user account, for example, using isolated containers. The cloud storage of data can be anonymized and anonymous group data can be stored in the cloud storage.
-
公开(公告)号:US20170255780A1
公开(公告)日:2017-09-07
申请号:US15275000
申请日:2016-09-23
Applicant: Apple Inc.
Inventor: Gregory D. Hughes , Ivan Krstic , Oliver J. Hunt
CPC classification number: G06F21/575 , G06F3/0622 , G06F3/0631 , G06F3/0634 , G06F3/065 , G06F9/4552 , G06F12/10 , G06F21/53 , G06F2212/1052 , G06F2221/033
Abstract: Methods and systems for securely executing untrusted software are described. In one embodiment, two virtual memory mappings are used (one readable/writeable-RW and the other readable/executable-RX). In one embodiment, compiled software is used at run time through pointers to the RX virtual memory space and a compiler causes the storage of the compiled software in the RW virtual memory space through the use of an executable function (e.g. a memory copy like function) stored in an executable only memory region.
-
-
-
-
-
-
-
-