-
公开(公告)号:US20200081847A1
公开(公告)日:2020-03-12
申请号:US16564502
申请日:2019-09-09
Applicant: Apple Inc.
Inventor: Julien Oster , Thomas G. Holland , Bernard J. Semeria , Jason A. Harmening , Pierre-Olivier J. Martel , Gregory D. Hughes , P. Love Hornquist Astrand , Jacques Fortier , Ryan P. Nielson , Simon P. Cooper
IPC: G06F12/1009 , G06F21/62 , G06F9/455
Abstract: In an embodiment, a computer system comprises a page protection layer. The page protection layer may be the component in the system which manages the page tables for virtual to physical page mappings. Transactions to the page protection layer are used to create/manage mappings created in the page tables. The page protection layer may enforce dynamic security policies in the system (i.e. security policies that may not be enforced using only a static hardware configuration). In an embodiment, the page protection layer may ensure that it is the only component which is able to modify the page tables. The page protection layer may ensure than no component in the system is able to modify a page that is marked executable in any process' address space. The page protection may ensure that any page that is marked executable has code with a verified code signature, in an embodiment.
-
公开(公告)号:US20150020077A1
公开(公告)日:2015-01-15
申请号:US14491970
申请日:2014-09-19
Applicant: Apple Inc.
Inventor: Jussi-Pekka Mantere, III , Alexander Tony Maluta , John William Scalo , Eugene Ray Tyacke , Bruce Gaya , Michael John Smith , Peter Kiehtreiber , Simon P. Cooper
CPC classification number: G06F9/5005 , G06F9/54 , G06F21/44 , G06F21/602 , H04L63/104
Abstract: Resource restrictions are associated with a user identifier. A resource restriction agent receives operating system calls related for resources and provides resource request data to a resource agent. The resource agent determines whether the resource is restricted based on the resource request data and resource restriction data and generates access data based on the determination. The resource restriction agent grants or denies the system call based on the access data.
Abstract translation: 资源限制与用户标识符相关联。 资源限制代理接收与资源相关的操作系统调用,并向资源代理提供资源请求数据。 资源代理基于资源请求数据和资源限制数据确定资源是否被限制,并且基于该确定生成访问数据。 资源限制代理根据访问数据授予或拒绝系统调用。
-
公开(公告)号:US20190354705A1
公开(公告)日:2019-11-21
申请号:US16526253
申请日:2019-07-30
Applicant: Apple Inc.
Inventor: Kelly B. Yancey , Jacques Anthony Vidrine , Eric Olaf Carlson , Paul William Chinn , Simon P. Cooper
Abstract: The disclosed technology addresses the need in the art for assigning multiple containers to a single application. A container can be a specified area of a file system that an assigned application can access to store data, while other applications are restricted access to the container. In some instances, it may be beneficial for multiple applications to share some data, while still maintaining other data in a secure location, thus an application can be assigned to multiple containers, a personal container that can only be accessed by the applications, and a shared container that can be accessed by multiple applications. Further, an application can be assigned an alternate container, in addition to the personal container. The alternate container can be used when an alternate user is using the client device, thus restricting the alternate user from accessing any sensitive data stored in the personal container.
-
公开(公告)号:US09294359B2
公开(公告)日:2016-03-22
申请号:US13645415
申请日:2012-10-04
Applicant: Apple Inc.
Inventor: Pavel Cisler , Yan Arrouye , John Iarocci , Marc Jason Krochmal , Christopher Brooke Sharp , Christopher Scott Linn , Mikhail Gonodanov , Simon P. Cooper , Richard Murphy
CPC classification number: H04L41/22 , G06F17/30126 , G06F17/30197 , G06F21/33
Abstract: This disclosure relates to methods and systems to allow, in one embodiment, automatic access from one system to other systems which include an operating system that includes a user login process. In one embodiment, a method includes logging into, automatically in response to starting a first data processing system, a second data processing system at least as a guest user of the second data processing system which has a storage volume storing data and displaying a user interface object on a display device of the first data processing system, the user interface object corresponding to at least one of the second data processing system and the storage volume to allow at least one of a search to be performed or a browsing to be performed of the data stored on the storage volume.
Abstract translation: 本公开涉及在一个实施例中允许从一个系统到包括包括用户登录过程的操作系统的其他系统的自动访问的方法和系统。 在一个实施例中,一种方法包括:响应于启动第一数据处理系统自动登录第二数据处理系统,至少作为具有存储数据的存储卷并显示用户界面的第二数据处理系统的访客用户 对象在第一数据处理系统的显示装置上,所述用户界面对象对应于所述第二数据处理系统和所述存储卷中的至少一个,以允许对所述第二数据处理系统和所述存储卷中的至少一个执行搜索或执行所述浏览 存储在存储卷上的数据。
-
公开(公告)号:US20200034527A1
公开(公告)日:2020-01-30
申请号:US16409654
申请日:2019-05-10
Applicant: Apple Inc.
Inventor: Jacques A. Vidrine , Nicholas C. Allegra , Simon P. Cooper , Gregory D. Hughes
Abstract: A data processing system can use a method of fine-grained address space layout randomization to mitigate the system's vulnerability to return oriented programming security exploits. The randomization can occur at the sub-segment level by randomizing clumps of virtual memory pages. The randomized virtual memory can be presented to processes executing on the system. The mapping between memory spaces can be obfuscated using several obfuscation techniques to prevent the reverse engineering of the shuffled virtual memory mapping.
-
公开(公告)号:US20130191634A1
公开(公告)日:2013-07-25
申请号:US13729014
申请日:2012-12-27
Applicant: Apple Inc.
Inventor: Jussi-Pekka Mantere, III , Alexander Tony Maluta , John William Scalo , Eugene Ray Tyacke , Bruce Gaya , Michael John Smith , Peter Kiehtreiber , Simon P. Cooper
IPC: G06F21/60
CPC classification number: G06F9/5005 , G06F9/54 , G06F21/44 , G06F21/602 , H04L63/104
Abstract: Resource restrictions are associated with a user identifier. A resource restriction agent receives operating system calls related for resources and provides resource request data to a resource agent. The resource agent determines whether the resource is restricted based on the resource request data and resource restriction data and generates access data based on the determination. The resource restriction agent grants or denies the system call based on the access data.
-
公开(公告)号:US11188477B2
公开(公告)日:2021-11-30
申请号:US16564502
申请日:2019-09-09
Applicant: Apple Inc.
Inventor: Julien Oster , Thomas G. Holland , Bernard J. Semeria , Jason A. Harmening , Pierre-Olivier J. Martel , Gregory D. Hughes , P. Love Hornquist Astrand , Jacques Fortier , Ryan P. Nielson , Simon P. Cooper
IPC: G06F12/1009 , G06F21/62 , G06F9/455
Abstract: In an embodiment, a computer system comprises a page protection layer. The page protection layer may be the component in the system which manages the page tables for virtual to physical page mappings. Transactions to the page protection layer are used to create/manage mappings created in the page tables. The page protection layer may enforce dynamic security policies in the system (i.e. security policies that may not be enforced using only a static hardware configuration). In an embodiment, the page protection layer may ensure that it is the only component which is able to modify the page tables. The page protection layer may ensure than no component in the system is able to modify a page that is marked executable in any process' address space. The page protection may ensure that any page that is marked executable has code with a verified code signature, in an embodiment.
-
8.
公开(公告)号:US10311228B2
公开(公告)日:2019-06-04
申请号:US14503212
申请日:2014-09-30
Applicant: Apple Inc.
Inventor: Jacques A. Vidrine , Nicholas C. Allegra , Simon P. Cooper , Gregory D. Hughes
Abstract: A data processing system can use a method of fine-grained address space layout randomization to mitigate the system's vulnerability to return oriented programming security exploits. The randomization can occur at the sub-segment level by randomizing clumps of virtual memory pages. The randomized virtual memory can be presented to processes executing on the system. The mapping between memory spaces can be obfuscated using several obfuscation techniques to prevent the reverse engineering of the shuffled virtual memory mapping.
-
公开(公告)号:US20160092675A1
公开(公告)日:2016-03-31
申请号:US14503212
申请日:2014-09-30
Applicant: Apple Inc.
Inventor: Jacques A. Vidrine , Nicholas C. Allegra , Simon P. Cooper , Gregory D. Hughes
IPC: G06F21/52
CPC classification number: G06F21/52 , G06F2221/033
Abstract: A data processing system can use a method of fine-grained address space layout randomization to mitigate the system's vulnerability to return oriented programming security exploits. The randomization can occur at the sub-segment level by randomizing clumps of virtual memory pages. The randomized virtual memory can be presented to processes executing on the system. The mapping between memory spaces can be obfuscated using several obfuscation techniques to prevent the reverse engineering of the shuffled virtual memory mapping.
Abstract translation: 数据处理系统可以使用细粒度的地址空间布局随机化方法来减轻系统的漏洞,从而导致面向对象的编程安全漏洞。 随机化可以通过随机分组虚拟内存页面在子分段级别进行。 随机虚拟内存可以呈现给在系统上执行的进程。 可以使用几种混淆技术来模糊存储空间之间的映射,以防止混洗的虚拟内存映射的反向工程。
-
公开(公告)号:US20140366157A1
公开(公告)日:2014-12-11
申请号:US13913059
申请日:2013-06-07
Applicant: Apple Inc.
Inventor: Kelly B. Yancey , Jacques Anthony Vidrine , Eric Olaf Carlson , Paul William Chinn , Simon P. Cooper
CPC classification number: G06F21/62 , G06F21/53 , G06F21/6245
Abstract: The disclosed technology addresses the need in the art for assigning multiple containers to a single application. A container can be a specified area of a file system that an assigned application can access to store data, while other applications are restricted access to the container. In some instances, it may be beneficial for multiple applications to share some data, while still maintaining other data in a secure location, thus an application can be assigned to multiple containers, a personal container that can only be accessed by the application, and a shared container that can be accessed by multiple applications. Further, an application can be assigned an alternate container, in addition to the personal container. The alternate container can be used when an alternate user is using the client device, thus restricting the alternate user from accessing any sensitive data stored in the personal container.
Abstract translation: 所公开的技术解决了本领域对单个应用分配多个容器的需要。 容器可以是分配的应用程序可以访问以存储数据的文件系统的指定区域,而其他应用程序被限制访问容器。 在某些情况下,多个应用程序共享一些数据可能是有益的,同时仍然将其他数据保持在安全位置,因此应用程序可以分配给多个容器,只能由应用程序访问的个人容器,以及 可以由多个应用程序访问的共享容器。 此外,除了个人容器之外,还可以为应用分配备用容器。 当替代用户使用客户端设备时,可以使用备用容器,从而限制备用用户访问存储在个人容器中的任何敏感数据。
-
-
-
-
-
-
-
-
-