Method and apparatus for protecting device

A technology for protecting equipment and equipment, applied in the direction of digital data protection, computer security devices, instruments, etc., can solve problems such as programming errors, lack, and inability to fully protect computers, and achieve the effect of reducing security risks

Pending Publication Date: 2020-03-31
ROBERT BOSCH GMBH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Security breaches resulting, inter alia, from inadequate protection of computers from attacks from the network (for example, due to lack of firewalls or other security software) and due to programming errors in operating systems, web browsers or other software applications running on said system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for protecting device
  • Method and apparatus for protecting device
  • Method and apparatus for protecting device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] In the following, the term "file" is used in a broad sense for input data of networked devices. Examples of files are eg software updates, multimedia files or text files which may contain requirements for the device in question. In general, each file consists of header data and useful data. The useful data of the file is related to its actual content, such as images, movies or texts. The file's header contains its so-called metadata, such as the format of the file, the version of the tool used to create it, etc.

[0018] A fundamental aspect of the invention is to bind a given file to a determined device such that said file can only be correctly processed (ie read and interpreted) on that specified device. An overview of the method proposed for this is in figure 1 shown in .

[0019] For simplicity, a prototype implementation of the concept is now illustrated based on a file system executable with user privileges (Filesystem in Userspace, FUSE). This principle can ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method (10) for protecting a device (d), characterized by the following features: a file system of the device (d) is individualized (20) and a file (f) to be processed by the device (d) is matched to the individualized runtime environment (30).

Description

technical field [0001] The invention relates to a method for protecting equipment. The invention also relates to a corresponding apparatus, a corresponding computer program and a corresponding storage medium. Background technique [0002] In the field of information security, a security breach is any error in software that allows a damaging program (malware) or an attacker to gain access to a computer system. [0003] Security breaches pose a threat to the security of computer systems. There is a risk that the security gaps involved may be exploited and damage the computer systems involved. Security breaches result, inter alia, from inadequate protection of computers from attacks from the network (eg due to lack of firewalls or other security software) and from programming errors in the operating system, web browser or other software applications running on said system. [0004] DE 10 2015 225 651 A1 discloses a method for protecting a device. Here, the verifier generate...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62H04L29/06
CPCG06F21/602G06F21/6218H04L63/1458G06F21/1011
Inventor P.杜普利斯H.鲍尔
Owner ROBERT BOSCH GMBH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products