SG11201804011VA - Device for self-defense security based on system environment and user behavior analysis, and operating method thereof - Google Patents

Device for self-defense security based on system environment and user behavior analysis, and operating method thereof

Info

Publication number
SG11201804011VA
SG11201804011VA SG11201804011VA SG11201804011VA SG11201804011VA SG 11201804011V A SG11201804011V A SG 11201804011VA SG 11201804011V A SG11201804011V A SG 11201804011VA SG 11201804011V A SG11201804011V A SG 11201804011VA SG 11201804011V A SG11201804011V A SG 11201804011VA
Authority
SG
Singapore
Prior art keywords
operating method
command
database
self
user behavior
Prior art date
Application number
SG11201804011VA
Inventor
Seokgu Yun
Original Assignee
Nod Bizware Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nod Bizware Co Ltd filed Critical Nod Bizware Co Ltd
Publication of SG11201804011VA publication Critical patent/SG11201804011VA/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Bioethics (AREA)
  • Databases & Information Systems (AREA)
  • Social Psychology (AREA)
  • Virology (AREA)
  • Automation & Control Theory (AREA)
  • Quality & Reliability (AREA)
  • Data Mining & Analysis (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The present inventive concepts relates to an operating method of a database security apparatus which performs an analysis on a command requested by a user on the basis of a situation of a system and a pattern of the user. The operating method includes receiving a command related to a database managed in a database system from a client, 5 confirming whether a service state of the database system is in a development state or an actual service state, changing a security policy for the database system in accordance with a result of the confirmation, determining whether the command transmitted from the client satisfies the changed security policy, and requesting an administrator client to confirm whether to execute the command in accordance with a result of the 10 determination. FIG. 2
SG11201804011VA 2016-01-29 2017-01-06 Device for self-defense security based on system environment and user behavior analysis, and operating method thereof SG11201804011VA (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
KR1020160011807A KR101905771B1 (en) 2016-01-29 2016-01-29 Self defense security server with behavior and environment analysis and operating method thereof
PCT/KR2017/000204 WO2017131355A1 (en) 2016-01-29 2017-01-06 Device for self-defense security based on system environment and user behavior analysis, and operating method therefor

Publications (1)

Publication Number Publication Date
SG11201804011VA true SG11201804011VA (en) 2018-06-28

Family

ID=59398442

Family Applications (1)

Application Number Title Priority Date Filing Date
SG11201804011VA SG11201804011VA (en) 2016-01-29 2017-01-06 Device for self-defense security based on system environment and user behavior analysis, and operating method thereof

Country Status (5)

Country Link
US (1) US20190005252A1 (en)
JP (1) JP6655731B2 (en)
KR (1) KR101905771B1 (en)
SG (1) SG11201804011VA (en)
WO (1) WO2017131355A1 (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11196757B2 (en) 2019-08-21 2021-12-07 International Business Machines Corporation Suspending security violating-database client connections in a database protection system
CN111125728A (en) * 2019-12-04 2020-05-08 深圳昂楷科技有限公司 Method and device for treating database security problems and treatment equipment
CN112202727B (en) * 2020-09-11 2023-01-10 苏州浪潮智能科技有限公司 Server-side verification user management method, system, terminal and storage medium
CN114640527B (en) * 2022-03-21 2023-03-24 重庆市规划和自然资源信息中心 Real estate registration service network security risk identification method and system based on log audit
KR102497464B1 (en) * 2022-10-11 2023-02-08 (주)케이스마텍 Cloud HSM system for security enhancement

Family Cites Families (125)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5323444A (en) * 1991-08-16 1994-06-21 U S West Advanced Technologies, Inc. Emergency call system with call capacity/last chance routing feature
US5379337A (en) * 1991-08-16 1995-01-03 U S West Advanced Technologies, Inc. Method and system for providing emergency call service
DE69232542T2 (en) * 1991-09-27 2002-11-21 Bmc Software Inc Definition change language for a database computer system
US5410693A (en) * 1994-01-26 1995-04-25 Wall Data Incorporated Method and apparatus for accessing a database
CA2138830A1 (en) * 1994-03-03 1995-09-04 Jamie Joanne Marschner Real-time administration-translation arrangement
JPH08123672A (en) * 1994-10-26 1996-05-17 Hitachi Ltd System performing access management of stored information
US7133845B1 (en) * 1995-02-13 2006-11-07 Intertrust Technologies Corp. System and methods for secure transaction management and electronic rights protection
US5892900A (en) * 1996-08-30 1999-04-06 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
CN1912885B (en) * 1995-02-13 2010-12-22 英特特拉斯特技术公司 Systems and methods for secure transaction management and electronic rights protection
US6948070B1 (en) * 1995-02-13 2005-09-20 Intertrust Technologies Corporation Systems and methods for secure transaction management and electronic rights protection
US7095854B1 (en) * 1995-02-13 2006-08-22 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US20030191719A1 (en) * 1995-02-13 2003-10-09 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US6438544B1 (en) * 1998-10-02 2002-08-20 Ncr Corporation Method and apparatus for dynamic discovery of data model allowing customization of consumer applications accessing privacy data
US6578037B1 (en) * 1998-10-05 2003-06-10 Oracle Corporation Partitioned access control to a database
US6530024B1 (en) * 1998-11-20 2003-03-04 Centrax Corporation Adaptive feedback security system and method
US6473794B1 (en) * 1999-05-27 2002-10-29 Accenture Llp System for establishing plan to test components of web based framework by displaying pictorial representation and conveying indicia coded components of existing network framework
US6519571B1 (en) * 1999-05-27 2003-02-11 Accenture Llp Dynamic customer profile management
AU6104800A (en) * 1999-07-16 2001-02-05 Intertrust Technologies Corp. Trusted storage systems and methods
US6704873B1 (en) * 1999-07-30 2004-03-09 Accenture Llp Secure gateway interconnection in an e-commerce based environment
US7100195B1 (en) * 1999-07-30 2006-08-29 Accenture Llp Managing user information on an e-commerce system
US6405212B1 (en) * 1999-09-27 2002-06-11 Oracle Corporation Database system event triggers
US7020697B1 (en) * 1999-10-01 2006-03-28 Accenture Llp Architectures for netcentric computing systems
US7716077B1 (en) * 1999-11-22 2010-05-11 Accenture Global Services Gmbh Scheduling and planning maintenance and service in a network-based supply chain environment
US6820082B1 (en) * 2000-04-03 2004-11-16 Allegis Corporation Rule based database security system and method
US7225244B2 (en) * 2000-05-20 2007-05-29 Ciena Corporation Common command interface
JP2002007195A (en) * 2000-06-20 2002-01-11 Fujitsu Ltd Access control system and recording medium
US20110219035A1 (en) * 2000-09-25 2011-09-08 Yevgeny Korsunsky Database security via data flow processing
US20020073089A1 (en) * 2000-09-29 2002-06-13 Andrew Schwartz Method and system for creating and managing relational data over the internet
US7412721B2 (en) * 2000-12-20 2008-08-12 Fujitsu Limited Method of and system for managing information, and computer product
KR100422327B1 (en) * 2001-03-09 2004-03-10 문지환 Realtime Control System and Method of User Browser
US20020157020A1 (en) * 2001-04-20 2002-10-24 Coby Royer Firewall for protecting electronic commerce databases from malicious hackers
US7640006B2 (en) * 2001-10-03 2009-12-29 Accenture Global Services Gmbh Directory assistance with multi-modal messaging
US20030088546A1 (en) * 2001-10-12 2003-05-08 Brown Douglas P. Collecting and/or presenting demographics information in a database system
US7499907B2 (en) * 2001-10-12 2009-03-03 Teradata Us, Inc. Index selection in a database system
US6801903B2 (en) * 2001-10-12 2004-10-05 Ncr Corporation Collecting statistics in a database system
DE60130902T2 (en) * 2001-11-23 2008-07-17 Protegrity Research & Development Method for detecting intrusion into a database system
US8316051B1 (en) * 2001-11-30 2012-11-20 Oralce International Corporation Techniques for adding multiple security policies to a database system
US7685173B2 (en) * 2001-12-13 2010-03-23 International Business Machines Corporation Security and authorization development tools
JP2003216497A (en) * 2002-01-25 2003-07-31 Casio Comput Co Ltd Database managing device and program
CA2384259A1 (en) * 2002-04-29 2003-10-29 Ibm Canada Limited-Ibm Canada Limitee Access concurrency for cached authorization information in relational database systems
JP4467257B2 (en) * 2002-06-28 2010-05-26 株式会社日立製作所 Database management method and apparatus, and processing program therefor
US20040030697A1 (en) * 2002-07-31 2004-02-12 American Management Systems, Inc. System and method for online feedback
US7240046B2 (en) * 2002-09-04 2007-07-03 International Business Machines Corporation Row-level security in a relational database management system
US7454785B2 (en) * 2002-12-19 2008-11-18 Avocent Huntsville Corporation Proxy method and system for secure wireless administration of managed entities
US7155612B2 (en) * 2003-04-30 2006-12-26 International Business Machines Corporation Desktop database data administration tool with row level security
JP2004341623A (en) * 2003-05-13 2004-12-02 Hitachi Ltd Security specification creation support device and security specification creation support method
JP2005038124A (en) * 2003-07-18 2005-02-10 Hitachi Information Systems Ltd File access control method and control system
US20050039002A1 (en) * 2003-07-29 2005-02-17 International Business Machines Corporation Method, system and program product for protecting a distributed application user
JP4756821B2 (en) * 2003-11-19 2011-08-24 キヤノン株式会社 Document management apparatus, control method therefor, and program
US7506371B1 (en) * 2004-01-22 2009-03-17 Guardium, Inc. System and methods for adaptive behavior based access control
US7711750B1 (en) * 2004-02-11 2010-05-04 Microsoft Corporation Systems and methods that specify row level database security
US7661141B2 (en) * 2004-02-11 2010-02-09 Microsoft Corporation Systems and methods that optimize row level database security
US20050203881A1 (en) * 2004-03-09 2005-09-15 Akio Sakamoto Database user behavior monitor system and method
US8146160B2 (en) * 2004-03-24 2012-03-27 Arbor Networks, Inc. Method and system for authentication event security policy generation
KR100593661B1 (en) * 2004-04-03 2006-06-26 주식회사 피앤피시큐어 Method and system for monitoring and securing a database
US20070180490A1 (en) * 2004-05-20 2007-08-02 Renzi Silvio J System and method for policy management
US7321893B1 (en) * 2004-07-29 2008-01-22 Emc Corporation System and method for the configuration of resources in resource groups
US7383430B1 (en) * 2004-07-29 2008-06-03 Emc Corporation System and method for validating resource groups
US7398471B1 (en) * 2004-07-29 2008-07-08 Emc Corporation System and method for the administration of resource groups
US7814075B2 (en) * 2004-12-30 2010-10-12 Oracle International Corporation Dynamic auditing
US8732856B2 (en) * 2004-12-30 2014-05-20 Oracle International Corporation Cross-domain security for data vault
US7593942B2 (en) * 2004-12-30 2009-09-22 Oracle International Corporation Mandatory access control base
US7814076B2 (en) * 2004-12-30 2010-10-12 Oracle International Corporation Data vault
US7831570B2 (en) * 2004-12-30 2010-11-09 Oracle International Corporation Mandatory access control label security
US7962513B1 (en) * 2005-10-31 2011-06-14 Crossroads Systems, Inc. System and method for defining and implementing policies in a database system
US8180762B2 (en) * 2005-12-13 2012-05-15 International Business Machines Corporation Database tuning methods
US20070208857A1 (en) * 2006-02-21 2007-09-06 Netiq Corporation System, method, and computer-readable medium for granting time-based permissions
JP4904886B2 (en) * 2006-03-30 2012-03-28 富士通株式会社 Maintenance program and maintenance method
US8924335B1 (en) * 2006-03-30 2014-12-30 Pegasystems Inc. Rule-based user interface conformance methods
US7853624B2 (en) * 2006-05-02 2010-12-14 International Business Machines Corporation System and method for optimizing distributed and hybrid queries in imperfect environments
US20080022386A1 (en) * 2006-06-08 2008-01-24 Shevchenko Oleksiy Yu Security mechanism for server protection
US8768966B2 (en) * 2006-09-04 2014-07-01 Db Maestro Ltd. Method for managing simultaneous modification of database objects during development
US20080120286A1 (en) * 2006-11-22 2008-05-22 Dettinger Richard D Method and system for performing a clean operation on a query result
US8027993B2 (en) * 2006-12-28 2011-09-27 Teradota Us, Inc. Techniques for establishing and enforcing row level database security
US7831621B1 (en) * 2007-09-27 2010-11-09 Crossroads Systems, Inc. System and method for summarizing and reporting impact of database statements
US8234299B2 (en) * 2008-01-11 2012-07-31 International Business Machines Corporation Method and system for using fine-grained access control (FGAC) to control access to data in a database
US8886564B2 (en) * 2008-09-16 2014-11-11 Ca, Inc. Program for resource security in a database management system
CN101854340B (en) * 2009-04-03 2015-04-01 瞻博网络公司 Behavior based communication analysis carried out based on access control information
US20100287597A1 (en) * 2009-05-07 2010-11-11 Microsoft Corporation Security policy trigger for policy enforcement
KR101039698B1 (en) * 2009-06-12 2011-06-08 (주)소만사 Database Security System, Server and Method which can protect user's Access to Database through Application
US20100325685A1 (en) * 2009-06-17 2010-12-23 Jamie Sanbower Security Integration System and Device
WO2011115839A2 (en) * 2010-03-15 2011-09-22 DynamicOps, Inc. Computer relational database method and system having role based access control
WO2011126911A1 (en) * 2010-03-30 2011-10-13 Authentic8, Inc Disposable browsers and authentication techniques for a secure online user environment
US20120110011A1 (en) * 2010-10-29 2012-05-03 Ihc Intellectual Asset Management, Llc Managing application access on a computing device
US8578487B2 (en) * 2010-11-04 2013-11-05 Cylance Inc. System and method for internet security
AU2011332881B2 (en) * 2010-11-24 2016-06-30 LogRhythm Inc. Advanced intelligence engine
US9780995B2 (en) * 2010-11-24 2017-10-03 Logrhythm, Inc. Advanced intelligence engine
KR101226693B1 (en) * 2010-12-03 2013-01-25 주식회사 웨어밸리 Database security method with remove the exposed weak point using Access Control System
KR101134091B1 (en) * 2011-01-12 2012-04-13 주식회사 피앤피시큐어 Database secure system preventing the access to the database by detour
EP2689353B1 (en) * 2011-03-22 2019-11-06 Informatica LLC System and method for data masking
SG11201403482TA (en) * 2011-12-21 2014-07-30 Ssh Comm Security Oyj Automated access, key, certificate, and credential management
US9286475B2 (en) * 2012-02-21 2016-03-15 Xerox Corporation Systems and methods for enforcement of security profiles in multi-tenant database
US20130227352A1 (en) * 2012-02-24 2013-08-29 Commvault Systems, Inc. Log monitoring
US9264395B1 (en) * 2012-04-11 2016-02-16 Artemis Internet Inc. Discovery engine
US9264449B1 (en) * 2012-05-01 2016-02-16 Amazon Technologies, Inc. Automatic privilege determination
US9177172B2 (en) * 2012-11-15 2015-11-03 Microsoft Technology Licensing, Llc Single system image via shell database
US20140230070A1 (en) * 2013-02-14 2014-08-14 Microsoft Corporation Auditing of sql queries using select triggers
WO2014151061A2 (en) * 2013-03-15 2014-09-25 Authentic8, Inc. Secure web container for a secure online user environment
US9426226B2 (en) * 2013-05-03 2016-08-23 Secureworks Corp. System and method for as needed connection escalation
US10481981B2 (en) * 2013-06-19 2019-11-19 Virtual Forge GmbH System and method for automatic correction of a database configuration in case of quality defects
US9251355B2 (en) * 2013-07-30 2016-02-02 International Business Machines Corporation Field level database encryption using a transient key
US20150142852A1 (en) * 2013-11-15 2015-05-21 Anett Lippert Declarative authorizations for sql data manipulation
US9350714B2 (en) * 2013-11-19 2016-05-24 Globalfoundries Inc. Data encryption at the client and server level
US9740870B1 (en) * 2013-12-05 2017-08-22 Amazon Technologies, Inc. Access control
US9692789B2 (en) * 2013-12-13 2017-06-27 Oracle International Corporation Techniques for cloud security monitoring and threat intelligence
US10757133B2 (en) * 2014-02-21 2020-08-25 Intuit Inc. Method and system for creating and deploying virtual assets
US9866581B2 (en) * 2014-06-30 2018-01-09 Intuit Inc. Method and system for secure delivery of information to computing environments
TW201537378A (en) * 2014-03-31 2015-10-01 Ibm Computer devices and security management device communicationally-connected to the same
SG10201913041VA (en) * 2014-04-17 2020-03-30 Ab Initio Technology Llc Integrated monitoring and control of processing environment
US9613224B2 (en) * 2014-06-25 2017-04-04 Oracle International Corporation Integrating a user's security context in a database for access control
US10049205B2 (en) * 2014-06-25 2018-08-14 Oracle International Corporation Asserting identities of application users in a database system based on delegated trust
US9882930B2 (en) * 2014-07-02 2018-01-30 Waratek Limited Command injection protection for java applications
US20160180248A1 (en) * 2014-08-21 2016-06-23 Peder Regan Context based learning
US10438008B2 (en) * 2014-10-30 2019-10-08 Microsoft Technology Licensing, Llc Row level security
SG11201703004XA (en) * 2014-11-05 2017-05-30 Ab Initio Technology Llc Database security
US10122757B1 (en) * 2014-12-17 2018-11-06 Amazon Technologies, Inc. Self-learning access control policies
US10108791B1 (en) * 2015-03-19 2018-10-23 Amazon Technologies, Inc. Authentication and fraud detection based on user behavior
EP3295359B1 (en) * 2015-05-15 2020-08-26 Virsec Systems, Inc. Detection of sql injection attacks
US10043006B2 (en) * 2015-06-17 2018-08-07 Accenture Global Services Limited Event anomaly analysis and prediction
EP3320447A4 (en) * 2015-07-07 2019-05-22 Private Machines Inc. Secure searchable and shareable remote storage system and method
US10587671B2 (en) * 2015-07-09 2020-03-10 Zscaler, Inc. Systems and methods for tracking and auditing changes in a multi-tenant cloud system
US10454963B1 (en) * 2015-07-31 2019-10-22 Tripwire, Inc. Historical exploit and vulnerability detection
US20170093910A1 (en) * 2015-09-25 2017-03-30 Acalvio Technologies, Inc. Dynamic security mechanisms
US20170178025A1 (en) * 2015-12-22 2017-06-22 Sap Se Knowledge base in enterprise threat detection
US10565214B2 (en) * 2017-03-22 2020-02-18 Bank Of America Corporation Intelligent database control systems with automated request assessments

Also Published As

Publication number Publication date
WO2017131355A1 (en) 2017-08-03
KR101905771B1 (en) 2018-10-11
US20190005252A1 (en) 2019-01-03
KR20170090874A (en) 2017-08-08
JP2019503021A (en) 2019-01-31
JP6655731B2 (en) 2020-02-26

Similar Documents

Publication Publication Date Title
SG11201804011VA (en) Device for self-defense security based on system environment and user behavior analysis, and operating method thereof
PH12020550701A1 (en) Asset management method and apparatus, and electronic device
MY177409A (en) Method and system for verifying an account operation
PH12020550994A1 (en) Identity verification method and apparatus
SG11201900538VA (en) Terminal rule engine device and terminal rule operation method
TW201614535A (en) Method, device, terminal, and server for verifying security of service operation
RU2014132923A (en) SYSTEM AND METHOD FOR INSTALLING USER SETTINGS
MX2015013352A (en) Vehicle occupant authentication system.
MX2019008945A (en) Origin certificate based online certificate issuance.
WO2014208033A3 (en) Secure discovery for proximity based service communication
SG11201803693VA (en) Information processing network based on uniform code issuance, method therefor, and sensing access device
SG11201903216TA (en) Method, apparatus and server for account login
MX354969B (en) Method and device for accessing operator network.
EP4271016A3 (en) Enhanced authentication based on secondary device interactions
MX2017000430A (en) Networked access control system.
JP2018501567A5 (en)
SG10201808530XA (en) Security in intersystem mobility
EA201690730A1 (en) SYSTEM AND METHOD OF MANAGEMENT, ASSOCIATION AND DISTRIBUTION OF KEY ENCRYPTION KEY
TW201614489A (en) System for using an application software on trial and method and server and user device thereof
MX2016013044A (en) Device policy manager.
SG10201907254XA (en) Text address processing method and apparatus
JP2013109385A5 (en)
GB2564624A (en) Configuration for multi-factor event authorization
IN2014CH00681A (en)
RU2014144086A (en) METHOD OF USER AUTHORIZATION IN A NETWORK AND SERVER USED IN IT