BR112015009690A2 - método de negócios incluindo o sistema de resposta convite para autenticar se forma segura um software de interface para programação de aplicativos (api) - Google Patents
método de negócios incluindo o sistema de resposta convite para autenticar se forma segura um software de interface para programação de aplicativos (api)Info
- Publication number
- BR112015009690A2 BR112015009690A2 BR112015009690A BR112015009690A BR112015009690A2 BR 112015009690 A2 BR112015009690 A2 BR 112015009690A2 BR 112015009690 A BR112015009690 A BR 112015009690A BR 112015009690 A BR112015009690 A BR 112015009690A BR 112015009690 A2 BR112015009690 A2 BR 112015009690A2
- Authority
- BR
- Brazil
- Prior art keywords
- verifier
- applicant
- response
- api
- challenge
- Prior art date
Links
- 238000000034 method Methods 0.000 title abstract 3
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/235—Processing of additional data, e.g. scrambling of additional data or processing content descriptors
- H04N21/2351—Processing of additional data, e.g. scrambling of additional data or processing content descriptors involving encryption of additional data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/105—Arrangements for software license management or administration, e.g. for managing licenses at corporate level
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/629—Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/435—Processing of additional data, e.g. decrypting of additional data, reconstructing software from modules extracted from the transport stream
- H04N21/4353—Processing of additional data, e.g. decrypting of additional data, reconstructing software from modules extracted from the transport stream involving decryption of additional data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/443—OS processes, e.g. booting an STB, implementing a Java virtual machine in an STB or power management in an STB
- H04N21/4431—OS processes, e.g. booting an STB, implementing a Java virtual machine in an STB or power management in an STB characterized by the use of Application Program Interface [API] libraries
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/443—OS processes, e.g. booting an STB, implementing a Java virtual machine in an STB or power management in an STB
- H04N21/4433—Implementing client middleware, e.g. Multimedia Home Platform [MHP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/60—Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client
- H04N21/63—Control signaling related to video distribution between client, server and network components; Network processes for video distribution between server and clients or between remote clients, e.g. transmitting basic layer and enhancement layers over different transmission paths, setting up a peer-to-peer communication via Internet between remote STB's; Communication protocols; Addressing
- H04N21/647—Control signaling between network components and server or clients; Network processes for video distribution between server and clients, e.g. controlling the quality of the video stream, by dropping packets, protecting content from unauthorised alteration within the network, monitoring of network load, bridging between two different networks, e.g. between IP and wireless
- H04N21/64715—Protecting content from unauthorized alteration within the network
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Technology Law (AREA)
- Computing Systems (AREA)
- Library & Information Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
resumo método de negócios incluindo o sistema de resposta convite para autenticar se forma segura um software de interface para programação de aplicativos (api) um sistema de software para autenticar com segurança interface para programação de aplicativoss (apis) inclui um protocolo de handshake que é fornecido para validar se as partes envolvidas está licenciado para usar o sistema, que inclui direitos de propriedade intelectual (ip) e as correspondentes obrigações. a aproximação é um protocolo de desafio-resposta que inclui várias etapas. em primeiro lugar, o requerente envia uma solicitação para um verificador solicitando acesso a uma função através de uma api. o verificador reage ao pedido de emissão de um desafio que é enviado para o requerente. o desafio também é retida pelo verificador para uso em seu cálculo interno para verificar a resposta do requerente. o requerente processa próximo desafio usando os componentes sob a licença, conhecido como ip hook, e emite uma resposta ao verificador. o verificador compara a resposta possivelmente candidate-correto do requerente para o alvo correto conhecido response e se ocorrer uma correspondência do verificador permite o acesso do requerente à api.
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201261719923P | 2012-10-29 | 2012-10-29 | |
US201261719928P | 2012-10-29 | 2012-10-29 | |
PCT/US2013/067353 WO2014070800A1 (en) | 2012-10-29 | 2013-10-29 | BUSINESS METHOD INCLUDING CHALLENGE-RESPONSE SYSTEM TO SECURELY AUTHENTICATE SOFTWARE APPLICATION PROGRAM INTERFACES (APIs) |
US14/066,591 US20140123220A1 (en) | 2012-10-29 | 2013-10-29 | BUSINESS METHOD INCLUDING CHALLENGE-RESPONSE SYSTEM TO SECURELY AUTHENTICATE SOFTWARE APPLICATION PROGRAM INTERFACES (APIs) |
Publications (2)
Publication Number | Publication Date |
---|---|
BR112015009690A2 true BR112015009690A2 (pt) | 2018-05-22 |
BR112015009690A8 BR112015009690A8 (pt) | 2023-02-07 |
Family
ID=50548740
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
BR112015009690A BR112015009690A8 (pt) | 2012-10-29 | 2013-10-29 | Método de negócios incluindo um sistema de resposta a desafio para a autenticação de forma segura de interfaces de programa aplicativo (apis) de software |
Country Status (8)
Country | Link |
---|---|
US (4) | US9172981B2 (pt) |
EP (1) | EP2901349A1 (pt) |
KR (1) | KR101722868B1 (pt) |
AU (1) | AU2013338059B2 (pt) |
BR (1) | BR112015009690A8 (pt) |
CA (1) | CA2899385C (pt) |
MX (1) | MX355757B (pt) |
WO (1) | WO2014070800A1 (pt) |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CA2899385C (en) | 2012-10-29 | 2020-10-13 | Arris Technology, Inc. | Handshaking protocol for secure transfer of data |
US9565022B1 (en) * | 2013-07-02 | 2017-02-07 | Impinj, Inc. | RFID tags with dynamic key replacement |
US9258274B2 (en) * | 2014-07-09 | 2016-02-09 | Shape Security, Inc. | Using individualized APIs to block automated attacks on native apps and/or purposely exposed APIs |
US10050935B2 (en) | 2014-07-09 | 2018-08-14 | Shape Security, Inc. | Using individualized APIs to block automated attacks on native apps and/or purposely exposed APIs with forced user interaction |
US9729506B2 (en) | 2014-08-22 | 2017-08-08 | Shape Security, Inc. | Application programming interface wall |
US9800602B2 (en) | 2014-09-30 | 2017-10-24 | Shape Security, Inc. | Automated hardening of web page content |
US20170061131A1 (en) * | 2015-08-31 | 2017-03-02 | Cisco Technology, Inc. | Side-Channel Integrity Validation of Devices |
CN106648440B (zh) * | 2015-10-28 | 2020-07-24 | 华为技术有限公司 | 操作存储设备的控制方法和存储设备 |
CN106778341A (zh) * | 2016-12-02 | 2017-05-31 | 华北计算技术研究所(中国电子科技集团公司第十五研究所) | 数据权限管理系统及方法 |
WO2021056069A1 (en) * | 2019-09-25 | 2021-04-01 | Commonwealth Scientific And Industrial Research Organisation | Cryptographic services for browser applications |
Family Cites Families (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4860353A (en) | 1988-05-17 | 1989-08-22 | General Instrument Corporation | Dynamic feedback arrangement scrambling technique keystream generator |
US6850252B1 (en) * | 1999-10-05 | 2005-02-01 | Steven M. Hoffberg | Intelligent electronic appliance system and method |
US6961427B1 (en) | 1999-11-23 | 2005-11-01 | General Instrument Corporation | Methods and apparatus for keystream generation |
JP3793009B2 (ja) | 2000-09-06 | 2006-07-05 | キヤノン株式会社 | コンテンツ再生装置 |
KR20050123105A (ko) * | 2003-03-24 | 2005-12-29 | 마츠시타 덴끼 산교 가부시키가이샤 | 데이터 보호 관리 장치 및 데이터 보호 관리 방법 |
US7383438B2 (en) * | 2004-12-18 | 2008-06-03 | Comcast Cable Holdings, Llc | System and method for secure conditional access download and reconfiguration |
JP4589758B2 (ja) * | 2005-03-03 | 2010-12-01 | フェリカネットワークス株式会社 | データ通信システム,代行システムサーバ,コンピュータプログラム,およびデータ通信方法 |
KR101564731B1 (ko) | 2007-11-16 | 2015-11-02 | 톰슨 라이센싱 | 다운로드된 디지털 매체 파일을 추적하기 위한 시스템 및 방법 |
US8635664B2 (en) | 2007-12-28 | 2014-01-21 | Intel Corporation | Method and system for securing application program interfaces in unified extensible firmware interface |
US8713705B2 (en) | 2009-08-03 | 2014-04-29 | Eisst Ltd. | Application authentication system and method |
EP2507999A2 (en) * | 2009-11-30 | 2012-10-10 | General instrument Corporation | System and method for encrypting and decrypting data |
US8898469B2 (en) | 2010-02-05 | 2014-11-25 | Motorola Mobility Llc | Software feature authorization through delegated agents |
US8813202B2 (en) * | 2012-01-03 | 2014-08-19 | General Instrument Corporation | Mechanism to determine source device service tier based on the version of the HDCP key |
CA2899385C (en) | 2012-10-29 | 2020-10-13 | Arris Technology, Inc. | Handshaking protocol for secure transfer of data |
-
2013
- 2013-10-29 CA CA2899385A patent/CA2899385C/en active Active
- 2013-10-29 KR KR1020157014437A patent/KR101722868B1/ko active IP Right Grant
- 2013-10-29 US US14/066,653 patent/US9172981B2/en active Active
- 2013-10-29 US US14/066,636 patent/US9197910B2/en active Active
- 2013-10-29 BR BR112015009690A patent/BR112015009690A8/pt not_active Application Discontinuation
- 2013-10-29 WO PCT/US2013/067353 patent/WO2014070800A1/en active Application Filing
- 2013-10-29 US US14/066,657 patent/US9027159B2/en active Active
- 2013-10-29 AU AU2013338059A patent/AU2013338059B2/en active Active
- 2013-10-29 EP EP13795326.1A patent/EP2901349A1/en not_active Ceased
- 2013-10-29 US US14/066,591 patent/US20140123220A1/en not_active Abandoned
- 2013-10-29 MX MX2015005454A patent/MX355757B/es active IP Right Grant
Also Published As
Publication number | Publication date |
---|---|
CA2899385C (en) | 2020-10-13 |
KR20150081328A (ko) | 2015-07-13 |
MX2015005454A (es) | 2016-01-15 |
US20140123321A1 (en) | 2014-05-01 |
US20140123242A1 (en) | 2014-05-01 |
KR101722868B1 (ko) | 2017-04-05 |
US9027159B2 (en) | 2015-05-05 |
US9172981B2 (en) | 2015-10-27 |
US20140123220A1 (en) | 2014-05-01 |
AU2013338059A1 (en) | 2015-06-18 |
MX355757B (es) | 2018-04-27 |
US20140123172A1 (en) | 2014-05-01 |
AU2013338059B2 (en) | 2017-06-15 |
WO2014070800A1 (en) | 2014-05-08 |
CA2899385A1 (en) | 2014-05-08 |
EP2901349A1 (en) | 2015-08-05 |
US9197910B2 (en) | 2015-11-24 |
BR112015009690A8 (pt) | 2023-02-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
BR112015009690A2 (pt) | método de negócios incluindo o sistema de resposta convite para autenticar se forma segura um software de interface para programação de aplicativos (api) | |
AR102007A1 (es) | Sistema, método implementado por computadora y dispositivo informático de autenticación para acceder a recursos en base a desafíos | |
BR112019000169A2 (pt) | sistema, método, e aparelho de gestão de segurança cibernética | |
GB2533728A (en) | Method for assigning an agent device from a first device registry to a second device registry | |
EP2782037A3 (en) | Method and apparatus for performing authentication between applications | |
BR112017014135A2 (pt) | métodos e sistemas para gerenciar permissões para acessar recursos de dispositivo móvel | |
BR112015000175A2 (pt) | método, uma ou mais mídias de armazenamento não transitório legíveis por computador e um dispositivo, em particular, relacionado a recursos de computação resources e/ou computação de confiança com base em dispositivo móvel | |
IN2014CN02443A (pt) | ||
BR112014019847A8 (pt) | Garantia de acesso seguro a um servidor de localização descoberta para um dispositivo móvel | |
PH12019501289A1 (en) | Asset transfer method and apparatus, and electronic device | |
AU2014235181A8 (en) | Certificate based profile confirmation | |
MX2017008769A (es) | Metodo y dispositivo para determinar una autoridad de control en un dispositivo de usuario. | |
WO2016085883A3 (en) | Call stack integrity check on client/server systems | |
EP3142062A3 (en) | System and method for transactions security enhancement | |
BR112015027633A2 (pt) | Autenticação de usuário | |
BR112015004063A2 (pt) | sistema para comunicação sem fio; dispositivo portátil para comunicação sem fio para uso no sistema; dispositivo hospedeiro para comunicação sem fio para uso no sistema; dispositivo sem fio para comunicação sem fio para uso no sistema; método de comunicação sem fio em um sistema de dispositivos sem fio; e produto de programa de computador para comunicação sem fio entre dispositivos sem fio | |
WO2013032515A3 (en) | Systems and methods for application identification | |
BR112015028071A2 (pt) | sistemas e métodos para comunicação segura | |
GB2549227A (en) | Secure data management techniques | |
BR112014007113A8 (pt) | Autenticação para um dispositivo computacional baseada em reconhecimento facial | |
IN2013MU03727A (pt) | ||
BR112015032325A8 (pt) | Método implementado por computador para melhorar a segurança em sistemas de autenticação/autorização e seus produto de programa de computador | |
WO2014055241A3 (en) | Secure identification of computing device and secure identification methods | |
BR112014019863A8 (pt) | Método e arranjo para indicar a autenticidade em uma tela de exibição de um dispositivo eletrônico | |
WO2015013474A3 (en) | Anti-piracy protection for software |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
B06F | Objections, documents and/or translations needed after an examination request according [chapter 6.6 patent gazette] | ||
B06U | Preliminary requirement: requests with searches performed by other patent offices: procedure suspended [chapter 6.21 patent gazette] | ||
B07A | Application suspended after technical examination (opinion) [chapter 7.1 patent gazette] | ||
B09B | Patent application refused [chapter 9.2 patent gazette] | ||
B12B | Appeal against refusal [chapter 12.2 patent gazette] | ||
B25A | Requested transfer of rights approved |
Owner name: ARRIS INTERNATIONAL IP LTD. (GB) |
|
B25A | Requested transfer of rights approved |
Owner name: ANDREW WIRELESS SYSTEMS UK LIMITED (GB) |