CA3056394A1 - Systemes et methodes pour evaluer la signature d`acces aux donnees d`applications de tiers - Google Patents
Systemes et methodes pour evaluer la signature d`acces aux donnees d`applications de tiers Download PDFInfo
- Publication number
- CA3056394A1 CA3056394A1 CA3056394A CA3056394A CA3056394A1 CA 3056394 A1 CA3056394 A1 CA 3056394A1 CA 3056394 A CA3056394 A CA 3056394A CA 3056394 A CA3056394 A CA 3056394A CA 3056394 A1 CA3056394 A1 CA 3056394A1
- Authority
- CA
- Canada
- Prior art keywords
- application
- data
- server
- fake
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 82
- 238000012360 testing method Methods 0.000 claims abstract description 91
- 238000012546 transfer Methods 0.000 claims description 58
- 230000004044 response Effects 0.000 claims description 27
- 238000004891 communication Methods 0.000 claims description 24
- 230000009471 action Effects 0.000 claims description 9
- 238000011156 evaluation Methods 0.000 description 50
- 238000012544 monitoring process Methods 0.000 description 20
- 230000008859 change Effects 0.000 description 19
- 230000006399 behavior Effects 0.000 description 18
- 244000035744 Hura crepitans Species 0.000 description 12
- 230000000694 effects Effects 0.000 description 8
- 230000006870 function Effects 0.000 description 8
- 238000001514 detection method Methods 0.000 description 5
- 230000008569 process Effects 0.000 description 5
- 230000001186 cumulative effect Effects 0.000 description 4
- 238000010586 diagram Methods 0.000 description 4
- 238000013507 mapping Methods 0.000 description 4
- 230000002085 persistent effect Effects 0.000 description 4
- 238000012545 processing Methods 0.000 description 4
- 238000013515 script Methods 0.000 description 4
- 230000009193 crawling Effects 0.000 description 3
- 238000007726 management method Methods 0.000 description 3
- 238000013475 authorization Methods 0.000 description 2
- 238000010295 mobile communication Methods 0.000 description 2
- 238000012015 optical character recognition Methods 0.000 description 2
- 230000008520 organization Effects 0.000 description 2
- 238000012552 review Methods 0.000 description 2
- 238000007790 scraping Methods 0.000 description 2
- 238000013473 artificial intelligence Methods 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 230000001010 compromised effect Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000002349 favourable effect Effects 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 230000000116 mitigating effect Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000000737 periodic effect Effects 0.000 description 1
- 238000011176 pooling Methods 0.000 description 1
- 230000003442 weekly effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3664—Environments for testing or debugging software
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3668—Software testing
- G06F11/3672—Test management
- G06F11/3684—Test management for test design, e.g. generating new test cases
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/033—Test or assess software
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Quality & Reliability (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Computing Systems (AREA)
- Storage Device Security (AREA)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CA3056394A CA3056394A1 (fr) | 2019-09-23 | 2019-09-23 | Systemes et methodes pour evaluer la signature d`acces aux donnees d`applications de tiers |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CA3056394A CA3056394A1 (fr) | 2019-09-23 | 2019-09-23 | Systemes et methodes pour evaluer la signature d`acces aux donnees d`applications de tiers |
Publications (1)
Publication Number | Publication Date |
---|---|
CA3056394A1 true CA3056394A1 (fr) | 2021-03-23 |
Family
ID=75163868
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA3056394A Pending CA3056394A1 (fr) | 2019-09-23 | 2019-09-23 | Systemes et methodes pour evaluer la signature d`acces aux donnees d`applications de tiers |
Country Status (1)
Country | Link |
---|---|
CA (1) | CA3056394A1 (fr) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11704440B2 (en) | 2020-09-15 | 2023-07-18 | OneTrust, LLC | Data processing systems and methods for preventing execution of an action documenting a consent rejection |
US11727141B2 (en) | 2016-06-10 | 2023-08-15 | OneTrust, LLC | Data processing systems and methods for synching privacy-related user consent across multiple computing devices |
WO2023146854A3 (fr) * | 2022-01-25 | 2023-09-21 | OneTrust, LLC | Contrôle d'accès de données sur la base d'un objectif et/ou d'un consentement |
US11847182B2 (en) | 2016-06-10 | 2023-12-19 | OneTrust, LLC | Data processing consent capture systems and related methods |
US11868507B2 (en) | 2016-06-10 | 2024-01-09 | OneTrust, LLC | Data processing systems for cookie compliance testing with website scanning and related methods |
US11921894B2 (en) | 2016-06-10 | 2024-03-05 | OneTrust, LLC | Data processing systems for generating and populating a data inventory for processing data access requests |
US11947708B2 (en) | 2018-09-07 | 2024-04-02 | OneTrust, LLC | Data processing systems and methods for automatically protecting sensitive data within privacy management systems |
US11960564B2 (en) | 2016-06-10 | 2024-04-16 | OneTrust, LLC | Data processing systems and methods for automatically blocking the use of tracking tools |
US11968229B2 (en) | 2020-07-28 | 2024-04-23 | OneTrust, LLC | Systems and methods for automatically blocking the use of tracking tools |
-
2019
- 2019-09-23 CA CA3056394A patent/CA3056394A1/fr active Pending
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11727141B2 (en) | 2016-06-10 | 2023-08-15 | OneTrust, LLC | Data processing systems and methods for synching privacy-related user consent across multiple computing devices |
US11847182B2 (en) | 2016-06-10 | 2023-12-19 | OneTrust, LLC | Data processing consent capture systems and related methods |
US11868507B2 (en) | 2016-06-10 | 2024-01-09 | OneTrust, LLC | Data processing systems for cookie compliance testing with website scanning and related methods |
US11921894B2 (en) | 2016-06-10 | 2024-03-05 | OneTrust, LLC | Data processing systems for generating and populating a data inventory for processing data access requests |
US11960564B2 (en) | 2016-06-10 | 2024-04-16 | OneTrust, LLC | Data processing systems and methods for automatically blocking the use of tracking tools |
US11947708B2 (en) | 2018-09-07 | 2024-04-02 | OneTrust, LLC | Data processing systems and methods for automatically protecting sensitive data within privacy management systems |
US11968229B2 (en) | 2020-07-28 | 2024-04-23 | OneTrust, LLC | Systems and methods for automatically blocking the use of tracking tools |
US11704440B2 (en) | 2020-09-15 | 2023-07-18 | OneTrust, LLC | Data processing systems and methods for preventing execution of an action documenting a consent rejection |
WO2023146854A3 (fr) * | 2022-01-25 | 2023-09-21 | OneTrust, LLC | Contrôle d'accès de données sur la base d'un objectif et/ou d'un consentement |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA3056394A1 (fr) | Systemes et methodes pour evaluer la signature d`acces aux donnees d`applications de tiers | |
US11861017B2 (en) | Systems and methods for evaluating security of third-party applications | |
US10554736B2 (en) | Mobile URL categorization | |
US11822670B2 (en) | Security risk assessment and control for code | |
US10223524B1 (en) | Compromised authentication information clearing house | |
Chow et al. | Authentication in the clouds: a framework and its application to mobile users | |
US9838384B1 (en) | Password-based fraud detection | |
US11947678B2 (en) | Systems and methods for evaluating data access signature of third-party applications | |
US10176318B1 (en) | Authentication information update based on fraud detection | |
US11394739B2 (en) | Configurable event-based compute instance security assessments | |
US11050773B2 (en) | Selecting security incidents for advanced automatic analysis | |
US10831646B2 (en) | Resources usage for fuzz testing applications | |
Haimes et al. | Assessing systemic risk to cloud‐computing technology as complex interconnected systems of systems | |
Dini et al. | A multi-criteria-based evaluation of android applications | |
Baskaran et al. | Measuring the leakage and exploitability of authentication secrets in super-apps: The wechat case | |
Zhang et al. | A small leak will sink many ships: Vulnerabilities related to mini-programs permissions | |
US20220198013A1 (en) | Detecting suspicious activation of an application in a computer device | |
US20210084070A1 (en) | Systems and methods for detecting changes in data access pattern of third-party applications | |
Varshney et al. | Detecting spying and fraud browser extensions: Short paper | |
US20220138312A1 (en) | Processing transactions involving card reader devices containerized execution of code | |
CA3055486A1 (fr) | Systemes et methodes de detection de changements dans la signature d`acces aux donnees d`applications de tiers | |
CA3056083A1 (fr) | Systemes et methodes pour evaluer les applications de tiers | |
El May et al. | State of the art on Privacy Risk Estimation Related to Android Applications | |
Narang et al. | Severity measure of issues creating vulnerabilities in websites using two way assessment technique | |
Nomoto et al. | Understanding the Inconsistencies in the Permissions Mechanism of Web Browsers |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request |
Effective date: 20220615 |
|
EEER | Examination request |
Effective date: 20220615 |
|
EEER | Examination request |
Effective date: 20220615 |
|
EEER | Examination request |
Effective date: 20220615 |
|
EEER | Examination request |
Effective date: 20220615 |
|
EEER | Examination request |
Effective date: 20220615 |