CO6430045A1 - Mecanismo para aseguramiento de transacciones electronicas - Google Patents
Mecanismo para aseguramiento de transacciones electronicasInfo
- Publication number
- CO6430045A1 CO6430045A1 CO11050985A CO11050985A CO6430045A1 CO 6430045 A1 CO6430045 A1 CO 6430045A1 CO 11050985 A CO11050985 A CO 11050985A CO 11050985 A CO11050985 A CO 11050985A CO 6430045 A1 CO6430045 A1 CO 6430045A1
- Authority
- CO
- Colombia
- Prior art keywords
- user
- application
- operating system
- transactional
- electronic transactions
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2127—Bluffing
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Information Transfer Between Computers (AREA)
- Debugging And Monitoring (AREA)
Abstract
La presente invención divulga un método de seguridad informática que permite a usuarios de una aplicación informática poseer niveles superiores de seguridad al momento de intercambiar información sensible con aplicaciones transaccionales. Cualquier usuario (sin necesidad de conocimientos avanzados en tecnologías) desde cualquier lugar, usando cualquier tipo de red puede realizar transacciones electrónicas con un muy bajo riesgo de que su información sea robada o comprometida.El método consiste en el desarrollo de un escritorio virtual que aísla el ambiente en el cual trabaja el usuario, implantando técnicas de hooking para interceptar mensajes entre la aplicación transaccional y el sistema operativo del usuario. Adicionalmente el método bloquea las combinaciones de teclas especiales para prevenir la ejecución de código malicioso. Durante el uso de la aplicación, se generan eventos basura en el sistema operativo del usuario. Cuando el usuario determine la terminación de la sesión segura, se retorna al escritorio original y el usuario puede seguir usando el equipo de forma normal.
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CO11050985A CO6430045A1 (es) | 2011-04-26 | 2011-04-26 | Mecanismo para aseguramiento de transacciones electronicas |
EP18190264.4A EP3454508A1 (en) | 2011-04-26 | 2012-03-15 | Method for internet transactions |
PCT/IB2012/051260 WO2012146987A1 (en) | 2011-04-26 | 2012-03-15 | Method for internet transactions |
US14/113,824 US9369439B2 (en) | 2011-04-26 | 2012-03-15 | Method for internet transactions |
EP12777216.8A EP2702728A4 (en) | 2011-04-26 | 2012-03-15 | TRANSACTION METHOD BY INTERNET |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CO11050985A CO6430045A1 (es) | 2011-04-26 | 2011-04-26 | Mecanismo para aseguramiento de transacciones electronicas |
Publications (1)
Publication Number | Publication Date |
---|---|
CO6430045A1 true CO6430045A1 (es) | 2012-04-30 |
Family
ID=46766651
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CO11050985A CO6430045A1 (es) | 2011-04-26 | 2011-04-26 | Mecanismo para aseguramiento de transacciones electronicas |
Country Status (4)
Country | Link |
---|---|
US (1) | US9369439B2 (es) |
EP (2) | EP2702728A4 (es) |
CO (1) | CO6430045A1 (es) |
WO (1) | WO2012146987A1 (es) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104699503A (zh) * | 2015-02-28 | 2015-06-10 | 深圳市同洲电子股份有限公司 | 一种替换安卓系统中函数的执行逻辑的方法及装置 |
US9769131B1 (en) * | 2016-08-02 | 2017-09-19 | Architecture Technology Corporation | Fast reconfiguring environment for mobile computing devices |
Family Cites Families (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5974549A (en) * | 1997-03-27 | 1999-10-26 | Soliton Ltd. | Security monitor |
US6321337B1 (en) * | 1997-09-09 | 2001-11-20 | Sanctum Ltd. | Method and system for protecting operations of trusted internal networks |
US6513071B2 (en) * | 1998-08-13 | 2003-01-28 | International Business Machines Corporation | Method for providing kiosk functionality in a general purpose operating system |
US6384853B1 (en) * | 1999-06-15 | 2002-05-07 | Siemens Information And Communcation Networks, Inc. | Apparatus and method for preventing screen savers from shutting down ToL clients |
US7908652B1 (en) * | 2001-12-21 | 2011-03-15 | Trapware Corporation | Detection of observers and countermeasures against observers |
US7958237B2 (en) | 2001-01-23 | 2011-06-07 | Pearl Software, Inc. | Method for managing computer network access |
AU2002305490B2 (en) * | 2001-05-09 | 2008-11-06 | Sca Ipla Holdings, Inc. | Systems and methods for the prevention of unauthorized use and manipulation of digital content |
US7392541B2 (en) | 2001-05-17 | 2008-06-24 | Vir2Us, Inc. | Computer system architecture and method providing operating-system independent virus-, hacker-, and cyber-terror-immune processing environments |
US7089419B2 (en) * | 2002-04-18 | 2006-08-08 | International Business Machines Corporation | Control function with multiple security states for facilitating secure operation of an integrated system |
US7224344B2 (en) * | 2003-08-05 | 2007-05-29 | International Business Machines Corporation | Key code filter apparatus and method |
WO2005043360A1 (en) * | 2003-10-21 | 2005-05-12 | Green Border Technologies | Systems and methods for secure client applications |
US20100005531A1 (en) | 2004-12-23 | 2010-01-07 | Kenneth Largman | Isolated multiplexed multi-dimensional processing in a virtual processing space having virus, spyware, and hacker protection features |
US7725737B2 (en) | 2005-10-14 | 2010-05-25 | Check Point Software Technologies, Inc. | System and methodology providing secure workspace environment |
US20070174429A1 (en) * | 2006-01-24 | 2007-07-26 | Citrix Systems, Inc. | Methods and servers for establishing a connection between a client system and a virtual machine hosting a requested computing environment |
US8793662B2 (en) * | 2008-03-25 | 2014-07-29 | Microsoft Corporation | Runtime code hooking for print driver and functionality testing |
US8335931B2 (en) | 2008-06-20 | 2012-12-18 | Imation Corp. | Interconnectable personal computer architectures that provide secure, portable, and persistent computing environments |
-
2011
- 2011-04-26 CO CO11050985A patent/CO6430045A1/es unknown
-
2012
- 2012-03-15 EP EP12777216.8A patent/EP2702728A4/en not_active Ceased
- 2012-03-15 WO PCT/IB2012/051260 patent/WO2012146987A1/en active Application Filing
- 2012-03-15 EP EP18190264.4A patent/EP3454508A1/en not_active Withdrawn
- 2012-03-15 US US14/113,824 patent/US9369439B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
US9369439B2 (en) | 2016-06-14 |
EP3454508A1 (en) | 2019-03-13 |
EP2702728A4 (en) | 2014-09-03 |
US20140137196A1 (en) | 2014-05-15 |
WO2012146987A1 (en) | 2012-11-01 |
EP2702728A1 (en) | 2014-03-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
BR112017014632A2 (pt) | ?método implementado por computador, e, sistema de computador? | |
BR112014004858A2 (pt) | método para um backup seguro e recuperação de dados de configuração de um dispositivo de usuário em uma extremidade, e dispositivo utilizando o método | |
GB2440854A (en) | System and method for key recovery | |
BRPI0608201A2 (pt) | segredo compartilhado de contexto limitado | |
BR112016021120A2 (pt) | Método e dispositivo de gerenciamento de dados confidenciais; método e sistema de autenticação segura | |
BR112014013805A2 (pt) | meio legível por computador; método implantado por computador de proteção de um conjunto de participantes; dispositivo de computação; e objeto de transferência de cifra inteligente | |
JP2015508257A5 (es) | ||
BR0311994A (pt) | geração de chave em um sistema de comunicação | |
DE60324593D1 (de) | Zuverlässiger systemzeitgeber | |
CO6170397A2 (es) | Sistema seguro universal de transacciones | |
BR112015005740A2 (pt) | método para controlar o acesso a dados sendo processados por um recurso de computação remoto, meio legível por computador, e sistema para controlar o acesso a dados sendo processados por um recurso de computação remoto | |
EA201401072A1 (ru) | Способ защиты цифровой информации | |
EA201200921A1 (ru) | Внешнее устройство по меньшей мере с одним запоминающим устройством | |
BRPI0503226A (pt) | sistema e método para gerar um indicador de estado seguro em uma tela | |
CO6430045A1 (es) | Mecanismo para aseguramiento de transacciones electronicas | |
CN105205416A (zh) | 一种移动硬盘密码模块 | |
Ferraz et al. | More than meets the eye in smart city information security: Exploring security issues far beyond privacy concerns | |
CN204613932U (zh) | 一种计算机数据保护系统 | |
Li et al. | Secure multi-party computation of set-inclusion and graph-inclusion. | |
CN204576521U (zh) | 一种防泄密的计算机网络系统 | |
Zeshan et al. | Implementation of Disaster Risk Reduction Policy in Pakistan–An Evidence from Sialkot | |
Diffie | The Evolving Meaning of Information Security | |
ES2538188A2 (es) | Dispositivo , sistema y procedimiento para el intercambio seguro de información sensible en una red de comunicación | |
CN205038648U (zh) | 一种实现大数据安全的系统 | |
Baviskar et al. | Android based message encryption/decryption using matrix |