CO6430045A1 - Mecanismo para aseguramiento de transacciones electronicas - Google Patents

Mecanismo para aseguramiento de transacciones electronicas

Info

Publication number
CO6430045A1
CO6430045A1 CO11050985A CO11050985A CO6430045A1 CO 6430045 A1 CO6430045 A1 CO 6430045A1 CO 11050985 A CO11050985 A CO 11050985A CO 11050985 A CO11050985 A CO 11050985A CO 6430045 A1 CO6430045 A1 CO 6430045A1
Authority
CO
Colombia
Prior art keywords
user
application
operating system
transactional
electronic transactions
Prior art date
Application number
CO11050985A
Other languages
English (en)
Inventor
Hernandez Jaime Enrique Gomez
Peinado Carlos A Perry
Montanez Wilmer Linares
Rueda Ivan Dario Tovar
Original Assignee
Azuan Technologies S A
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Azuan Technologies S A filed Critical Azuan Technologies S A
Priority to CO11050985A priority Critical patent/CO6430045A1/es
Priority to EP18190264.4A priority patent/EP3454508A1/en
Priority to PCT/IB2012/051260 priority patent/WO2012146987A1/en
Priority to US14/113,824 priority patent/US9369439B2/en
Priority to EP12777216.8A priority patent/EP2702728A4/en
Publication of CO6430045A1 publication Critical patent/CO6430045A1/es

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2127Bluffing

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Information Transfer Between Computers (AREA)
  • Debugging And Monitoring (AREA)

Abstract

La presente invención divulga un método de seguridad informática que permite a usuarios de una aplicación informática poseer niveles superiores de seguridad al momento de intercambiar información sensible con aplicaciones transaccionales. Cualquier usuario (sin necesidad de conocimientos avanzados en tecnologías) desde cualquier lugar, usando cualquier tipo de red puede realizar transacciones electrónicas con un muy bajo riesgo de que su información sea robada o comprometida.El método consiste en el desarrollo de un escritorio virtual que aísla el ambiente en el cual trabaja el usuario, implantando técnicas de hooking para interceptar mensajes entre la aplicación transaccional y el sistema operativo del usuario. Adicionalmente el método bloquea las combinaciones de teclas especiales para prevenir la ejecución de código malicioso. Durante el uso de la aplicación, se generan eventos basura en el sistema operativo del usuario. Cuando el usuario determine la terminación de la sesión segura, se retorna al escritorio original y el usuario puede seguir usando el equipo de forma normal.
CO11050985A 2011-04-26 2011-04-26 Mecanismo para aseguramiento de transacciones electronicas CO6430045A1 (es)

Priority Applications (5)

Application Number Priority Date Filing Date Title
CO11050985A CO6430045A1 (es) 2011-04-26 2011-04-26 Mecanismo para aseguramiento de transacciones electronicas
EP18190264.4A EP3454508A1 (en) 2011-04-26 2012-03-15 Method for internet transactions
PCT/IB2012/051260 WO2012146987A1 (en) 2011-04-26 2012-03-15 Method for internet transactions
US14/113,824 US9369439B2 (en) 2011-04-26 2012-03-15 Method for internet transactions
EP12777216.8A EP2702728A4 (en) 2011-04-26 2012-03-15 TRANSACTION METHOD BY INTERNET

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CO11050985A CO6430045A1 (es) 2011-04-26 2011-04-26 Mecanismo para aseguramiento de transacciones electronicas

Publications (1)

Publication Number Publication Date
CO6430045A1 true CO6430045A1 (es) 2012-04-30

Family

ID=46766651

Family Applications (1)

Application Number Title Priority Date Filing Date
CO11050985A CO6430045A1 (es) 2011-04-26 2011-04-26 Mecanismo para aseguramiento de transacciones electronicas

Country Status (4)

Country Link
US (1) US9369439B2 (es)
EP (2) EP2702728A4 (es)
CO (1) CO6430045A1 (es)
WO (1) WO2012146987A1 (es)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104699503A (zh) * 2015-02-28 2015-06-10 深圳市同洲电子股份有限公司 一种替换安卓系统中函数的执行逻辑的方法及装置
US9769131B1 (en) * 2016-08-02 2017-09-19 Architecture Technology Corporation Fast reconfiguring environment for mobile computing devices

Family Cites Families (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5974549A (en) * 1997-03-27 1999-10-26 Soliton Ltd. Security monitor
US6321337B1 (en) * 1997-09-09 2001-11-20 Sanctum Ltd. Method and system for protecting operations of trusted internal networks
US6513071B2 (en) * 1998-08-13 2003-01-28 International Business Machines Corporation Method for providing kiosk functionality in a general purpose operating system
US6384853B1 (en) * 1999-06-15 2002-05-07 Siemens Information And Communcation Networks, Inc. Apparatus and method for preventing screen savers from shutting down ToL clients
US7908652B1 (en) * 2001-12-21 2011-03-15 Trapware Corporation Detection of observers and countermeasures against observers
US7958237B2 (en) 2001-01-23 2011-06-07 Pearl Software, Inc. Method for managing computer network access
AU2002305490B2 (en) * 2001-05-09 2008-11-06 Sca Ipla Holdings, Inc. Systems and methods for the prevention of unauthorized use and manipulation of digital content
US7392541B2 (en) 2001-05-17 2008-06-24 Vir2Us, Inc. Computer system architecture and method providing operating-system independent virus-, hacker-, and cyber-terror-immune processing environments
US7089419B2 (en) * 2002-04-18 2006-08-08 International Business Machines Corporation Control function with multiple security states for facilitating secure operation of an integrated system
US7224344B2 (en) * 2003-08-05 2007-05-29 International Business Machines Corporation Key code filter apparatus and method
WO2005043360A1 (en) * 2003-10-21 2005-05-12 Green Border Technologies Systems and methods for secure client applications
US20100005531A1 (en) 2004-12-23 2010-01-07 Kenneth Largman Isolated multiplexed multi-dimensional processing in a virtual processing space having virus, spyware, and hacker protection features
US7725737B2 (en) 2005-10-14 2010-05-25 Check Point Software Technologies, Inc. System and methodology providing secure workspace environment
US20070174429A1 (en) * 2006-01-24 2007-07-26 Citrix Systems, Inc. Methods and servers for establishing a connection between a client system and a virtual machine hosting a requested computing environment
US8793662B2 (en) * 2008-03-25 2014-07-29 Microsoft Corporation Runtime code hooking for print driver and functionality testing
US8335931B2 (en) 2008-06-20 2012-12-18 Imation Corp. Interconnectable personal computer architectures that provide secure, portable, and persistent computing environments

Also Published As

Publication number Publication date
US9369439B2 (en) 2016-06-14
EP3454508A1 (en) 2019-03-13
EP2702728A4 (en) 2014-09-03
US20140137196A1 (en) 2014-05-15
WO2012146987A1 (en) 2012-11-01
EP2702728A1 (en) 2014-03-05

Similar Documents

Publication Publication Date Title
BR112017014632A2 (pt) ?método implementado por computador, e, sistema de computador?
BR112014004858A2 (pt) método para um backup seguro e recuperação de dados de configuração de um dispositivo de usuário em uma extremidade, e dispositivo utilizando o método
GB2440854A (en) System and method for key recovery
BRPI0608201A2 (pt) segredo compartilhado de contexto limitado
BR112016021120A2 (pt) Método e dispositivo de gerenciamento de dados confidenciais; método e sistema de autenticação segura
BR112014013805A2 (pt) meio legível por computador; método implantado por computador de proteção de um conjunto de participantes; dispositivo de computação; e objeto de transferência de cifra inteligente
JP2015508257A5 (es)
BR0311994A (pt) geração de chave em um sistema de comunicação
DE60324593D1 (de) Zuverlässiger systemzeitgeber
CO6170397A2 (es) Sistema seguro universal de transacciones
BR112015005740A2 (pt) método para controlar o acesso a dados sendo processados por um recurso de computação remoto, meio legível por computador, e sistema para controlar o acesso a dados sendo processados por um recurso de computação remoto
EA201401072A1 (ru) Способ защиты цифровой информации
EA201200921A1 (ru) Внешнее устройство по меньшей мере с одним запоминающим устройством
BRPI0503226A (pt) sistema e método para gerar um indicador de estado seguro em uma tela
CO6430045A1 (es) Mecanismo para aseguramiento de transacciones electronicas
CN105205416A (zh) 一种移动硬盘密码模块
Ferraz et al. More than meets the eye in smart city information security: Exploring security issues far beyond privacy concerns
CN204613932U (zh) 一种计算机数据保护系统
Li et al. Secure multi-party computation of set-inclusion and graph-inclusion.
CN204576521U (zh) 一种防泄密的计算机网络系统
Zeshan et al. Implementation of Disaster Risk Reduction Policy in Pakistan–An Evidence from Sialkot
Diffie The Evolving Meaning of Information Security
ES2538188A2 (es) Dispositivo , sistema y procedimiento para el intercambio seguro de información sensible en una red de comunicación
CN205038648U (zh) 一种实现大数据安全的系统
Baviskar et al. Android based message encryption/decryption using matrix