GB2597005A - Smart property archive for safeguarding software configuration - Google Patents

Smart property archive for safeguarding software configuration Download PDF

Info

Publication number
GB2597005A
GB2597005A GB2115358.0A GB202115358A GB2597005A GB 2597005 A GB2597005 A GB 2597005A GB 202115358 A GB202115358 A GB 202115358A GB 2597005 A GB2597005 A GB 2597005A
Authority
GB
United Kingdom
Prior art keywords
property
user
computing device
value
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
GB2115358.0A
Other versions
GB202115358D0 (en
GB2597005B (en
Inventor
Kong Kenneth Lee Hon
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of GB202115358D0 publication Critical patent/GB202115358D0/en
Publication of GB2597005A publication Critical patent/GB2597005A/en
Application granted granted Critical
Publication of GB2597005B publication Critical patent/GB2597005B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

A masked property file system receives a property key from a programmer and retrieves property key-value pairs. For each property key-value pair, the masked property file system identifies a masked value based on property files associated with the property key-value pair. For each property key-value pair, the masked property file system associates an environment for the masked value corresponding to the property key-value pair. For each property key -value pair, the masked property file system identifies an executable code for the masked value associated with the environment associated with each property key-value pair and generates a callback within the property key-value pair comprising the executable code. The masked property file system presents the property key-value pairs comprising the callbacks to the programmer. The programmer selects a callback of a property- key -value pair and the user computing device web browser is redirected to a property file service where the programmer may unmasking the masked value corresponding to the executable code.

Claims (10)

WHAT IS CLAIMED
1. A computer-implemented method to provide property key-value pairs comprising executable codes, comprising: receiving, by one or more computing devices and from a user computing device, a property key; retrieving, by the one or more computing devices, one or more property key-value pairs associated with one or more elements of the property key and property files associated with the one or more property key-value pairs; retrieving, by the one or more computing devices, service secrets corresponding to a plurality of environments; for each of the retrieved property key-value pairs: identifying, by the one or more computing devices, a masked value corresponding to the property key-value pair based on the property file; identifying, by the one or more computing devices, one or more environments of the plurality of environments correspond to the identified masked value; selecting, by the one or more computing devices, a particular environment of the one or more environments; and determining, by the one or more computing devices, an executable code associated with the particular environment, wherein the executable code directs the user computing device to a property file service offering unmasking of the masked value in response to a user selecting the executable code via the user computing device; generating, by the one or more computing devices, a callback comprising the executable code associated with the particular environment to be rendered with the retrieved property key-value pairs; transmitting, by the one or more computing devices and to the user computing device, the retrieved property key-value pairs comprising the respective callbacks for render on the user computing device.
2. The method of claim 1, further comprising: receiving, by the one or more computing devices and from the user computing device, an indication of a selection by the user of a callback corresponding to a particular property key-value pair; and transmitting, by the one or more computing devices and to the user computing device, a request for the web browser of the user computing device to redirect to the property file service corresponding to the executable code.
3. The method of claim 2, wherein the user unmasks the masked value by using the property file service via the user computing device.
4. The method of claim 1, further comprising: receiving, by the one or more computing devices and from the user computing device, an indication of a selection by the user of a callback corresponding to a particular property key-value pair; and transmitting, by the one or more computing devices and to the user computing device, a request for an application associated with the property file service resident on the user computing device to communicate with the property file service corresponding to the executable code.
5. The method of claim 1, further comprising: receiving, by the one or more computing devices and from the user computing device, an indication of a selection by the user of a callback corresponding to a particular property key-value pair; transmitting, by the one or more computing devices and to the property file service corresponding to the executable code, a request for a property plaintext secret associated with the masked value; receiving, by the one or more computing devices and from the property file service, the requested property ciphertext secret associated with the masked value; determining, by the one or more computing devices and based on the property ciphertext secret, a second plaintext secret for unmasking the masked value; transmitting, by the one or more computing devices and to the user computing device, a request for runnable information from the user, wherein the user enters or selects runnable information via the user computing device; receiving, by the one or more computing devices and from the user computing device, runnable information from the user; processing, by the one or more computing devices, a first transaction to unmask the masked value using the second plaintext secret; and processing, by the one or more computing devices, a second transaction to provide a runnable with the unmasked value using the runnable information from the user.
6. The method of claim 1, wherein the property file comprises contextual information associated with the property key-value pair as rendered on a web service discovery to which the property key-value pair pertains.
7. A system to provide property key-value pairs comprising executable codes, comprising: a storage device; and a processor communicatively coupled to the storage device, wherein the processor executes application code instructions that are stored in the storage device to cause the system to: receive a property key; retrieve one or more property key-value pairs associated with one or more elements of the property key and property files associated with the one or more property key-value pairs; retrieve service secrets corresponding to a plurality of environments; for each of the retrieved property key-value pairs: identify a masked value corresponding to the property key-value pair based on the property file; identify one or more environments of the plurality of environments corresponding to the identified masked value; select a particular environment of the one or more environments; determine an executable code associated with the particular environment, wherein the executable code directs the user computing device to a property file service offering the masked value in response to a user selecting the executable code via the user computing device; generate a callback comprising the executable code associated with the particular environment to be rendered with the retrieved property key-value pairs; and transmit, to the user computing device, the retrieved property key-value pairs comprising the respective callbacks for render on the user computing device.
8. The system of claim 7, wherein the processor is further configured to execute computer-readable program instructions stored in the storage medium to cause the system to: receive, from the user computing device, an indication of a selection by the user of a callback corresponding to a particular property key-value pair; transmit, to the property file service corresponding to the executable code, a request for a property plaintext secret associated with the masked value; receive, from the property file service, the requested property ciphertext secret associated with the masked value; determine, based on the property ciphertext secret, a second plaintext secret of the masked value; transmit, to the user computing device, a request for runnable information from the user, wherein the user enters or selects runnable information via the user computing device; receive, from the user computing device, runnable information of the user; process a first transaction to unmask the masked value using the second plaintext secret; and process a second transaction to provide a runnable with the unmasked value using the runnable information from the user.
9. The system of claim 7, wherein the processor is further configured to execute computer-readable program instructions stored in the storage medium to cause the system to: receive, from the user computing device, an indication of a selection by the user of a callback corresponding to a particular property key-value pair; and transmit, to the user computing device, a request for the web browser of the user computing device to redirect to the property file service corresponding to the executable code.
10. The system of claim 7, wherein the processor is further configured to execute computer-readable program instructions stored in the storage medium to cause the system to: receive, from the user computing device, an indication of a selection by the user of a callback corresponding to a particular property key-value pair; and transmit, to the user computing device, a request for an application associated with the property file service resident on the user computing device to communicate with the property file service corresponding to the executable code.
GB2115358.0A 2019-03-28 2019-03-28 Smart property archive for safeguarding software configuration Expired - Fee Related GB2597005B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/IB2019/052522 WO2020194035A1 (en) 2019-03-28 2019-03-28 Smart property archive for safeguarding software configuration

Publications (3)

Publication Number Publication Date
GB202115358D0 GB202115358D0 (en) 2021-12-08
GB2597005A true GB2597005A (en) 2022-01-12
GB2597005B GB2597005B (en) 2022-11-30

Family

ID=72608873

Family Applications (1)

Application Number Title Priority Date Filing Date
GB2115358.0A Expired - Fee Related GB2597005B (en) 2019-03-28 2019-03-28 Smart property archive for safeguarding software configuration

Country Status (3)

Country Link
CA (1) CA3139249A1 (en)
GB (1) GB2597005B (en)
WO (1) WO2020194035A1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008154105A2 (en) * 2007-06-08 2008-12-18 Massachusetts Institute Of Technology Disk-resident streaming dictionary
US8621447B1 (en) * 2009-08-25 2013-12-31 Adobe Systems Incorporated Systems and methods for dynamic struct variable creation including inline declaration with dynamic keys
CN108469952A (en) * 2018-03-16 2018-08-31 祖龙(天津)科技有限公司 A kind of code generating method and kit of management game configuration
CN108694041A (en) * 2017-03-06 2018-10-23 武汉斗鱼网络科技有限公司 Data transfer device, device and service terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008154105A2 (en) * 2007-06-08 2008-12-18 Massachusetts Institute Of Technology Disk-resident streaming dictionary
US8621447B1 (en) * 2009-08-25 2013-12-31 Adobe Systems Incorporated Systems and methods for dynamic struct variable creation including inline declaration with dynamic keys
CN108694041A (en) * 2017-03-06 2018-10-23 武汉斗鱼网络科技有限公司 Data transfer device, device and service terminal
CN108469952A (en) * 2018-03-16 2018-08-31 祖龙(天津)科技有限公司 A kind of code generating method and kit of management game configuration

Also Published As

Publication number Publication date
GB202115358D0 (en) 2021-12-08
CA3139249A1 (en) 2020-10-01
WO2020194035A1 (en) 2020-10-01
GB2597005B (en) 2022-11-30

Similar Documents

Publication Publication Date Title
US10606672B2 (en) Micro-service framework derived from third-party apps
US9699272B2 (en) Mechanism for initiating behavior in a native client application from a web client application via a custom URL scheme
US9547721B2 (en) Native application search results
JP2019517057A (en) Wide and deep machine learning model
CN111614655A (en) Consensus checking method and device
EP3011477A1 (en) Identifying relevant apps in response to queries
US8832143B2 (en) Client-side statement cache
US10362097B1 (en) Processing an operation with a plurality of processing steps
KR102153035B1 (en) Method and apparatus for detecting malicious mining
LaBarbera et al. A prediction model for Clostridium difficile recurrence
US10747657B2 (en) Methods, systems, apparatuses and devices for facilitating execution of test cases
US11438401B2 (en) Service processing method and device
US20230006819A1 (en) Systems and methods for homomorphic encryption-based triggering
KR20150022138A (en) System and method for providing agent service to user terminal
US11775439B2 (en) Prefetching data for application usage
US12072760B2 (en) Methods and apparatus to control execution of tasks in a computing system
CN114239026A (en) Information desensitization conversion processing method, device, computer equipment and storage medium
GB2597005A (en) Smart property archive for safeguarding software configuration
CN112738249A (en) File uploading method, device, equipment and storage medium based on quantitative transaction
US20140114954A1 (en) Incorporating related searches by other users in a social network in a search request
WO2016186628A1 (en) Hardware bus redirection
US20180062936A1 (en) Display of Server Capabilities
JP6710716B2 (en) Threat information evaluation device, threat information evaluation method and program
GB2601098A (en) Security credentials management for client applications
KR20170061682A (en) Automated computing system personalization

Legal Events

Date Code Title Description
PCNP Patent ceased through non-payment of renewal fee

Effective date: 20230328