IN2013MU01235A - - Google Patents

Info

Publication number
IN2013MU01235A
IN2013MU01235A IN1235MU2013A IN2013MU01235A IN 2013MU01235 A IN2013MU01235 A IN 2013MU01235A IN 1235MU2013 A IN1235MU2013 A IN 1235MU2013A IN 2013MU01235 A IN2013MU01235 A IN 2013MU01235A
Authority
IN
India
Prior art keywords
hybrid application
secure
primary
native file
hybrid
Prior art date
Application number
Inventor
Rajmohan Colonel
Satyanarayanan Ramaswamy
Original Assignee
Tata Consultancy Services Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tata Consultancy Services Ltd filed Critical Tata Consultancy Services Ltd
Priority to IN1235MU2013 priority Critical patent/IN2013MU01235A/en
Priority to US14/057,087 priority patent/US20140298456A1/en
Publication of IN2013MU01235A publication Critical patent/IN2013MU01235A/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/168Implementing security features at a particular protocol layer above the transport layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/128Anti-malware arrangements, e.g. protection against SMS fraud or mobile malware

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Stored Programmes (AREA)

Abstract

Systems and methods for securing hybrid applications for computing devices are described. According to the present subject matter, the system(s) implement the described method(s) for building and execution of secure hybrid applications. During build of the hybrid application, the disclosed method may incorporate identifying of at least one non-native file of the hybrid application, generating a primary Unique Identifier (UI) associated with the at least one non-native file, and storing the generated primary UI as a part of the hybrid application to form a secure hybrid application. During execution of the secure hybrid application the disclosed method may incorporate identifying of at least one non-native file of the secure hybrid application, generating a secondary UI associated with the at least one non-native file, extracting primary UI stored in the secure hybrid application. The system/method may further implement determining whether the generated secondary UI is different from the extracted primary UI.
IN1235MU2013 2013-03-28 2013-03-28 IN2013MU01235A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
IN1235MU2013 IN2013MU01235A (en) 2013-03-28 2013-03-28
US14/057,087 US20140298456A1 (en) 2013-03-28 2013-10-18 Securing applications for computing devices

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
IN1235MU2013 IN2013MU01235A (en) 2013-03-28 2013-03-28

Publications (1)

Publication Number Publication Date
IN2013MU01235A true IN2013MU01235A (en) 2015-04-10

Family

ID=51622221

Family Applications (1)

Application Number Title Priority Date Filing Date
IN1235MU2013 IN2013MU01235A (en) 2013-03-28 2013-03-28

Country Status (2)

Country Link
US (1) US20140298456A1 (en)
IN (1) IN2013MU01235A (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160253171A1 (en) * 2015-02-26 2016-09-01 Yan Zang Application development system with native feature engine
CN105740026B (en) * 2016-03-01 2019-07-30 深圳市茁壮网络股份有限公司 A kind of method that end TV updates application
FR3074323B1 (en) * 2017-11-30 2019-12-06 Idemia France METHOD AND DEVICE FOR CRYPTOGRAPHIC DATA PROCESSING

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7243236B1 (en) * 1999-07-29 2007-07-10 Intertrust Technologies Corp. Systems and methods for using cryptography to protect secure and insecure computing environments
US6922782B1 (en) * 2000-06-15 2005-07-26 International Business Machines Corporation Apparatus and method for ensuring data integrity of unauthenticated code
AU2001293563A1 (en) * 2000-09-21 2002-04-02 Research In Motion Limited Code signing system and method
US8495700B2 (en) * 2005-02-28 2013-07-23 Mcafee, Inc. Mobile data security system and methods
US20070264985A1 (en) * 2006-04-17 2007-11-15 Flextronics Software Systems Method and system for rapid creation of applications in communication devices
EP2583174A1 (en) * 2010-06-18 2013-04-24 Sweetlabs, Inc. Systems and methods for integration of an application runtime environment into a user computing environment
US8966508B2 (en) * 2012-02-20 2015-02-24 Electronics And Telecommunications Research Institute Method for executing hybrid web application and apparatus therefor
US20140096246A1 (en) * 2012-10-01 2014-04-03 Google Inc. Protecting users from undesirable content

Also Published As

Publication number Publication date
US20140298456A1 (en) 2014-10-02

Similar Documents

Publication Publication Date Title
EP3232602A4 (en) Management device, key generating device, vehicle, maintenance tool, management system, management method, and computer program
NZ713294A (en) Content creation tool
IN2014DE00768A (en)
MX2014013295A (en) Systems and methods for secure processing with embedded cryptographic unit.
BR112015021281A2 (en) cesium or rubidium secondary ore recovery methods
GB2520858A (en) Instruction set for message scheduling of SHA256 algorithm
MX352126B (en) Telemetry system for a cloud synchronization system.
IN2014DN10281A (en)
IN2015DN02532A (en)
GB201211544D0 (en) Trusted boot of a virtual machine
EP3334085A4 (en) Management device, management system, key generation device, key generation system, key management system, vehicle, management method, key generation method, and computer program
MX343875B (en) Method and system for determining image similarity.
IN2014DN08017A (en)
WO2012099801A3 (en) Ordering document content
MY178309A (en) Method and system for running encrypted files
SG11201805151WA (en) Method for performing inter-system service operation, service platform, and target system
GB2497458A (en) Enabling control to a hypervisor in a cloud computing environment
GB2509634A (en) Maintaining multiple target copies
MX2018006523A (en) Techniques for case allocation.
SG10201403477WA (en) Method, System and Computer Program for Generating Electronic Checklists
RU2015151183A (en) SIGNING THE PACKAGE
CA2927669C (en) Method and system for validating a virtual asset
AR099277A1 (en) COMPUTER DEVICE, METHOD AND APPLIANCE USING CALCULATION SHEETS AS A BASE FOR THE DEVELOPMENT OF IMPROVED APPLICATIONS
MX347158B (en) Spectrum management system and method.
AR091674A1 (en) METHOD FOR TRANSFORMING AN IMAGE DESCRIPTOR BASED ON A GRADIENT HISTOGRAM AND RELATED IMAGE PROCESSING DEVICE