IN2013MU01235A - - Google Patents
Info
- Publication number
- IN2013MU01235A IN2013MU01235A IN1235MU2013A IN2013MU01235A IN 2013MU01235 A IN2013MU01235 A IN 2013MU01235A IN 1235MU2013 A IN1235MU2013 A IN 1235MU2013A IN 2013MU01235 A IN2013MU01235 A IN 2013MU01235A
- Authority
- IN
- India
- Prior art keywords
- hybrid application
- secure
- primary
- native file
- hybrid
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/168—Implementing security features at a particular protocol layer above the transport layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/128—Anti-malware arrangements, e.g. protection against SMS fraud or mobile malware
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Stored Programmes (AREA)
Abstract
Systems and methods for securing hybrid applications for computing devices are described. According to the present subject matter, the system(s) implement the described method(s) for building and execution of secure hybrid applications. During build of the hybrid application, the disclosed method may incorporate identifying of at least one non-native file of the hybrid application, generating a primary Unique Identifier (UI) associated with the at least one non-native file, and storing the generated primary UI as a part of the hybrid application to form a secure hybrid application. During execution of the secure hybrid application the disclosed method may incorporate identifying of at least one non-native file of the secure hybrid application, generating a secondary UI associated with the at least one non-native file, extracting primary UI stored in the secure hybrid application. The system/method may further implement determining whether the generated secondary UI is different from the extracted primary UI.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
IN1235MU2013 IN2013MU01235A (en) | 2013-03-28 | 2013-03-28 | |
US14/057,087 US20140298456A1 (en) | 2013-03-28 | 2013-10-18 | Securing applications for computing devices |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
IN1235MU2013 IN2013MU01235A (en) | 2013-03-28 | 2013-03-28 |
Publications (1)
Publication Number | Publication Date |
---|---|
IN2013MU01235A true IN2013MU01235A (en) | 2015-04-10 |
Family
ID=51622221
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
IN1235MU2013 IN2013MU01235A (en) | 2013-03-28 | 2013-03-28 |
Country Status (2)
Country | Link |
---|---|
US (1) | US20140298456A1 (en) |
IN (1) | IN2013MU01235A (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160253171A1 (en) * | 2015-02-26 | 2016-09-01 | Yan Zang | Application development system with native feature engine |
CN105740026B (en) * | 2016-03-01 | 2019-07-30 | 深圳市茁壮网络股份有限公司 | A kind of method that end TV updates application |
FR3074323B1 (en) * | 2017-11-30 | 2019-12-06 | Idemia France | METHOD AND DEVICE FOR CRYPTOGRAPHIC DATA PROCESSING |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7243236B1 (en) * | 1999-07-29 | 2007-07-10 | Intertrust Technologies Corp. | Systems and methods for using cryptography to protect secure and insecure computing environments |
US6922782B1 (en) * | 2000-06-15 | 2005-07-26 | International Business Machines Corporation | Apparatus and method for ensuring data integrity of unauthenticated code |
AU2001293563A1 (en) * | 2000-09-21 | 2002-04-02 | Research In Motion Limited | Code signing system and method |
US8495700B2 (en) * | 2005-02-28 | 2013-07-23 | Mcafee, Inc. | Mobile data security system and methods |
US20070264985A1 (en) * | 2006-04-17 | 2007-11-15 | Flextronics Software Systems | Method and system for rapid creation of applications in communication devices |
EP2583174A1 (en) * | 2010-06-18 | 2013-04-24 | Sweetlabs, Inc. | Systems and methods for integration of an application runtime environment into a user computing environment |
US8966508B2 (en) * | 2012-02-20 | 2015-02-24 | Electronics And Telecommunications Research Institute | Method for executing hybrid web application and apparatus therefor |
US20140096246A1 (en) * | 2012-10-01 | 2014-04-03 | Google Inc. | Protecting users from undesirable content |
-
2013
- 2013-03-28 IN IN1235MU2013 patent/IN2013MU01235A/en unknown
- 2013-10-18 US US14/057,087 patent/US20140298456A1/en not_active Abandoned
Also Published As
Publication number | Publication date |
---|---|
US20140298456A1 (en) | 2014-10-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3232602A4 (en) | Management device, key generating device, vehicle, maintenance tool, management system, management method, and computer program | |
NZ713294A (en) | Content creation tool | |
IN2014DE00768A (en) | ||
MX2014013295A (en) | Systems and methods for secure processing with embedded cryptographic unit. | |
BR112015021281A2 (en) | cesium or rubidium secondary ore recovery methods | |
GB2520858A (en) | Instruction set for message scheduling of SHA256 algorithm | |
MX352126B (en) | Telemetry system for a cloud synchronization system. | |
IN2014DN10281A (en) | ||
IN2015DN02532A (en) | ||
GB201211544D0 (en) | Trusted boot of a virtual machine | |
EP3334085A4 (en) | Management device, management system, key generation device, key generation system, key management system, vehicle, management method, key generation method, and computer program | |
MX343875B (en) | Method and system for determining image similarity. | |
IN2014DN08017A (en) | ||
WO2012099801A3 (en) | Ordering document content | |
MY178309A (en) | Method and system for running encrypted files | |
SG11201805151WA (en) | Method for performing inter-system service operation, service platform, and target system | |
GB2497458A (en) | Enabling control to a hypervisor in a cloud computing environment | |
GB2509634A (en) | Maintaining multiple target copies | |
MX2018006523A (en) | Techniques for case allocation. | |
SG10201403477WA (en) | Method, System and Computer Program for Generating Electronic Checklists | |
RU2015151183A (en) | SIGNING THE PACKAGE | |
CA2927669C (en) | Method and system for validating a virtual asset | |
AR099277A1 (en) | COMPUTER DEVICE, METHOD AND APPLIANCE USING CALCULATION SHEETS AS A BASE FOR THE DEVELOPMENT OF IMPROVED APPLICATIONS | |
MX347158B (en) | Spectrum management system and method. | |
AR091674A1 (en) | METHOD FOR TRANSFORMING AN IMAGE DESCRIPTOR BASED ON A GRADIENT HISTOGRAM AND RELATED IMAGE PROCESSING DEVICE |