JP2018511133A - 動的なセキュリティーモジュールサーバー装置及びその駆動方法 - Google Patents
動的なセキュリティーモジュールサーバー装置及びその駆動方法 Download PDFInfo
- Publication number
- JP2018511133A JP2018511133A JP2017567030A JP2017567030A JP2018511133A JP 2018511133 A JP2018511133 A JP 2018511133A JP 2017567030 A JP2017567030 A JP 2017567030A JP 2017567030 A JP2017567030 A JP 2017567030A JP 2018511133 A JP2018511133 A JP 2018511133A
- Authority
- JP
- Japan
- Prior art keywords
- security
- dynamic
- security module
- user terminal
- client
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 58
- 238000012790 confirmation Methods 0.000 claims description 21
- 230000015556 catabolic process Effects 0.000 claims description 17
- 238000004891 communication Methods 0.000 claims description 16
- 238000012795 verification Methods 0.000 claims description 14
- 238000007726 management method Methods 0.000 description 93
- 238000010586 diagram Methods 0.000 description 11
- 241000700605 Viruses Species 0.000 description 8
- 230000006870 function Effects 0.000 description 6
- 230000004075 alteration Effects 0.000 description 5
- 230000009385 viral infection Effects 0.000 description 5
- 230000008569 process Effects 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 3
- 238000004458 analytical method Methods 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 238000010348 incorporation Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000003745 diagnosis Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 230000007480 spreading Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
- H04L63/0846—Network architectures or network communication protocols for network security for authentication of entities using passwords using time-dependent-passwords, e.g. periodically changing passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/14—Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/54—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/567—Computer malware detection or handling, e.g. anti-virus arrangements using dedicated hardware
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
- H04L67/141—Setup of application sessions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
- H04L67/146—Markers for unambiguous identification of a particular session, e.g. session cookie or URL-encoding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/34—Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/033—Test or assess software
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2137—Time limited access, e.g. to a computer or data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Abstract
Description
発明の実施のための形態
産業上利用可能性
Claims (16)
- 使用者端末に動的なセキュリティーモジュールを伝送し、使用者端末からセキュリティー管理イベントを受信する動的なセキュリティーモジュールサーバー装置であって、
ネットワークを介して前記セキュリティー管理イベントを送受信する通信ユニット;及び
前記通信ユニットを制御するプロセッサ;を含み、
前記プロセッサは、前記使用者端末のセキュリティークライアントとのセキュリティーセッションを生成し、
前記動的なセキュリティーモジュールを前記使用者端末のセキュリティークライアントに伝送し、
前記セキュリティーセッションが生成された前記使用者端末のセキュリティークライアントで前記セキュリティー管理を行うコードの一部又は全部が有効時間を有するようにする、動的なセキュリティーモジュールサーバー装置。 - 前記プロセッサは、
前記セキュリティークライアントに伝送された動的なセキュリティーモジュールからセキュリティー管理の結果を受信し、前記受信したセキュリティー管理の結果を確認し、セキュリティー管理の確認の結果の値を前記セキュリティークライアントの動的なセキュリティーモジュールに伝送することをさらに含む、請求項1に記載の動的なセキュリティーモジュールサーバー装置。 - 前記プロセッサは、
前記使用者端末でセキュリティー問題が発生する時、前記使用者端末の応用プログラムを停止させるようにする停止命令を前記セキュリティークライアントの動的なセキュリティーモジュールに伝送することをさらに含む、請求項1に記載の動的なセキュリティーモジュールサーバー装置。 - 前記プロセッサは、
セキュリティーセッション識別子としてセッションIDを生成して保存し、前記セッションIDを前記セキュリティークライアントに伝送して前記セキュリティークライアントが前記セッションIDを保存するようにして、前記セキュリティーセッションを生成する、請求項1に記載の動的なセキュリティーモジュールサーバー装置。 - 前記セキュリティーセッションの生成は、認証の完了した使用者端末のセキュリティークライアントと生成する、請求項1に記載の動的なセキュリティーモジュールサーバー装置。
- 前記有効時間は、前記有効時間の経過時、前記コードの一部又は全部が削除される、又は使われないようにする有効時間である、請求項1に記載の動的なセキュリティーモジュールサーバー装置。
- 前記プロセッサは、
前記セキュリティーセッションが維持される中で、前記セキュリティークライアントに伝送されたそれぞれの前記動的なセキュリティーモジュールに対するパラメーターを保存することをさらに含む、請求項1に記載の動的なセキュリティーモジュールサーバー装置。 - 前記プロセッサは、
前記セキュリティークライアントから伝送された内訳が前記動的なセキュリティーモジュールのパラメーターの構成と同一であるかを検証することをさらに含む、請求項7に記載の動的なセキュリティーモジュールサーバー装置。 - 前記動的なセキュリティーモジュールサーバー装置は、前記使用者端末のセキュリティークライアントに伝送する動的なセキュリティーモジュール、セキュリティーセッション識別子としてセッションID、及び動的なセキュリティーモジュールに対するパラメーターを保存するストレージをさらに含む、請求項1に記載の動的なセキュリティーモジュールサーバー装置。
- 前記プロセッサは、
前記動的なセキュリティーモジュールが正常に動作したことを証明する検証トーケンを前記使用者端末の応用プログラム運用サーバーに伝送することをさらに含む、請求項1に記載の動的なセキュリティーモジュールサーバー装置。 - 使用者端末に動的なセキュリティーモジュールを伝送し、使用者端末からセキュリティー管理イベントを受信する動的なセキュリティーモジュールサーバー装置の駆動方法であって、
前記使用者端末のセキュリティークライアントとのセキュリティーセッションを生成する段階;及び
前記動的なセキュリティーモジュールを前記セキュリティーセッションが生成された前記使用者端末のセキュリティークライアントで前記セキュリティー管理を行うコードの一部又は全部が有効時間を有するように前記使用者端末のセキュリティークライアントに伝送する段階;を含む、動的なセキュリティーモジュールサーバー装置の駆動方法。 - 前記駆動方法は、
前記セキュリティークライアントに伝送された動的なセキュリティーモジュールからセキュリティー管理の結果を受信し、前記受信したセキュリティー管理の結果を確認し、セキュリティー管理の確認の結果の値を前記セキュリティークライアントの動的なセキュリティーモジュールに伝送する段階をさらに含む、請求項11に記載の動的なセキュリティーモジュールサーバー装置の駆動方法。 - 前記駆動方法は、
前記使用者端末でセキュリティー問題が発生する時、前記使用者端末の応用プログラムを停止させるようにする停止命令を前記セキュリティークライアントの動的なセキュリティーモジュールに伝送する段階をさらに含む、請求項11に記載の動的なセキュリティーモジュールサーバー装置の駆動方法。 - 前記駆動方法は、
セキュリティーセッション識別子としてセッションIDを生成して保存し、前記セッションIDを前記セキュリティークライアントに伝送して前記セキュリティークライアントが前記セッションIDを保存するようにして、前記セキュリティーセッションを生成する、請求項11に記載の動的なセキュリティーモジュールサーバー装置の駆動方法。 - 前記駆動方法は、
前記セキュリティーセッションが維持される中で、前記セキュリティークライアントに伝送されたそれぞれの前記動的なセキュリティーモジュールに対するパラメーターを保存する段階をさらに含む、請求項11に記載の動的なセキュリティーモジュールサーバー装置の駆動方法。 - 請求項11〜15のいずれか一項に記載の方法を行うためのプログラムが記録されているコンピュータ可読の記録媒体。
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR10-2015-0035177 | 2015-03-13 | ||
KR20150035177 | 2015-03-13 | ||
PCT/KR2016/002535 WO2016148471A1 (ko) | 2015-03-13 | 2016-03-14 | 다이나믹 보안모듈 서버장치 및 그 구동방법 |
KR1020160030568A KR101799366B1 (ko) | 2015-03-13 | 2016-03-14 | 다이나믹 보안모듈 서버장치 및 그 구동방법 |
KR10-2016-0030568 | 2016-03-14 |
Publications (2)
Publication Number | Publication Date |
---|---|
JP2018511133A true JP2018511133A (ja) | 2018-04-19 |
JP6663937B2 JP6663937B2 (ja) | 2020-03-13 |
Family
ID=57080532
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2017567031A Active JP6654651B2 (ja) | 2015-03-13 | 2016-03-14 | 動的なセキュリティーモジュール端末装置及びその駆動方法 |
JP2017567032A Active JP6654652B2 (ja) | 2015-03-13 | 2016-03-14 | 動的なセキュリティーモジュール生成方法及び生成装置 |
JP2017567030A Active JP6663937B2 (ja) | 2015-03-13 | 2016-03-14 | 動的なセキュリティーモジュールサーバー装置及びその駆動方法 |
Family Applications Before (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2017567031A Active JP6654651B2 (ja) | 2015-03-13 | 2016-03-14 | 動的なセキュリティーモジュール端末装置及びその駆動方法 |
JP2017567032A Active JP6654652B2 (ja) | 2015-03-13 | 2016-03-14 | 動的なセキュリティーモジュール生成方法及び生成装置 |
Country Status (5)
Country | Link |
---|---|
US (3) | US10867048B2 (ja) |
EP (3) | EP3270318B1 (ja) |
JP (3) | JP6654651B2 (ja) |
KR (3) | KR101756692B1 (ja) |
CN (3) | CN107431705B (ja) |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10318272B1 (en) * | 2017-03-30 | 2019-06-11 | Symantec Corporation | Systems and methods for managing application updates |
US11368474B2 (en) * | 2018-01-23 | 2022-06-21 | Rapid7, Inc. | Detecting anomalous internet behavior |
US11336658B2 (en) | 2018-04-27 | 2022-05-17 | Dell Products L.P. | Information handling system threat management |
US11595407B2 (en) | 2018-04-27 | 2023-02-28 | Dell Products L.P. | Information handling system threat management |
US10637876B2 (en) * | 2018-04-27 | 2020-04-28 | Dell Products L.P. | Information handling system threat management |
CN110413268B (zh) * | 2018-04-28 | 2023-11-10 | 武汉斗鱼网络科技有限公司 | 一种中间件验证方法、存储介质、设备及系统 |
WO2022185418A1 (ja) * | 2021-03-02 | 2022-09-09 | 三菱電機株式会社 | デバッグ支援プログラム、デバッグ支援装置、デバッグ支援方法および機械学習装置 |
CN115098227B (zh) * | 2022-08-24 | 2022-12-27 | 中诚华隆计算机技术有限公司 | 一种安防设备动态信息更新的方法及装置 |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2004038966A (ja) * | 2002-06-28 | 2004-02-05 | Microsoft Corp | セキュアな変数データ保護を提供するセキュアで不明瞭なタイプライブラリ |
JP2004348710A (ja) * | 2003-05-20 | 2004-12-09 | Samsung Electronics Co Ltd | 固有番号を用いたプログラムの耐タンパ手法、及び難読化されたプログラムアップグレード方法、並びにこれらの方法のための装置 |
JP2006259848A (ja) * | 2005-03-15 | 2006-09-28 | Matsushita Electric Ind Co Ltd | プログラム実行装置、プログラム実行方法、および、プログラム |
JPWO2006090800A1 (ja) * | 2005-02-25 | 2008-07-24 | 松下電器産業株式会社 | セキュア処理装置、及びセキュア処理システム |
JP2009514060A (ja) * | 2005-10-28 | 2009-04-02 | パナソニック株式会社 | 難読化評価方法および難読化方法 |
JP2010152877A (ja) * | 2008-11-26 | 2010-07-08 | Panasonic Corp | ソフトウェア更新システム、管理装置、記録媒体及び集積回路 |
JP2012165289A (ja) * | 2011-02-08 | 2012-08-30 | Fujitsu Ltd | 通信装置およびセキュアモジュール |
Family Cites Families (29)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5708709A (en) * | 1995-12-08 | 1998-01-13 | Sun Microsystems, Inc. | System and method for managing try-and-buy usage of application programs |
KR20030003593A (ko) | 2001-07-03 | 2003-01-10 | (주) 해커스랩 | 제한조건 동안 특정 보안정책을 적용할 수 있는 네트워크보안장치 및 네트워크 보안방법 |
US7552470B2 (en) * | 2002-11-21 | 2009-06-23 | Honeywell International Inc. | Generic security infrastructure for COM based systems |
KR100956823B1 (ko) * | 2003-02-11 | 2010-05-11 | 엘지전자 주식회사 | 이동 통신 시스템에서 보안 설정 메시지를 처리하는 방법 |
US7551986B2 (en) * | 2004-02-24 | 2009-06-23 | Denso Corporation | Program distribution system, program distribution device, and in-vehicle gateway device |
US7360237B2 (en) * | 2004-07-30 | 2008-04-15 | Lehman Brothers Inc. | System and method for secure network connectivity |
FR2880441B1 (fr) | 2004-12-31 | 2010-06-18 | Trusted Logic | Chargement dynamique securise |
KR101134217B1 (ko) | 2005-06-13 | 2012-04-06 | 주식회사 엘지씨엔에스 | 보안정책의 암호화 방법 및 그 방법을 구현하는침입탐지시스템 |
US9311454B2 (en) * | 2005-09-19 | 2016-04-12 | At&T Intellectual Property I, L.P. | Trial use of a collection of media files |
WO2007092573A2 (en) * | 2006-02-07 | 2007-08-16 | Cisco Technology, Inc. | Methods and systems for providing telephony services and enforcing policies in a communication network |
EP1879332A1 (fr) * | 2006-07-12 | 2008-01-16 | France Télécom | Procede et systeme de gestion d'une transmission securisee |
CN101083660A (zh) * | 2007-05-30 | 2007-12-05 | 北京润汇科技有限公司 | 基于会话控制的动态地址分配协议的ip网认证鉴权方法 |
CN101188495B (zh) * | 2007-12-04 | 2010-08-25 | 兆日科技(深圳)有限公司 | 一种实现强口令认证方式的安全系统及方法 |
US8738932B2 (en) * | 2009-01-16 | 2014-05-27 | Teleputers, Llc | System and method for processor-based security |
CN101894094B (zh) * | 2009-05-21 | 2014-10-15 | 鸿富锦精密工业(深圳)有限公司 | 客户端管理系统 |
US9722973B1 (en) * | 2011-03-08 | 2017-08-01 | Ciphercloud, Inc. | System and method to anonymize data transmitted to a destination computing device |
US8819768B1 (en) * | 2011-05-03 | 2014-08-26 | Robert Koeten | Split password vault |
US9026784B2 (en) * | 2012-01-26 | 2015-05-05 | Mcafee, Inc. | System and method for innovative management of transport layer security session tickets in a network environment |
US9032520B2 (en) * | 2012-02-22 | 2015-05-12 | iScanOnline, Inc. | Remote security self-assessment framework |
KR101944010B1 (ko) | 2012-02-24 | 2019-01-30 | 삼성전자 주식회사 | 애플리케이션의 변조 감지 방법 및 장치 |
KR101436202B1 (ko) | 2012-05-31 | 2014-09-01 | 주식회사 엘지씨엔에스 | 모바일 보안 관리 방법 및 그를 위한 모바일 보안 관리 시스템 |
EP2690450B1 (en) * | 2012-07-27 | 2014-07-09 | ABB Technology AG | A device for measuring the direct component of alternating current |
KR101948285B1 (ko) * | 2012-08-17 | 2019-02-14 | 에스케이플래닛 주식회사 | 결제 서비스를 위한 보안응용모듈 관리 시스템 및 방법 |
KR20140071744A (ko) * | 2012-12-04 | 2014-06-12 | 한국전자통신연구원 | 스마트 통신단말을 위한 보안정책 협상 기반의 차등화된 보안제어 방법 |
US20140283038A1 (en) * | 2013-03-15 | 2014-09-18 | Shape Security Inc. | Safe Intelligent Content Modification |
KR101308703B1 (ko) * | 2013-04-24 | 2013-09-13 | (주)누리아이엔에스 | 전자상거래 보안 시스템 및 그 방법 |
KR102008945B1 (ko) | 2013-04-26 | 2019-08-08 | 에스케이플래닛 주식회사 | 공용 단말 장치 보안을 위한 시스템 및 방법 |
US9591003B2 (en) * | 2013-08-28 | 2017-03-07 | Amazon Technologies, Inc. | Dynamic application security verification |
KR101451323B1 (ko) * | 2014-02-10 | 2014-10-16 | 주식회사 락인컴퍼니 | 애플리케이션 보안 시스템, 보안 서버, 보안 클라이언트 장치 및 기록매체 |
-
2016
- 2016-03-14 CN CN201680015639.4A patent/CN107431705B/zh active Active
- 2016-03-14 CN CN201680015640.7A patent/CN107408179B/zh active Active
- 2016-03-14 EP EP16765228.8A patent/EP3270318B1/en active Active
- 2016-03-14 CN CN201680015591.7A patent/CN107408166B/zh active Active
- 2016-03-14 EP EP16765229.6A patent/EP3270319B1/en active Active
- 2016-03-14 KR KR1020160030571A patent/KR101756692B1/ko active IP Right Grant
- 2016-03-14 JP JP2017567031A patent/JP6654651B2/ja active Active
- 2016-03-14 EP EP16765227.0A patent/EP3270317B1/en active Active
- 2016-03-14 KR KR1020160030572A patent/KR101969481B1/ko active IP Right Grant
- 2016-03-14 KR KR1020160030568A patent/KR101799366B1/ko active IP Right Grant
- 2016-03-14 JP JP2017567032A patent/JP6654652B2/ja active Active
- 2016-03-14 JP JP2017567030A patent/JP6663937B2/ja active Active
-
2017
- 2017-09-12 US US15/701,726 patent/US10867048B2/en active Active
- 2017-09-12 US US15/701,867 patent/US10867050B2/en active Active
- 2017-09-12 US US15/701,787 patent/US10867049B2/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2004038966A (ja) * | 2002-06-28 | 2004-02-05 | Microsoft Corp | セキュアな変数データ保護を提供するセキュアで不明瞭なタイプライブラリ |
JP2004348710A (ja) * | 2003-05-20 | 2004-12-09 | Samsung Electronics Co Ltd | 固有番号を用いたプログラムの耐タンパ手法、及び難読化されたプログラムアップグレード方法、並びにこれらの方法のための装置 |
JPWO2006090800A1 (ja) * | 2005-02-25 | 2008-07-24 | 松下電器産業株式会社 | セキュア処理装置、及びセキュア処理システム |
JP2006259848A (ja) * | 2005-03-15 | 2006-09-28 | Matsushita Electric Ind Co Ltd | プログラム実行装置、プログラム実行方法、および、プログラム |
JP2009514060A (ja) * | 2005-10-28 | 2009-04-02 | パナソニック株式会社 | 難読化評価方法および難読化方法 |
JP2010152877A (ja) * | 2008-11-26 | 2010-07-08 | Panasonic Corp | ソフトウェア更新システム、管理装置、記録媒体及び集積回路 |
JP2012165289A (ja) * | 2011-02-08 | 2012-08-30 | Fujitsu Ltd | 通信装置およびセキュアモジュール |
Non-Patent Citations (1)
Title |
---|
玉田 春昭, 他3名: "Javaクラスファイル難読化ツールDonQuixote", レクチャーノート/ソフトウェア学32 ソフトウェア工学の基礎XIII, JPN6019017669, 30 November 2006 (2006-11-30), JP, pages 113 - 118, ISSN: 0004037430 * |
Also Published As
Publication number | Publication date |
---|---|
JP6663937B2 (ja) | 2020-03-13 |
US10867050B2 (en) | 2020-12-15 |
KR20160110276A (ko) | 2016-09-21 |
EP3270319A1 (en) | 2018-01-17 |
KR101799366B1 (ko) | 2017-11-22 |
CN107408166B (zh) | 2021-08-10 |
US10867049B2 (en) | 2020-12-15 |
EP3270317A1 (en) | 2018-01-17 |
CN107408179B (zh) | 2021-05-11 |
JP2018509723A (ja) | 2018-04-05 |
KR101756692B1 (ko) | 2017-07-12 |
EP3270318A4 (en) | 2018-11-07 |
EP3270319B1 (en) | 2022-02-16 |
US20180007082A1 (en) | 2018-01-04 |
EP3270317B1 (en) | 2022-02-02 |
US10867048B2 (en) | 2020-12-15 |
CN107408166A (zh) | 2017-11-28 |
KR20160110275A (ko) | 2016-09-21 |
JP2018511899A (ja) | 2018-04-26 |
JP6654651B2 (ja) | 2020-02-26 |
EP3270318A1 (en) | 2018-01-17 |
EP3270319A4 (en) | 2018-11-07 |
EP3270318B1 (en) | 2020-06-24 |
US20180012025A1 (en) | 2018-01-11 |
EP3270317A4 (en) | 2018-11-07 |
KR20160110274A (ko) | 2016-09-21 |
CN107431705B (zh) | 2021-05-11 |
CN107408179A (zh) | 2017-11-28 |
CN107431705A (zh) | 2017-12-01 |
US20180004940A1 (en) | 2018-01-04 |
JP6654652B2 (ja) | 2020-02-26 |
KR101969481B1 (ko) | 2019-04-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6663937B2 (ja) | 動的なセキュリティーモジュールサーバー装置及びその駆動方法 | |
CN105934927B (zh) | 针对跨安全边界的sdn api调用的动态过滤 | |
US8909930B2 (en) | External reference monitor | |
KR101700552B1 (ko) | 보안 운영 체제 환경으로의 콘텍스트 기반 전환 | |
JP5613596B2 (ja) | 認証システム、端末装置、認証サーバ、およびプログラム | |
US9245118B2 (en) | Methods for identifying key logging activities with a portable device and devices thereof | |
US10579830B1 (en) | Just-in-time and secure activation of software | |
Zhang et al. | Kingfisher: Unveiling insecurely used credentials in iot-to-mobile communications | |
CA2911878A1 (en) | Data verification | |
WO2016148472A1 (ko) | 다이나믹 보안모듈 단말장치 및 그 구동방법 | |
WO2016148471A1 (ko) | 다이나믹 보안모듈 서버장치 및 그 구동방법 | |
KR101914044B1 (ko) | 내부네트워크 보안강화방법 및 이를 구현하는 보안시스템 | |
WO2016148473A1 (ko) | 다이나믹 보안모듈 생성방법 및 생성장치 | |
von Web Anwendungen | Secure Session Protocol-Concept and Implementation of a Protocol to Securely Operate Web Applications |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20171108 |
|
A711 | Notification of change in applicant |
Free format text: JAPANESE INTERMEDIATE CODE: A711 Effective date: 20180302 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A821 Effective date: 20180302 |
|
A977 | Report on retrieval |
Free format text: JAPANESE INTERMEDIATE CODE: A971007 Effective date: 20180830 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20180904 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20181203 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20190521 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20190819 |
|
TRDD | Decision of grant or rejection written | ||
A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20200204 |
|
A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20200217 |
|
R150 | Certificate of patent or registration of utility model |
Ref document number: 6663937 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |