JP6072091B2 - アプリケーション・プログラム用の安全なアクセス方法および安全なアクセス装置 - Google Patents
アプリケーション・プログラム用の安全なアクセス方法および安全なアクセス装置 Download PDFInfo
- Publication number
- JP6072091B2 JP6072091B2 JP2015006657A JP2015006657A JP6072091B2 JP 6072091 B2 JP6072091 B2 JP 6072091B2 JP 2015006657 A JP2015006657 A JP 2015006657A JP 2015006657 A JP2015006657 A JP 2015006657A JP 6072091 B2 JP6072091 B2 JP 6072091B2
- Authority
- JP
- Japan
- Prior art keywords
- application program
- authentication data
- authentication
- access
- operating system
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0869—Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| TW103102096 | 2014-01-21 | ||
| TW103102096A TW201530344A (zh) | 2014-01-21 | 2014-01-21 | 應用程式存取保護方法及應用程式存取保護裝置 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| JP2015143988A JP2015143988A (ja) | 2015-08-06 |
| JP6072091B2 true JP6072091B2 (ja) | 2017-02-01 |
Family
ID=52472174
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2015006657A Expired - Fee Related JP6072091B2 (ja) | 2014-01-21 | 2015-01-16 | アプリケーション・プログラム用の安全なアクセス方法および安全なアクセス装置 |
Country Status (6)
| Country | Link |
|---|---|
| US (1) | US9660986B2 (enExample) |
| EP (1) | EP2899664A1 (enExample) |
| JP (1) | JP6072091B2 (enExample) |
| CN (1) | CN104794388B (enExample) |
| RU (1) | RU2631136C2 (enExample) |
| TW (1) | TW201530344A (enExample) |
Families Citing this family (11)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP3040896A1 (en) * | 2014-12-30 | 2016-07-06 | Gemalto Sa | Secure element |
| CN105303071B (zh) * | 2015-09-18 | 2018-06-12 | 许继集团有限公司 | 一种嵌入式设备程序授权保护方法 |
| TWI605358B (zh) * | 2016-08-31 | 2017-11-11 | 啟碁科技股份有限公司 | 通訊集線器及其應用程式間的訊息驗證方法 |
| CN106709034A (zh) * | 2016-12-29 | 2017-05-24 | 广东欧珀移动通信有限公司 | 保护文件的方法、装置及终端 |
| GB2558918B (en) * | 2017-01-19 | 2020-01-29 | Exacttrak Ltd | Security Device |
| US10642970B2 (en) * | 2017-12-12 | 2020-05-05 | John Almeida | Virus immune computer system and method |
| US10623385B2 (en) * | 2018-03-16 | 2020-04-14 | At&T Mobility Ii Llc | Latency sensitive tactile network security interfaces |
| US10785213B2 (en) * | 2018-03-27 | 2020-09-22 | Ca Technologies, Inc. | Continuous authentication |
| US11468158B2 (en) | 2019-04-10 | 2022-10-11 | At&T Intellectual Property I, L.P. | Authentication for functions as a service |
| US11537705B2 (en) * | 2020-10-27 | 2022-12-27 | Dell Products L.P. | Device access control system |
| US12153806B2 (en) * | 2022-09-12 | 2024-11-26 | Dell Products L.P. | Secure one-time programming undo system |
Family Cites Families (16)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP3400480B2 (ja) * | 1993-01-20 | 2003-04-28 | 株式会社シーエスケイ | プログラム解析防止装置 |
| US6668325B1 (en) * | 1997-06-09 | 2003-12-23 | Intertrust Technologies | Obfuscation techniques for enhancing software security |
| JP4408601B2 (ja) * | 2001-12-27 | 2010-02-03 | 富士通株式会社 | 情報再生装置およびセキュアモジュール |
| US7434259B2 (en) * | 2002-10-21 | 2008-10-07 | Microsoft Corporation | Method for prompting a user to install and execute an unauthenticated computer application |
| JP2004199138A (ja) * | 2002-12-16 | 2004-07-15 | Matsushita Electric Ind Co Ltd | メモリデバイスとそれを使用する電子機器 |
| JP4744106B2 (ja) * | 2003-08-06 | 2011-08-10 | パナソニック株式会社 | セキュアデバイス、情報処理端末、通信システム及び通信方法 |
| US7571489B2 (en) * | 2004-10-20 | 2009-08-04 | International Business Machines Corporation | One time passcode system |
| GB0427696D0 (en) * | 2004-12-17 | 2005-01-19 | Ncr Int Inc | Method of authenticating an executable application |
| US20090287939A1 (en) * | 2005-12-07 | 2009-11-19 | Matsushita Electric Industrial Co., Ltd. | Secure device, information processing terminal, server, and authentication method |
| CN101326530A (zh) * | 2005-12-07 | 2008-12-17 | 松下电器产业株式会社 | 安全设备、信息处理终端、服务器以及认证方法 |
| EP2243083A2 (en) * | 2008-01-02 | 2010-10-27 | SanDisk IL Ltd. | Storage device having direct user access |
| JP5693824B2 (ja) * | 2009-03-25 | 2015-04-01 | 株式会社東芝 | Icカードの処理装置、icカード、及びicカードの処理システム |
| JP5449905B2 (ja) * | 2009-07-29 | 2014-03-19 | フェリカネットワークス株式会社 | 情報処理装置、プログラム、および情報処理システム |
| US8667303B2 (en) * | 2010-11-22 | 2014-03-04 | Motorola Mobility Llc | Peripheral authentication |
| US8539602B2 (en) * | 2011-06-23 | 2013-09-17 | Texas Instruments Incorporated | Microcontroller with secure feature for multiple party code development |
| US9141783B2 (en) * | 2012-06-26 | 2015-09-22 | Ologn Technologies Ag | Systems, methods and apparatuses for the application-specific identification of devices |
-
2014
- 2014-01-21 TW TW103102096A patent/TW201530344A/zh not_active IP Right Cessation
-
2015
- 2015-01-15 CN CN201510019739.1A patent/CN104794388B/zh not_active Expired - Fee Related
- 2015-01-16 US US14/599,293 patent/US9660986B2/en not_active Expired - Fee Related
- 2015-01-16 JP JP2015006657A patent/JP6072091B2/ja not_active Expired - Fee Related
- 2015-01-16 EP EP15151538.4A patent/EP2899664A1/en not_active Withdrawn
- 2015-01-20 RU RU2015101734A patent/RU2631136C2/ru active
Also Published As
| Publication number | Publication date |
|---|---|
| RU2015101734A (ru) | 2016-08-10 |
| US20150207792A1 (en) | 2015-07-23 |
| CN104794388A (zh) | 2015-07-22 |
| TW201530344A (zh) | 2015-08-01 |
| TWI509455B (enExample) | 2015-11-21 |
| CN104794388B (zh) | 2018-01-09 |
| US9660986B2 (en) | 2017-05-23 |
| EP2899664A1 (en) | 2015-07-29 |
| JP2015143988A (ja) | 2015-08-06 |
| RU2631136C2 (ru) | 2017-09-19 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP6072091B2 (ja) | アプリケーション・プログラム用の安全なアクセス方法および安全なアクセス装置 | |
| CN1327357C (zh) | 用于验证的系统和方法 | |
| US9582656B2 (en) | Systems for validating hardware devices | |
| US7840795B2 (en) | Method and apparatus for limiting access to sensitive data | |
| KR20110096554A (ko) | 기밀 파일을 보호하기 위한 클라이언트 컴퓨터, 및 그 서버 컴퓨터, 및 그 방법 및 컴퓨터 프로그램 | |
| JP2017021434A (ja) | 情報処理装置及びその制御方法 | |
| JP2010515159A (ja) | セキュアコンテンツおよびアプリケーションのコピーを防ぐセキュリティメカニズムを有するメモリカードのアップグレード | |
| JP2015528596A (ja) | 選択的ramスクランブリングのための方法およびデバイス | |
| TWI436235B (zh) | 資料加密方法與系統,資料解密方法 | |
| TW201411405A (zh) | 保護多安全cpu之計算系統及其方法 | |
| CN105993018A (zh) | 移动设备上的内容项加密 | |
| US11308238B2 (en) | Server and method for identifying integrity of application | |
| EP2541456B1 (en) | Method for protecting the digital contents of a solid state memory | |
| KR101711024B1 (ko) | 부정조작방지 장치 접근 방법 및 그 방법을 채용한 단말 장치 | |
| US9560032B2 (en) | Method and apparatus for preventing illegitimate outflow of electronic document | |
| CN114741670A (zh) | 一种文档保护方法、装置、电子设备及存储介质 | |
| EP3168768B1 (en) | Software protection | |
| GB2544328B (en) | Software protection | |
| TW202540882A (zh) | 用於軟體授權之系統、硬體裝置、方法以及執行該方法之電腦程式產品 | |
| JP5126530B2 (ja) | コンピュータの環境を測定する機能を備えた外部記憶デバイス | |
| CN118656821A (zh) | 一种基于智能密码钥匙的软件授权方法及装置 | |
| WO2025225364A1 (ja) | デバイス、デバイスにおける制御方法およびコンテンツ配信システム | |
| KR101781970B1 (ko) | 자가 대응 전자문서 불법 유출 방지 장치 및 방법 | |
| KR20240066716A (ko) | 콘텐츠 복호화 키를 관리하는 방법 및 이를 위한 장치 | |
| KR20150027677A (ko) | 키 관리자를 포함하는 데이터 프로세싱 시스템 및 및 키 관리자의 동작 방법 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20150220 |
|
| A977 | Report on retrieval |
Free format text: JAPANESE INTERMEDIATE CODE: A971007 Effective date: 20160225 |
|
| A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20160315 |
|
| A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20160526 |
|
| A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20160829 |
|
| TRDD | Decision of grant or rejection written | ||
| A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20161206 |
|
| A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20161227 |
|
| R150 | Certificate of patent or registration of utility model |
Ref document number: 6072091 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| RD02 | Notification of acceptance of power of attorney |
Free format text: JAPANESE INTERMEDIATE CODE: R3D02 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| LAPS | Cancellation because of no payment of annual fees |