JP6203396B2 - ユーザ端末機及び該ユーザ端末機の周辺機器を用いた核心コード保護方法 - Google Patents
ユーザ端末機及び該ユーザ端末機の周辺機器を用いた核心コード保護方法 Download PDFInfo
- Publication number
- JP6203396B2 JP6203396B2 JP2016527324A JP2016527324A JP6203396B2 JP 6203396 B2 JP6203396 B2 JP 6203396B2 JP 2016527324 A JP2016527324 A JP 2016527324A JP 2016527324 A JP2016527324 A JP 2016527324A JP 6203396 B2 JP6203396 B2 JP 6203396B2
- Authority
- JP
- Japan
- Prior art keywords
- user terminal
- peripheral device
- application program
- core code
- code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 230000002093 peripheral effect Effects 0.000 title claims description 118
- 238000000034 method Methods 0.000 title claims description 35
- 238000004891 communication Methods 0.000 claims description 24
- 230000008569 process Effects 0.000 claims description 12
- 238000010586 diagram Methods 0.000 description 6
- 230000005540 biological transmission Effects 0.000 description 4
- 238000012545 processing Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 230000000903 blocking effect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012806 monitoring device Methods 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 239000004984 smart glass Substances 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/123—Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/14—Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/61—Installation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/30—Security of mobile devices; Security of mobile applications
- H04W12/35—Protecting application or service provisioning, e.g. securing SIM application provisioning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/50—Secure pairing of devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/168—Implementing security features at a particular protocol layer above the transport layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/69—Identity-dependent
- H04W12/71—Hardware identity
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computing Systems (AREA)
- Power Engineering (AREA)
- Radar, Positioning & Navigation (AREA)
- Remote Sensing (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Telephonic Communication Services (AREA)
- Telephone Function (AREA)
Description
200:ユーザ端末機
210:ペアリング部
220:通信部
230:制御部
240:画面表示部
300:周辺機器
310:通信部
320:暗復号部
330:コード実行部
Claims (8)
- 応用プログラム提供サーバから応用プログラムをダウンロードされて設置する過程で、前記応用プログラムの一般コードを受信し、前記応用プログラム提供サーバから核心コードを受信して保存した周辺機器とペアリング連結を行うペアリング部と、
前記応用プログラムを実行する過程で、前記ペアリングされた周辺機器が前記核心コードの暗号化及び復号を行うように、ユーザ端末機固有情報を前記周辺機器に伝送する通信部と、
前記周辺機器に実行呼び出しメッセージを伝送し、前記周辺機器から前記核心コードの実行結果を伝達される制御部と、を含むユーザ端末機。 - 受信された前記核心コードの実行結果を画面上に表示する画面表示部をさらに含む請求項1に記載のユーザ端末機。
- 前記周辺機器は、
前記応用プログラムの最初実行要請が入力されれば、前記ユーザ端末機固有情報を用いて前記核心コードを暗号化して保存し、
前記応用プログラムの再実行要請が入力されれば、前記ユーザ端末機固有情報を用いて前記暗号化された核心コードを復号し、前記復号された核心コードを実行して、該実行結果を前記ユーザ端末機に伝送する請求項1に記載のユーザ端末機。 - 前記ユーザ端末機固有情報は、国際モバイル機器識別情報(IMEI)を含み、
前記周辺機器は、
前記ユーザ端末機固有情報を用いて前記核心コードを暗号化または復号する請求項3に記載のユーザ端末機。 - ユーザ端末機を用いた核心コード保護方法において、
前記ユーザ端末機は、応用プログラム提供サーバから応用プログラムをダウンロードされて設置する過程で、前記応用プログラムの一般コードを受信する段階と、
前記応用プログラム提供サーバから核心コードを受信して保存した周辺機器とペアリング連結を行う段階と、
前記応用プログラムを最初実行する過程で、前記ペアリングされた周辺機器が前記核心コードの暗号化を行うように、前記ユーザ端末機固有情報を前記周辺機器に伝送する段階と、
前記応用プログラムを再実行する過程で、前記周辺機器が前記暗号化された核心コードの復号を行うように、前記ユーザ端末機固有情報を前記周辺機器に伝送する段階と、
前記周辺機器に実行呼び出しメッセージを伝送し、前記周辺機器から前記核心コードの実行結果を伝達される段階と、を含む核心コード保護方法。 - 受信された前記核心コードの実行結果を画面上に表示する段階をさらに含む請求項5に記載の核心コード保護方法。
- 前記周辺機器は、
前記応用プログラムの最初実行要請が入力されれば、前記ユーザ端末機固有情報を用いて前記核心コードを暗号化して保存し、
前記応用プログラムの再実行要請が入力されれば、前記ユーザ端末機固有情報を用いて前記暗号化された核心コードを復号し、前記復号された核心コードを実行して、該実行結果を前記ユーザ端末機に伝送する請求項5に記載の核心コード保護方法。 - 前記ユーザ端末機固有情報は、国際モバイル機器識別情報)を含み、
前記周辺機器は、
前記ユーザ端末機固有情報を用いて前記核心コードを暗号化または復号する請求項7に記載の核心コード保護方法。
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR10-2014-0142689 | 2014-10-21 | ||
KR20140142689 | 2014-10-21 | ||
KR1020150002942A KR101566143B1 (ko) | 2014-10-21 | 2015-01-08 | 사용자 단말기 및 상기 사용자 단말기의 주변기기를 이용한 핵심코드 보호 방법 |
KR10-2015-0002942 | 2015-01-08 | ||
PCT/KR2015/002205 WO2016064043A1 (ko) | 2014-10-21 | 2015-03-06 | 사용자 단말기 및 상기 사용자 단말기의 주변기기를 이용한 핵심코드 보호 방법 |
Publications (2)
Publication Number | Publication Date |
---|---|
JP2017506372A JP2017506372A (ja) | 2017-03-02 |
JP6203396B2 true JP6203396B2 (ja) | 2017-09-27 |
Family
ID=54601238
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2016527324A Active JP6203396B2 (ja) | 2014-10-21 | 2015-03-06 | ユーザ端末機及び該ユーザ端末機の周辺機器を用いた核心コード保護方法 |
Country Status (5)
Country | Link |
---|---|
US (1) | US20160275271A1 (ja) |
EP (1) | EP3057020B1 (ja) |
JP (1) | JP6203396B2 (ja) |
KR (1) | KR101566143B1 (ja) |
WO (1) | WO2016064043A1 (ja) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2019028627A (ja) * | 2017-07-28 | 2019-02-21 | 公立大学法人岩手県立大学 | 送受信システム、ペアリング方法及びペアリングプログラム |
KR102015552B1 (ko) * | 2018-12-05 | 2019-08-28 | 이트너스 주식회사 | Qr 코드를 활용한 박스내부 상품리스트 확인 방법 및 시스템 |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2006033267A (ja) * | 2004-07-14 | 2006-02-02 | Sony Corp | 情報処理システム、情報処理方法、情報処理装置、並びにプログラム |
NO20050152D0 (no) | 2005-01-11 | 2005-01-11 | Dnb Nor Bank Asa | Fremgangsmate ved frembringelse av sikkerhetskode og programmbar anordning for denne |
JP2010193187A (ja) * | 2009-02-18 | 2010-09-02 | Fujitsu Ten Ltd | 車載装置及び通信制御方法 |
EP2264635A1 (en) * | 2009-06-19 | 2010-12-22 | Thomson Licensing | Software resistant against reverse engineering |
KR20120002079A (ko) * | 2010-06-30 | 2012-01-05 | 에스케이플래닛 주식회사 | 어플리케이션 저작권 보호 시스템, 어플리케이션 저작권 보호 장치 및 방법, 그리고 단말 장치 및 상기 단말 장치의 어플리케이션 저작권 보호 방법 |
JP5948680B2 (ja) * | 2011-09-13 | 2016-07-06 | パナソニックIpマネジメント株式会社 | コンテンツ再生システム、情報処理端末、メディアサーバ、セキュアデバイスおよびサーバ・セキュアデバイス |
KR20140007250A (ko) * | 2012-07-09 | 2014-01-17 | 주식회사 씽크풀 | 페어링 수행 디지털 시스템 및 그 제공방법 |
KR101223981B1 (ko) * | 2012-07-11 | 2013-01-21 | 주식회사 안랩 | 안전한 애플리케이션 실행을 위한 가상화 장치, 서버 및 방법 |
US9443421B2 (en) * | 2012-11-13 | 2016-09-13 | Panasonic Intellectual Property Corporation Of America | Method used in a system for remotely controlling an appliance |
WO2015092930A1 (ja) * | 2013-12-20 | 2015-06-25 | 株式会社 東芝 | 通信システム、電子機器および方法 |
-
2015
- 2015-01-08 KR KR1020150002942A patent/KR101566143B1/ko active IP Right Grant
- 2015-03-06 WO PCT/KR2015/002205 patent/WO2016064043A1/ko active Application Filing
- 2015-03-06 JP JP2016527324A patent/JP6203396B2/ja active Active
- 2015-03-06 US US14/785,637 patent/US20160275271A1/en not_active Abandoned
- 2015-03-06 EP EP15853303.4A patent/EP3057020B1/en active Active
Also Published As
Publication number | Publication date |
---|---|
EP3057020B1 (en) | 2019-02-20 |
WO2016064043A1 (ko) | 2016-04-28 |
KR101566143B1 (ko) | 2015-11-06 |
EP3057020A4 (en) | 2017-06-21 |
EP3057020A1 (en) | 2016-08-17 |
JP2017506372A (ja) | 2017-03-02 |
US20160275271A1 (en) | 2016-09-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101537205B1 (ko) | 해쉬값을 이용하여 응용 프로그램의 위변조 여부를 탐지하는 사용자 단말기 및 그것을 이용한 위변조 탐지 방법 | |
Liu et al. | Smart solution, poor protection: An empirical study of security and privacy issues in developing and deploying smart home devices | |
JP5613596B2 (ja) | 認証システム、端末装置、認証サーバ、およびプログラム | |
US20190140836A1 (en) | Provisioning trusted execution environment based on chain of trust including platform | |
JP2016519544A (ja) | 自己認証デバイス及び自己認証方法 | |
JP6321188B2 (ja) | 移動端末機のハッキング防止システム及びその方法 | |
Busold et al. | Smart and secure cross-device apps for the internet of advanced things | |
KR102439832B1 (ko) | 무선 기기를 위한 애드온 모뎀 및 그것과 함께 유용한 방법 | |
JP2013175179A (ja) | 少なくとも1つの暗号化された命令を備えるソフトウェアアプリケーションの協調実行のためのシステム、デバイスおよび方法 | |
KR101580425B1 (ko) | 주변기기와 연동하는 사용자 단말기 및 그것을 이용한 정보 유출 방지 방법 | |
KR101518689B1 (ko) | 핵심 코드를 이용하여 응용 프로그램의 위변조 여부를 탐지하는 사용자 단말기 및 그것을 이용한 위변조 탐지 방법 | |
JP6203396B2 (ja) | ユーザ端末機及び該ユーザ端末機の周辺機器を用いた核心コード保護方法 | |
KR20170069337A (ko) | 애플리케이션 보호를 위한 암호화 처리 방법, 이에 의해 생성된 프로그램 및 이를 위한 장치 | |
EP3048553A1 (en) | Method for distributing applets, and entities for distributing applets | |
JP2006514321A (ja) | 暗号化されたアプリケーションをインストールするためのアーキテクチャ | |
KR101566141B1 (ko) | 서명정보를 이용하여 응용 프로그램의 위변조 여부를 탐지하는 사용자 단말기 및 그것을 이용한 위변조 탐지 방법 | |
JP5498278B2 (ja) | データバックアップシステム、及び、無線親機 | |
JP6318246B2 (ja) | ユーザ端末機及びそれを用いた応用プログラムの核心コード保護方法 | |
CN111901312A (zh) | 一种网络访问控制的方法、系统、设备及可读存储介质 | |
CN103605927A (zh) | 一种基于嵌入式Linux系统实现加密和解密方法 | |
JP2013251814A (ja) | 無線通信装置 | |
KR20140089703A (ko) | 모바일 데이터 보안 장치 및 방법 | |
CN102710601B (zh) | 基于身份文件的安全加密和签名方法 | |
KR101566144B1 (ko) | 주변기기를 인증하여 응용 프로그램을 보호하는 사용자 단말기 및 그것을 이용한 응용 프로그램 보호 방법 | |
KR101875863B1 (ko) | 암호화된 해시값에 기반하여 클라우드 접속 허가를 결정하는 클라우드 시스템, 및 클라우드 접속 방법과 클라우드 단말에 설치된 소켓 데몬 장치 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
TRDD | Decision of grant or rejection written | ||
A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20170801 |
|
A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20170829 |
|
R150 | Certificate of patent or registration of utility model |
Ref document number: 6203396 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |