JP7464663B2 - プライバシー保持アプリケーションおよびデバイスエラー検出 - Google Patents
プライバシー保持アプリケーションおよびデバイスエラー検出 Download PDFInfo
- Publication number
- JP7464663B2 JP7464663B2 JP2022136800A JP2022136800A JP7464663B2 JP 7464663 B2 JP7464663 B2 JP 7464663B2 JP 2022136800 A JP2022136800 A JP 2022136800A JP 2022136800 A JP2022136800 A JP 2022136800A JP 7464663 B2 JP7464663 B2 JP 7464663B2
- Authority
- JP
- Japan
- Prior art keywords
- application
- data
- client device
- server
- trust
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000001514 detection method Methods 0.000 title claims description 69
- 238000000034 method Methods 0.000 claims description 49
- 238000012545 processing Methods 0.000 claims description 22
- 230000004044 response Effects 0.000 claims description 16
- 230000003993 interaction Effects 0.000 description 20
- 230000008569 process Effects 0.000 description 18
- 238000004590 computer program Methods 0.000 description 13
- 238000013515 script Methods 0.000 description 13
- 238000010586 diagram Methods 0.000 description 8
- 230000000694 effects Effects 0.000 description 7
- 238000004891 communication Methods 0.000 description 6
- 238000010801 machine learning Methods 0.000 description 6
- 230000008901 benefit Effects 0.000 description 4
- 230000003287 optical effect Effects 0.000 description 3
- 238000010420 art technique Methods 0.000 description 2
- 230000001010 compromised effect Effects 0.000 description 2
- 238000010295 mobile communication Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 230000001902 propagating effect Effects 0.000 description 2
- 238000000926 separation method Methods 0.000 description 2
- 238000013179 statistical model Methods 0.000 description 2
- 238000012549 training Methods 0.000 description 2
- 241000700605 Viruses Species 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000004422 calculation algorithm Methods 0.000 description 1
- 238000013480 data collection Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 230000000644 propagated effect Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 230000001953 sensory effect Effects 0.000 description 1
- 239000000758 substrate Substances 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3668—Software testing
- G06F11/3672—Test management
- G06F11/3688—Test management for test execution, e.g. scheduling of test suites
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3668—Software testing
- G06F11/3672—Test management
- G06F11/3692—Test management for test results analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3668—Software testing
- G06F11/3696—Methods or tools to render software testable
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3257—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using blind signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3268—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Computing Systems (AREA)
- Quality & Reliability (AREA)
- Storage Device Security (AREA)
- Debugging And Monitoring (AREA)
- Examining Or Testing Airtightness (AREA)
- Investigating Or Analysing Biological Materials (AREA)
- Bidet-Like Cleaning Device And Other Flush Toilet Accessories (AREA)
Description
本出願は国際出願であり、2020年4月23日に出願されたIL出願第274165号の利益を主張する。上記の出願の開示は、参照によりその全体が本明細書に組み込まれている。
104 アプリケーション
106 オペレーティングシステム
108 信頼されるアプリケーション
110 デバイス信頼性クライアント
120 ネットワーク
130 信頼評価サーバ
140 アプリケーションエラー検出サーバ
150 コンテンツプラットフォーム
400 コンピュータシステム、システム
410 プロセッサ、構成要素
420 メモリ、構成要素
430 記憶デバイス、構成要素
440 入力/出力デバイス、構成要素
450 システムバス
460 周辺デバイス
Claims (7)
クライアントデバイス(102)上で実行するアプリケーション(104)によって、前記アプリケーション内でコンテンツが提供され、対話されるコンテキストを表すコンテキストアプリケーションデータを取得するステップ(302)と、
前記アプリケーションによって、データのランダムセットを生成し、前記データのランダムセットをブラインドして、ブラインドされたデータのランダムセットを生成するステップと、
信頼評価サーバに、前記ブラインドされたデータのランダムセットを提供するステップと、
前記信頼評価サーバによって、前記ブラインドされたデータのランダムセットに対するデジタル署名を生成するステップと、
前記アプリケーションによって、前記ブラインドされたデータのランダムセットをブラインド解除して、前記ブラインド解除されたデータのランダムセットが前記データのランダムセットと同じであることを確認するステップと、
前記信頼評価サーバに、前記クライアントデバイス上で実行する前記アプリケーションのデジタル証明書に関するデータ、前記コンテキストアプリケーションデータ、および前記クライアントデバイスの信頼性を評価するためのデータを表すデバイス信頼性データを提供するステップ(308)と、
前記信頼評価サーバから、(1)前記クライアントデバイスが信頼できることを明記する第1の指示と、(2)前記アプリケーションが真正であることを明記する第2の指示と、(3)第1のデータ項目に対する前記デジタル署名とを含むデータのセットを受信するステップ(310)と、
前記第1のデータ項目に対する前記デジタル署名を検証するステップ(312)と、
前記第1のデータ項目に対する前記デジタル署名を検証したことに応答して、前記第1のデータ項目が前記コンテキストアプリケーションデータと一致することを確認するステップ(316)と、
アプリケーションエラー検出サーバに、前記第1のデータ項目に対する前記デジタル署名、前記第1の指示、前記第2の指示、および前記第1のデータ項目を提供するステップ(318)と、
前記アプリケーションエラー検出サーバから、前記アプリケーションがいかなるエラーも持たないことを明記する第3の指示を受信するステップ(320)と
を含む、方法。
前記信頼評価サーバによって、および前記クライアントデバイスに、前記クライアントデバイスが信頼できることを明記する前記第1の指示、および前記アプリケーションが既知のアプリケーションであることを明記する前記第2の指示を提供するステップと
をさらに含む、請求項1に記載の方法。
前記アプリケーションのアプリケーションパッケージ(APK)のデジタルダイジェスト、または
前記アプリケーションの前記APKの暗号ハッシュ
を含む、請求項1または2に記載の方法。
前記2ビット値の第1のビットは、前記クライアントデバイスが修正も改変もされていないことを示し、
前記2ビット値の第2のビットは、前記クライアントデバイスのプロファイルが、以前検証されたデバイスのプロファイルと一致することを示す、請求項1から3のいずれか1項に記載の方法。
前記アプリケーションエラー検出サーバによって、および前記信頼評価サーバから、前記デジタル署名が有効であることを明記する第4の指示を受信するステップと
をさらに含む、請求項1から4のいずれか1項に記載の方法。
前記1つまたは複数のメモリデバイスと対話し、前記命令が実行されると、請求項1から5のいずれか1項に記載の方法を実施するように構成されている前記1つまたは複数のデータ処理装置と
を備えるシステム。
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
IL274165 | 2020-04-23 | ||
IL274165A IL274165B2 (en) | 2020-04-23 | 2020-04-23 | An application for maintaining privacy and detecting device errors |
PCT/US2020/032502 WO2021216098A1 (en) | 2020-04-23 | 2020-05-12 | Privacy preserving application and device error detection |
JP2021521052A JP7135210B2 (ja) | 2020-04-23 | 2020-05-12 | プライバシー保持アプリケーションおよびデバイスエラー検出 |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2021521052A Division JP7135210B2 (ja) | 2020-04-23 | 2020-05-12 | プライバシー保持アプリケーションおよびデバイスエラー検出 |
Publications (2)
Publication Number | Publication Date |
---|---|
JP2022172237A JP2022172237A (ja) | 2022-11-15 |
JP7464663B2 true JP7464663B2 (ja) | 2024-04-09 |
Family
ID=78269877
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2021521052A Active JP7135210B2 (ja) | 2020-04-23 | 2020-05-12 | プライバシー保持アプリケーションおよびデバイスエラー検出 |
JP2022136800A Active JP7464663B2 (ja) | 2020-04-23 | 2022-08-30 | プライバシー保持アプリケーションおよびデバイスエラー検出 |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2021521052A Active JP7135210B2 (ja) | 2020-04-23 | 2020-05-12 | プライバシー保持アプリケーションおよびデバイスエラー検出 |
Country Status (7)
Country | Link |
---|---|
US (2) | US11928237B2 (ja) |
EP (2) | EP4109317B1 (ja) |
JP (2) | JP7135210B2 (ja) |
KR (2) | KR102672181B1 (ja) |
CN (1) | CN113853603A (ja) |
IL (1) | IL274165B2 (ja) |
WO (1) | WO2021216098A1 (ja) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117879832A (zh) * | 2024-01-09 | 2024-04-12 | 苏州市伏泰信息科技股份有限公司 | 基于可信计算技术的无废城市的数据传输方法及其系统 |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2015519652A (ja) | 2012-05-01 | 2015-07-09 | ターセーラ, インコーポレイテッド | 動的証明に基づいてモバイルセキュリティを提供するためのシステムおよび方法 |
JP2016129037A (ja) | 2011-02-17 | 2016-07-14 | ターセーラ, インコーポレイテッド | アプリケーション証明のためのシステムおよび方法 |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1205889A1 (en) * | 2000-11-10 | 2002-05-15 | TELEFONAKTIEBOLAGET LM ERICSSON (publ) | Returning of change in an electronic payment system |
JP4550865B2 (ja) | 2007-06-18 | 2010-09-22 | 株式会社東芝 | 情報処理システム、情報処理装置、およびプログラム |
US8887246B2 (en) * | 2010-06-22 | 2014-11-11 | Telefonaktiebolaget L M Ericsson (Publ) | Privacy preserving authorisation in pervasive environments |
JP5458309B2 (ja) | 2010-08-04 | 2014-04-02 | 株式会社日立製作所 | 利用者端末管理システム、利用者端末管理方法、及びプログラム |
JP6019484B2 (ja) * | 2010-08-25 | 2016-11-02 | ルックアウト、アイエヌシー. | サーバで結合されたマルウェア防止のためのシステムと方法 |
WO2014036021A1 (en) * | 2012-08-28 | 2014-03-06 | Visa International Service Association | Secure device service enrollment |
GB2524578A (en) * | 2014-03-28 | 2015-09-30 | Ibm | Production of cryptographic signatures |
KR20160017551A (ko) * | 2014-08-06 | 2016-02-16 | 주식회사 안랩 | 어플리케이션 연동 장치 및 방법 |
EP3026557A1 (en) * | 2014-11-28 | 2016-06-01 | Thomson Licensing | Method and device for providing verifying application integrity |
SG11202008621QA (en) * | 2017-12-06 | 2020-10-29 | Zamna Tech Limited | Method and system for data security, validation, verification and provenance within independent computer systems and digital networks |
US11025429B2 (en) * | 2018-05-14 | 2021-06-01 | Skydio, Inc. | Trusted contextual content |
US11368445B2 (en) | 2018-05-21 | 2022-06-21 | Amazon Technologies, Inc. | Local encryption for single sign-on |
CN108768664B (zh) | 2018-06-06 | 2020-11-03 | 腾讯科技(深圳)有限公司 | 密钥管理方法、装置、系统、存储介质和计算机设备 |
-
2020
- 2020-04-23 IL IL274165A patent/IL274165B2/en unknown
- 2020-05-12 WO PCT/US2020/032502 patent/WO2021216098A1/en unknown
- 2020-05-12 KR KR1020237004161A patent/KR102672181B1/ko active IP Right Grant
- 2020-05-12 EP EP22183531.7A patent/EP4109317B1/en active Active
- 2020-05-12 US US17/285,547 patent/US11928237B2/en active Active
- 2020-05-12 KR KR1020217008982A patent/KR102498265B1/ko active IP Right Grant
- 2020-05-12 EP EP20728874.7A patent/EP3924856B1/en active Active
- 2020-05-12 CN CN202080005624.6A patent/CN113853603A/zh active Pending
- 2020-05-12 JP JP2021521052A patent/JP7135210B2/ja active Active
-
2022
- 2022-08-30 JP JP2022136800A patent/JP7464663B2/ja active Active
-
2024
- 2024-01-24 US US18/421,458 patent/US20240160779A1/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2016129037A (ja) | 2011-02-17 | 2016-07-14 | ターセーラ, インコーポレイテッド | アプリケーション証明のためのシステムおよび方法 |
JP2015519652A (ja) | 2012-05-01 | 2015-07-09 | ターセーラ, インコーポレイテッド | 動的証明に基づいてモバイルセキュリティを提供するためのシステムおよび方法 |
Also Published As
Publication number | Publication date |
---|---|
KR20210131989A (ko) | 2021-11-03 |
KR102672181B1 (ko) | 2024-06-05 |
IL274165B2 (en) | 2023-08-01 |
WO2021216098A1 (en) | 2021-10-28 |
EP4109317A1 (en) | 2022-12-28 |
EP4109317B1 (en) | 2023-09-27 |
EP3924856A1 (en) | 2021-12-22 |
JP2022533871A (ja) | 2022-07-27 |
IL274165B1 (en) | 2023-04-01 |
US11928237B2 (en) | 2024-03-12 |
US20210334404A1 (en) | 2021-10-28 |
JP2022172237A (ja) | 2022-11-15 |
EP3924856B1 (en) | 2022-08-10 |
KR102498265B1 (ko) | 2023-02-09 |
US20240160779A1 (en) | 2024-05-16 |
IL274165A (en) | 2021-10-31 |
JP7135210B2 (ja) | 2022-09-12 |
CN113853603A (zh) | 2021-12-28 |
KR20230023826A (ko) | 2023-02-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10936727B2 (en) | Detection of second order vulnerabilities in web services | |
US12028460B2 (en) | Verifying user interactions on a content platform | |
US11288376B2 (en) | Identifying hard-coded secret vulnerability inside application source code | |
US10452421B2 (en) | Identifying kernel data structures | |
US11882327B2 (en) | Verifying display of third party content at a client device | |
Continella et al. | Prometheus: Analyzing WebInject-based information stealers | |
US20240160779A1 (en) | Privacy preserving application and device error detection | |
US20220269785A1 (en) | Enhanced cybersecurity analysis for malicious files detected at the endpoint level | |
CN114127715A (zh) | 验证网页视图内的内容和交互 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20220913 |
|
A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20220913 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20231127 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20240215 |
|
TRDD | Decision of grant or rejection written | ||
A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20240304 |
|
A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20240328 |
|
R150 | Certificate of patent or registration of utility model |
Ref document number: 7464663 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 |