MX355757B - Metodo de negocios que incluye un sistema de desafio-respuesta para autenticar de forma segura interfaces de programa de aplicaciones de software (apis). - Google Patents

Metodo de negocios que incluye un sistema de desafio-respuesta para autenticar de forma segura interfaces de programa de aplicaciones de software (apis).

Info

Publication number
MX355757B
MX355757B MX2015005454A MX2015005454A MX355757B MX 355757 B MX355757 B MX 355757B MX 2015005454 A MX2015005454 A MX 2015005454A MX 2015005454 A MX2015005454 A MX 2015005454A MX 355757 B MX355757 B MX 355757B
Authority
MX
Mexico
Prior art keywords
claimant
verifier
challenge
response
apis
Prior art date
Application number
MX2015005454A
Other languages
English (en)
Other versions
MX2015005454A (es
Inventor
Medvinsky Alexander
J Sprunk Eric
Qiu Xin
G Depietro Mark
Moroney Paul
Original Assignee
Arris Entpr Llc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Arris Entpr Llc filed Critical Arris Entpr Llc
Publication of MX2015005454A publication Critical patent/MX2015005454A/es
Publication of MX355757B publication Critical patent/MX355757B/es

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/235Processing of additional data, e.g. scrambling of additional data or processing content descriptors
    • H04N21/2351Processing of additional data, e.g. scrambling of additional data or processing content descriptors involving encryption of additional data
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/105Arrangements for software license management or administration, e.g. for managing licenses at corporate level
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/629Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/435Processing of additional data, e.g. decrypting of additional data, reconstructing software from modules extracted from the transport stream
    • H04N21/4353Processing of additional data, e.g. decrypting of additional data, reconstructing software from modules extracted from the transport stream involving decryption of additional data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/443OS processes, e.g. booting an STB, implementing a Java virtual machine in an STB or power management in an STB
    • H04N21/4431OS processes, e.g. booting an STB, implementing a Java virtual machine in an STB or power management in an STB characterized by the use of Application Program Interface [API] libraries
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/443OS processes, e.g. booting an STB, implementing a Java virtual machine in an STB or power management in an STB
    • H04N21/4433Implementing client middleware, e.g. Multimedia Home Platform [MHP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/60Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client 
    • H04N21/63Control signaling related to video distribution between client, server and network components; Network processes for video distribution between server and clients or between remote clients, e.g. transmitting basic layer and enhancement layers over different transmission paths, setting up a peer-to-peer communication via Internet between remote STB's; Communication protocols; Addressing
    • H04N21/647Control signaling between network components and server or clients; Network processes for video distribution between server and clients, e.g. controlling the quality of the video stream, by dropping packets, protecting content from unauthorised alteration within the network, monitoring of network load, bridging between two different networks, e.g. between IP and wireless
    • H04N21/64715Protecting content from unauthorized alteration within the network

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Technology Law (AREA)
  • Computing Systems (AREA)
  • Library & Information Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

Un sistema para autenticar de forma segura Interfaces de Programa de Aplicaciones de software (APIs) incluye un protocolo de enlace que se proporciona para validar si las partes involucradas tienen licencia para utilizar el sistema que incluye los derechos de propiedad intelectual (IP) y las obligaciones correspondientes. El enlace es un protocolo de desafío-respuesta que incluye varios pasos. En primer lugar, un Demandante envía una solicitud a un Verificador que solicita el acceso a una función a través de un API. El Verificador reacciona a la solicitud mediante la emisión de un Desafío que se envía al Demandante. El Desafío también es retenido por el Verificador para el uso en su cálculo interno para verificar la respuesta del Demandante. El Demandante posteriormente procesa el Desafío utilizando componentes bajo la licencia, conocidos como IP Hook, y emite una Respuesta al Verificador. El Verificador compara la respuesta del Candidato posiblemente correcta del Demandante a la Respuesta Objetivo conocida correcta y si se produce una coincidencia, entonces el Verificador permite el acceso del Demandante a la API.
MX2015005454A 2012-10-29 2013-10-29 Metodo de negocios que incluye un sistema de desafio-respuesta para autenticar de forma segura interfaces de programa de aplicaciones de software (apis). MX355757B (es)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US201261719923P 2012-10-29 2012-10-29
US201261719928P 2012-10-29 2012-10-29
PCT/US2013/067353 WO2014070800A1 (en) 2012-10-29 2013-10-29 BUSINESS METHOD INCLUDING CHALLENGE-RESPONSE SYSTEM TO SECURELY AUTHENTICATE SOFTWARE APPLICATION PROGRAM INTERFACES (APIs)
US14/066,591 US20140123220A1 (en) 2012-10-29 2013-10-29 BUSINESS METHOD INCLUDING CHALLENGE-RESPONSE SYSTEM TO SECURELY AUTHENTICATE SOFTWARE APPLICATION PROGRAM INTERFACES (APIs)

Publications (2)

Publication Number Publication Date
MX2015005454A MX2015005454A (es) 2016-01-15
MX355757B true MX355757B (es) 2018-04-27

Family

ID=50548740

Family Applications (1)

Application Number Title Priority Date Filing Date
MX2015005454A MX355757B (es) 2012-10-29 2013-10-29 Metodo de negocios que incluye un sistema de desafio-respuesta para autenticar de forma segura interfaces de programa de aplicaciones de software (apis).

Country Status (8)

Country Link
US (4) US9172981B2 (es)
EP (1) EP2901349A1 (es)
KR (1) KR101722868B1 (es)
AU (1) AU2013338059B2 (es)
BR (1) BR112015009690A8 (es)
CA (1) CA2899385C (es)
MX (1) MX355757B (es)
WO (1) WO2014070800A1 (es)

Families Citing this family (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014070800A1 (en) 2012-10-29 2014-05-08 General Instrument Corporation BUSINESS METHOD INCLUDING CHALLENGE-RESPONSE SYSTEM TO SECURELY AUTHENTICATE SOFTWARE APPLICATION PROGRAM INTERFACES (APIs)
US9565022B1 (en) 2013-07-02 2017-02-07 Impinj, Inc. RFID tags with dynamic key replacement
US10050935B2 (en) 2014-07-09 2018-08-14 Shape Security, Inc. Using individualized APIs to block automated attacks on native apps and/or purposely exposed APIs with forced user interaction
US9258274B2 (en) * 2014-07-09 2016-02-09 Shape Security, Inc. Using individualized APIs to block automated attacks on native apps and/or purposely exposed APIs
US9729506B2 (en) 2014-08-22 2017-08-08 Shape Security, Inc. Application programming interface wall
US9800602B2 (en) 2014-09-30 2017-10-24 Shape Security, Inc. Automated hardening of web page content
US20170061131A1 (en) * 2015-08-31 2017-03-02 Cisco Technology, Inc. Side-Channel Integrity Validation of Devices
CN106648440B (zh) * 2015-10-28 2020-07-24 华为技术有限公司 操作存储设备的控制方法和存储设备
CN106778341A (zh) * 2016-12-02 2017-05-31 华北计算技术研究所(中国电子科技集团公司第十五研究所) 数据权限管理系统及方法
US12362947B2 (en) 2019-09-25 2025-07-15 Commonwealth Scientific And Industrial Research Organisation Cryptographic services for browser applications
KR20250031508A (ko) 2023-08-28 2025-03-07 주식회사 소프트프릭 보안 기능을 포함하는 적응형 ai 기반 통합 api 플랫폼 서비스 제공 시스템
KR20250031507A (ko) 2023-08-28 2025-03-07 주식회사 소프트프릭 온프레미스 및 클라우드 환경에서 api 보안 서비스를 제공하는 방법
KR20250031505A (ko) 2023-08-28 2025-03-07 주식회사 소프트프릭 다양한 환경에서 애플리케이션 프로그래밍 인터페이스를 보안하기 위한 방법
KR20250033022A (ko) 2023-08-28 2025-03-07 주식회사 소프트프릭 Api 보안 위협에 대응하기 위한 지능형 통합 api 보안 시스템
KR20250031504A (ko) 2023-08-28 2025-03-07 주식회사 소프트프릭 적응형 인공지능 기반의 api 보안 시스템
KR20250031506A (ko) 2023-08-28 2025-03-07 주식회사 소프트프릭 Api 공격 유형 및 보안 취약점에 대응할 수 있는 적응형 ai 기반의 api 보안 시스템

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4860353A (en) 1988-05-17 1989-08-22 General Instrument Corporation Dynamic feedback arrangement scrambling technique keystream generator
US6850252B1 (en) * 1999-10-05 2005-02-01 Steven M. Hoffberg Intelligent electronic appliance system and method
US6961427B1 (en) 1999-11-23 2005-11-01 General Instrument Corporation Methods and apparatus for keystream generation
JP3793009B2 (ja) 2000-09-06 2006-07-05 キヤノン株式会社 コンテンツ再生装置
KR20050123105A (ko) * 2003-03-24 2005-12-29 마츠시타 덴끼 산교 가부시키가이샤 데이터 보호 관리 장치 및 데이터 보호 관리 방법
US7383438B2 (en) * 2004-12-18 2008-06-03 Comcast Cable Holdings, Llc System and method for secure conditional access download and reconfiguration
JP4589758B2 (ja) * 2005-03-03 2010-12-01 フェリカネットワークス株式会社 データ通信システム,代行システムサーバ,コンピュータプログラム,およびデータ通信方法
KR101564731B1 (ko) 2007-11-16 2015-11-02 톰슨 라이센싱 다운로드된 디지털 매체 파일을 추적하기 위한 시스템 및 방법
US8635664B2 (en) * 2007-12-28 2014-01-21 Intel Corporation Method and system for securing application program interfaces in unified extensible firmware interface
US8713705B2 (en) * 2009-08-03 2014-04-29 Eisst Ltd. Application authentication system and method
US8638929B2 (en) 2009-11-30 2014-01-28 Motorola Mobility Llc System and method for encrypting and decrypting data
US8898469B2 (en) 2010-02-05 2014-11-25 Motorola Mobility Llc Software feature authorization through delegated agents
US8813202B2 (en) * 2012-01-03 2014-08-19 General Instrument Corporation Mechanism to determine source device service tier based on the version of the HDCP key
WO2014070800A1 (en) 2012-10-29 2014-05-08 General Instrument Corporation BUSINESS METHOD INCLUDING CHALLENGE-RESPONSE SYSTEM TO SECURELY AUTHENTICATE SOFTWARE APPLICATION PROGRAM INTERFACES (APIs)

Also Published As

Publication number Publication date
US9027159B2 (en) 2015-05-05
WO2014070800A1 (en) 2014-05-08
EP2901349A1 (en) 2015-08-05
AU2013338059B2 (en) 2017-06-15
US20140123172A1 (en) 2014-05-01
CA2899385A1 (en) 2014-05-08
CA2899385C (en) 2020-10-13
MX2015005454A (es) 2016-01-15
US9172981B2 (en) 2015-10-27
BR112015009690A8 (pt) 2023-02-07
KR101722868B1 (ko) 2017-04-05
AU2013338059A1 (en) 2015-06-18
US20140123321A1 (en) 2014-05-01
US20140123242A1 (en) 2014-05-01
KR20150081328A (ko) 2015-07-13
US9197910B2 (en) 2015-11-24
BR112015009690A2 (pt) 2018-05-22
US20140123220A1 (en) 2014-05-01

Similar Documents

Publication Publication Date Title
MX355757B (es) Metodo de negocios que incluye un sistema de desafio-respuesta para autenticar de forma segura interfaces de programa de aplicaciones de software (apis).
PH12019501854A1 (en) Trusted login method, server, and system
GB2523710A (en) Multi-factor authentication and comprehensive login system for client-server networks
IN2014MN01517A (es)
EP2782037A3 (en) Method and apparatus for performing authentication between applications
WO2015056010A3 (en) Registry apparatus, agent device, application providing apparatus and corresponding methods
WO2013040042A9 (en) Systems and methods of performing link setup and authentication
WO2012069263A3 (en) Method for authorizing access to protected content
WO2013106094A3 (en) System and method for device registration and authentication
WO2010011919A3 (en) Http authentication and authorization management
WO2016175914A3 (en) Transaction signing utilizing asymmetric cryptography
MY208966A (en) Network security management method, apparatus, and network security management system
GB201313407D0 (en) Two device authentication mechanism
WO2011137297A3 (en) Participant authentication via a conference user interface
WO2015013474A3 (en) Anti-piracy protection for software
WO2013045898A3 (en) Methods and apparatus for brokering a transaction
WO2010060704A3 (en) Method and system for token-based authentication
IN2013MU03727A (es)
WO2015057937A8 (en) Method and system for implementing video two factor authentication
BR112013010398A2 (pt) método e aparelho para reforçar uma política em um dispositivo de cliente
WO2017035085A9 (en) System and method for biometric protocol standards
WO2014042992A3 (en) Establishing and using credentials for a common lightweight identity
AU2017261844A1 (en) Authenticating a user
WO2016048129A3 (en) A system and method for authenticating a user based on user behaviour and environmental factors
EP2824603A3 (en) System and method for authenticating public keys

Legal Events

Date Code Title Description
FG Grant or registration