MX355757B - Metodo de negocios que incluye un sistema de desafio-respuesta para autenticar de forma segura interfaces de programa de aplicaciones de software (apis). - Google Patents
Metodo de negocios que incluye un sistema de desafio-respuesta para autenticar de forma segura interfaces de programa de aplicaciones de software (apis).Info
- Publication number
- MX355757B MX355757B MX2015005454A MX2015005454A MX355757B MX 355757 B MX355757 B MX 355757B MX 2015005454 A MX2015005454 A MX 2015005454A MX 2015005454 A MX2015005454 A MX 2015005454A MX 355757 B MX355757 B MX 355757B
- Authority
- MX
- Mexico
- Prior art keywords
- claimant
- verifier
- challenge
- response
- apis
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/235—Processing of additional data, e.g. scrambling of additional data or processing content descriptors
- H04N21/2351—Processing of additional data, e.g. scrambling of additional data or processing content descriptors involving encryption of additional data
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/105—Arrangements for software license management or administration, e.g. for managing licenses at corporate level
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/629—Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/435—Processing of additional data, e.g. decrypting of additional data, reconstructing software from modules extracted from the transport stream
- H04N21/4353—Processing of additional data, e.g. decrypting of additional data, reconstructing software from modules extracted from the transport stream involving decryption of additional data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/443—OS processes, e.g. booting an STB, implementing a Java virtual machine in an STB or power management in an STB
- H04N21/4431—OS processes, e.g. booting an STB, implementing a Java virtual machine in an STB or power management in an STB characterized by the use of Application Program Interface [API] libraries
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/443—OS processes, e.g. booting an STB, implementing a Java virtual machine in an STB or power management in an STB
- H04N21/4433—Implementing client middleware, e.g. Multimedia Home Platform [MHP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/60—Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client
- H04N21/63—Control signaling related to video distribution between client, server and network components; Network processes for video distribution between server and clients or between remote clients, e.g. transmitting basic layer and enhancement layers over different transmission paths, setting up a peer-to-peer communication via Internet between remote STB's; Communication protocols; Addressing
- H04N21/647—Control signaling between network components and server or clients; Network processes for video distribution between server and clients, e.g. controlling the quality of the video stream, by dropping packets, protecting content from unauthorised alteration within the network, monitoring of network load, bridging between two different networks, e.g. between IP and wireless
- H04N21/64715—Protecting content from unauthorized alteration within the network
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Technology Law (AREA)
- Computing Systems (AREA)
- Library & Information Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Un sistema para autenticar de forma segura Interfaces de Programa de Aplicaciones de software (APIs) incluye un protocolo de enlace que se proporciona para validar si las partes involucradas tienen licencia para utilizar el sistema que incluye los derechos de propiedad intelectual (IP) y las obligaciones correspondientes. El enlace es un protocolo de desafío-respuesta que incluye varios pasos. En primer lugar, un Demandante envía una solicitud a un Verificador que solicita el acceso a una función a través de un API. El Verificador reacciona a la solicitud mediante la emisión de un Desafío que se envía al Demandante. El Desafío también es retenido por el Verificador para el uso en su cálculo interno para verificar la respuesta del Demandante. El Demandante posteriormente procesa el Desafío utilizando componentes bajo la licencia, conocidos como IP Hook, y emite una Respuesta al Verificador. El Verificador compara la respuesta del Candidato posiblemente correcta del Demandante a la Respuesta Objetivo conocida correcta y si se produce una coincidencia, entonces el Verificador permite el acceso del Demandante a la API.
Applications Claiming Priority (4)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US201261719923P | 2012-10-29 | 2012-10-29 | |
| US201261719928P | 2012-10-29 | 2012-10-29 | |
| PCT/US2013/067353 WO2014070800A1 (en) | 2012-10-29 | 2013-10-29 | BUSINESS METHOD INCLUDING CHALLENGE-RESPONSE SYSTEM TO SECURELY AUTHENTICATE SOFTWARE APPLICATION PROGRAM INTERFACES (APIs) |
| US14/066,591 US20140123220A1 (en) | 2012-10-29 | 2013-10-29 | BUSINESS METHOD INCLUDING CHALLENGE-RESPONSE SYSTEM TO SECURELY AUTHENTICATE SOFTWARE APPLICATION PROGRAM INTERFACES (APIs) |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| MX2015005454A MX2015005454A (es) | 2016-01-15 |
| MX355757B true MX355757B (es) | 2018-04-27 |
Family
ID=50548740
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| MX2015005454A MX355757B (es) | 2012-10-29 | 2013-10-29 | Metodo de negocios que incluye un sistema de desafio-respuesta para autenticar de forma segura interfaces de programa de aplicaciones de software (apis). |
Country Status (8)
| Country | Link |
|---|---|
| US (4) | US9172981B2 (es) |
| EP (1) | EP2901349A1 (es) |
| KR (1) | KR101722868B1 (es) |
| AU (1) | AU2013338059B2 (es) |
| BR (1) | BR112015009690A8 (es) |
| CA (1) | CA2899385C (es) |
| MX (1) | MX355757B (es) |
| WO (1) | WO2014070800A1 (es) |
Families Citing this family (16)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2014070800A1 (en) | 2012-10-29 | 2014-05-08 | General Instrument Corporation | BUSINESS METHOD INCLUDING CHALLENGE-RESPONSE SYSTEM TO SECURELY AUTHENTICATE SOFTWARE APPLICATION PROGRAM INTERFACES (APIs) |
| US9565022B1 (en) | 2013-07-02 | 2017-02-07 | Impinj, Inc. | RFID tags with dynamic key replacement |
| US10050935B2 (en) | 2014-07-09 | 2018-08-14 | Shape Security, Inc. | Using individualized APIs to block automated attacks on native apps and/or purposely exposed APIs with forced user interaction |
| US9258274B2 (en) * | 2014-07-09 | 2016-02-09 | Shape Security, Inc. | Using individualized APIs to block automated attacks on native apps and/or purposely exposed APIs |
| US9729506B2 (en) | 2014-08-22 | 2017-08-08 | Shape Security, Inc. | Application programming interface wall |
| US9800602B2 (en) | 2014-09-30 | 2017-10-24 | Shape Security, Inc. | Automated hardening of web page content |
| US20170061131A1 (en) * | 2015-08-31 | 2017-03-02 | Cisco Technology, Inc. | Side-Channel Integrity Validation of Devices |
| CN106648440B (zh) * | 2015-10-28 | 2020-07-24 | 华为技术有限公司 | 操作存储设备的控制方法和存储设备 |
| CN106778341A (zh) * | 2016-12-02 | 2017-05-31 | 华北计算技术研究所(中国电子科技集团公司第十五研究所) | 数据权限管理系统及方法 |
| US12362947B2 (en) | 2019-09-25 | 2025-07-15 | Commonwealth Scientific And Industrial Research Organisation | Cryptographic services for browser applications |
| KR20250031508A (ko) | 2023-08-28 | 2025-03-07 | 주식회사 소프트프릭 | 보안 기능을 포함하는 적응형 ai 기반 통합 api 플랫폼 서비스 제공 시스템 |
| KR20250031507A (ko) | 2023-08-28 | 2025-03-07 | 주식회사 소프트프릭 | 온프레미스 및 클라우드 환경에서 api 보안 서비스를 제공하는 방법 |
| KR20250031505A (ko) | 2023-08-28 | 2025-03-07 | 주식회사 소프트프릭 | 다양한 환경에서 애플리케이션 프로그래밍 인터페이스를 보안하기 위한 방법 |
| KR20250033022A (ko) | 2023-08-28 | 2025-03-07 | 주식회사 소프트프릭 | Api 보안 위협에 대응하기 위한 지능형 통합 api 보안 시스템 |
| KR20250031504A (ko) | 2023-08-28 | 2025-03-07 | 주식회사 소프트프릭 | 적응형 인공지능 기반의 api 보안 시스템 |
| KR20250031506A (ko) | 2023-08-28 | 2025-03-07 | 주식회사 소프트프릭 | Api 공격 유형 및 보안 취약점에 대응할 수 있는 적응형 ai 기반의 api 보안 시스템 |
Family Cites Families (14)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US4860353A (en) | 1988-05-17 | 1989-08-22 | General Instrument Corporation | Dynamic feedback arrangement scrambling technique keystream generator |
| US6850252B1 (en) * | 1999-10-05 | 2005-02-01 | Steven M. Hoffberg | Intelligent electronic appliance system and method |
| US6961427B1 (en) | 1999-11-23 | 2005-11-01 | General Instrument Corporation | Methods and apparatus for keystream generation |
| JP3793009B2 (ja) | 2000-09-06 | 2006-07-05 | キヤノン株式会社 | コンテンツ再生装置 |
| KR20050123105A (ko) * | 2003-03-24 | 2005-12-29 | 마츠시타 덴끼 산교 가부시키가이샤 | 데이터 보호 관리 장치 및 데이터 보호 관리 방법 |
| US7383438B2 (en) * | 2004-12-18 | 2008-06-03 | Comcast Cable Holdings, Llc | System and method for secure conditional access download and reconfiguration |
| JP4589758B2 (ja) * | 2005-03-03 | 2010-12-01 | フェリカネットワークス株式会社 | データ通信システム,代行システムサーバ,コンピュータプログラム,およびデータ通信方法 |
| KR101564731B1 (ko) | 2007-11-16 | 2015-11-02 | 톰슨 라이센싱 | 다운로드된 디지털 매체 파일을 추적하기 위한 시스템 및 방법 |
| US8635664B2 (en) * | 2007-12-28 | 2014-01-21 | Intel Corporation | Method and system for securing application program interfaces in unified extensible firmware interface |
| US8713705B2 (en) * | 2009-08-03 | 2014-04-29 | Eisst Ltd. | Application authentication system and method |
| US8638929B2 (en) | 2009-11-30 | 2014-01-28 | Motorola Mobility Llc | System and method for encrypting and decrypting data |
| US8898469B2 (en) | 2010-02-05 | 2014-11-25 | Motorola Mobility Llc | Software feature authorization through delegated agents |
| US8813202B2 (en) * | 2012-01-03 | 2014-08-19 | General Instrument Corporation | Mechanism to determine source device service tier based on the version of the HDCP key |
| WO2014070800A1 (en) | 2012-10-29 | 2014-05-08 | General Instrument Corporation | BUSINESS METHOD INCLUDING CHALLENGE-RESPONSE SYSTEM TO SECURELY AUTHENTICATE SOFTWARE APPLICATION PROGRAM INTERFACES (APIs) |
-
2013
- 2013-10-29 WO PCT/US2013/067353 patent/WO2014070800A1/en not_active Ceased
- 2013-10-29 US US14/066,653 patent/US9172981B2/en active Active
- 2013-10-29 AU AU2013338059A patent/AU2013338059B2/en active Active
- 2013-10-29 US US14/066,636 patent/US9197910B2/en active Active
- 2013-10-29 KR KR1020157014437A patent/KR101722868B1/ko active Active
- 2013-10-29 US US14/066,591 patent/US20140123220A1/en not_active Abandoned
- 2013-10-29 US US14/066,657 patent/US9027159B2/en active Active
- 2013-10-29 CA CA2899385A patent/CA2899385C/en active Active
- 2013-10-29 EP EP13795326.1A patent/EP2901349A1/en not_active Ceased
- 2013-10-29 MX MX2015005454A patent/MX355757B/es active IP Right Grant
- 2013-10-29 BR BR112015009690A patent/BR112015009690A8/pt not_active Application Discontinuation
Also Published As
| Publication number | Publication date |
|---|---|
| US9027159B2 (en) | 2015-05-05 |
| WO2014070800A1 (en) | 2014-05-08 |
| EP2901349A1 (en) | 2015-08-05 |
| AU2013338059B2 (en) | 2017-06-15 |
| US20140123172A1 (en) | 2014-05-01 |
| CA2899385A1 (en) | 2014-05-08 |
| CA2899385C (en) | 2020-10-13 |
| MX2015005454A (es) | 2016-01-15 |
| US9172981B2 (en) | 2015-10-27 |
| BR112015009690A8 (pt) | 2023-02-07 |
| KR101722868B1 (ko) | 2017-04-05 |
| AU2013338059A1 (en) | 2015-06-18 |
| US20140123321A1 (en) | 2014-05-01 |
| US20140123242A1 (en) | 2014-05-01 |
| KR20150081328A (ko) | 2015-07-13 |
| US9197910B2 (en) | 2015-11-24 |
| BR112015009690A2 (pt) | 2018-05-22 |
| US20140123220A1 (en) | 2014-05-01 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| MX355757B (es) | Metodo de negocios que incluye un sistema de desafio-respuesta para autenticar de forma segura interfaces de programa de aplicaciones de software (apis). | |
| PH12019501854A1 (en) | Trusted login method, server, and system | |
| GB2523710A (en) | Multi-factor authentication and comprehensive login system for client-server networks | |
| IN2014MN01517A (es) | ||
| EP2782037A3 (en) | Method and apparatus for performing authentication between applications | |
| WO2015056010A3 (en) | Registry apparatus, agent device, application providing apparatus and corresponding methods | |
| WO2013040042A9 (en) | Systems and methods of performing link setup and authentication | |
| WO2012069263A3 (en) | Method for authorizing access to protected content | |
| WO2013106094A3 (en) | System and method for device registration and authentication | |
| WO2010011919A3 (en) | Http authentication and authorization management | |
| WO2016175914A3 (en) | Transaction signing utilizing asymmetric cryptography | |
| MY208966A (en) | Network security management method, apparatus, and network security management system | |
| GB201313407D0 (en) | Two device authentication mechanism | |
| WO2011137297A3 (en) | Participant authentication via a conference user interface | |
| WO2015013474A3 (en) | Anti-piracy protection for software | |
| WO2013045898A3 (en) | Methods and apparatus for brokering a transaction | |
| WO2010060704A3 (en) | Method and system for token-based authentication | |
| IN2013MU03727A (es) | ||
| WO2015057937A8 (en) | Method and system for implementing video two factor authentication | |
| BR112013010398A2 (pt) | método e aparelho para reforçar uma política em um dispositivo de cliente | |
| WO2017035085A9 (en) | System and method for biometric protocol standards | |
| WO2014042992A3 (en) | Establishing and using credentials for a common lightweight identity | |
| AU2017261844A1 (en) | Authenticating a user | |
| WO2016048129A3 (en) | A system and method for authenticating a user based on user behaviour and environmental factors | |
| EP2824603A3 (en) | System and method for authenticating public keys |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| FG | Grant or registration |