MY185039A - A system and method to secure distribution and execution of library files in a client-server environment - Google Patents
A system and method to secure distribution and execution of library files in a client-server environmentInfo
- Publication number
- MY185039A MY185039A MYPI2014002188A MYPI2014002188A MY185039A MY 185039 A MY185039 A MY 185039A MY PI2014002188 A MYPI2014002188 A MY PI2014002188A MY PI2014002188 A MYPI2014002188 A MY PI2014002188A MY 185039 A MY185039 A MY 185039A
- Authority
- MY
- Malaysia
- Prior art keywords
- file
- execution
- client
- server
- present
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Abstract
The system and method of the present invention secures distribution and execution of library files in a client-server environment by splitting through random number and key generator which prevents file from being tampered and program analysis which prevents exploitation of file. The present invention comprising at least one server (106); at least one client device (112) at client side; and at least a database (104). The server (106) for hosting library file further comprises at least one Security Agent (102) for performing file vulnerability analysis, file secrecy and updating the database with file DNA (Deoxyribonucleic acid). Generally, the present invention encompassed fragmentation of executable file to multiple chunks using file size and random number; file security check using file chunk mapping information and file DNA; and file vulnerability using malware analysis before distribution and execution. (Figure 1.0)
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
MYPI2014002188A MY185039A (en) | 2014-07-24 | 2014-07-24 | A system and method to secure distribution and execution of library files in a client-server environment |
PCT/MY2015/050071 WO2016013926A1 (en) | 2014-07-24 | 2015-07-13 | A system and method to secure distribution and execution of library files in a client-server environment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
MYPI2014002188A MY185039A (en) | 2014-07-24 | 2014-07-24 | A system and method to secure distribution and execution of library files in a client-server environment |
Publications (1)
Publication Number | Publication Date |
---|---|
MY185039A true MY185039A (en) | 2021-04-30 |
Family
ID=54072924
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
MYPI2014002188A MY185039A (en) | 2014-07-24 | 2014-07-24 | A system and method to secure distribution and execution of library files in a client-server environment |
Country Status (2)
Country | Link |
---|---|
MY (1) | MY185039A (en) |
WO (1) | WO2016013926A1 (en) |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB0210325D0 (en) * | 2002-05-04 | 2002-06-12 | Gaffney Philip M | Secure data delivery |
US8069349B1 (en) | 2005-11-02 | 2011-11-29 | The United States Of America As Represented By The Director, National Security Agency | Method of secure file transfer |
US8171560B2 (en) | 2008-04-07 | 2012-05-01 | Microsoft Corporation | Secure content pre-distribution to designated systems |
US9792429B2 (en) * | 2010-10-06 | 2017-10-17 | Red Hat, Inc. | Detection of malicious software packages |
-
2014
- 2014-07-24 MY MYPI2014002188A patent/MY185039A/en unknown
-
2015
- 2015-07-13 WO PCT/MY2015/050071 patent/WO2016013926A1/en active Application Filing
Also Published As
Publication number | Publication date |
---|---|
WO2016013926A1 (en) | 2016-01-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
ZA201900512B (en) | Blockchain-implemented method and system | |
WO2015187640A3 (en) | System and method for secure review of audit logs | |
MX2017014355A (en) | System and method for extracting and sharing application-related user data. | |
WO2019083440A3 (en) | Vehicle-mounted device upgrading method and related device | |
NZ714230A (en) | System and methods for encrypting data | |
BRPI0711335A2 (en) | efficiently creating consistent consistent application backups | |
BR112018016810A2 (en) | computer-implemented method and system for encrypting data on an electronic device, electronic device, and computer program | |
EP2897051A3 (en) | Verifiable audit log | |
AU2015202373B2 (en) | Computer System for Distributed Discovery of Vulnerabilities in Applications | |
WO2013170064A3 (en) | Methods and apparatus for identifying and removing malicious applications | |
EP3541006A4 (en) | Reuse system, key creating device, data security device, on-vehicle computer, reuse method, and computer program | |
WO2008034009A3 (en) | Method of randomly and dynamically checking configuration integrity of a gaming system | |
NZ701459A (en) | Systems and methods for secure processing with embedded cryptographic unit | |
GB2560861A8 (en) | Labeling computing objects for improved threat detection | |
CO2019007875A2 (en) | Addressing a reliable execution environment using signature key | |
BR112015023090A2 (en) | system and method for use on multiple payment accounts using a single payment device | |
GB2545838A (en) | Hypervisor and virtual machine protection | |
IN2014MU00771A (en) | ||
MY178309A (en) | Method and system for running encrypted files | |
PH12018502397A1 (en) | Processing method for presenting copy attack, and server and client | |
BR112019000805A2 (en) | end-to-end key management system and method | |
BR112018009137A2 (en) | method of generating a master key from a subkey sequence for cryptographic operations, method of generating a master key from related direct and reverse sequence of subkeys for use in cryptographic operations, method of decrypting a message encrypted with a block cipher, method of processing a block cipher message having a key programming, device for generating a master key from a subkey sequence for cryptographic operations, device for processing a message with a block cipher having a key programming, computer program product, and one or more computer readable media | |
BR112018013306A2 (en) | ? bank card password protection method and system? | |
BR112013021704A2 (en) | secure management and customization of unique code signing keys | |
BR112018000325A2 (en) | separation of software modules by controlled encryption key management |