MY185039A - A system and method to secure distribution and execution of library files in a client-server environment - Google Patents

A system and method to secure distribution and execution of library files in a client-server environment

Info

Publication number
MY185039A
MY185039A MYPI2014002188A MYPI2014002188A MY185039A MY 185039 A MY185039 A MY 185039A MY PI2014002188 A MYPI2014002188 A MY PI2014002188A MY PI2014002188 A MYPI2014002188 A MY PI2014002188A MY 185039 A MY185039 A MY 185039A
Authority
MY
Malaysia
Prior art keywords
file
execution
client
server
present
Prior art date
Application number
MYPI2014002188A
Inventor
Haszeli Ahmad Nurul
Bin Mat Nor Fazli
M Perumal Nagendran
M Balakrishnan Nathan
Azrul Hadi Abd Aziz Mohd
Original Assignee
Mimos Berhad
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mimos Berhad filed Critical Mimos Berhad
Priority to MYPI2014002188A priority Critical patent/MY185039A/en
Priority to PCT/MY2015/050071 priority patent/WO2016013926A1/en
Publication of MY185039A publication Critical patent/MY185039A/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

The system and method of the present invention secures distribution and execution of library files in a client-server environment by splitting through random number and key generator which prevents file from being tampered and program analysis which prevents exploitation of file. The present invention comprising at least one server (106); at least one client device (112) at client side; and at least a database (104). The server (106) for hosting library file further comprises at least one Security Agent (102) for performing file vulnerability analysis, file secrecy and updating the database with file DNA (Deoxyribonucleic acid). Generally, the present invention encompassed fragmentation of executable file to multiple chunks using file size and random number; file security check using file chunk mapping information and file DNA; and file vulnerability using malware analysis before distribution and execution. (Figure 1.0)
MYPI2014002188A 2014-07-24 2014-07-24 A system and method to secure distribution and execution of library files in a client-server environment MY185039A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
MYPI2014002188A MY185039A (en) 2014-07-24 2014-07-24 A system and method to secure distribution and execution of library files in a client-server environment
PCT/MY2015/050071 WO2016013926A1 (en) 2014-07-24 2015-07-13 A system and method to secure distribution and execution of library files in a client-server environment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
MYPI2014002188A MY185039A (en) 2014-07-24 2014-07-24 A system and method to secure distribution and execution of library files in a client-server environment

Publications (1)

Publication Number Publication Date
MY185039A true MY185039A (en) 2021-04-30

Family

ID=54072924

Family Applications (1)

Application Number Title Priority Date Filing Date
MYPI2014002188A MY185039A (en) 2014-07-24 2014-07-24 A system and method to secure distribution and execution of library files in a client-server environment

Country Status (2)

Country Link
MY (1) MY185039A (en)
WO (1) WO2016013926A1 (en)

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB0210325D0 (en) * 2002-05-04 2002-06-12 Gaffney Philip M Secure data delivery
US8069349B1 (en) 2005-11-02 2011-11-29 The United States Of America As Represented By The Director, National Security Agency Method of secure file transfer
US8171560B2 (en) 2008-04-07 2012-05-01 Microsoft Corporation Secure content pre-distribution to designated systems
US9792429B2 (en) * 2010-10-06 2017-10-17 Red Hat, Inc. Detection of malicious software packages

Also Published As

Publication number Publication date
WO2016013926A1 (en) 2016-01-28

Similar Documents

Publication Publication Date Title
ZA201900512B (en) Blockchain-implemented method and system
WO2015187640A3 (en) System and method for secure review of audit logs
MX2017014355A (en) System and method for extracting and sharing application-related user data.
WO2019083440A3 (en) Vehicle-mounted device upgrading method and related device
NZ714230A (en) System and methods for encrypting data
BRPI0711335A2 (en) efficiently creating consistent consistent application backups
BR112018016810A2 (en) computer-implemented method and system for encrypting data on an electronic device, electronic device, and computer program
EP2897051A3 (en) Verifiable audit log
AU2015202373B2 (en) Computer System for Distributed Discovery of Vulnerabilities in Applications
WO2013170064A3 (en) Methods and apparatus for identifying and removing malicious applications
EP3541006A4 (en) Reuse system, key creating device, data security device, on-vehicle computer, reuse method, and computer program
WO2008034009A3 (en) Method of randomly and dynamically checking configuration integrity of a gaming system
NZ701459A (en) Systems and methods for secure processing with embedded cryptographic unit
GB2560861A8 (en) Labeling computing objects for improved threat detection
CO2019007875A2 (en) Addressing a reliable execution environment using signature key
BR112015023090A2 (en) system and method for use on multiple payment accounts using a single payment device
GB2545838A (en) Hypervisor and virtual machine protection
IN2014MU00771A (en)
MY178309A (en) Method and system for running encrypted files
PH12018502397A1 (en) Processing method for presenting copy attack, and server and client
BR112019000805A2 (en) end-to-end key management system and method
BR112018009137A2 (en) method of generating a master key from a subkey sequence for cryptographic operations, method of generating a master key from related direct and reverse sequence of subkeys for use in cryptographic operations, method of decrypting a message encrypted with a block cipher, method of processing a block cipher message having a key programming, device for generating a master key from a subkey sequence for cryptographic operations, device for processing a message with a block cipher having a key programming, computer program product, and one or more computer readable media
BR112018013306A2 (en) ? bank card password protection method and system?
BR112013021704A2 (en) secure management and customization of unique code signing keys
BR112018000325A2 (en) separation of software modules by controlled encryption key management