MY193643A - Processing method for preventing copy attack, and server and client - Google Patents
Processing method for preventing copy attack, and server and clientInfo
- Publication number
- MY193643A MY193643A MYPI2018001905A MYPI2018001905A MY193643A MY 193643 A MY193643 A MY 193643A MY PI2018001905 A MYPI2018001905 A MY PI2018001905A MY PI2018001905 A MYPI2018001905 A MY PI2018001905A MY 193643 A MY193643 A MY 193643A
- Authority
- MY
- Malaysia
- Prior art keywords
- client
- server
- copy attack
- identifier
- variable identifier
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1458—Protection against unauthorised use of memory or access to memory by checking the subject access rights
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1475—Passive attacks, e.g. eavesdropping or listening without modification of the traffic monitored
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2212/00—Indexing scheme relating to accessing, addressing or allocation within memory systems or architectures
- G06F2212/10—Providing a specific technical effect
- G06F2212/1052—Security improvement
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2212/00—Indexing scheme relating to accessing, addressing or allocation within memory systems or architectures
- G06F2212/15—Use in a specific computing environment
- G06F2212/154—Networked environment
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer And Data Communications (AREA)
- Storage Device Security (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201610318168.6A CN107368737A (zh) | 2016-05-13 | 2016-05-13 | 一种防止拷贝攻击的处理方法、服务器及客户端 |
| PCT/CN2017/080006 WO2017193750A1 (zh) | 2016-05-13 | 2017-04-11 | 一种防止拷贝攻击的处理方法、服务器及客户端 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| MY193643A true MY193643A (en) | 2022-10-21 |
Family
ID=60267507
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| MYPI2018001905A MY193643A (en) | 2016-05-13 | 2017-04-11 | Processing method for preventing copy attack, and server and client |
Country Status (10)
| Country | Link |
|---|---|
| US (2) | US10999321B2 (cg-RX-API-DMAC7.html) |
| EP (1) | EP3457309B1 (cg-RX-API-DMAC7.html) |
| JP (1) | JP6880071B2 (cg-RX-API-DMAC7.html) |
| KR (1) | KR102218572B1 (cg-RX-API-DMAC7.html) |
| CN (1) | CN107368737A (cg-RX-API-DMAC7.html) |
| MY (1) | MY193643A (cg-RX-API-DMAC7.html) |
| PH (1) | PH12018502397B1 (cg-RX-API-DMAC7.html) |
| SG (1) | SG11201809981QA (cg-RX-API-DMAC7.html) |
| TW (1) | TWI669626B (cg-RX-API-DMAC7.html) |
| WO (1) | WO2017193750A1 (cg-RX-API-DMAC7.html) |
Families Citing this family (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN107368737A (zh) * | 2016-05-13 | 2017-11-21 | 阿里巴巴集团控股有限公司 | 一种防止拷贝攻击的处理方法、服务器及客户端 |
| WO2019136407A1 (en) * | 2018-01-08 | 2019-07-11 | Equifax Inc. | Facilitating entity resolution, keying, and search match without transmitting personally identifiable information in the clear |
| CN110297651B (zh) * | 2019-06-18 | 2023-06-13 | 广州华多网络科技有限公司 | 协议接口的常用变量的更新方法和装置 |
| CN110247925A (zh) * | 2019-06-26 | 2019-09-17 | 国网山东省电力公司临朐县供电公司 | 配电自动化信息交互方法、系统、终端及存储介质 |
| CN110445841B (zh) * | 2019-07-12 | 2022-04-22 | 苏州浪潮智能科技有限公司 | 一种云物理机挂载云盘的方法、设备以及存储介质 |
| CN111726334A (zh) * | 2020-05-08 | 2020-09-29 | 深圳知路科技有限公司 | 防止网络攻击的方法、客户端、服务器及系统 |
| CN112667151B (zh) * | 2020-12-11 | 2022-09-20 | 苏州浪潮智能科技有限公司 | 一种存储设备的拷贝系统、方法及介质 |
| CN113098880A (zh) * | 2021-04-06 | 2021-07-09 | 杭州和利时自动化有限公司 | 一种重放攻击识别的方法、系统、设备及可读存储介质 |
| CN115292697B (zh) * | 2022-10-10 | 2022-12-16 | 北京安帝科技有限公司 | 一种基于入侵行为分析的内存保护方法及装置 |
| CN115527243B (zh) * | 2022-10-13 | 2025-08-19 | 东南大学 | 基于双任务学习的生物指纹识别方法及产品 |
Family Cites Families (24)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPH05336109A (ja) * | 1992-05-29 | 1993-12-17 | Toshiba Corp | 無線通信システム |
| JPH06164493A (ja) * | 1992-11-26 | 1994-06-10 | N T T Idou Tsuushinmou Kk | 移動通信方式 |
| JP3278550B2 (ja) * | 1995-06-08 | 2002-04-30 | 日本電気株式会社 | 移動無線通信システムにおけるクローン端末の通信拒否方式 |
| JPH0984124A (ja) * | 1995-09-19 | 1997-03-28 | Fujitsu Ltd | パーソナル通信端末の不正使用防止方法 |
| JP2001308850A (ja) * | 2000-03-31 | 2001-11-02 | Internatl Business Mach Corp <Ibm> | 通信端末装置によるネットワークへの接続方法および装置 |
| US20030065919A1 (en) * | 2001-04-18 | 2003-04-03 | Albert Roy David | Method and system for identifying a replay attack by an access device to a computer system |
| WO2005069295A1 (en) * | 2004-01-16 | 2005-07-28 | Matsushita Electric Industrial Co., Ltd. | Authentication server, method and system for detecting unauthorized terminal |
| CN100470573C (zh) * | 2004-12-13 | 2009-03-18 | 松下电器产业株式会社 | 非授权设备检测设备、非授权设备检测系统及其非授权设备检测方法 |
| KR100764153B1 (ko) * | 2006-03-15 | 2007-10-12 | 포스데이타 주식회사 | 휴대 인터넷 시스템에서의 단말 복제 검출 방법 및 장치 |
| US20070245010A1 (en) | 2006-03-24 | 2007-10-18 | Robert Arn | Systems and methods for multi-perspective optimization of data transfers in heterogeneous networks such as the internet |
| CN101166091B (zh) * | 2006-10-19 | 2010-08-11 | 阿里巴巴集团控股有限公司 | 一种动态密码认证的方法及服务端系统 |
| JP4928364B2 (ja) * | 2007-06-25 | 2012-05-09 | 日本電信電話株式会社 | 認証方法、登録値生成方法、サーバ装置、クライアント装置及びプログラム |
| CN100531365C (zh) * | 2007-07-09 | 2009-08-19 | 中国联合网络通信集团有限公司 | Iptv认证鉴权方法、服务器及系统 |
| KR101261678B1 (ko) * | 2009-09-21 | 2013-05-09 | 한국전자통신연구원 | 분산된 신뢰기관을 이용하는 다운로더블 제한수신 시스템 및 상기 시스템의 동작 방법 |
| US20130204935A1 (en) * | 2012-02-07 | 2013-08-08 | Soaric Ab | Dynamic sharing of a webservice |
| JP5903190B2 (ja) * | 2012-04-01 | 2016-04-13 | オーセンティファイ・インクAuthentify Inc. | マルチパーティシステムにおける安全な認証 |
| EP2962485B1 (en) * | 2013-03-01 | 2019-08-21 | Intel IP Corporation | Wireless local area network (wlan) traffic offloading |
| CN104301288B (zh) * | 2013-07-16 | 2017-11-10 | 中钞信用卡产业发展有限公司 | 在线身份认证、在线交易验证、在线验证保护的方法与系统 |
| SG2014011308A (en) * | 2014-02-11 | 2015-09-29 | Smart Communications Inc | Authentication system and method |
| CN105024813B (zh) * | 2014-04-15 | 2018-06-22 | 中国银联股份有限公司 | 一种服务器、用户设备以及用户设备与服务器的交互方法 |
| CN104331801A (zh) * | 2014-10-29 | 2015-02-04 | 重庆智韬信息技术中心 | 通过动态码授权实现安全支付的方法 |
| CN104579694B (zh) * | 2015-02-09 | 2018-09-14 | 浙江大学 | 一种身份认证方法及系统 |
| CN105491077B (zh) * | 2016-02-26 | 2019-02-12 | 浙江维尔科技股份有限公司 | 一种身份认证的系统 |
| CN107368737A (zh) * | 2016-05-13 | 2017-11-21 | 阿里巴巴集团控股有限公司 | 一种防止拷贝攻击的处理方法、服务器及客户端 |
-
2016
- 2016-05-13 CN CN201610318168.6A patent/CN107368737A/zh active Pending
-
2017
- 2017-03-15 TW TW106108586A patent/TWI669626B/zh active
- 2017-04-11 KR KR1020187036283A patent/KR102218572B1/ko active Active
- 2017-04-11 EP EP17795368.4A patent/EP3457309B1/en active Active
- 2017-04-11 WO PCT/CN2017/080006 patent/WO2017193750A1/zh not_active Ceased
- 2017-04-11 PH PH1/2018/502397A patent/PH12018502397B1/en unknown
- 2017-04-11 SG SG11201809981QA patent/SG11201809981QA/en unknown
- 2017-04-11 MY MYPI2018001905A patent/MY193643A/en unknown
- 2017-04-11 JP JP2018559753A patent/JP6880071B2/ja active Active
-
2018
- 2018-11-09 US US16/186,197 patent/US10999321B2/en active Active
-
2019
- 2019-12-20 US US16/722,832 patent/US10887343B2/en active Active
Also Published As
| Publication number | Publication date |
|---|---|
| PH12018502397B1 (en) | 2023-08-18 |
| JP2019517067A (ja) | 2019-06-20 |
| CN107368737A (zh) | 2017-11-21 |
| SG11201809981QA (en) | 2018-12-28 |
| EP3457309A1 (en) | 2019-03-20 |
| US10887343B2 (en) | 2021-01-05 |
| JP6880071B2 (ja) | 2021-06-02 |
| TW201810109A (zh) | 2018-03-16 |
| WO2017193750A1 (zh) | 2017-11-16 |
| KR102218572B1 (ko) | 2021-02-23 |
| PH12018502397A1 (en) | 2019-07-15 |
| US20200128045A1 (en) | 2020-04-23 |
| US10999321B2 (en) | 2021-05-04 |
| TWI669626B (zh) | 2019-08-21 |
| EP3457309A4 (en) | 2019-04-17 |
| KR20190008333A (ko) | 2019-01-23 |
| US20190081979A1 (en) | 2019-03-14 |
| EP3457309B1 (en) | 2021-08-25 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| MY193643A (en) | Processing method for preventing copy attack, and server and client | |
| TWI701561B (zh) | 資料備份方法、裝置、存儲介質及伺服器 | |
| MY202763A (en) | Security implementation method, device and system | |
| PH12018501742A1 (en) | A method and system for securing computer software using a distributed hash table and a block chain | |
| MX2017005801A (es) | Acciones de borrado de contenido itinerante a traves de dispositivos. | |
| MY192409A (en) | Business processing method and apparatus | |
| PH12019501055A1 (en) | Blockchain-based data processing method and device | |
| MY190550A (en) | Method and device for processing service request | |
| WO2019072293A3 (en) | Data isolation in blockchain network | |
| MX2016016024A (es) | Metodo apra refrescar memoria de acceso aleatorio, dinamica y un sistema de computadora. | |
| MY199117A (en) | Multimedia data processing method, apparatus, and system, and storage medium | |
| WO2016040204A3 (en) | Preserving data protection with policy | |
| EP4236203A3 (en) | Data security using request-supplied keys | |
| PH12018550176A1 (en) | Using hardware based secure isolated region to prevent piracy and cheating on electronic devices | |
| EP3132371A1 (en) | Method and apparatus of detecting weak password | |
| MX2016011988A (es) | Metodo y dispositivo de administracion de datos confidenciales, y metodo y sistema de autenticacion de seguridad. | |
| SG10201900062SA (en) | Method and system of decentralized malware identification | |
| HK1243512A1 (zh) | 利用统计分析识别潜在的ddos攻击 | |
| MY203310A (en) | Digital rights management method of media content, drm client and server side | |
| MY201886A (en) | Verification code short message processing method and terminal | |
| CN105981356A (zh) | 一种信息发送、处理方法及装置 | |
| SG10201806904QA (en) | Cyber attack information processing apparatus, method, and program | |
| Wang | Food information management and security strategy of computer network | |
| US11558419B2 (en) | Method and apparatus for autonomous identification of similar and adjacent attacks based on detected attacks | |
| MX2020002294A (es) | Sistema y metodo para proteger contenido. |