MY193643A - Processing method for preventing copy attack, and server and client - Google Patents

Processing method for preventing copy attack, and server and client

Info

Publication number
MY193643A
MY193643A MYPI2018001905A MYPI2018001905A MY193643A MY 193643 A MY193643 A MY 193643A MY PI2018001905 A MYPI2018001905 A MY PI2018001905A MY PI2018001905 A MYPI2018001905 A MY PI2018001905A MY 193643 A MY193643 A MY 193643A
Authority
MY
Malaysia
Prior art keywords
client
server
copy attack
identifier
variable identifier
Prior art date
Application number
MYPI2018001905A
Other languages
English (en)
Inventor
Li Xiaofeng
Original Assignee
Advanced New Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Advanced New Technologies Co Ltd filed Critical Advanced New Technologies Co Ltd
Publication of MY193643A publication Critical patent/MY193643A/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • G06F12/1458Protection against unauthorised use of memory or access to memory by checking the subject access rights
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1475Passive attacks, e.g. eavesdropping or listening without modification of the traffic monitored
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/002Countermeasures against attacks on cryptographic mechanisms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2212/00Indexing scheme relating to accessing, addressing or allocation within memory systems or architectures
    • G06F2212/10Providing a specific technical effect
    • G06F2212/1052Security improvement
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2212/00Indexing scheme relating to accessing, addressing or allocation within memory systems or architectures
    • G06F2212/15Use in a specific computing environment
    • G06F2212/154Networked environment

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer And Data Communications (AREA)
  • Storage Device Security (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
MYPI2018001905A 2016-05-13 2017-04-11 Processing method for preventing copy attack, and server and client MY193643A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610318168.6A CN107368737A (zh) 2016-05-13 2016-05-13 一种防止拷贝攻击的处理方法、服务器及客户端
PCT/CN2017/080006 WO2017193750A1 (zh) 2016-05-13 2017-04-11 一种防止拷贝攻击的处理方法、服务器及客户端

Publications (1)

Publication Number Publication Date
MY193643A true MY193643A (en) 2022-10-21

Family

ID=60267507

Family Applications (1)

Application Number Title Priority Date Filing Date
MYPI2018001905A MY193643A (en) 2016-05-13 2017-04-11 Processing method for preventing copy attack, and server and client

Country Status (10)

Country Link
US (2) US10999321B2 (cg-RX-API-DMAC7.html)
EP (1) EP3457309B1 (cg-RX-API-DMAC7.html)
JP (1) JP6880071B2 (cg-RX-API-DMAC7.html)
KR (1) KR102218572B1 (cg-RX-API-DMAC7.html)
CN (1) CN107368737A (cg-RX-API-DMAC7.html)
MY (1) MY193643A (cg-RX-API-DMAC7.html)
PH (1) PH12018502397B1 (cg-RX-API-DMAC7.html)
SG (1) SG11201809981QA (cg-RX-API-DMAC7.html)
TW (1) TWI669626B (cg-RX-API-DMAC7.html)
WO (1) WO2017193750A1 (cg-RX-API-DMAC7.html)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107368737A (zh) * 2016-05-13 2017-11-21 阿里巴巴集团控股有限公司 一种防止拷贝攻击的处理方法、服务器及客户端
WO2019136407A1 (en) * 2018-01-08 2019-07-11 Equifax Inc. Facilitating entity resolution, keying, and search match without transmitting personally identifiable information in the clear
CN110297651B (zh) * 2019-06-18 2023-06-13 广州华多网络科技有限公司 协议接口的常用变量的更新方法和装置
CN110247925A (zh) * 2019-06-26 2019-09-17 国网山东省电力公司临朐县供电公司 配电自动化信息交互方法、系统、终端及存储介质
CN110445841B (zh) * 2019-07-12 2022-04-22 苏州浪潮智能科技有限公司 一种云物理机挂载云盘的方法、设备以及存储介质
CN111726334A (zh) * 2020-05-08 2020-09-29 深圳知路科技有限公司 防止网络攻击的方法、客户端、服务器及系统
CN112667151B (zh) * 2020-12-11 2022-09-20 苏州浪潮智能科技有限公司 一种存储设备的拷贝系统、方法及介质
CN113098880A (zh) * 2021-04-06 2021-07-09 杭州和利时自动化有限公司 一种重放攻击识别的方法、系统、设备及可读存储介质
CN115292697B (zh) * 2022-10-10 2022-12-16 北京安帝科技有限公司 一种基于入侵行为分析的内存保护方法及装置
CN115527243B (zh) * 2022-10-13 2025-08-19 东南大学 基于双任务学习的生物指纹识别方法及产品

Family Cites Families (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH05336109A (ja) * 1992-05-29 1993-12-17 Toshiba Corp 無線通信システム
JPH06164493A (ja) * 1992-11-26 1994-06-10 N T T Idou Tsuushinmou Kk 移動通信方式
JP3278550B2 (ja) * 1995-06-08 2002-04-30 日本電気株式会社 移動無線通信システムにおけるクローン端末の通信拒否方式
JPH0984124A (ja) * 1995-09-19 1997-03-28 Fujitsu Ltd パーソナル通信端末の不正使用防止方法
JP2001308850A (ja) * 2000-03-31 2001-11-02 Internatl Business Mach Corp <Ibm> 通信端末装置によるネットワークへの接続方法および装置
US20030065919A1 (en) * 2001-04-18 2003-04-03 Albert Roy David Method and system for identifying a replay attack by an access device to a computer system
WO2005069295A1 (en) * 2004-01-16 2005-07-28 Matsushita Electric Industrial Co., Ltd. Authentication server, method and system for detecting unauthorized terminal
CN100470573C (zh) * 2004-12-13 2009-03-18 松下电器产业株式会社 非授权设备检测设备、非授权设备检测系统及其非授权设备检测方法
KR100764153B1 (ko) * 2006-03-15 2007-10-12 포스데이타 주식회사 휴대 인터넷 시스템에서의 단말 복제 검출 방법 및 장치
US20070245010A1 (en) 2006-03-24 2007-10-18 Robert Arn Systems and methods for multi-perspective optimization of data transfers in heterogeneous networks such as the internet
CN101166091B (zh) * 2006-10-19 2010-08-11 阿里巴巴集团控股有限公司 一种动态密码认证的方法及服务端系统
JP4928364B2 (ja) * 2007-06-25 2012-05-09 日本電信電話株式会社 認証方法、登録値生成方法、サーバ装置、クライアント装置及びプログラム
CN100531365C (zh) * 2007-07-09 2009-08-19 中国联合网络通信集团有限公司 Iptv认证鉴权方法、服务器及系统
KR101261678B1 (ko) * 2009-09-21 2013-05-09 한국전자통신연구원 분산된 신뢰기관을 이용하는 다운로더블 제한수신 시스템 및 상기 시스템의 동작 방법
US20130204935A1 (en) * 2012-02-07 2013-08-08 Soaric Ab Dynamic sharing of a webservice
JP5903190B2 (ja) * 2012-04-01 2016-04-13 オーセンティファイ・インクAuthentify Inc. マルチパーティシステムにおける安全な認証
EP2962485B1 (en) * 2013-03-01 2019-08-21 Intel IP Corporation Wireless local area network (wlan) traffic offloading
CN104301288B (zh) * 2013-07-16 2017-11-10 中钞信用卡产业发展有限公司 在线身份认证、在线交易验证、在线验证保护的方法与系统
SG2014011308A (en) * 2014-02-11 2015-09-29 Smart Communications Inc Authentication system and method
CN105024813B (zh) * 2014-04-15 2018-06-22 中国银联股份有限公司 一种服务器、用户设备以及用户设备与服务器的交互方法
CN104331801A (zh) * 2014-10-29 2015-02-04 重庆智韬信息技术中心 通过动态码授权实现安全支付的方法
CN104579694B (zh) * 2015-02-09 2018-09-14 浙江大学 一种身份认证方法及系统
CN105491077B (zh) * 2016-02-26 2019-02-12 浙江维尔科技股份有限公司 一种身份认证的系统
CN107368737A (zh) * 2016-05-13 2017-11-21 阿里巴巴集团控股有限公司 一种防止拷贝攻击的处理方法、服务器及客户端

Also Published As

Publication number Publication date
PH12018502397B1 (en) 2023-08-18
JP2019517067A (ja) 2019-06-20
CN107368737A (zh) 2017-11-21
SG11201809981QA (en) 2018-12-28
EP3457309A1 (en) 2019-03-20
US10887343B2 (en) 2021-01-05
JP6880071B2 (ja) 2021-06-02
TW201810109A (zh) 2018-03-16
WO2017193750A1 (zh) 2017-11-16
KR102218572B1 (ko) 2021-02-23
PH12018502397A1 (en) 2019-07-15
US20200128045A1 (en) 2020-04-23
US10999321B2 (en) 2021-05-04
TWI669626B (zh) 2019-08-21
EP3457309A4 (en) 2019-04-17
KR20190008333A (ko) 2019-01-23
US20190081979A1 (en) 2019-03-14
EP3457309B1 (en) 2021-08-25

Similar Documents

Publication Publication Date Title
MY193643A (en) Processing method for preventing copy attack, and server and client
TWI701561B (zh) 資料備份方法、裝置、存儲介質及伺服器
MY202763A (en) Security implementation method, device and system
PH12018501742A1 (en) A method and system for securing computer software using a distributed hash table and a block chain
MX2017005801A (es) Acciones de borrado de contenido itinerante a traves de dispositivos.
MY192409A (en) Business processing method and apparatus
PH12019501055A1 (en) Blockchain-based data processing method and device
MY190550A (en) Method and device for processing service request
WO2019072293A3 (en) Data isolation in blockchain network
MX2016016024A (es) Metodo apra refrescar memoria de acceso aleatorio, dinamica y un sistema de computadora.
MY199117A (en) Multimedia data processing method, apparatus, and system, and storage medium
WO2016040204A3 (en) Preserving data protection with policy
EP4236203A3 (en) Data security using request-supplied keys
PH12018550176A1 (en) Using hardware based secure isolated region to prevent piracy and cheating on electronic devices
EP3132371A1 (en) Method and apparatus of detecting weak password
MX2016011988A (es) Metodo y dispositivo de administracion de datos confidenciales, y metodo y sistema de autenticacion de seguridad.
SG10201900062SA (en) Method and system of decentralized malware identification
HK1243512A1 (zh) 利用统计分析识别潜在的ddos攻击
MY203310A (en) Digital rights management method of media content, drm client and server side
MY201886A (en) Verification code short message processing method and terminal
CN105981356A (zh) 一种信息发送、处理方法及装置
SG10201806904QA (en) Cyber attack information processing apparatus, method, and program
Wang Food information management and security strategy of computer network
US11558419B2 (en) Method and apparatus for autonomous identification of similar and adjacent attacks based on detected attacks
MX2020002294A (es) Sistema y metodo para proteger contenido.