TWI669626B - 防止拷貝攻擊的處理方法、伺服器及用戶端 - Google Patents

防止拷貝攻擊的處理方法、伺服器及用戶端 Download PDF

Info

Publication number
TWI669626B
TWI669626B TW106108586A TW106108586A TWI669626B TW I669626 B TWI669626 B TW I669626B TW 106108586 A TW106108586 A TW 106108586A TW 106108586 A TW106108586 A TW 106108586A TW I669626 B TWI669626 B TW I669626B
Authority
TW
Taiwan
Prior art keywords
identification code
server
client
change identification
unique identification
Prior art date
Application number
TW106108586A
Other languages
English (en)
Chinese (zh)
Other versions
TW201810109A (zh
Inventor
李小峰
Original Assignee
香港商阿里巴巴集團服務有限公司
Alibaba Group Services Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 香港商阿里巴巴集團服務有限公司, Alibaba Group Services Limited filed Critical 香港商阿里巴巴集團服務有限公司
Publication of TW201810109A publication Critical patent/TW201810109A/zh
Application granted granted Critical
Publication of TWI669626B publication Critical patent/TWI669626B/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • G06F12/1458Protection against unauthorised use of memory or access to memory by checking the subject access rights
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1475Passive attacks, e.g. eavesdropping or listening without modification of the traffic monitored
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/002Countermeasures against attacks on cryptographic mechanisms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2212/00Indexing scheme relating to accessing, addressing or allocation within memory systems or architectures
    • G06F2212/10Providing a specific technical effect
    • G06F2212/1052Security improvement
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2212/00Indexing scheme relating to accessing, addressing or allocation within memory systems or architectures
    • G06F2212/15Use in a specific computing environment
    • G06F2212/154Networked environment

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer And Data Communications (AREA)
  • Storage Device Security (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
TW106108586A 2016-05-13 2017-03-15 防止拷貝攻擊的處理方法、伺服器及用戶端 TWI669626B (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610318168.6A CN107368737A (zh) 2016-05-13 2016-05-13 一种防止拷贝攻击的处理方法、服务器及客户端
CN201610318168.6 2016-05-13

Publications (2)

Publication Number Publication Date
TW201810109A TW201810109A (zh) 2018-03-16
TWI669626B true TWI669626B (zh) 2019-08-21

Family

ID=60267507

Family Applications (1)

Application Number Title Priority Date Filing Date
TW106108586A TWI669626B (zh) 2016-05-13 2017-03-15 防止拷貝攻擊的處理方法、伺服器及用戶端

Country Status (10)

Country Link
US (2) US10999321B2 (cg-RX-API-DMAC7.html)
EP (1) EP3457309B1 (cg-RX-API-DMAC7.html)
JP (1) JP6880071B2 (cg-RX-API-DMAC7.html)
KR (1) KR102218572B1 (cg-RX-API-DMAC7.html)
CN (1) CN107368737A (cg-RX-API-DMAC7.html)
MY (1) MY193643A (cg-RX-API-DMAC7.html)
PH (1) PH12018502397B1 (cg-RX-API-DMAC7.html)
SG (1) SG11201809981QA (cg-RX-API-DMAC7.html)
TW (1) TWI669626B (cg-RX-API-DMAC7.html)
WO (1) WO2017193750A1 (cg-RX-API-DMAC7.html)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107368737A (zh) * 2016-05-13 2017-11-21 阿里巴巴集团控股有限公司 一种防止拷贝攻击的处理方法、服务器及客户端
WO2019136407A1 (en) * 2018-01-08 2019-07-11 Equifax Inc. Facilitating entity resolution, keying, and search match without transmitting personally identifiable information in the clear
CN110297651B (zh) * 2019-06-18 2023-06-13 广州华多网络科技有限公司 协议接口的常用变量的更新方法和装置
CN110247925A (zh) * 2019-06-26 2019-09-17 国网山东省电力公司临朐县供电公司 配电自动化信息交互方法、系统、终端及存储介质
CN110445841B (zh) * 2019-07-12 2022-04-22 苏州浪潮智能科技有限公司 一种云物理机挂载云盘的方法、设备以及存储介质
CN111726334A (zh) * 2020-05-08 2020-09-29 深圳知路科技有限公司 防止网络攻击的方法、客户端、服务器及系统
CN112667151B (zh) * 2020-12-11 2022-09-20 苏州浪潮智能科技有限公司 一种存储设备的拷贝系统、方法及介质
CN113098880A (zh) * 2021-04-06 2021-07-09 杭州和利时自动化有限公司 一种重放攻击识别的方法、系统、设备及可读存储介质
CN115292697B (zh) * 2022-10-10 2022-12-16 北京安帝科技有限公司 一种基于入侵行为分析的内存保护方法及装置
CN115527243B (zh) * 2022-10-13 2025-08-19 东南大学 基于双任务学习的生物指纹识别方法及产品

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130204935A1 (en) * 2012-02-07 2013-08-08 Soaric Ab Dynamic sharing of a webservice
CN104579694A (zh) * 2015-02-09 2015-04-29 浙江大学 一种身份认证方法及系统
TW201535287A (zh) * 2014-02-11 2015-09-16 智慧通訊公司 認證系統及方法
TW201539239A (zh) * 2014-04-15 2015-10-16 China Unionpay Co Ltd 伺服器、用戶設備以及用戶設備與伺服器的交互方法

Family Cites Families (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH05336109A (ja) * 1992-05-29 1993-12-17 Toshiba Corp 無線通信システム
JPH06164493A (ja) * 1992-11-26 1994-06-10 N T T Idou Tsuushinmou Kk 移動通信方式
JP3278550B2 (ja) * 1995-06-08 2002-04-30 日本電気株式会社 移動無線通信システムにおけるクローン端末の通信拒否方式
JPH0984124A (ja) * 1995-09-19 1997-03-28 Fujitsu Ltd パーソナル通信端末の不正使用防止方法
JP2001308850A (ja) * 2000-03-31 2001-11-02 Internatl Business Mach Corp <Ibm> 通信端末装置によるネットワークへの接続方法および装置
US20030065919A1 (en) * 2001-04-18 2003-04-03 Albert Roy David Method and system for identifying a replay attack by an access device to a computer system
WO2005069295A1 (en) * 2004-01-16 2005-07-28 Matsushita Electric Industrial Co., Ltd. Authentication server, method and system for detecting unauthorized terminal
CN100470573C (zh) * 2004-12-13 2009-03-18 松下电器产业株式会社 非授权设备检测设备、非授权设备检测系统及其非授权设备检测方法
KR100764153B1 (ko) * 2006-03-15 2007-10-12 포스데이타 주식회사 휴대 인터넷 시스템에서의 단말 복제 검출 방법 및 장치
US20070245010A1 (en) 2006-03-24 2007-10-18 Robert Arn Systems and methods for multi-perspective optimization of data transfers in heterogeneous networks such as the internet
CN101166091B (zh) * 2006-10-19 2010-08-11 阿里巴巴集团控股有限公司 一种动态密码认证的方法及服务端系统
JP4928364B2 (ja) * 2007-06-25 2012-05-09 日本電信電話株式会社 認証方法、登録値生成方法、サーバ装置、クライアント装置及びプログラム
CN100531365C (zh) * 2007-07-09 2009-08-19 中国联合网络通信集团有限公司 Iptv认证鉴权方法、服务器及系统
KR101261678B1 (ko) * 2009-09-21 2013-05-09 한국전자통신연구원 분산된 신뢰기관을 이용하는 다운로더블 제한수신 시스템 및 상기 시스템의 동작 방법
JP5903190B2 (ja) * 2012-04-01 2016-04-13 オーセンティファイ・インクAuthentify Inc. マルチパーティシステムにおける安全な認証
EP2962485B1 (en) * 2013-03-01 2019-08-21 Intel IP Corporation Wireless local area network (wlan) traffic offloading
CN104301288B (zh) * 2013-07-16 2017-11-10 中钞信用卡产业发展有限公司 在线身份认证、在线交易验证、在线验证保护的方法与系统
CN104331801A (zh) * 2014-10-29 2015-02-04 重庆智韬信息技术中心 通过动态码授权实现安全支付的方法
CN105491077B (zh) * 2016-02-26 2019-02-12 浙江维尔科技股份有限公司 一种身份认证的系统
CN107368737A (zh) * 2016-05-13 2017-11-21 阿里巴巴集团控股有限公司 一种防止拷贝攻击的处理方法、服务器及客户端

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130204935A1 (en) * 2012-02-07 2013-08-08 Soaric Ab Dynamic sharing of a webservice
TW201535287A (zh) * 2014-02-11 2015-09-16 智慧通訊公司 認證系統及方法
TW201539239A (zh) * 2014-04-15 2015-10-16 China Unionpay Co Ltd 伺服器、用戶設備以及用戶設備與伺服器的交互方法
CN104579694A (zh) * 2015-02-09 2015-04-29 浙江大学 一种身份认证方法及系统

Also Published As

Publication number Publication date
PH12018502397B1 (en) 2023-08-18
JP2019517067A (ja) 2019-06-20
CN107368737A (zh) 2017-11-21
SG11201809981QA (en) 2018-12-28
EP3457309A1 (en) 2019-03-20
US10887343B2 (en) 2021-01-05
JP6880071B2 (ja) 2021-06-02
TW201810109A (zh) 2018-03-16
WO2017193750A1 (zh) 2017-11-16
KR102218572B1 (ko) 2021-02-23
PH12018502397A1 (en) 2019-07-15
MY193643A (en) 2022-10-21
US20200128045A1 (en) 2020-04-23
US10999321B2 (en) 2021-05-04
EP3457309A4 (en) 2019-04-17
KR20190008333A (ko) 2019-01-23
US20190081979A1 (en) 2019-03-14
EP3457309B1 (en) 2021-08-25

Similar Documents

Publication Publication Date Title
TWI669626B (zh) 防止拷貝攻擊的處理方法、伺服器及用戶端
US8261086B2 (en) Computer and method for sending security information for authentication
US9514300B2 (en) Systems and methods for enhanced security in wireless communication
JP5613596B2 (ja) 認証システム、端末装置、認証サーバ、およびプログラム
KR101756692B1 (ko) 다이나믹 보안모듈 단말장치 및 그 구동방법
CN102184352A (zh) 基于蓝牙设备认证的计算机系统自动防护方法
US20180204004A1 (en) Authentication method and apparatus for reinforced software
WO2015010568A1 (en) Method,apparatus and server for identity authentication
JP2019057167A (ja) コンピュータプログラム、デバイス及び判定方法
CN110069241B (zh) 伪随机数的获取方法、装置、客户端设备和服务器
KR20150045790A (ko) 신뢰 보안 플랫폼 모듈을 이용한 보안 애플리케이션 인증 및 관리 방법 및 장치
US20170201528A1 (en) Method for providing trusted service based on secure area and apparatus using the same
CN112257086A (zh) 一种用户隐私数据保护方法及电子设备
CN107835185A (zh) 一种基于ARM TrustZone的移动终端安全服务方法及装置
Podder et al. The pit-cerberus framework: preventing device tampering during transit
CN106992978B (zh) 网络安全管理方法及服务器
US20180183609A1 (en) Remote attestation of a network endpoint device
CN104955043B (zh) 一种智能终端安全防护系统
US9977907B2 (en) Encryption processing method and device for application, and terminal
CN114070548A (zh) 一种基于软加密狗装置的软件版权加密保护方法
CN101136048A (zh) 软件认证方法
KR20150089696A (ko) 접근제어와 우선순위기반 무결성 검증 시스템 및 그 방법
JP2009505196A (ja) コンピューティング・デバイスにおける安全性を改善するための保護されたソフトウェア識別子
WO2015055972A1 (en) Crm security core
CN108848051B (zh) 应用数据的获取方法和装置