WO2020194035A1 - Smart property archive for safeguarding software configuration - Google Patents
Smart property archive for safeguarding software configuration Download PDFInfo
- Publication number
- WO2020194035A1 WO2020194035A1 PCT/IB2019/052522 IB2019052522W WO2020194035A1 WO 2020194035 A1 WO2020194035 A1 WO 2020194035A1 IB 2019052522 W IB2019052522 W IB 2019052522W WO 2020194035 A1 WO2020194035 A1 WO 2020194035A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- property
- computing device
- value
- user
- key
- Prior art date
Links
- 238000000034 method Methods 0.000 claims description 29
- 230000004044 response Effects 0.000 claims description 14
- 238000012545 processing Methods 0.000 claims description 6
- 230000008569 process Effects 0.000 claims description 5
- 238000013500 data storage Methods 0.000 description 13
- 238000010586 diagram Methods 0.000 description 10
- 238000004519 manufacturing process Methods 0.000 description 6
- 238000013475 authorization Methods 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 4
- 230000010354 integration Effects 0.000 description 4
- 238000004891 communication Methods 0.000 description 3
- 238000011161 development Methods 0.000 description 3
- 239000013598 vector Substances 0.000 description 2
- 238000004590 computer program Methods 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 238000009877 rendering Methods 0.000 description 1
- 230000026676 system process Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
Definitions
- the present disclosure relates to improving configuration controls in software engineering compliance by providing a direct executable code to unmasking a masked value in a property key-value pair.
- Hard-coding configuration conflates configuration and code. This may cause much pain in software engineering, as the application and infrastructure grow this anti-pattern will make configuration increasingly complex and error prone. Configuration varies substantially across deploys.
- Techniques herein provide computer-implemented methods to provide property key-value pairs comprising executable codes for masked property values associated with the property key-value pairs are provided.
- the masked property file system provides the programmer with an executable code for an item associated with a property key-value pair in a property key-value pair in response to receiving a property key.
- Runtime configuration properties such as database passwords, are masked to restrict access from programmers during application development, and are automatically unmasked during execution of an application runnable in environments.
- a typical software development workflow include example environments such as Lab, QA, UAT, Staging, Integration, and Production.
- a masked property file system receives a property query from a programmer and retrieves property key-value pairs based on the property query. For each property key-value pair, the masked property file system identifies a masked value based on property files associated with the property key-value pair. For each property key-value pair, the masked property file system associates an environment for the masked value corresponding to the property key-value pair based on comparing property files associated with the property key-value pair to service secrets associated with environments. For each property key-value pair, the masked property file system identifies an executable code for the masked value associated with the environment associated with each property key-value pair and generates a callback within the property key-value pair comprising the executable code.
- the masked property file system presents the property key-value pairs comprising the callbacks to the programmer in response to the programmer's property query.
- the programmer selects, via the user computing device, a callback of a property key-value pair and the user computing device web browser is redirected to a property file service where the programmer may unmask the masked value corresponding with the executable code.
- systems and computer program masked values to provide property key-value pairs comprising executable codes for masked values associated with the property key-value pairs are provided.
- FIG. 1 is a block diagram depicting a system for providing property key-value pairs comprising executable codes for masked values associated with the property keys, in accordance with certain example embodiments.
- FIG. 2 is a block flow diagram depicting a method for providing property key-value pairs comprising executable codes for masked values associated with the property keys, in accordance with certain example embodiments.
- FIG. 3 is a block flow diagram depicting a method for retrieving property key-value pairs in response to receiving a user property key, in accordance with certain example embodiments.
- FIG. 4 is a block flow diagram depicting a method for identifying environments to associate with property key-value pairs based on property files associated with property key-value pairs and service secrets associated with environments, in accordance with certain example embodiments.
- FIG. 5 is a block flow diagram depicting a method for completing an online unmasking of the masked value associated with selected property key-value pair, in accordance with certain example embodiments.
- FIG.1 is a block diagram depicting a system 100 for providing property key-value pairs comprising unmasking executable codes for masked values associated with the property keys, in accordance with certain example embodiments.
- the system 100 includes network computing devices 110, 120, and 130 that are configured to communicate with one another via one or more networks 140.
- a programmer associated with a device must install an application and/or make a property selection to obtain the benefits of the techniques described herein.
- Each network computing device 110, 120, and 130 includes a device having a communication module capable of transmitting and receiving data over the network 140.
- each network computing device 110, 120, and 130 can include a server, desktop computer, laptop computer, tablet computer, a television with one or more processors embedded therein and/or coupled thereto, smart phone, handheld computer, personal digital assistant ("PDA"), or any other wired or wireless, processor-driven device.
- PDA personal digital assistant
- the network computing devices 110, 120, and 130 are operated by programmers 101, environment 120 operators, and masked property file system 130 operators, respectively.
- An example user computing device 110 comprises a user interface 111, a device-resident application 113, a data storage unit 115, a communication application 117, and a web browser 119.
- the user interface 111 enables the programmer 101 to access a property query service 139 and enter a property key.
- the programmer 101 selects a callback associated with a property key-value pair via the user interface 111.
- the programmer 101 enters runnable information and / or user information to a property file service 129 to use in an unmasking transaction for unmasking a masked value corresponding with a property key-value pair via the user interface 111.
- the programmer 101 selects an option to confirm the unmasking transaction with the property file service 129 via the user interface 111.
- one or more functions performed by the device-resident application 113 resident on the user computing device 110 may also be performed by a web browser 119 associated with the masked property file system 130.
- one or more functions performed by the masked property file system 130 may also be performed by the device-resident application 113.
- one or more functions performed by the web browser 119 associated with the masked property file system 130 may also be performed by the device-resident application 113.
- the data storage unit 115 comprises a local or remote data storage structure accessible to the user computing device 110 suitable for storing information.
- the data storage unit 115 stores encrypted information, such as HTML5 local storage.
- the communication application 119 can interact with web servers or other computing devices connected to the network 140, including the user computing device 110 and a web server 127 of an environment 120.
- the web browser 119 can enable the programmer 101 to interact with web services using the user computing device 110.
- the masked property file system 130 instructs the user computing device 110 to direct the web browser 119 to redirect to a property file service 139 unmasking a masked value in response to receiving, from the user computing device 110, an indication of the selection by the programmer 101 of a callback corresponding to a property key-value pair depicting the masked value.
- An example environment 120 comprises a data storage unit 125, a server 127, and a property file service 129.
- An example data storage unit 125 comprises a local or remote data storage structure accessible to the environment 120 suitable for storing information.
- the data storage unit 125 stores encrypted information, such as HTML5 local storage.
- An example masked property file system 130 comprises a query module 131, a key-value pair analyzer module 132, an environment finder module 133, a data storage unit 135, a server 137, and a property query service 139.
- the query module 131 receives a programmer's 101 property key from a user computing device 110 associated with the programmer 101. In an example embodiment, the query module 131 retrieves one or more property key-value pairs based on the property key. In an example embodiment, the query module 131 communicates with the key-value pair analyzer module 132 and/or the environment finder module 133. For example, the query module 131 communicates with the key-value pair analyzer module 132 to determine one or more query elements of a property key-value pair, which the query module 131 compares against one or more corresponding elements of other property key-value pairs to determine a masked value depicted by a property key-value pair.
- the query module 131 communicates with the environment finder module 133 to retrieve one or more environments corresponding to a masked value depicted in a property key-value pair. In an example embodiment, the query module 131 generates a callback comprising an unmasking executable code for the selected environment. In an example embodiment, the query module 131 transmits one or more property key-value pairs comprising corresponding callbacks to the user computing device 110 for rendering to the programmer 101. In an example embodiment, the query module 131 receives an indication of a programmer 101 selection of a callback from the user computing device 110. In an example embodiment, the query module 131 transmits instructions to the user computing device 110 to redirect the web browser 119 of the user computing device 110 to a property file service 129 associated with the unmasking executable code corresponding to the selected callback.
- the key-value pair analyzer module 132 determines one or more query elements of a property key-value pair. In an example embodiment, the key-value pair analyzer module 132 determines the closest property key in the database to the property key-value pair based on the comparison of the elements of the property keys and transmits the key-value pair to the query module 131, which determines the masked value depicted by the property key.
- the environment finder module 133 receives a request from the query module 131 to find one or more environments associated with a masked value identified in a property key-value pair. In an example embodiment, the environment finder module 133 accesses a masked value environment list catalog to retrieve one or more environments associated with the identified masked value. In an example embodiment, the environment finder module 133 selects an environment from the one or more retrieved environments to present to the programmer 101. In this example embodiment, the environment finder module 133 determines an unmasking executable code for the selected environment. In an example embodiment, the environment finder module 133 communicates the selected environment associated with the particular property key-value pair and the corresponding unmasking executable code to the query module 131.
- the data storage unit 135 comprises a local or remote data storage structure accessible to the masked property file system 130 suitable for storing information.
- the data storage unit 135 stores encrypted information, such as HTML5 local storage.
- the data storage unit 135 comprises a masked value environment listing catalog comprising a list of masked values and one or more environments associated with each masked value listing.
- the property query service 139 is a means by which the programmer 101 interacts with the masked property file system 130.
- the programmer 101 may enter a property key and receive property key-value pairs comprising callbacks via the property query service 139.
- the programmer 101 accesses the property query service 139 via the web browser 119 of the user computing device 110.
- the programmer 101 accesses the property query service 139 via the device-resident application 113 resident on the user computing device 110.
- FIG. 2 is a block diagram depicting a method 200 for providing property key-value pairs comprising unmasking executable codes for masked values associated with the property keys, in accordance with certain example embodiments.
- the method 200 is described with reference to the components illustrated in FIG. 1.
- a masked property file system receives a programmer 101 property key and retrieves property key-value pairs.
- FIG. 3 is a block diagram depicting a method 210 for retrieving property key-value pairs in response to receiving a user property query, in accordance with certain example embodiments. The method 210 is described with reference to the components illustrated in FIG.1.
- the programmer 101 accesses a property query service 139.
- the programmer 101 enters, via the user interface 111, the property query service address associated with the property query service 139 into the user computing device web browser 119 and accesses the property query service 139 via the network 140.
- the programmer 101 is viewing a property query service other than the property query service 139 in the web browser 119 and clicks an executable code on the other property query service, which redirects the web browser 119 to the property query service 139.
- the programmer 101 accesses the property query service 139 and downloads a device-resident application 113 onto the user computing device 110 over the network 140.
- the device-resident application 113 resident on the user computing device 110 communicates with the property query service 139 over the network 140 to enable the programmer 101 to access the property query service 139 via the device-resident application 113.
- the programmer 101 selects the device-resident application 113 on the user computing device 110 to access the property query service 139.
- a programmer 101 submits a property key using the user computing device 110.
- the programmer 101 submits a property key to the property query service 139 via the device-resident application 113 or via the web browser 119.
- the programmer 101 may actuate one or more user interface 111 objects to direct the device-resident application 113 or the web browser 119 to submit the property key to the property query service 139 over the network 140.
- the masked property file system 130 receives the property key.
- the property query service 139 receives the property key via the network 140 from the device-resident application 113 or the web browser 119 resident on the user computing device 110.
- the masked property file system 130 retrieves property keys associated with the property key.
- the masked property file system 130 parses the received property key into one or more query elements or otherwise determines one or more query elements based on the received property key.
- the programmer 101 submits a property key comprising text reading "config.sales.backend.password”
- the masked property file system 130 may interpret the property key as comprising query elements "config,” “app_config” and "backend_password".
- the property key-value pair of the sales department radius is more compatible than a property key-value pair of a marketing department radius or a sales department database with the aforementioned query elements.
- the masked property file system 130 may determine a compatibility of each of the retrieved property key-value pairs by comparing information associated with the property key-value pairs against the one or more query elements.
- the masked property file system 130 may comprise a database comprising property key-value pairs, wherein each property key-value pair is associated with one or more text descriptors.
- FIG. 4 is a block diagram depicting a method 220 for identifying environments to associate with property key-value pairs based on property files associated with property key-value pairs and service secrets associated with environments, in accordance with certain example embodiments.
- the method 220 is described with reference to the components illustrated in FIG.1.
- Runtime configuration properties such as database passwords, are masked to restrict access from programmers during application development, and are automatically unmasked during execution of an application runnable in environments.
- a typical software development workflow include example environments such as Lab, QA, UAT, Staging, Integration, and Production.
- Unmasking of a masked value comprises of a pair of a service secret and a property ciphertext secret, wherein the property ciphertext secret is associated with a property file comprises the masked value, and wherein a service secret is associated with a specific environment. Access to both a first service secret and a first property ciphertext secret are required to execute in a first environment an application runnable that requires access to a masked value in a first property file, wherein the first service secret is associated with the first environment, and the first property ciphertext secret is associated with the first property file.
- the masked property file system 130 retrieves property files associated with the retrieved property key-value pairs.
- the masked property file system 130 identifies a masked value corresponding to each retrieved property key-value pair based on the property files.
- the masked property file system 130 identifies a masked values corresponding to a particular property key-value pair based on property files associated with the particular property key-value pair.
- the masked property file system 130 identifies a masked value corresponding to a particular property key-value pair by comparing the property key-value pair to one or more other property key-value pairs for which the masked property file system 130 has identified a corresponding masked value.
- the masked property file system 130 may comprise a database of property key-value pairs and associated masked values.
- the database of property key-value pairs and associated masked values may associate property key-value pairs with masked values.
- a property key-value pair of a programmer 101 comprises a query element of a database in a sales department, but the masked property file system 130 is unable to identify the property key-value pair as corresponding to the masked value "config.sales.database.password" based on property files associated with the property key-value pair.
- the masked property file system 130 accesses service secrets corresponding to environments.
- the masked property file system 130 comprises a masked value environment listing catalog.
- the masked value environment listing catalog comprises a list of masked values and one or more environments associated with each listed masked value.
- the masked property file system 130 obtains environments for masked values from one or more environments 120.
- the masked property file system 130 comprises a web integration that periodically extracts information comprising environments from one or more property file services 129.
- one or more environments 120 periodically transmit, via the network 140, a list of environments associated one or more masked values to the masked property file system 120.
- the masked property file system 130 retrieves, for each property key-value pair, one or more environments associated with the identified masked value corresponding to the property key-value pair.
- the masked property file system 130 identifies a masked value in the property key-value pair and retrieves one or more environments associated with the identified masked value in the masked value environment listing catalog.
- the masked property file system 130 identifies two or more masked values in a property key-value pair and retrieves one or more environments associated with each of the two or more identified masked values in the masked value environment listing catalog.
- the masked property file system 130 selects, for each property key-value pair, an environment from the one or more retrieved environments to associate with the property key-value pair.
- the masked property file system 130 selects an environment from the one or more environments corresponding to a location of the environment 120 that is closest to a location of the user computing device 110 associated with the programmer 101 that submitted the property key. In this example embodiment, the masked property file system 130 requests the programmer 101 location from the user computing device 110 over the network 140. In this example embodiment, the programmer 101 enables location-based services on the user computing device 110 and the user computing device 110 transmits the current location of the user computing device 110 to the masked property file system 130. In this example embodiment, the masked property file system 130 compares the received location of the user computing device 110 against locations of environments 120 associated with one or more environments associated with a property key-value pair.
- the masked property file system 130 selects an environment from the one or more environments corresponding to the shortest distance between the location of the user computing device 110 and the location of the environment 120. [0045] From block 450, the method 220 proceeds to block 230 in FIG.2.Returning to FIG. 2, in block 230, the masked property file system 130 identifies, for each property key-value pair, an unmasking executable code associated with the selected environment corresponding to the property key-value pair.
- An example unmasking executable code comprises an executable code to a property file service 129 from which the selected environment originated.
- the unmasking executable code comprises an executable code that, when selected by the programmer 101 operating the user computing device 110, redirects the web browser 119 of the user computing device 110 to a property file service 129 that presents the environment to the programmer 101 and allows the programmer 101 to enter runnable and/or user information to unmasking the masked value.
- the masked property file system 130 generates, for each property key-value pair, a callback within the property key-value pair comprising the corresponding unmasking executable code.
- the callback comprises a text format.
- the callback comprises a JSON structure of the selected environment associated with the property key-value pair rendered in an object of the property key-value pair.
- the masked property file system 130 when receiving an indication that a programmer 101 has selected a callback, redirects the web browser 119 of the user computing device 110 associated with the programmer 101 to the property file service 129 associated with the unmasking executable code.
- the masked property file system 130 presents property key-value pairs comprising corresponding callbacks to the user computing device 110 to render in response to the programmer's 101 property key.
- the programmer 101 submitted a property key or other property key to the masked property file system 130 and the masked property file system 130 presents the property key-value pairs comprising the callbacks to the programmer 101 in response to receiving the property key.
- the programmer 101 selects a callback of a property key-value pair. For example, the programmer 101 actuates an object of the user interface 111 to select a callback of a property key-value pair.
- the user computing device 110 transmits, via the network 140 and to the masked property file system 130, an indication of the programmer's 101 selection of the callback of the property key-value pair.
- the masked property file system 130 receives, from the user computing device 110 via the network 140, the indication of the selection of the callback of the property key-value pair by the programmer 101.
- the masked property file system 130 identifies the unmasking executable code associated with the callback.
- the user computing device web browser 119 is redirected to a property file service 129 associated with the unmasking executable code.
- the masked property file system 130 transmits instructions to the user computing device 110 comprising the unmasking executable code and instructing the web browser 119 of the user computing device 110 to redirect to a property file service associated with the unmasking executable code.
- the user computing device 110 receives the unmasking executable code and the instructions from the masked property file system 130 and instructs the web browser 119 to render the property file service 129 associated with the unmasking executable code.
- the user computing device web browser 119 communicates with the environment server 127 via the network 140 to render the property file service 129 on the user computing device 110.
- the user computing device web browser 119 is not redirected to the property file service 129.
- the application associated with the environment 120 and residing on the user computing device 110 executes on the user computing device 110 in response to the programmer 101 selecting the callback.
- the application associated with the environment 120 communicates with the environment 120 via the network 140.
- the programmer 101 completes an unmasking of the masked value associated with the selected property key-value pair.
- the programmer 101 completes a transaction with the environment 120 via the property file service 129 to unmask the masked value associated with the selected property key-value pair.
- an application associated with the environment 120 executes on the user computing device 110 in response to the programmer 101 selecting the callback, the programmer 101 completes a transaction with the environment 120 via the application, which communicates with the environment 120 via the network 140.
- the user computing device 110 web browser 119 is not redirected to the property file service 129 or does not communicate with the environment 120 via an application resident on the user computing device 110.
- a processing system associated with the masked property file system 130 processes a first unmasking transaction to receive runtime information from an account of the programmer 101 for providing the masked value associated with the selected property key-value pair.
- the processing system processes a second transaction to retrieve an environment 120 unmasking the masked value using a service secret from an account of the processing system.
- FIG.5 is a block diagram depicting a method 280 for completing an unmasking of the masked value associated with selected property key-value pair, in accordance with certain example embodiments.
- the method 280 is described with reference to the components illustrated in FIG. 1.
- the programmer 101 completes a transaction via the property file service 129.
- one or more actions performed by the property file service 129 may also be performed by an application associated with the environment 120 and executing on the user computing device 110, wherein the application communicates with the environment 120 via the network 140.
- the environment from the property file service 129 is rendered on the user computing device 110.
- the property file service 129 associated with the unmasking executable code renders the masked value associated with the selected property key-value pair in a web application.
- the property file service 129 may also render an option to the programmer to initiate an unmasking of the masked value in rendered in the web application.
- the programmer 101 selects an option on the property file service 129 to unmask the masked value associated with the environment. For example, the programmer 101 actuates an object on the user interface 111 of the user computing device 110 to select the option rendered on the property file service 129 to unmasking the masked value associated with the environment. In an example embodiment, the user computing device web browser 119 communicates an indication of the programmer's 101 selection of the option of unmasking with the property file service 129.
- the property file service 129 requests runnable and user information from the programmer 101. For example, in response to receiving an indication of a programmer 101 selection of the option to unmask the masked value associated with the environment, the property file service 129 transmits a command to the user computing device 110 for runnable information and/or user information from the programmer 101. In an example embodiment, the user computing device 110 renders the request for runnable and/or user information to the programmer 101.
- the programmer 101 enters runnable and user information on the property file service 129.
- the programmer 101 enters runnable information corresponding to one or more of a process id number, a web service address, or other applicable runnable information.
- the property file service 129 receives the runnable and user information entered by the programmer via the user computing device 110 over the network 140.
- the programmer 101 selects an option to approve an unmasking transaction to unmasking the masked value.
- the property file service 129 in response to receiving the programmer's 101 user information and runnable information, renders an option to approve an unmasking transaction to unmask the masked value.
- the programmer 101 actuates one or more objects on the user interface 111 to select the option to approve the unmasking transaction. For example, the programmer 101 clicks on an option reading "confirm" to approve the unmasking transaction.
- the environment 120 processes an unmasking transaction initiated by the programmer 101.
- the environment 120 communicates with a control processing system (not depicted) associated with the runnable information provided by the programmer 101 for use in the transaction.
- the programmer 101 provided a web service endpoint to use in the transaction.
- the environment 120 communicates an unmasking authorization request to a control center associated with the web service endpoint via an authorization system associated with the endpoint.
- the control center approves the unmasking authorization request and transmits a notification of approval of the unmasking authorization request to the environment 120.
- the environment 120 transmits a receipt to the user computing device 110 confirming the success of the programmer's 101 transaction to unmask the masked value.
- an account of the programmer 101 is logged for the occurrence of the transaction and an account of the environment 120 is logged for the same transaction.
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/IB2019/052522 WO2020194035A1 (en) | 2019-03-28 | 2019-03-28 | Smart property archive for safeguarding software configuration |
CA3139249A CA3139249A1 (en) | 2019-03-28 | 2019-03-28 | Smart property archive for safeguarding software configuration |
GB2115358.0A GB2597005B (en) | 2019-03-28 | 2019-03-28 | Smart property archive for safeguarding software configuration |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/IB2019/052522 WO2020194035A1 (en) | 2019-03-28 | 2019-03-28 | Smart property archive for safeguarding software configuration |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2020194035A1 true WO2020194035A1 (en) | 2020-10-01 |
Family
ID=72608873
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/IB2019/052522 WO2020194035A1 (en) | 2019-03-28 | 2019-03-28 | Smart property archive for safeguarding software configuration |
Country Status (3)
Country | Link |
---|---|
CA (1) | CA3139249A1 (en) |
GB (1) | GB2597005B (en) |
WO (1) | WO2020194035A1 (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2008154105A2 (en) * | 2007-06-08 | 2008-12-18 | Massachusetts Institute Of Technology | Disk-resident streaming dictionary |
US8621447B1 (en) * | 2009-08-25 | 2013-12-31 | Adobe Systems Incorporated | Systems and methods for dynamic struct variable creation including inline declaration with dynamic keys |
CN108469952A (en) * | 2018-03-16 | 2018-08-31 | 祖龙(天津)科技有限公司 | A kind of code generating method and kit of management game configuration |
CN108694041A (en) * | 2017-03-06 | 2018-10-23 | 武汉斗鱼网络科技有限公司 | Data transfer device, device and service terminal |
-
2019
- 2019-03-28 WO PCT/IB2019/052522 patent/WO2020194035A1/en active Application Filing
- 2019-03-28 GB GB2115358.0A patent/GB2597005B/en not_active Expired - Fee Related
- 2019-03-28 CA CA3139249A patent/CA3139249A1/en not_active Abandoned
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2008154105A2 (en) * | 2007-06-08 | 2008-12-18 | Massachusetts Institute Of Technology | Disk-resident streaming dictionary |
US8621447B1 (en) * | 2009-08-25 | 2013-12-31 | Adobe Systems Incorporated | Systems and methods for dynamic struct variable creation including inline declaration with dynamic keys |
CN108694041A (en) * | 2017-03-06 | 2018-10-23 | 武汉斗鱼网络科技有限公司 | Data transfer device, device and service terminal |
CN108469952A (en) * | 2018-03-16 | 2018-08-31 | 祖龙(天津)科技有限公司 | A kind of code generating method and kit of management game configuration |
Also Published As
Publication number | Publication date |
---|---|
GB202115358D0 (en) | 2021-12-08 |
GB2597005B (en) | 2022-11-30 |
CA3139249A1 (en) | 2020-10-01 |
GB2597005A (en) | 2022-01-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11520912B2 (en) | Methods, media, apparatuses and computing devices of user data authorization based on blockchain | |
US9191389B2 (en) | Access control of remote communication interfaces based on system-specific keys | |
US5742759A (en) | Method and system for facilitating access control to system resources in a distributed computer system | |
US11843593B2 (en) | Application integration using multiple user identities | |
US11627129B2 (en) | Method and system for contextual access control | |
EP3610623B1 (en) | Protocol-level identity mapping | |
CN112039826B (en) | Login method and device applied to applet end, electronic equipment and readable medium | |
CN110574350B (en) | Method and system for performing a prioritized generation of a second factor certificate | |
WO2021221981A1 (en) | Selecting a version of an application | |
US11924210B2 (en) | Protected resource authorization using autogenerated aliases | |
CA3122376A1 (en) | Systems and methods for securing login access | |
WO2022232353A1 (en) | System and method for secure internet communications | |
US20230262045A1 (en) | Secure management of a robotic process automation environment | |
EP3716564B1 (en) | Method for resetting password, request terminal and check terminal | |
US10963559B1 (en) | Smart property archive for safeguarding software configuration | |
WO2020194035A1 (en) | Smart property archive for safeguarding software configuration | |
JPWO2006114906A1 (en) | Service providing system, service using device, service providing device, service relay device, authentication method, authentication program, and recording medium thereof | |
US11206310B2 (en) | Serving assets in a networked environment | |
US10554789B2 (en) | Key based authorization for programmatic clients | |
CN112769565A (en) | Method and device for upgrading cryptographic algorithm, computing equipment and medium | |
US20150007292A1 (en) | User authentication utilizing patterns | |
CN117278323B (en) | Third party information acquisition method, electronic equipment and readable storage medium | |
US11271738B1 (en) | Secure, reliable, and decentralized communication in cloud platform | |
CN111104666A (en) | Method, apparatus and computer program product for accessing services | |
US11316843B1 (en) | Systems for authenticating users from a separate user interface |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 19922133 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 202115358 Country of ref document: GB Kind code of ref document: A Free format text: PCT FILING DATE = 20190328 |
|
ENP | Entry into the national phase |
Ref document number: 3139249 Country of ref document: CA |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 19922133 Country of ref document: EP Kind code of ref document: A1 |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 20/01/2022) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 19922133 Country of ref document: EP Kind code of ref document: A1 |