Patent classifications
G06F21/125
Cryptographic mechanisms to provide information privacy and integrity
A security engine may be selected from a plurality of security engines to apply one or more security mechanisms to a section of source code of an application. In some cases, the section of source code may be identified by one or more security mechanism identifiers included in the source code. The security engine may generate machine-readable code that corresponds to the section of source code for which the one or more security mechanisms are to be applied. The machine-readable code may be executed on a plurality of computing devices. In one implementation, applying the security mechanisms to the section of source code may include producing zero-knowledge proofs of knowledge for the section of source code.
Determination method, authentication apparatus, and storage medium
A determination method executed by a computer that serves as an authentication apparatus for a program that operates on a device, the determination method includes counting a number of times of execution of a first process related to the device and determining, in a case where an authentication request for the program that includes a number of times of execution of a second process in the device is received, whether or not it is required to verify the device based on a result of comparison between the number of times of execution of the first process and the number of times of execution of the second process.
METHOD AND SYSTEM FOR PROVIDING CLOUD-BASED APPLICATION SECURITY SERVICE
The present invention relates to a method and a system for providing a cloud-based application security service. The system for providing the cloud-based application security service according to the present invention includes: a client device including a compiler, an execution package composition unit, an uploader, and a downloader; and a cloud device including an execution package decomposition unit, a security library providing unit, a security library application unit, and an execution package recomposition unit, thereby, based on a cloud, providing convenience in security application and rapid action against hacker attacks.
LICENSE SYSTEM, LICENSE MANAGEMENT SERVER, METHOD, AND STORAGE MEDIUM
A license management server generates a license including information about update confirmation date and usage period. An image forming apparatus tries to communicate with the license management server until the usage period elapses since the update confirmation date.
METHOD AND SYSTEM OF HARDENING APPLICATIONS AGAINST SECURITY ATTACKS
In one aspect, computerized method for hardening security of an application includes the step of modifying a set of instructions of an application to include at least one sensor adapted to capture a set of information snapshots from within the application in a running state. The method includes the step of analyzing, from within the application, the set of information snapshots from the at least one sensor. The method includes the step of detecting a presence, a status, and a configuration of a security defense mechanism based on an analysis of the information snapshots; invoking an appropriate hardening action to improve the security defense mechanism of the application.
WEB SERVER TRANSMISSION OBFUSCATION
A proxy that requests, and then analyzes, some test characteristics of a client to generate a client signature profile. When the test characteristics change in a manner to suggest that the client has been spoofed or infected, the proxy could trigger appropriate security measures to adjust communication protocols with the client. The test characteristics could also be randomly selected, and if the wrong test characteristics are sent to the server by the client in response to a request for test characteristics, another security alert could be triggered.
System and method for modifying a software distribution package without recalculating digital signatures
Disclosed are systems, methods and computer program products for modifying a software distribution package. An example method includes receiving a software distribution package that including one or more compressed files and one or more digital signatures of the one or more compressed files. The method further includes determining to add modifications to the software distribution package. The method further includes writing the modifications into a commentary section of the software distribution package or into a free region between the one or more compressed files of the software distribution package without recalculating the digital signatures for the one or more compressed files included in the software distribution package.
Method for facilitating transactions between two or more parties
The present invention provides a method for facilitating a transaction between two or more parties. A server computer is used to determine whether a contact information and an identity validation information of a second party are accurate. Whenever the contact information and the identity validation information of the second party are accurate, one or more documents are modified by attaching and identity validation from a first party and the identity validation from the second party to the one or more documents.
Apparatus and method for managing gaming engine file in a mobile platform
The present invention relates to managing a UNITY file in a mobile platform in order to forestall a UNITY library executable in a mobile platform from being analyzed by reverse engineering and decompiling and provides an apparatus for managing a UNITY file in a mobile platform comprising a file extracting section that extracts a UNITY library file from a UNITY application; an encrypting section that encrypts a programming library file in the UNITY library file thus extracted and creates an encrypted programming library file; a file creating section that creates a decrypting library to decrypt the encrypted programming library file and creates a secured UNITY application using the decrypting library and the encrypted programming library file; and a file executing section that, upon request to execute the secured UNITY application, executes the secured application by decrypting the encrypted programming library file using the decrypting library.
CONTENT PROTECTION VIA ONLINE SERVERS AND CODE EXECUTION IN A SECURE OPERATING SYSTEM
A computer system comprising a processor and a memory for storing instructions, that when executed by the processor performs a copy protection method. The copy protection method comprises executing a software loop of a first software application in a first operating system. A first call is executed in the software loop to a code portion. A decrypted code portion of the first software application is executed in a second operating system in response to the first call. The code portion is decrypted in response to a successful validation of the first software application.