MX2018006204A - Metodo para verificar la integridad de ejecucion de una aplicacion en dispositivo objetivo. - Google Patents
Metodo para verificar la integridad de ejecucion de una aplicacion en dispositivo objetivo.Info
- Publication number
- MX2018006204A MX2018006204A MX2018006204A MX2018006204A MX2018006204A MX 2018006204 A MX2018006204 A MX 2018006204A MX 2018006204 A MX2018006204 A MX 2018006204A MX 2018006204 A MX2018006204 A MX 2018006204A MX 2018006204 A MX2018006204 A MX 2018006204A
- Authority
- MX
- Mexico
- Prior art keywords
- application
- target device
- integrity
- challenge
- function
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/54—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Mobile Radio Communication Systems (AREA)
- Debugging And Monitoring (AREA)
- Storage Device Security (AREA)
- Stored Programmes (AREA)
- Measuring Or Testing Involving Enzymes Or Micro-Organisms (AREA)
Abstract
La presente invención se relaciona con el campo de la verificación de software, en particular para comprobar si puede demostrarse la integridad del tiempo de ejecución de una aplicación de software. Por lo tanto se propone un método para verificar, por medio de un servidor de verificación, la integridad de ejecución de una aplicación en un dispositivo objetivo en donde el servidor de verificación recibe una firma de aplicación generada a partir de información de aplicación de tiempo de ejecución en el dispositivo objetivo, la firma se usa para verificar la integridad de ejecución de la aplicación en el dispositivo objetivo, la aplicación comprende una matriz de bloques, cada bloque produce un resumen, produciendo por lo tanto una matriz de resúmenes relacionada con la matriz de bloques, comprendiendo los pasos de: - enviar al dispositivo objetivo un mensaje que comprende un desafío y una primera función, la primera función define un método de agregación, el desafío define una instrucción de agregación, - recibir una certificación desde el dispositivo objetivo, siendo esta certificación generada por el dispositivo objetivo determinando para cada bloque, el resumen correspondiente para el bloque, agregando los resúmenes de los bloques de acuerdo con el método de agregación de la primera función y el desafío para producir la certificación relacionada con la aplicación, - aplicar una segunda función a la certificación por medio del servidor de verificación, la segunda función deshace el efecto del desafío produciendo así una firma de aplicación independiente del desafío, - verificar la integridad de ejecución de la aplicación comparando la firma de aplicación producida con una firma de referencia.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| EP15195379 | 2015-11-19 | ||
| PCT/EP2016/077932 WO2017085159A1 (en) | 2015-11-19 | 2016-11-17 | Method to verify the execution integrity of an application in a target device |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| MX2018006204A true MX2018006204A (es) | 2018-08-01 |
| MX384515B MX384515B (es) | 2025-03-14 |
Family
ID=54843588
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| MX2018006204A MX384515B (es) | 2015-11-19 | 2016-11-17 | Metodo para verificar la integridad de ejecucion de una aplicacion en dispositivo objetivo. |
Country Status (9)
| Country | Link |
|---|---|
| US (2) | US10846409B2 (es) |
| EP (1) | EP3378005B1 (es) |
| KR (1) | KR102603797B1 (es) |
| CN (1) | CN108292341B (es) |
| BR (1) | BR112018010120B1 (es) |
| ES (1) | ES2774487T3 (es) |
| MX (1) | MX384515B (es) |
| SG (1) | SG11201803707PA (es) |
| WO (1) | WO2017085159A1 (es) |
Families Citing this family (13)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US11790119B2 (en) * | 2018-11-16 | 2023-10-17 | Apple Inc. | Application integrity attestation |
| KR102036618B1 (ko) * | 2019-01-31 | 2019-10-28 | 주식회사그린존시큐리티 | 디바이스의 무결성을 검증하는 무결성 검증 체인 및 이를 이용한 디바이스의 무결성 검증 방법 |
| US11271721B2 (en) * | 2019-03-25 | 2022-03-08 | Micron Technology, Inc. | Distributed secure array using intra-dice communications to perform data attestation |
| US12009034B2 (en) | 2020-03-02 | 2024-06-11 | Micron Technology, Inc. | Classification of error rate of data retrieved from memory cells |
| US11029890B1 (en) | 2020-03-02 | 2021-06-08 | Micron Technology, Inc. | Compound feature generation in classification of error rate of data retrieved from memory cells |
| US11740970B2 (en) | 2020-03-02 | 2023-08-29 | Micron Technology, Inc. | Dynamic adjustment of data integrity operations of a memory system based on error rate classification |
| US11086572B1 (en) | 2020-03-02 | 2021-08-10 | Micron Technology, Inc. | Self adapting iterative read calibration to retrieve data from memory cells |
| US11221800B2 (en) | 2020-03-02 | 2022-01-11 | Micron Technology, Inc. | Adaptive and/or iterative operations in executing a read command to retrieve data from memory cells |
| US11081200B1 (en) | 2020-05-07 | 2021-08-03 | Micron Technology, Inc. | Intelligent proactive responses to operations to read data from memory cells |
| US11562793B2 (en) | 2020-05-07 | 2023-01-24 | Micron Technology, Inc. | Read soft bits through boosted modulation following reading hard bits |
| US11257546B2 (en) | 2020-05-07 | 2022-02-22 | Micron Technology, Inc. | Reading of soft bits and hard bits from memory cells |
| CN114760061B (zh) * | 2020-12-29 | 2023-09-05 | 深信服科技股份有限公司 | 数据上传的方法、装置、设备及存储介质 |
| CN115840944B (zh) * | 2021-11-15 | 2025-08-05 | 宁德时代新能源科技股份有限公司 | 生成软件包的方法、软件包的刷写更新方法及签名方法 |
Family Cites Families (23)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8579705B1 (en) * | 1998-06-17 | 2013-11-12 | Eugene Thomas Bond | Software verification and authentication |
| US7581103B2 (en) * | 2001-06-13 | 2009-08-25 | Intertrust Technologies Corporation | Software self-checking systems and methods |
| US7103779B2 (en) * | 2003-09-18 | 2006-09-05 | Apple Computer, Inc. | Method and apparatus for incremental code signing |
| JP4064914B2 (ja) * | 2003-12-02 | 2008-03-19 | インターナショナル・ビジネス・マシーンズ・コーポレーション | 情報処理装置、サーバ装置、情報処理装置のための方法、サーバ装置のための方法および装置実行可能なプログラム |
| US20050132031A1 (en) * | 2003-12-12 | 2005-06-16 | Reiner Sailer | Method and system for measuring status and state of remotely executing programs |
| US8688991B1 (en) * | 2007-06-01 | 2014-04-01 | Adobe Systems Incorporated | Media player embodiments and secure playlist packaging |
| KR101495535B1 (ko) * | 2007-06-22 | 2015-02-25 | 삼성전자주식회사 | 컨텐츠 디바이스의 폐기 여부를 확인하여 데이터를전송하는 전송 방법과 시스템, 데이터 서버 |
| KR101426270B1 (ko) * | 2008-02-13 | 2014-08-05 | 삼성전자주식회사 | 소프트웨어의 전자 서명 생성 방법, 검증 방법, 그 장치,및 그 방법을 실행하기 위한 프로그램을 기록한 컴퓨터로읽을 수 있는 기록매체 |
| CN102016865A (zh) * | 2008-03-04 | 2011-04-13 | 苹果公司 | 基于可用权利来授权执行软件代码的系统和方法 |
| US20090300348A1 (en) * | 2008-06-02 | 2009-12-03 | Samsung Electronics Co., Ltd. | Preventing abuse of services in trusted computing environments |
| CN102246179A (zh) * | 2008-10-10 | 2011-11-16 | 松下电器产业株式会社 | 在安全处理系统的应用空间中使用瞬时pcr来实现信任 |
| US8544092B2 (en) * | 2009-03-12 | 2013-09-24 | International Business Machines Corporation | Integrity verification using a peripheral device |
| US8213907B2 (en) * | 2009-07-08 | 2012-07-03 | Uniloc Luxembourg S. A. | System and method for secured mobile communication |
| EP2372592B1 (en) * | 2009-12-14 | 2016-08-24 | Nxp B.V. | integrated circuit and system for installing computer code thereon |
| WO2011078855A1 (en) * | 2009-12-22 | 2011-06-30 | Intel Corporation | Method and apparatus to provide secure application execution |
| WO2011119137A1 (en) * | 2010-03-22 | 2011-09-29 | Lrdc Systems, Llc | A method of identifying and protecting the integrity of a set of source data |
| EP2378452B1 (en) * | 2010-04-16 | 2012-12-19 | Thomson Licensing | Method, device and computer program support for verification of checksums for self-modified computer code |
| US20120324557A1 (en) * | 2011-06-17 | 2012-12-20 | Raytheon Bbn Technologies Corp | System and method for remote integrity verification |
| US9569618B2 (en) * | 2013-08-28 | 2017-02-14 | Korea University Research And Business Foundation | Server and method for attesting application in smart device using random executable code |
| CN103810421B (zh) * | 2014-02-19 | 2017-01-04 | 北京视博数字电视科技有限公司 | 应用程序的校验方法、装置和终端设备 |
| CN103995992A (zh) * | 2014-05-28 | 2014-08-20 | 全联斯泰克科技有限公司 | 一种软件的保护方法和装置 |
| US10936720B2 (en) * | 2015-07-10 | 2021-03-02 | Nec Corporation | Method and system for reliable computation of a program |
| US20170068955A1 (en) * | 2015-09-04 | 2017-03-09 | Ca, Inc. | Verification and provisioning of mobile payment applications |
-
2016
- 2016-11-17 CN CN201680067368.7A patent/CN108292341B/zh active Active
- 2016-11-17 ES ES16797889T patent/ES2774487T3/es active Active
- 2016-11-17 EP EP16797889.9A patent/EP3378005B1/en active Active
- 2016-11-17 MX MX2018006204A patent/MX384515B/es unknown
- 2016-11-17 BR BR112018010120-6A patent/BR112018010120B1/pt active IP Right Grant
- 2016-11-17 WO PCT/EP2016/077932 patent/WO2017085159A1/en not_active Ceased
- 2016-11-17 US US15/774,673 patent/US10846409B2/en active Active
- 2016-11-17 KR KR1020187014060A patent/KR102603797B1/ko active Active
- 2016-11-17 SG SG11201803707PA patent/SG11201803707PA/en unknown
-
2020
- 2020-11-17 US US17/099,814 patent/US11526616B1/en active Active
Also Published As
| Publication number | Publication date |
|---|---|
| ES2774487T3 (es) | 2020-07-21 |
| US10846409B2 (en) | 2020-11-24 |
| SG11201803707PA (en) | 2018-06-28 |
| BR112018010120B1 (pt) | 2023-12-05 |
| WO2017085159A1 (en) | 2017-05-26 |
| CN108292341A (zh) | 2018-07-17 |
| KR20180084053A (ko) | 2018-07-24 |
| EP3378005A1 (en) | 2018-09-26 |
| US11526616B1 (en) | 2022-12-13 |
| MX384515B (es) | 2025-03-14 |
| EP3378005B1 (en) | 2020-01-08 |
| BR112018010120A2 (pt) | 2018-11-21 |
| US20180330098A1 (en) | 2018-11-15 |
| KR102603797B1 (ko) | 2023-11-16 |
| CN108292341B (zh) | 2022-03-29 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| MX2018006204A (es) | Metodo para verificar la integridad de ejecucion de una aplicacion en dispositivo objetivo. | |
| RU2017110787A (ru) | Автоматизированная проверка системы программного обеспечения | |
| MX377198B (es) | Metodo y dispositivo para enviar informacion de transaccion y para verificacion de consenso. | |
| PH12019501503A1 (en) | Consensus verification method and device | |
| MX373229B (es) | Aceleración de la verificación del estado de un certificado en línea con un servicio de sugerencias de internet. | |
| MX2012008138A (es) | Sistema y metodo para enlazar software preinstalado a una cuenta de usuario en una tienda en linea. | |
| BR112019006183A2 (pt) | serviço de provisionamento de iot | |
| AR102007A1 (es) | Sistema, método implementado por computadora y dispositivo informático de autenticación para acceder a recursos en base a desafíos | |
| BR112014001389A2 (pt) | método para o reparo de um arquivo de sistema e aparelho para reparar um arquivo de sistema | |
| BR112016024507A8 (pt) | métodos de estabelecer confiança para um hospedeiro, e sistema de computação | |
| EA201291142A1 (ru) | Машины, системы, реализуемые компьютером способы и компьютерные программные продукты для испытания и сертификации нефтегазового оборудования | |
| NI201600092A (es) | Identificación del flujo del tiempo activo blanco en el reconocimiento del twt | |
| CN108040507A8 (zh) | 物联网领域中的哨兵装备 | |
| BR112016017947A2 (pt) | Método implementado por computador, dispositivo de acesso, e, sistema | |
| MX2016004097A (es) | Metodos, dispositivos y sistemas para manejar datos de calendario. | |
| GT201600202A (es) | Métodos y aparato para la coordinación de la selección del sistema entre un conjunto de nodos | |
| MX2018003345A (es) | Metodo y dispositivo de registro y autenticacion de informacion. | |
| MX2018001426A (es) | Motor de reglas para dispositivos conectados. | |
| BR112017004299A2 (pt) | dispositivo e método de processamento de informação, e, programa. | |
| WO2014150737A3 (en) | Method and system for enabling the federation of unrelated applications | |
| CL2018001102A1 (es) | Sistema y método de autenticación y encriptación a prueba de intercepciones | |
| CY1121890T1 (el) | Ασφαλης μεταδοση | |
| BR112016028505A2 (pt) | método para produzir um item de informação de autenticidade de um elemento de segurança e elemento de segurança | |
| GB2552600A (en) | Document verification system | |
| WO2014165464A3 (en) | Cryptographic mechanisms to provide information privacy and integrity |