METHOD FOR AUTHENTICATING A CLIENT PROGRAM BY A REMOTE DATA PROCESSING SYSTEM
    2.
    发明申请
    METHOD FOR AUTHENTICATING A CLIENT PROGRAM BY A REMOTE DATA PROCESSING SYSTEM 审中-公开
    通过远程数据处理系统认证客户程序的方法

    公开(公告)号:WO2014139598A1

    公开(公告)日:2014-09-18

    申请号:PCT/EP2013/062256

    申请日:2013-06-13

    CPC classification number: H04L63/12 G06F8/65 G06F21/44

    Abstract: A method, executed by a data processing device, for verifying authenticity of a client program executed on a processing device, the method comprising: receiving one or more messages from the processing device, and verifying authenticity of the client program based on one or more properties of the received messages; repeatedly updating a first part of the client program, wherein different instances of the first part of the client program cause messages sent by the processing device to have respective detectable properties indicative of the instance of the first part of the client program.

    Abstract translation: 一种由数据处理设备执行的用于验证在处理设备上执行的客户端程序的真实性的方法,所述方法包括:从所述处理设备接收一个或多个消息,以及基于一个或多个属性来验证所述客户端程序的真实性 收到的消息; 反复更新客户端程序的第一部分,其中客户端程序的第一部分的不同实例导致由处理设备发送的消息具有指示客户端程序的第一部分的实例的相应可检测属性。

    TECHNIQUE FOR DETERMINING A MALIGN OR NON-MALIGN BEHAVIOR OF AN EXECUTABLE FILE
    3.
    发明申请
    TECHNIQUE FOR DETERMINING A MALIGN OR NON-MALIGN BEHAVIOR OF AN EXECUTABLE FILE 审中-公开
    用于确定可执行文件的恶性或非恶性行为的技术

    公开(公告)号:WO2014008961A1

    公开(公告)日:2014-01-16

    申请号:PCT/EP2012/076161

    申请日:2012-12-19

    Abstract: A technique for determining a malign or non-malign behavior of an executable file is disclosed. In a first method aspect, the method comprises the steps of first acquiring a first behavior profile of the executable file, the first behavior profile comprising a first observable execution trace of the executable file from an emulated environment, second acquiring a second behavior profile of the executable file, the second behavior profile comprising a second observable execution trace of the executable file from a real environment, and comparing the first and second observable execution traces so as to determine the malign or non-malign behavior of the executable file. In another method aspect, the method comprises the steps of receiving a trigger condition, collecting, responsive to the trigger condition, first and second behavior profiles of the executable file from first and second one of two or more file-execution devices, the first and second behavior profiles comprising first and second observable execution traces of the executable file, and the first and second observable execution traces being non-mapped to the first and second file- execution device, respectively.

    Abstract translation: 公开了一种用于确定可执行文件的恶性或非恶性行为的技术。 在第一方法方面,所述方法包括以下步骤:首先获取所述可执行文件的第一行为简档,所述第一行为简档包括来自仿真环境的所述可执行文件的第一可观察执行跟踪,第二获取所述可执行文件的第二行为简档 可执行文件,所述第二行为简档包括来自真实环境的所述可执行文件的第二可观察执行轨迹,以及比较所述第一和第二可观察执行轨迹,以便确定所述可执行文件的恶性或非恶性行为。 在另一方法方面,该方法包括以下步骤:接收触发条件,响应于触发条件,从两个或多个文件执行装置中的第一和第二个文件执行装置收集可执行文件的第一和第二行为简档,第一和 第二行为简档包括可执行文件的第一和第二可观察执行轨迹,并且第一和第二可观察执行轨迹分别被非映射到第一和第二文件执行装置。

Patent Agency Ranking