Movatterモバイル変換


[0]ホーム

URL:


GB2525742A - CRM Security core - Google Patents

CRM Security core
Download PDF

Info

Publication number
GB2525742A
GB2525742AGB1504898.6AGB201504898AGB2525742AGB 2525742 AGB2525742 AGB 2525742AGB 201504898 AGB201504898 AGB 201504898AGB 2525742 AGB2525742 AGB 2525742A
Authority
GB
United Kingdom
Prior art keywords
core
layer
attempts
reverse engineering
tls
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB1504898.6A
Other versions
GB201504898D0 (en
Inventor
Mike Bond
Matthew Landrock
Peter Landrock
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Cryptomathic Ltd
Original Assignee
Cryptomathic Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US13/628,828external-prioritypatent/US20140089202A1/en
Application filed by Cryptomathic LtdfiledCriticalCryptomathic Ltd
Priority claimed from PCT/GB2013/052669external-prioritypatent/WO2015055972A1/en
Publication of GB201504898D0publicationCriticalpatent/GB201504898D0/en
Publication of GB2525742ApublicationCriticalpatent/GB2525742A/en
Withdrawnlegal-statusCriticalCurrent

Links

Classifications

Landscapes

Abstract

A security core supports a networked banking app for a client application device communicating with a server, such as e.g. a smartphone. It provides a secure environment for the banking app to conduct registration, enrollment, and transaction workflows with corresponding back-end servers on the network. It includes defenses against static analysis, attempts at reverse engineering, and real-time transaction fraud. A principal defense employed is obfuscation of the protocols, APIs, algorithms, and program code. It actively detects, thwarts, misdirects, and reports reverse engineering attempts and malware activity it senses. A routing obfuscator is configured to operate at the outer layer. Previous core designs are retainedas camouflage. An internal TLS library is used rather than the OS TLS layer. Cookies are managed internally in the core rather than in the webkit-browser layer.
GB1504898.6A2012-09-182013-10-14CRM Security coreWithdrawnGB2525742A (en)

Applications Claiming Priority (3)

Application NumberPriority DateFiling DateTitle
US201261702260P2012-09-182012-09-18
US13/628,828US20140089202A1 (en)2012-09-272012-09-27CRM Security Core
PCT/GB2013/052669WO2015055972A1 (en)2013-10-142013-10-14Crm security core

Publications (2)

Publication NumberPublication Date
GB201504898D0 GB201504898D0 (en)2015-05-06
GB2525742Atrue GB2525742A (en)2015-11-04

Family

ID=54266912

Family Applications (1)

Application NumberTitlePriority DateFiling Date
GB1504898.6AWithdrawnGB2525742A (en)2012-09-182013-10-14CRM Security core

Country Status (1)

CountryLink
GB (1)GB2525742A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20040039924A1 (en)*2001-04-092004-02-26Baldwin Robert W.System and method for security of computing devices
WO2013056104A1 (en)*2011-10-122013-04-18C-Sam, Inc.A multi-tiered secure mobile transactions enabling platform
US20130263212A1 (en)*2012-03-302013-10-03Goldman, Sachs & Co.Secure mobile framework

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20040039924A1 (en)*2001-04-092004-02-26Baldwin Robert W.System and method for security of computing devices
WO2013056104A1 (en)*2011-10-122013-04-18C-Sam, Inc.A multi-tiered secure mobile transactions enabling platform
US20130263212A1 (en)*2012-03-302013-10-03Goldman, Sachs & Co.Secure mobile framework

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
JUN XU et al, "Transparent runtime randomization for security", Reliable Distributed Systems, 2003, Proceedings. 22nd International Symposium on, Piscataway, USA, IEEE, 6 October 2003, pages 260-269. XP010662101. DOI: 10.1109/RELDIS.2003.1238076. ISBN: 978-0-7695-1955-5.*
Open Mobile Alliance (OMA), "Mobile Proximity Payment Issue and Recommendations 1.0", San Diego, USA, 10 December 2006, pages 1-88. XP064017300. Retrieved from the Internet: URL: ftp/Public_documents/ARCH/ARC-MCC/2006 /, [retrieved on 2006-12-10].*

Also Published As

Publication numberPublication date
GB201504898D0 (en)2015-05-06

Similar Documents

PublicationPublication DateTitle
ECSP18079192A (en) SYSTEMS AND METHODS TO PROVIDE A MULTIFACTORIAL PERSONAL IDENTITY VERIFICATION BASED ON A CHAIN OF BLOCKS
EP3779723A4 (en)Data processing model construction method and device, server and client
WO2016085883A3 (en)Call stack integrity check on client/server systems
PL3319292T3 (en)Methods, client and server for checking security based on biometric features
EP3001345A3 (en)Targeted attack discovery
IN2015DN02657A (en)
WO2011068796A3 (en)Policy directed security-centric model driven architecture to secure client and cloud hosted web service enabled processes
WO2012097110A3 (en)Secure computing in multi-tenant data centers
WO2011153425A3 (en)Systems and methods to provide messages in real-time with transaction processing
CL2007001510A1 (en) Methods and client computing devices that allow delegating user credentials from the client computing device to a server computing device in a computer network, eventually in a single connection, and obtaining secure resources from the server.
WO2012166873A3 (en)Computer program, method, and system for preventing execution of viruses and malware
HK1249603A1 (en)Systems and methods for generating network threat intelligence
MY184704A (en)A system and method for authenticating a user based on user behaviour and environmental factors
WO2015013139A8 (en)Native application testing
SG11202104481UA (en)Trusted computing method, and server
EP2811714A3 (en)System and method for computer system security
EP2833274A4 (en)Encrypted database system, client terminal, database server, data linking method, and program
EP3499794A4 (en) SSL COMMUNICATION SYSTEM, CLIENT, SERVER, SSL COMMUNICATION PROCEDURE AND COMPUTER PROGRAM
HK1243512A1 (en)Identifying a potential ddos attack using statistical analysis
WO2014004615A3 (en)System and method for hosting and sharing a live event
WO2015127170A3 (en)Method and system for providing a robust and efficient virtual asset vulnerability management and verification service
WO2013103640A3 (en)Methods and apparatuses for maintaining secure communication between a group of users in a social network
WO2017208079A3 (en)Method and system for improving network security
GB2533049A (en)System and method for securing an architectural environment against crime and minimizing criminal elements
EP3696658A4 (en) LOG MANAGEMENT PROCEDURES, SERVER AND DATABASE SYSTEM

Legal Events

DateCodeTitleDescription
WAPApplication withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)

[8]ページ先頭

©2009-2025 Movatter.jp