摘要:
A software-usage management system that manages a usage of a software function by a client connected to a network includes a test-conducting unit that conducts a test relevant to a software function for a user of a client for which a specific software function is not available from a standpoint of security; and a usage allowing unit that allows a user who passed the test conducted by the test-conducting unit to use the specific software function.
摘要:
An editing apparatus generates a capsular work in which usage conditions for each of plural usages and usage secret information, obtained by encrypting a decryption key encrypted work data with ticket keys which differ depending on usage from each other, are encapsulated together with the encrypted work data. A ticket server apparatus, which manages the usage conditions and the ticket keys, issues a ticket containing a ticket key in the case of allowing a user to practice the usage requested by the user. A distribution center apparatus, which manages the capsular work, distributes the capsular work in accordance with the user's request. An audiovisual apparatus acquires the capsular work from the distribution center apparatus and requests the ticket necessary to make use of the capsular work from the ticket server apparatus. The audiovisual apparatus decrypts the encrypted work data contained in the capsular work and reproduces the work data only in the case where the audiovisual apparatus has acquired the ticket.
摘要:
A set of a management-use memory medium in which is written various type of regulatory information (limit I of use of software, limit L of production of the next generation, a number K of generations showing up to what generation backup copies can be produced, software identification information PID, etc.) and a software memory medium in which the software is stored is established and use of the software is allowed under the restrictions of this regulatory information. Further, the software memory medium and the management-use memory medium may be provided in the same memory medium or the two may be constituted as separate memory media. In the case of the latter separate management system, the software is allowed to be used only when the software identification information PID written in the two match. It is therefore possible to suppress the unauthorized use of software without detracting from the spatial convenience of software use.
摘要:
A communication system and accounting apparatus are provided capable of easy management of accounting a use of information by a user in multi-media networks while protecting privacy of the user. As a user input money information to an PPC input unit of a user terminal, the money information including cash, a pre-paid card, an IC card, and the like, a discrimination unit judges a use permission of provided information in accordance with the money amount indicated by the money information and/or charge information added to the information provided by an information provider. In response to a user permission signal, a signal processing unit processes the provided information and supplies it to the user.
摘要:
A software analysis protection method capable of preventing an illegitimate use of a software reliably, by making a software analysis difficult without complicating or enciphering the software itself. Software parts dividing the software to be used at the user terminal are distributedly stored in the user terminal and the center, and the software parts stored in the center are transmitted to the user terminal and loaded into missing parts among the software parts stored in the user terminal on a memory so as to make the software operable at the user terminal. Then, the software as developed on the memory is operated at the user terminal. The software parts are down-loaded from the center to the user terminal such that an arranged pattern of the software as developed on the memory is changed at each time of a use of the software at the user terminal.
摘要:
Systems and methods enable automated and scalable obfuscation detection in programming scripts, including processing devices that receive software programming scripts and a symbol set. The processing devices determine a frequency of each symbol and an average frequency of the symbols in the script text. The processing devices determine a normal score of each symbol based on the frequency of each symbol and the average frequency to create a symbol feature for each symbol including the normal score. The processing devices utilize an obfuscation machine learning model including a classifier for binary obfuscation classification to detect obfuscation in the script based on the symbol features. The processing devices cause to display an alert indicting an obfuscated software programming script on a screen of a computing device associated with an administrative user to recommend security analysis of the software programming script based on the binary obfuscation classification.
摘要:
A storage device, including at least one nonvolatile memory device configured to store data; and a storage controller configured to: generate a virtual table including a plurality of random values, wherein each random value of the plurality of random values designates an index from among a plurality of indexes corresponding to a plurality of main functions; transmit the virtual table to a host; receive from the host a vendor unique command (VUC) generated by the host based on the virtual table; parse the VUC based on the virtual table, perform an operation corresponding to the at least one nonvolatile memory device based on the parsed VUC; and transmit a result of the operation to the host.
摘要:
A device for validating authorization key obfuscation in a continuous integration (CI) pipeline codebase is presented. The device includes a transceiver, one or more memories, and one or more processors interfacing with the transceiver and the one or more memories. The one or more processors are configured to receive an update to the CI pipeline codebase. The update may include an authorization key, which the one or more processors store in the one or more memories. The one or more processors may perform a build process to integrate the update into the CI pipeline codebase. The build process may include an obfuscation, which creates an obfuscated CI pipeline codebase. The one or more processors may also scan the obfuscated CI pipeline codebase to determine a presence or an absence of the authorization key.
摘要:
The present disclosure provides for improving security in a meter or an intelligent electronic device (IED) through the use of a security key which is unique to each meter or IED. Such a key may be used to prevent password reuse among multiple meters. Such a key may also be used to encrypt critical components of the software, such that only when running on the correct meter can the components of the software be decrypted. Such a key may also be used to uniquely identify the device in a larger data collection and management system. The security key can also be used to prevent the direct copying of meters. The present disclosure also provides for a meter or IED that stores functional software separately from core software.
摘要:
An adaptive malware writing system includes a targeting engine that classifies malware candidates as a malicious candidate or a benign candidate through a surrogate model. The surrogate model assigns a weight to each byte of the malware candidates through a saliency vector. The sum of the weights render a malware classification score. An alteration engine alters a binary form of the malware candidates classified as malware by executing a functional analysis that traces application program interface calls and memory. The alteration engine alters the binary form of the malware candidates classified as malware to render a synthesized malware. The malware analysis determines if the synthesized malware is operational by comparing an image of the synthesized malware to an image of at least one of the plurality of malware candidates. A target classifier engine identifies the vulnerabilities of a targeted computer.