System and method for security using one-time execution code
First Claim
1. A security client comprising a processor and a memory, the security client configured to use a one-time execution code in an environment in which a server and the security client establish a connection through a network, wherein the security client automatically receives, from the server, the one-time execution code without a user interaction,wherein the received one-time execution code is included in a packet between the server and the security client, the packet being transmitted from the server to the security client,wherein the one-time execution code is repeatedly generated as irregular by the server while the connection with the security client is maintained, for determining whether a client program is appropriate,wherein the security client is configured to load the one-time execution code on a code container, the code container being pre-allocated in a part of the memory which is already occupied by the client program, and obtain an execution result of the loaded one-time execution code while executing the client program,wherein the received one-time execution code is not generated as a file but directly loaded on the pre-allocated part of the memory which is already occupied by the client program,wherein the security client transmits the execution result to the server, and deletes the one-time execution code from the code container after the transmitting of the execution result,wherein the transmitted execution result is included in a packet between the server and the security client, the packet being transmitted from the security client to the server.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention relates to a security system, and more particularly, to a security system and method using a one-time execution code in an environment in which a client and a server are connected through a network. The server irregularly generates and transmits the one-time execution code to the client, and the client directly executes the one-time execution code on a memory area and transmits the execution result and deletes the one-time execution code on the memory area. Therefore, the server determines whether or not an error exists in the execution result and can prevent forgery and appropriation of the client by blocking the connection with the client.
-
Citations
16 Claims
-
1. A security client comprising a processor and a memory, the security client configured to use a one-time execution code in an environment in which a server and the security client establish a connection through a network, wherein the security client automatically receives, from the server, the one-time execution code without a user interaction,
wherein the received one-time execution code is included in a packet between the server and the security client, the packet being transmitted from the server to the security client, wherein the one-time execution code is repeatedly generated as irregular by the server while the connection with the security client is maintained, for determining whether a client program is appropriate, wherein the security client is configured to load the one-time execution code on a code container, the code container being pre-allocated in a part of the memory which is already occupied by the client program, and obtain an execution result of the loaded one-time execution code while executing the client program, wherein the received one-time execution code is not generated as a file but directly loaded on the pre-allocated part of the memory which is already occupied by the client program, wherein the security client transmits the execution result to the server, and deletes the one-time execution code from the code container after the transmitting of the execution result, wherein the transmitted execution result is included in a packet between the server and the security client, the packet being transmitted from the security client to the server.
-
6. A security server configured to use a one-time execution code in an environment in which the server and a security client establish a connection through a network, the server comprising:
-
a processor and a memory; a one-time execution code generator, implemented using the processor, configured to generate and transmit the one-time execution code for determining whether a client program is appropriate, the transmitted one-time execution code being included in a packet between the server and the client program, wherein the one-time execution code is not generated as a file but configured to be directly loaded on a pre-allocated part of a memory area which is already occupied by the client program running on the security client; a result analyzer, implemented using the processor, configured to analyze an execution result of the loaded one-time execution code transmitted from the security client to determine whether or not an error occurs in the execution result, the execution result of the loaded one-time execution code being obtained by the security client while executing the client program, wherein the transmitted execution result being included in a packet between the server and the client program; and a client connection controller, implemented using the processor, configured to block the connection with the security client when the result analyzer finds the error, wherein the one-time execution code is repeatedly generated as irregular, and the one-time execution code is repeatedly transmitted to the security client without a user interaction, while the connection with the security client is maintained, and wherein it is determined based on random value whether or not the one-time execution code is generated. - View Dependent Claims (7, 8, 9, 10, 11)
-
-
12. A security method, comprising:
-
receiving, from a server, a one-time execution code for determining whether a client program is appropriate without a user interaction, wherein the received one-time execution code is included in a packet between a server program running on the server and a client program running on a security client, the packet being transmitted from the server to the security client through a connection established between the server and the security client on a network; loading the received one-time execution code on a code container, the code container being pre-allocated in a part of a memory area which is already occupied by the client program, and wherein the received one-time execution code is not generated as a file but directly loaded on the pre-allocated part of the memory area which is already occupied by the client program; wherein the one-time execution code is repeatedly generated as irregular by the server while the connection with the security client is maintained; obtaining an execution result of the loaded one-time execution code while executing the client program and transmitting the execution result to the server, wherein the execution result of the one-time execution code is obtained without a user interaction, wherein the transmitted execution result is included in a packet between the server program and the client program, the packet being transmitted from the server to the security client; and deleting the loaded one time execution code from the code container after the execution result is transmitted to the server. - View Dependent Claims (16)
-
-
13. A security method, comprising:
-
generating a one-time execution code for determining whether a client program is appropriate and transmitting the one-time execution code to a security client connected through a connection established between a server and the security client on a network, the transmitted one-time execution code being included in a packet between the server and the client program, wherein the one-time execution code received by the security client is not generated as a file but directly loaded on a pre-allocated part of a memory area which is already occupied by the client program running on the security client, receiving the execution result of the one-time execution code from the security client and analyzing the execution result, the transmitted execution result being included in a packet between the server and the client program; and blocking the connection with the security client when the execution result indicates that the client program is inappropriate, wherein the one-time execution code is repeatedly generated as irregular, and the one-time execution code is repeatedly transmitted to the security client without a user interaction, while the connection with the security client is maintained, wherein it is determined based on random value whether or not the one-time execution code is generated, and wherein the execution result of the one-time execution code is obtained at the security client while executing the client program and without a user interaction. - View Dependent Claims (14, 15)
-
Specification