Mobile application peer-to-peer security system and method
First Claim
1. A mobile application security system, comprising:
- one or more nodes of a peer-to-peer network wherein each node is configured to execute a mobile application;
a central security enforcement node connected to each node of the peer-to-peer network for controlling the security of a mobile application;
the central security enforcement node further comprising means for monitoring the security of the mobile application as it jumps between the nodes wherein data about the mobile application is communicated to the central security enforcement node when the mobile application is communicated from a first node to a second node; and
wherein the security monitoring means further comprises means for detecting unwanted changes in the code associated with the mobile application when the mobile application is jumping between hosts.
2 Assignments
0 Petitions
Accused Products
Abstract
The mobile application security system and method in accordance with the invention increases the overall level of security in using a mobile application. In a preferred embodiment, the system may use a peer-to-peer architecture wherein each host of a mobile application is a node of the peer-to-peer network. In operation, when a mobile application jumps between hosts (nodes), information about the mobile application is generated and sent to a central security enforcement node so that the central security enforcement node may perform various security checks. The security checks ensure that the security of the mobile application is not compromised.
66 Citations
20 Claims
-
1. A mobile application security system, comprising:
-
one or more nodes of a peer-to-peer network wherein each node is configured to execute a mobile application;
a central security enforcement node connected to each node of the peer-to-peer network for controlling the security of a mobile application;
the central security enforcement node further comprising means for monitoring the security of the mobile application as it jumps between the nodes wherein data about the mobile application is communicated to the central security enforcement node when the mobile application is communicated from a first node to a second node; and
wherein the security monitoring means further comprises means for detecting unwanted changes in the code associated with the mobile application when the mobile application is jumping between hosts. - View Dependent Claims (2, 3)
-
-
4. A mobile application security system, comprising:
-
one or more nodes of a peer-to-peer network wherein each node is configured to execute a mobile application;
a central security enforcement node connected to each node of the peer-to-peer network for controlling the security of a mobile application;
the central security enforcement node further comprising means for monitoring the security of the mobile application as it jumps between the nodes wherein data about the mobile application is communicated to the central security enforcement node when the mobile application is communicated from a first node to a second node; and
wherein the security monitoring means further comprises means for preventing a node from transmitting hostile code in a mobile application to another node. - View Dependent Claims (5)
-
-
6. A mobile application security system, comprising:
-
one or more nodes of a peer-to-peer network wherein each node is configured to execute a mobile application;
a central security enforcement node connected to each node of the peer-to-peer network for controlling the security of a mobile application;
the central security enforcement node further comprising means for monitoring the security of the mobile application as it jumps between the nodes wherein data about the mobile application is communicated to the central security enforcement node when the mobile application is communicated from a first node to a second node; and
wherein security monitoring means further comprises means for detecting unwanted changes in the state of the mobile application. - View Dependent Claims (7)
-
-
8. A mobile application security system, comprising:
-
one or more nodes of a peer-to-peer network wherein each node is configured to execute a mobile application;
a central security enforcement node connected to each node of the peer-to-peer network for controlling the security of a mobile application;
the central security enforcement node further comprising means for monitoring the security of the mobile application as it jumps between the nodes wherein data about the mobile application is communicated to the central security enforcement node when the mobile application is communicated from a first node to a second node; and
wherein the security monitoring means further comprises means for detecting unwanted changes in the itinerary of the mobile application. - View Dependent Claims (9, 10)
-
-
11. A mobile application security method, comprising:
-
receiving data about a mobile application at a central security enforcement node each time the mobile application jumps between a first node and a second node of a peer-to-peer network; and
monitoring the security of the mobile application as it jumps between the nodes, wherein the security monitoring further comprises detecting unwanted changes in the code associated with the mobile application when the mobile application is jumping between hosts. - View Dependent Claims (12)
-
-
13. A mobile application security method, comprising:
-
receiving data about a mobile application at a central security enforcement node each time the mobile application jumps between a first node and a second node of a peer-to-peer network; and
monitoring the security of the mobile application as it jumps between the nodes, wherein the security monitoring further comprises preventing a host from transmitting hostile code in a mobile application to another node. - View Dependent Claims (14)
-
-
15. A mobile application security method, comprising:
-
receiving data about a mobile application at a central security enforcement node each time the mobile application jumps between a first node and a second node of a peer-to-peer network; and
monitoring the security of the mobile application as it jumps between the nodes, wherein the security monitoring further comprises detecting unwanted changes in the state of the mobile application. - View Dependent Claims (16)
-
-
17. A mobile application security method, comprising:
-
receiving data about a mobile application at a central security enforcement node each time the mobile application jumps between a first node and a second node of a peer-to-peer network; and
monitoring the security of the mobile application as it jumps between the nodes, wherein the security monitoring further comprises detecting unwanted changes in the itinerary of the mobile application. - View Dependent Claims (18, 19)
-
-
20. A mobile application security method, comprising:
-
receiving data about a mobile application at a central security enforcement node each time the mobile application jumps between a first node and a second node of a peer-to-peer network; and
monitoring the security of the mobile application as it jumps between the nodes, wherein the security monitoring further comprises preventing untrusted hosts from initially launching mobile applications
-
Specification