Mobile application access control list security system
First Claim
Patent Images
1. A mobile application security system, comprising:
- one or more hosts between which a mobile application jumps during the execution of the mobile application, the one or more hosts comprising a current host and a next host; and
a management and security console which ensures the security of the execution of the mobile application wherein the mobile application is sent to the management and security console between the jump from the current host to the next host, the management and security console further comprising means for calculating the access control list of the mobile application based on the current host to determine a computed access control list;
means for comparing the computed access control list to the actual access control list of the mobile application and means for adjusting the actual access control list of the mobile application based on the computed access control list and a trust level associated with the current host.
1 Assignment
0 Petitions
Accused Products
Abstract
A mobile application security system and method, in the preferred embodiment, ensures the integrity of a mobile application'"'"'s multi-jump access control list (ACL) by either (a) checking the compatibility of a mobile application '"'"'s multi-jump ACL with a known accurate multi-jump ACL, or (b) overwriting a mobile application '"'"'s multijump ACL with an ACL which is known to be accurate, depending on whether the host dispatching the mobile application is trusted or not trusted to modify a mobile application'"'"'s multi-jump ACL, respectively.
-
Citations
28 Claims
-
1. A mobile application security system, comprising:
-
one or more hosts between which a mobile application jumps during the execution of the mobile application, the one or more hosts comprising a current host and a next host; and
a management and security console which ensures the security of the execution of the mobile application wherein the mobile application is sent to the management and security console between the jump from the current host to the next host, the management and security console further comprising means for calculating the access control list of the mobile application based on the current host to determine a computed access control list;
means for comparing the computed access control list to the actual access control list of the mobile application and means for adjusting the actual access control list of the mobile application based on the computed access control list and a trust level associated with the current host. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A mobile application security method executed for a mobile application which jumps between at least a current host and a next host during its execution, the method comprising:
-
providing a management and security console which ensures the security of the execution of the mobile application wherein the mobile application is sent to the management and security console between the jump from the current host to the next host;
calculating the access control list of the mobile application based on the current host to determine a computed access control list;
comparing the computed access control list to the actual access control list of the mobile application; and
adjusting the actual access control list of the mobile application based on the computed access control list and a trust level associated with the current host. - View Dependent Claims (8, 9, 10, 11, 12, 14, 15, 16, 17, 18, 20, 21, 22, 23, 24, 26, 27, 28)
-
-
13. A mobile application security system, comprising:
-
one or more hosts between which a mobile application jumps during the execution of the mobile application, the one or more hosts comprising a current host and a next host;
a management and security console which ensures the security of the execution of the mobile application wherein the mobile application is sent to the management and security console between the jump from the current host to the next host, the management and security console being connected to each host to form a hub and spoke arrangement; and
the management and security console further comprising means for calculating the access control list of the mobile application based on the current host to determine a computed access control list;
means for comparing the computed access control list to the actual access control list of the mobile application and means for adjusting the actual access control list of the mobile application based on the computed access control list and a trust level associated with the current host.
-
-
19. A method for managing the access control list of a mobile application which jumps between a current host and a next host during the execution of the mobile application, the method comprising:
-
calculating the access control list of the mobile application based on the current host to determine a computed access control list comparing the computed access control list to the actual access control list of the mobile application; and
adjusting the actual access control list of the mobile application based on the computed access control list and a trust level associated with the current host.
-
-
25. A mobile application management and security console for a mobile application system having one or more hosts between which a mobile application jumps during the execution of the mobile application, the one or more hosts comprising a current host and a next host wherein the mobile application is sent to the management and security console between the jump from the current host to the next host, the mobile application management and security console comprising:
-
means for calculating the access control list of the mobile application based on the current host to determine a computed access control list;
means for comparing the computed access control list to the actual access control list of the mobile application; and
means for adjusting the actual access control list of the mobile application based on the computed access control list and a trust level associated with the current host.
-
Specification