Mobile application security system and method
First Claim
1. A mobile application security system, comprising:
- a central computer for controlling the security of a mobile application;
one or more host computers connected to the server computer, each host computer executing the mobile application that jumps between the hosts during execution;
the central computer further comprising means for monitoring the security of the mobile application as it jumps between the host computers wherein when the mobile application is communicated from a first host to a second host, it passes through the central computer;
wherein the security monitoring means further comprises means detecting code of the mobile application marked as immutable and means for replacing the immutable code with code known to be safe by the central computer.
2 Assignments
0 Petitions
Accused Products
Abstract
The mobile application security system and method in accordance with the invention increases the overall level of security in using a mobile application. In a preferred embodiment, the system may use a client/server architecture wherein each host of a mobile application is treated as a client and a central computer is treated as the server. In operation, any time that a mobile application is going to jump between hosts, it must first pass through the central computer so that the central computer may perform various security checks. The security checks ensure that the security of the mobile application is not compromised and overcomes the above problems with typical mobile application systems.
-
Citations
8 Claims
-
1. A mobile application security system, comprising:
-
a central computer for controlling the security of a mobile application;
one or more host computers connected to the server computer, each host computer executing the mobile application that jumps between the hosts during execution;
the central computer further comprising means for monitoring the security of the mobile application as it jumps between the host computers wherein when the mobile application is communicated from a first host to a second host, it passes through the central computer;
wherein the security monitoring means further comprises means detecting code of the mobile application marked as immutable and means for replacing the immutable code with code known to be safe by the central computer.
-
-
2. A mobile application security system, comprising:
-
a central computer for controlling the security of a mobile application;
one or more host computers connected to the server computer, each host computer executing the mobile application that jumps between the hosts during execution;
the central computer further comprising means for monitoring the security of the mobile application as it jumps between the host computers wherein when the mobile application is communicated from a first host to a second host, it passes through the central computer; and
wherein the security monitoring means further comprises means for detecting state data marked as immutable and means for replacing the immutable state data with state data known to be safe by the central computer.
-
-
3. A mobile application security system, comprising:
-
a central computer for controlling the security of a mobile application;
one or more host computers connected to the server computer, each host computer executing the mobile application that jumps between the hosts during execution;
the central computer further comprising means for monitoring the security of the mobile application as it jumps between the host computers wherein when the mobile application is communicated from a first host to a second host, it passes through the central computer; and
wherein the security monitoring means further comprises means for detecting an itinerary of the mobile application that is marked as immutable and means for replacing the immutable itinerary with an itinerary known to be safe by the central computer. - View Dependent Claims (4)
-
-
5. A mobile application security method, comprising:
-
receiving a mobile application at a central computer each time the mobile application is jumping between a first host and a second host; and
monitoring the security of the mobile application as it jumps between the host computers, wherein the security monitoring further comprises detecting code of the mobile application that is marked as immutable and replacing the immutable code with code known to be safe by the central computer.
-
-
6. A mobile application security method, comprising:
-
receiving a mobile application at a central computer each time the mobile application is jumping between a first host and a second host; and
monitoring the security of the mobile application as it jumps between the host computers, wherein the security monitoring further comprises detecting a state of the mobile application that is marked as immutable and replacing the immutable state with state data that is known to be safe by the central computer.
-
-
7. A mobile application security method, comprising:
-
receiving a mobile application at a central computer each time the mobile application is jumping between a first host and a second host; and
monitoring the security of the mobile application as it jumps between the host computers, wherein the security monitoring further comprises detecting an itinerary of the mobile application that is marked as immutable and replacing the immutable itinerary with itinerary data known to be safe by the central computer. - View Dependent Claims (8)
-
Specification