Jumping application security system
First Claim
Patent Images
1. A computer implemented jumping application security console that maintains the security of a jumping application that is jumping between one or more hosts connected to the security console, the security console comprising:
- a security module that controls the security of a jumping application;
a database that contains one or more pieces of code and a description of each piece of code, wherein each piece of code implements a particular behavior; and
wherein the security module further comprises instructions that replace code from the jumping application that implements a first behavior with a piece of code from the database into the jumping application that implements the first behavior.
1 Assignment
0 Petitions
Accused Products
Abstract
A jumping application security system and method provides known safe code for the jumping applications on each jump. A participating host specifies the desired code by describing the desired behavior. The security system provides the specified code on behalf of the host.
-
Citations
23 Claims
-
1. A computer implemented jumping application security console that maintains the security of a jumping application that is jumping between one or more hosts connected to the security console, the security console comprising:
-
a security module that controls the security of a jumping application;
a database that contains one or more pieces of code and a description of each piece of code, wherein each piece of code implements a particular behavior; and
wherein the security module further comprises instructions that replace code from the jumping application that implements a first behavior with a piece of code from the database into the jumping application that implements the first behavior. - View Dependent Claims (2, 3, 4)
-
-
5. A computer implemented jumping application security console that maintains the security of a jumping application that is jumping between one or more hosts connected to the security console, the security console comprising:
-
means for controlling the security of a jumping application;
means for storing one or more pieces of code and a description of each piece of code, wherein each piece of code implements a particular behavior; and
wherein the security controlling means further comprises means for replacing code from the jumping application that implements a first behavior with a piece of code from the database into the jumping application that implements the first behavior. - View Dependent Claims (6, 7, 8)
-
-
9. A computer-implemented method for controlling the security of a jumping application in a jumping application system, the method comprising:
-
receiving a request for a piece of code that implements a particular behavior for a jumping application; and
replacing code in the jumping application that implements the particular behavior with a piece of code that implements the particular behavior into the jumping application so that the jumping application has the particular behavior when it is executed by a host in the jumping application system. - View Dependent Claims (10, 11, 12, 13)
-
-
14. A jumping application security system, comprising:
-
a security console computer system that control the security of a jumping application in the jumping application security system;
one or more host computers connected to the first computer by a computer network, wherein each host computer executes a jumping application; and
wherein the console further comprises a database that contains one or more pieces of code and a description of each piece of code, wherein each piece of code implements a particular behavior and a security module that comprises instructions that replace code from the jumping application that implements a first behavior with a piece of code from the database into the jumping application that implements the first behavior. - View Dependent Claims (15, 16, 17, 18, 19)
-
-
20. A server computer for a jumping application security system, the server comprising:
-
a processor;
a memory connected to the processor;
a database connected to the processor that contains one or more pieces of code and a description of each piece of code, wherein each piece of code implements a particular behavior; and
wherein the memory further comprises instructions that replace code from the jumping application that implements a first behavior with a piece of code from the database into the jumping application that implements the first behavior. - View Dependent Claims (21, 22, 23)
-
Specification