PERFORMING SECURITY ANALYSIS ON A SOFTWARE APPLICATION
First Claim
1. A method for performing security analysis on a software application, the method comprising:
- receiving application architecture information for a software application;
determining an application type based on the application architecture information;
performing one or more security tests on the software application based on the application type and the application architecture information; and
approving the software application to be available in an online marketplace if the software application passes the one or more security tests.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for performing security analysis on a software application. In one embodiment, a method includes receiving application architecture information for a software application; and determining an application type based on the application architecture information. The method also includes performing one or more security tests on the software application based on the application type and the application architecture information; and approving the software application to be available in an online marketplace if the software application passes the one or more security tests.
60 Citations
20 Claims
-
1. A method for performing security analysis on a software application, the method comprising:
-
receiving application architecture information for a software application; determining an application type based on the application architecture information; performing one or more security tests on the software application based on the application type and the application architecture information; and approving the software application to be available in an online marketplace if the software application passes the one or more security tests. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer-readable storage medium having one or more instructions thereon for performing security analysis on a software application, the instructions when executed by a processor causing the processor to:
-
receive application architecture information for a software application; determine an application type based on the application architecture information; perform one or more security tests on the software application based on the application type and the application architecture information; and approve the software application to be available in an online marketplace if the software application passes the one or more security tests. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. An apparatus for performing security analysis on a software application, the apparatus comprising:
-
a processor; and a storage device storing one or more stored sequences of instructions which when executed by the processor cause the processor to; receive application architecture information for a software application; determine an application type based on the application architecture information; perform one or more security tests on the software application based on the application type and the application architecture information; and approve the software application to be available in an online marketplace if the software application passes the one or more security tests. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification