Mobile application security system and method
First Claim
1. A mobile application security system, comprising:
- a central computer, in communication with a first host computer and a second host computer, the first and second host computers executing a mobile application that jumps between the first and second host computers during execution and passes through the central computer, the central computer further comprising means for monitoring the security of the mobile application as the mobile application jumps between the first and second host computers the means for monitoring further comprising, means for inspecting an access control list of the mobile application to determine if code of the mobile application is marked as immutable, and means for replacing immutable code with code known by the central computer to be safe.
2 Assignments
0 Petitions
Accused Products
Abstract
The mobile application security system and method in accordance with the invention increases the overall level of security in using a mobile application. In a preferred embodiment, the system may use a client/server architecture wherein each host of a mobile application is treated as a client and a central computer is treated as the server. In operation, any time that a mobile application is going to jump between hosts, it must first pass through the central computer so that the central computer may perform various security checks. The security checks ensure that the security of the mobile application is not compromised and overcomes the above problems with typical mobile application systems.
-
Citations
24 Claims
-
1. A mobile application security system, comprising:
-
a central computer, in communication with a first host computer and a second host computer, the first and second host computers executing a mobile application that jumps between the first and second host computers during execution and passes through the central computer, the central computer further comprising means for monitoring the security of the mobile application as the mobile application jumps between the first and second host computers the means for monitoring further comprising, means for inspecting an access control list of the mobile application to determine if code of the mobile application is marked as immutable, and means for replacing immutable code with code known by the central computer to be safe.
-
-
2. A system, comprising:
a server, in communication with a first host computer and a second host computer, the first and second host computers executing a mobile application that jumps between the first and second host computers during execution, passing through the server, the server inspecting an access control list of the mobile application to determine if data of the mobile application is marked as immutable and replacing immutable data with data known by the central computer to be safe to monitor security of the mobile application as the mobile application jumps between the first and second host computers. - View Dependent Claims (3, 4, 5, 6, 7, 8)
-
9. A method at a server, comprising:
-
monitoring security of a mobile application as the mobile application jumps between a first host and a second host including;
inspecting an access control list of the mobile application to determine if data of the mobile application is marked as immutable; and
replacing immutable data with data known to be safe. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A mobile application security system, comprising:
-
a central computer, in communication with a first host computer and a second host computer, the first and second host computers executing a mobile application that jumps between the first and second host computers during execution, passing through the central computer, the central computer further comprising means for monitoring security of the mobile application as the mobile application jumps between the first and second host computers the means for monitoring further comprising, means for inspecting an access control list of the mobile application to determine if state data of the mobile application is marked as immutable, and means for replacing immutable state data of the mobile application with state data known by the central computer to be safe.
-
-
17. A mobile application security system, comprising:
-
a central computer, in communication with a first host computer and a second host computer, the first and second host computers executing a mobile application that jumps between the first and second host computers during execution, passing through the central computer, the central computer further comprising means for monitoring security of the mobile application as the mobile application jumps between the first and second host computers the means for monitoring further comprising, means for inspecting an access control list of the mobile application to determine if itinerary data of the mobile application is marked as immutable, and means for replacing immutable itinerary data with itinerary data known by the central computer to be safe. - View Dependent Claims (18)
-
-
19. A mobile application security method, comprising:
-
receiving a mobile application at a central computer each time the mobile application is jumping between a first host and a second host; and
monitoring security of the mobile application as it jumps between the first and second hosts, including inspecting an access control list of the mobile application to determine if code of the mobile application is marked as immutable, and replacing immutable code with code known by the central computer to be safe.
-
-
20. A mobile application security method, comprising:
-
receiving a mobile application at a central computer each time the mobile application is jumping between a first host and a second host; and
monitoring security of the mobile application as it jumps between the first and second hosts, including inspecting an access control list of the mobile application to determine if state data of the mobile application is marked as immutable, and replacing immutable state data with state data that is known by the central computer to be safe. - View Dependent Claims (22)
-
-
21. A mobile application security method, comprising:
-
receiving a mobile application at a central computer each time the mobile application is jumping between a first host and a second host; and
monitoring security of the mobile application as it jumps between the first and second hosts, including inspecting an access control list of the mobile application to determine if itinerary data of the mobile application is marked as immutable, and replacing immutable itinerary data with itinerary data known by the central computer to be safe.
-
-
23. A mobile application security method, comprising:
-
receiving a mobile application at a central computer each time the mobile application is jumping between a first host and a second host; and
monitoring security of the mobile application as it jumps between the first and second hosts, including saving code of the mobile application when the code is marked as immutable, the mobile application has not been dispatched in the past and a host dispatching the mobile application is trusted, stripping the code from the mobile application when the code is marked as immutable, the mobile application has not been dispatched in the past and the host dispatching the mobile application is not trusted, replacing the code of the mobile application when the code is marked as immutable and the mobile application has been dispatched in the past, and saving the code of the mobile application when the code is not marked as immutable.
-
-
24. A mobile application security system, comprising:
-
a central computer, in communication with a first host computer and a second host computer, the first and second host computers executing a mobile application that jumps between the first and second host computers during execution and passes through the central computer, the central computer further comprising means for monitoring security of the mobile application as the mobile application jumps between the first and second host computers the security monitoring means further comprising means for saving code of the mobile application when the code is marked as immutable, the mobile application has not been dispatched in the past and a host dispatching the mobile application is trusted, means for stripping the code from the mobile application when the code is marked as immutable, the mobile application has not been dispatched in the past and the host dispatching the mobile application is not trusted, means for replacing the code of the mobile application when the code is marked as immutable and the mobile application has not been dispatched in the past, and means for saving the code of the mobile application when the code is not marked as immutable.
-
Specification