Mobile application peer-to-peer security system and method
First Claim
Patent Images
1. A system, including:
- a centralized security enforcement node, in communication with at least a receiving host on a peer-to peer network, the receiving host operable to execute a mobile application that jumps to the receiving host from a dispatching host during execution, the centralized security enforcement node including;
a first module to store, prior to a jump to the receiving host, first content data associated with the mobile application;
a second module to receive from the receiving host, prior to instantiation of the mobile application on the receiving host, second content data associated with the mobile application; and
a third module, in communication with the first and second modules, to detect unwanted changes in contents of the mobile application including comparing the first and second content data.
2 Assignments
0 Petitions
Accused Products
Abstract
The mobile application security system and method in accordance with the invention increases the overall level of security in using a mobile application. In a preferred embodiment, the system may use a peer-to-peer architecture wherein each host of a mobile application is a node of the peer-to-peer network. In operation, when a mobile application jumps between hosts (nodes), information about the mobile application is generated and sent to a central security enforcement node so that the central security enforcement node may perform various security checks. The security checks ensure that the security of the mobile application is not compromised.
68 Citations
18 Claims
-
1. A system, including:
-
a centralized security enforcement node, in communication with at least a receiving host on a peer-to peer network, the receiving host operable to execute a mobile application that jumps to the receiving host from a dispatching host during execution, the centralized security enforcement node including; a first module to store, prior to a jump to the receiving host, first content data associated with the mobile application; a second module to receive from the receiving host, prior to instantiation of the mobile application on the receiving host, second content data associated with the mobile application; and a third module, in communication with the first and second modules, to detect unwanted changes in contents of the mobile application including comparing the first and second content data. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method, including:
-
storing at a centralized security enforcement node, prior to a jump to a receiving host from a dispatching host, a first content data associated with a mobile application; receiving, at the centralized security enforcement node, from the receiving host, second content data associated with the mobile application prior to instantiation of the mobile application at a receiving host, wherein the first and the second content data include one from the group containing a first and a second copy of the mobile application, a first and a second digest of the contents of the mobile application, a first and a second itinerary, and first and second security breach information; and detecting, at the centralized security enforcement node, unwanted changes in contents of the mobile application including comparing the first and second content data. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A computer program product including program instructions tangibly stored on a computer-readable medium and operable to cause a computer system to perform a method, including:
-
storing at a first module of a centralized security enforcement node, prior to a jump from a receiving host to a dispatching host, first content data associated with a mobile application; receiving, at a second module of the centralized security enforcement node, from the receiving host second content data associated with the mobile application prior to instantiation of the mobile application; and detecting, at a third module of the centralized security enforcement node, unwanted changes in contents of the mobile application including comparing the first and second content data. - View Dependent Claims (15, 16, 17, 18)
-
Specification