Wireless device mobile application security system
First Claim
Patent Images
1. A mobile application security system, comprising:
- a management and security console computer connected to one or more hosts, each host configured to execute a mobile application that jumps between hosts during execution, the management and security console computer comprising means for monitoring security of the mobile application as it jumps between a dispatching host and another host wherein information about the mobile application and the dispatching host is communicated to the management and security console computer, the security monitoring means further comprising means for determining if authentication of a user of the dispatching host is required prior to dispatch of the mobile application responsive to means for determining if the mobile application is a sensitive mobile application and determining if the dispatching host is a vulnerable host, and means for requesting authentication if authentication of the user is required.
1 Assignment
0 Petitions
Accused Products
Abstract
A mobile application security system and method, in the preferred embodiment, permits authentication of a user of a sensitive mobile application dispatched from a vulnerable host to occur, but does not perform user authentication for non-sensitive mobile applications or for sensitive mobile applications dispatched from non-vulnerable hosts. A hub and spoke architecture and a peer-to-peer architecture are described.
-
Citations
45 Claims
-
1. A mobile application security system, comprising:
a management and security console computer connected to one or more hosts, each host configured to execute a mobile application that jumps between hosts during execution, the management and security console computer comprising means for monitoring security of the mobile application as it jumps between a dispatching host and another host wherein information about the mobile application and the dispatching host is communicated to the management and security console computer, the security monitoring means further comprising means for determining if authentication of a user of the dispatching host is required prior to dispatch of the mobile application responsive to means for determining if the mobile application is a sensitive mobile application and determining if the dispatching host is a vulnerable host, and means for requesting authentication if authentication of the user is required. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
9. A mobile application security method, comprising:
-
receiving data about a mobile application at a security node each time the mobile application jumps from a dispatching host to another host; determining if authentication of a user of the dispatching host is required prior to dispatch of the mobile application, including determining if the mobile application is a sensitive mobile application and determining if the dispatching node is a vulnerable node; and responsive to determining, requesting authentication if authentication of the user is required. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A mobile application security system, comprising:
a management and security node connected to one or more nodes of a peer-to-peer network, each node configured to execute a mobile application, the management and security node comprising means for monitoring security of the mobile application as it jumps between the one or more nodes wherein data about the mobile application is communicated to the management and security node prior to the mobile application being dispatched from a dispatching node, the security monitoring means further comprising means for determining if authentication of a user of the dispatching node is required prior to dispatch of the mobile application responsive to means for determining if the mobile application is a sensitive application and determining if the dispatching node is a vulnerable node, and means for requesting authentication if authentication of the user is required. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
25. A mobile application security method, comprising:
-
receiving data about a mobile application at a management and security node each time the mobile application is being dispatched from a dispatching node in a peer-to-peer network; determining if authentication of a user of the dispatching node is required prior to dispatch of the mobile application, including determining if the mobile application is a sensitive application and determining if the dispatching node is a vulnerable node; and responsive to determining, requesting authentication if authentication of the user is required. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32)
-
-
33. A mobile application security system, comprising:
-
a mobile application capable of jumping between hosts during execution; and a management and security node, in communication with the hosts, the management and security node configured to determine whether to authenticate a user of a dispatching host prior to dispatch of the mobile application responsive to a vulnerability classification of the dispatching host and a sensitivity classification of the mobile application, and request authentication if authentication of the user is required. - View Dependent Claims (34, 35, 36, 37, 38, 39, 40, 41, 42)
-
-
43. A mobile application security system, comprising:
-
a mobile application capable of jumping between hosts during execution; and a dispatching host, in communication with a management and security node, the dispatching host configured to provide a vulnerability classification of the dispatching host and a sensitivity classification of the mobile application to the management and security node prior to dispatch in order to determine whether authentication of a user of the dispatching host is required, and to assist authentication of the user responsive to receiving an authentication request. - View Dependent Claims (44, 45)
-
Specification