Mobile application security system and method
First Claim
1. A method for verifying integrity of a jumping mobile application, the method including:
- storing, prior to a jump and at a server, a first instance of a mobile application that jumps from a first host to a second host during execution, an instance of the mobile application including executable code for the mobile application;
receiving, during the jump and at the server, a second instance of the mobile application; and
detecting unwanted changes in contents of the mobile application, including the server comparing the first and second instances.
2 Assignments
0 Petitions
Accused Products
Abstract
The mobile application security system and method in accordance with the invention increases the overall level of security in using a mobile application. In a preferred embodiment, the system may use a client/server architecture wherein each host of a mobile application is treated as a client and a central computer is treated as the server. In operation, any time that a mobile application is going to jump between hosts, it must first pass through the central computer so that the central computer may perform various security checks. The security checks ensure that the security of the mobile application is not compromised and overcomes the above problems with typical mobile application systems.
29 Citations
23 Claims
-
1. A method for verifying integrity of a jumping mobile application, the method including:
-
storing, prior to a jump and at a server, a first instance of a mobile application that jumps from a first host to a second host during execution, an instance of the mobile application including executable code for the mobile application; receiving, during the jump and at the server, a second instance of the mobile application; and detecting unwanted changes in contents of the mobile application, including the server comparing the first and second instances. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system, including:
-
a server, in communication with a first host and a second host, the first and second hosts executing a mobile application that jumps from the first host to the second host during execution, where during the jump from the first host to the second host the mobile application passes through the server, the server storing, prior to the jump from the first host to the second host, a first instance of the mobile application, an instance of the mobile application including executable code for the mobile application, the server receiving from the first host, during the jump to the second host, a second instance of the mobile application, and the server detecting unwanted changes in contents of the mobile application including comparing the first and second instances. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer program product including program instructions tangibly stored on a computer-readable medium and operable to cause a computer system to perform a method for verifying integrity of a jumping mobile application, the method including:
-
storing, prior to a jump and at a location other than a first host or a second host, a first instance of a mobile application that jumps from the first host to the second host during execution, an instance of the mobile application including executable code for the mobile application, receiving, during the jump and at the location, a second instance of the mobile application, and detecting unwanted changes in contents of the mobile application including comparing, at the location, the first and second instances. - View Dependent Claims (18, 19, 20, 21, 22, 23)
-
Specification