Jumping application security system
First Claim
Patent Images
1. A computer implemented jumping application security console that maintains the security of a jumping application that is jumping between two or more hosts connected to the security console though a network, the security console comprising:
- a security module that controls the security of a jumping application;
a database that contains one or more pieces of code and a description of each piece of code, wherein each piece of code implements a particular behavior; and
wherein the security module further comprises instructions to replace code from the jumping application that implements a first behavior with a piece of code from the database into the jumping application that implements the first behavior when the jumping application is received at the security console during a jump between hosts, and where the code is replaced for each jump of the jumping application between hosts.
1 Assignment
0 Petitions
Accused Products
Abstract
A jumping application security system and method provides known safe code for the jumping applications on each jump. A participating host specifies the desired code by describing the desired behavior. The security system provides the specified code on behalf of the host.
-
Citations
26 Claims
-
1. A computer implemented jumping application security console that maintains the security of a jumping application that is jumping between two or more hosts connected to the security console though a network, the security console comprising:
-
a security module that controls the security of a jumping application; a database that contains one or more pieces of code and a description of each piece of code, wherein each piece of code implements a particular behavior; and wherein the security module further comprises instructions to replace code from the jumping application that implements a first behavior with a piece of code from the database into the jumping application that implements the first behavior when the jumping application is received at the security console during a jump between hosts, and where the code is replaced for each jump of the jumping application between hosts. - View Dependent Claims (2, 3, 4, 26)
-
-
5. A computer implemented jumping application security console that maintains the security of a jumping application that is jumping between two or more hosts connected to the security console though a network, the security console being distinct from each of the two or more hosts, the security console comprising:
-
means for controlling the security of a jumping application; means for storing one or more pieces of code and a description of each piece of code, wherein each piece of code implements a particular behavior; and wherein the security controlling means further comprises means for replacing code from the jumping application that implements a first behavior with a piece of code from the database into the jumping application that implements the first behavior when the jumping application is received at the security console during a jump between hosts, and where the code is replaced during each jump between hosts. - View Dependent Claims (6, 7, 8)
-
-
9. A computer-implemented method for controlling the security of a jumping application in a jumping application system, the jumping application system including a plurality of distinct hosts and a security console distinct from the plurality of hosts, the method comprising:
-
receiving the jumping application at the security console from a host; identifying a piece of code in the jumping application that implements a particular behavior; removing the identified piece of code in the jumping application that implements the particular behavior each time the jumping application jumps between hosts so that the jumping application does not include the piece of code when it is executed by a next host in the jumping application system; and sending the jumping application to the next host. - View Dependent Claims (10, 11, 12, 13)
-
-
14. A jumping application security system, comprising:
-
a security console computer system that control the security of a jumping application in the jumping application security system; one or more host computers connected to the security console computer system through a computer network, wherein each host computer executes a jumping application; and wherein the security console computer system further comprises a database that contains one or more pieces of code and a description of each piece of code, wherein each piece of code implements a particular behavior and a security module that comprises instructions that replace code from the jumping application that implements a first behavior with a piece of code from the database when the jumping application is received at the security console during a jump between hosts, and where the code is replaced into the jumping application that implements the first behavior each time the jumping application jumps between hosts. - View Dependent Claims (15, 16, 17, 18, 19)
-
-
20. A server computer for a jumping application security system, the server comprising:
-
a processor; a memory connected to the processor; a database connected to the processor that contains one or more pieces of code and a description of each piece of code, wherein each piece of code implements a particular behavior; and wherein the memory further comprises instructions that replace code from a jumping application received from a first host through a network that implements a first behavior with a piece of code from the database into the jumping application that implements the first behavior each time the jumping application including code that implements the first behavior jumps from the first host to a second host, the first host and the second host being distinct from the server computer. - View Dependent Claims (21, 22, 23)
-
-
24. A computer-implemented method comprising:
-
receiving a jumping application at a server from a first host during a jump from the first host to a second host; determining whether the first host has been designated as an untrusted host; when the first host is an untrusted host, determining whether the received jumping application includes code that implements a particular behavior and when the jumping application includes the code, replacing the code in the jumping application that implements a particular behavior with a piece of code that implements the particular behavior in the jumping application so that the jumping application has the particular behavior when it is executed by the second host; and forwarding the jumping application to the second host.
-
-
25. A jumping application security system, comprising:
-
a security console computer system that control the security of a jumping application in the jumping application security system; one or more host computers connected to the security console computer system through a computer network, wherein each host computer executes a jumping application; and wherein the security console computer system further comprises a database that contains one or more pieces of code and a description of each piece of code and a security module that comprises instructions that replace code from the jumping application with a piece of code from the database when the jumping application is received at the security console during a jump between hosts and where the code is replaced each time the jumping application jumps between hosts.
-
Specification