Layered mobile application security system
First Claim
1. A method of communicating, comprising:
- protecting an integrity of a wireless network using a combination of at least two of(A) obfuscating software code of a mobile application for use in the wireless network;
(B) providing a mobile application with a plurality of code signatures for generating a corresponding plurality of unique values and periodically, randomly using one of the plurality of code signatures for a selected period of time;
(C) limiting a useful lifetime of a mobile application to a selected duration; and
(D) determining that a control value of a first mobile application corresponds to a control value of a second mobile application before allowing an interaction between the first and second mobile applications.
6 Assignments
0 Petitions
Accused Products
Abstract
A wireless communication network (20) including mobile applications (56-62) includes a security approach that uses a combination of at least two techniques (42, 50, 54, 72). One disclosed example includes a combination of all four techniques. The combined, layered approach greatly reduces the probability that an unauthorized individual will be able to masquerade as a valid application within the network so that network security is improved. Disclosed techniques include obfuscating software code of a mobile application, providing a mobile application with a plurality of code signatures for generating a corresponding plurality of unique control values, limiting the useful lifetime of a mobile application and determining that a control value of a mobile application corresponds to the control value of another application before the two applications are allowed to interact in a manner that could compromise either application or the network.
-
Citations
18 Claims
-
1. A method of communicating, comprising:
-
protecting an integrity of a wireless network using a combination of at least two of (A) obfuscating software code of a mobile application for use in the wireless network; (B) providing a mobile application with a plurality of code signatures for generating a corresponding plurality of unique values and periodically, randomly using one of the plurality of code signatures for a selected period of time; (C) limiting a useful lifetime of a mobile application to a selected duration; and (D) determining that a control value of a first mobile application corresponds to a control value of a second mobile application before allowing an interaction between the first and second mobile applications. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
Specification