×

Transport-level web application security on a resource-constrained device

  • US 8,245,285 B1
  • Filed: 09/22/2006
  • Issued: 08/14/2012
  • Est. Priority Date: 09/22/2006
  • Status: Active Grant
First Claim
Patent Images

1. A method, implemented in a resource-constrained device, comprising:

  • providing, at the resource-constrained device, an application container which includes a plurality of server applications executing therein, wherein each server applicationexecutes within its own application context,is capable of conducting transactions with client applications executing on a remote device, andincludes within its application context one or more security tokens specific to that server application, for use by the client applications with that server application;

    providing one or more application firewalls, which restrict the application context and the security tokens specific to each server application from use by others of the server applications;

    providing a physical interconnect layer which is configured to allow the client applications to make requests to the server applications within the application container;

    during deployment of each server application to the resource-constrained device,dynamically allocating a secure port and a virtual host associated with that server application, which receives requests directed to that server application, andadding an application-context root uniform resource identifier and an identifier for the newly allocated port to a redirection map;

    providing a secure port redirector within the application container and coupled to a default port which receives the requests via the physical interconnect layer, wherein the secure port redirectorlistens on the default port for an incoming request directed to a particular server application,determines, using the redirection map, the secure port associated with the virtual host for that particular server application, andrebuilds the incoming request to form a rebuilt request that includes an identifier for the secure port associated with the virtual host for that particular server application;

    receiving, at a security layer which executes within the application contexts of the server applications, a rebuilt request, from the client application executing on the client device, directed to the particular server application; and

    using the security tokens that are specific to the particular server application toauthenticate the client application that initially sent the request, andestablish an application-specific secure connection between the client application and the server application for conducting a transaction.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×