System for implementing security on telecommunications terminals
First Claim
1. A system comprising:
- at least one telecommunications terminal comprising data processing capabilities, the telecommunications terminal being susceptible of having installed thereon software applications, wherein a plurality of software applications are monitored, and wherein each of the plurality of monitored software applications has associated therewith a respective numerical value indicating a level of security of the corresponding software application, said numerical value indicating the level of security being susceptible of varying in time;
a software agent executed by the at least one telecommunications terminal, said software agent capable of being adapted to conditionally allow the installation of software applications on the telecommunications terminal based on the respective level of security; and
a server in communications relationship with the software agent, said server being adapted to dynamically calculate the numerical value indicating the level of security of each of the monitored software applications, and to communicate to the software agent, the calculated numerical value indicating the level of security of the monitored software applications to be installed on said telecommunications terminal,wherein said server comprises;
a binary analyzer adapted to perform a static analysis of codes of the software applications; and
a vulnerability analyzer adapted to perform an analysis of vulnerabilities exhibited by the software applications,wherein said vulnerability analyzer comprises an adaptation to perform said analysis of vulnerabilities based on information obtained from one or more among a computer emergency response team, an open vulnerability and assessment language, common vulnerabilities and exposures bulletins of the software applications producers/vendors, and software certification authorities.
1 Assignment
0 Petitions
Accused Products
Abstract
A system includes at least one telecommunications terminal having data processing capabilities, the telecommunications terminal being susceptible of having installed thereon software applications, wherein each software application has associated therewith a respective indicator adapted to indicate a level of security of the software application, the level of security being susceptible of varying in time; a software agent executed by the at least one telecommunications terminal, the software agent being adapted to conditionally allow the installation of software applications on the telecommunications terminal based on the respective level of security; a server in communications relationship with the software agent, the server being adapted to dynamically calculate the level of security of the software applications, and to communicate to the software agent the calculated level of security of the software applications to be installed on the telecommunications terminal.
-
Citations
21 Claims
-
1. A system comprising:
-
at least one telecommunications terminal comprising data processing capabilities, the telecommunications terminal being susceptible of having installed thereon software applications, wherein a plurality of software applications are monitored, and wherein each of the plurality of monitored software applications has associated therewith a respective numerical value indicating a level of security of the corresponding software application, said numerical value indicating the level of security being susceptible of varying in time; a software agent executed by the at least one telecommunications terminal, said software agent capable of being adapted to conditionally allow the installation of software applications on the telecommunications terminal based on the respective level of security; and a server in communications relationship with the software agent, said server being adapted to dynamically calculate the numerical value indicating the level of security of each of the monitored software applications, and to communicate to the software agent, the calculated numerical value indicating the level of security of the monitored software applications to be installed on said telecommunications terminal, wherein said server comprises; a binary analyzer adapted to perform a static analysis of codes of the software applications; and a vulnerability analyzer adapted to perform an analysis of vulnerabilities exhibited by the software applications, wherein said vulnerability analyzer comprises an adaptation to perform said analysis of vulnerabilities based on information obtained from one or more among a computer emergency response team, an open vulnerability and assessment language, common vulnerabilities and exposures bulletins of the software applications producers/vendors, and software certification authorities. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A telecommunications terminal having data processing capabilities, the telecommunications terminal being susceptible of having installed thereon software applications or executing software applications installed thereon, wherein a plurality of software applications are monitored, and wherein each of the plurality of software applications has associated therewith a respective numerical value indicating a level of security of the corresponding software application, comprising:
-
a software agent, adapted to be executed by the telecommunications terminal, said software agent comprising an adaptation to at least one among; conditionally allow the installation of software applications on the telecommunications terminal; and conditionally allow the software applications, when executed on the telecommunications terminal, to access telecommunications terminal resources based on the respective level of security, and to receive from a server updated numerical values indicating levels of security calculated by the server, wherein said server comprises; a binary analyzer adapted to perform a static analysis of codes of the software applications; and a vulnerability analyzer adapted to perform an analysis of vulnerabilities exhibited by the software applications, wherein said vulnerability analyzer comprises an adaptation to perform said analysis of vulnerabilities based on information obtained from one or more among a computer emergency response team, an open vulnerability and assessment language, common vulnerabilities and exposures bulletins of the software applications producers/vendors, and software certification authorities. - View Dependent Claims (18, 19, 20)
-
-
21. A server including at least one hardware component, comprising:
-
a communication interface to communicate with at least one telecommunications terminal having data processing capabilities, wherein the telecommunications terminal is capable of having installed or run thereon software applications, wherein a plurality of software applications are monitored, and wherein each of the plurality of monitored software applications has associated therewith a respective numerical value indicating a level of security of the corresponding software application, said numerical value indicating the level of security being capable of varying in time, said server comprising; a security level evaluator to dynamically calculate the numerical value indicating the level of security of each of the plurality of monitored software applications, and to communicate to a software agent the calculated numerical value indicating the level of security of each of the plurality of monitored software applications to be installed or run on said telecommunications terminal, a binary analyzer adapted to perform a static analysis of codes of the software applications; and a vulnerability analyzer adapted to perform an analysis of vulnerabilities exhibited by the software applications, wherein said vulnerability analyzer comprises an adaptation to perform said analysis of vulnerabilities based on information obtained from one or more among a computer emergency response team, an open vulnerability and assessment language, and common vulnerabilities and exposures bulletins of the software applications producers/vendors, and software certification authorities.
-
Specification