Please download the dossier by clicking on the dossier button x
×

System for implementing security on telecommunications terminals

  • US 8,474,004 B2
  • Filed: 07/31/2006
  • Issued: 06/25/2013
  • Est. Priority Date: 07/31/2006
  • Status: Active Grant
First Claim
Patent Images

1. A system comprising:

  • at least one telecommunications terminal comprising data processing capabilities, the telecommunications terminal being susceptible of having installed thereon software applications, wherein a plurality of software applications are monitored, and wherein each of the plurality of monitored software applications has associated therewith a respective numerical value indicating a level of security of the corresponding software application, said numerical value indicating the level of security being susceptible of varying in time;

    a software agent executed by the at least one telecommunications terminal, said software agent capable of being adapted to conditionally allow the installation of software applications on the telecommunications terminal based on the respective level of security; and

    a server in communications relationship with the software agent, said server being adapted to dynamically calculate the numerical value indicating the level of security of each of the monitored software applications, and to communicate to the software agent, the calculated numerical value indicating the level of security of the monitored software applications to be installed on said telecommunications terminal,wherein said server comprises;

    a binary analyzer adapted to perform a static analysis of codes of the software applications; and

    a vulnerability analyzer adapted to perform an analysis of vulnerabilities exhibited by the software applications,wherein said vulnerability analyzer comprises an adaptation to perform said analysis of vulnerabilities based on information obtained from one or more among a computer emergency response team, an open vulnerability and assessment language, common vulnerabilities and exposures bulletins of the software applications producers/vendors, and software certification authorities.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×