Secure mobile app connection bus
First Claim
Patent Images
1. A method of secure communication between mobile applications, comprising:
- providing, from a first mobile application to a second mobile application, via a first communication mechanism on a mobile device, a first encryption information and an identifier associated with a data storage location on the mobile device, wherein the data storage location is not associated with the first communication mechanism, and wherein providing comprises providing information using a uniform resource locator (URL) scheme associated with the second mobile application;
retrieving by the first mobile application, from the data storage location, a second encryption information associated with the second mobile application, wherein the second mobile application is configured to provide the second encryption information to the data storage location at least in part in response to receiving the first encryption information and the identifier associated with the data storage location, and wherein the second mobile application is configured to generate and including in the second encryption information an application identifier associated with the second mobile application and an encrypted version of a first encryption key included by the first mobile application in the first encryption information;
validating an identity of the second mobile application based at least in part on the application identifier included in the second encryption information; and
transferring data securely between the first mobile application and the second mobile application via the data storage location by encrypting the data using a second encryption key included in the second encryption information.
4 Assignments
0 Petitions
Accused Products
Abstract
A secure mobile application connection bus is disclosed. First encryption information and an identifier associated with a data storage location on a mobile device are provided from a first application to a second application. Second encryption information associated with the second mobile application is retrieved from the data storage location. The second mobile application is configured to provide data to the data storage location. Data is transferred securely between the first mobile application and the second mobile application via the data storage location.
26 Citations
25 Claims
-
1. A method of secure communication between mobile applications, comprising:
-
providing, from a first mobile application to a second mobile application, via a first communication mechanism on a mobile device, a first encryption information and an identifier associated with a data storage location on the mobile device, wherein the data storage location is not associated with the first communication mechanism, and wherein providing comprises providing information using a uniform resource locator (URL) scheme associated with the second mobile application; retrieving by the first mobile application, from the data storage location, a second encryption information associated with the second mobile application, wherein the second mobile application is configured to provide the second encryption information to the data storage location at least in part in response to receiving the first encryption information and the identifier associated with the data storage location, and wherein the second mobile application is configured to generate and including in the second encryption information an application identifier associated with the second mobile application and an encrypted version of a first encryption key included by the first mobile application in the first encryption information; validating an identity of the second mobile application based at least in part on the application identifier included in the second encryption information; and transferring data securely between the first mobile application and the second mobile application via the data storage location by encrypting the data using a second encryption key included in the second encryption information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 24, 25)
-
-
22. A system for secure communication between mobile applications, comprising:
-
a processor; and a memory coupled with the processor, wherein the memory is configured to provide the processor with instructions which when executed cause the processor to; provide, from a first mobile application to a second mobile application, via a first communication mechanism on a mobile device, a first encryption information and an identifier associated with a data storage location on the mobile device, wherein the data storage location is not associated with the first communication mechanism, and wherein providing comprises providing information using a uniform resource locator (URL) scheme associated with the second mobile application; retrieve by the first mobile application, from the data storage location, a second encryption information associated with the second mobile application, wherein the second mobile application is configured to provide the second encryption information to the data storage location at least in part in response to receiving the first encryption information and the identifier associated with the data storage location, and wherein the second mobile application is configured to generate and including in the second encryption information an application identifier associated with the second mobile application and an encrypted version of a first encryption key included by the first mobile application in the first encryption information; validate an identity of the second mobile application based at least in part on the application identifier included in the second encryption information; and transfer data securely between the first mobile application and the second mobile application via the data storage location by encrypting the data using a second encryption key included in the second encryption information.
-
-
23. A computer program product for secure communication between mobile applications, the computer program product being embodied in a non-transitory tangible computer readable storage medium and comprising computer instructions for:
-
providing, from a first mobile application to a second mobile application, via a first communication mechanism on a mobile device, a first encryption information and an identifier associated with a data storage location on the mobile device, wherein the data storage location is not associated with the first communication mechanism, and wherein providing comprises providing information using a uniform resource locator (URL) scheme associated with the second mobile application; retrieving by the first mobile application, from the data storage location, a second encryption information associated with the second mobile application, wherein the second mobile application is configured to provide the second encryption information to the data storage location at least in part in response to receiving the first encryption information and the identifier associated with the data storage location, and wherein the second mobile application is configured to generate and including in the second encryption information an application identifier associated with the second mobile application and an encrypted version of a first encryption key included by the first mobile application in the first encryption information; validating an identity of the second mobile application based at least in part on the application identifier included in the second encryption information; and transferring data securely between the first mobile application and the second mobile application via the data storage location by encrypting the data using a second encryption key included in the second encryption information.
-
Specification