Method and system for protecting data flow at a mobile device
First Claim
1. A data flow policy evaluation system for a mobile computing device embodied as executable instructions in one or more non-transitory machine-accessible storage media, comprising:
- one or more hardware processors coupled to the media and executable by the one or more hardware processors;
a system call monitor to monitor system calls made by a plurality of security-wrapped software applications during execution of the security-wrapped software applications at the mobile computing device; and
a data flow policy engine to generate policy decisions to enable the security-wrapped software applications to prevent the execution of system calls that would violate a data flow policy, wherein the data flow policy defines security labels, associates data flow policies with the security labels, and associates data objects with the security labels, and the data flow policy engine is configured to;
associate an executing process of a security-wrapped software application with a security label in response to the process accessing a data object having the security label; and
associate another executing process with the security label in response to wherein the other executing process is in communication with the executing process;
wherein the data flow policy engine further defines each security label as either public or private;
wherein the system permits the executing instance of the security-wrapped software application to write data associated with a public security label only when;
the security-wrapped software application has not read data associated with a private security label; and
the security-wrapped software application has not written data associated with the private security label.
0 Assignments
0 Petitions
Accused Products
Abstract
A method and system for evaluating and enforcing a data flow policy at a mobile computing device includes a data flow policy engine to evaluate data access requests made by security-wrapped software applications running on the mobile device and prevent the security-wrapped software applications from violating the data flow policy. The data flow policy defines a number of security labels that are associated with data objects. A software application process may be associated with a security label if the process accesses data having the security label or the process is in communication with another process that has accessed data having the security label.
-
Citations
15 Claims
-
1. A data flow policy evaluation system for a mobile computing device embodied as executable instructions in one or more non-transitory machine-accessible storage media, comprising:
-
one or more hardware processors coupled to the media and executable by the one or more hardware processors; a system call monitor to monitor system calls made by a plurality of security-wrapped software applications during execution of the security-wrapped software applications at the mobile computing device; and a data flow policy engine to generate policy decisions to enable the security-wrapped software applications to prevent the execution of system calls that would violate a data flow policy, wherein the data flow policy defines security labels, associates data flow policies with the security labels, and associates data objects with the security labels, and the data flow policy engine is configured to; associate an executing process of a security-wrapped software application with a security label in response to the process accessing a data object having the security label; and associate another executing process with the security label in response to wherein the other executing process is in communication with the executing process; wherein the data flow policy engine further defines each security label as either public or private; wherein the system permits the executing instance of the security-wrapped software application to write data associated with a public security label only when; the security-wrapped software application has not read data associated with a private security label; and the security-wrapped software application has not written data associated with the private security label. - View Dependent Claims (2, 3, 4)
-
-
5. A system for evaluating data access requests at a mobile computing device, embodied as executable instructions in one or more non-transitory machine-accessible storage media, comprising:
-
one or more hardware processors coupled to the media and executable by the one or more hardware processors; a system call monitor to monitor system calls relating to data accesses made by an instance of a security-wrapped software application executing on the mobile computing device; and a data flow policy engine to; associate data access tracking data with the instance of the security-wrapped software application, wherein the data access tracking data relates to data objects accessed by the instance and security labels associated with the data objects, and the security labels indicate conflicts of interest between or among the data objects; and generate data flow policy decisions based on the data access tracking data, wherein the policy decisions are based on and in response to one or more current and one or more previous data accesses made by the instance; wherein the data flow policy engine further defines each security label as either public or private; wherein the system permits the executing instance of the security-wrapped software application to write data associated with a public security label only when; the security-wrapped software application has not read data associated with a private security label; and the security-wrapped software application has not written data associated with the private security label. - View Dependent Claims (6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A system for enforcing a data flow policy at a mobile computing device, embodied as executable instructions in one or more non-transitory machine-accessible storage media, the system comprising:
-
one or more hardware processors coupled to the media and executable by the one or more hardware processors; a system call monitor to monitor system calls made by an instance of a security-wrapped software application executing on the mobile computing device; a data flow policy engine to; analyze the system calls using a data flow policy, wherein the data flow policy associates security labels with data objects and the security labels indicate conflicts of interest between or among data objects, associate a data object with a security label in response to the data object is produced by a data source having the security label or in response to the data object is created by a software application process having the security label, and associate the instance with the security label in response to the instance accessing the data object and the data object is associated with the security label; a data flow policy enforcer to prevent the instance from executing a system call that violates the data flow policy; and wherein the data flow policy engine further defines each security label as either public or private; wherein the system permits the executing instance of the security-wrapped software application to write data associated with a public security label only when; the security-wrapped software application has not read data associated with a private security label; and the security-wrapped software application has not written data associated with the private security label. - View Dependent Claims (15)
-
Specification