Secure mobile app connection bus
First Claim
Patent Images
1. A method of secure communication between mobile applications, comprising:
- providing, from a first mobile application on a mobile device to a second mobile application on the mobile device, a first encryption information and an identifier associated with a data storage location on the mobile device, wherein a library associated with the second mobile application validates an identifier associated with the first mobile application and wherein the data storage location comprises a shared keychain location;
retrieving, from the data storage location, a second encryption information associated with the second mobile application, wherein the second mobile application is configured to provide the second encryption information to the data storage location at least in part in response to receiving the first encryption information, the identifier associated with the data storage location, and the first mobile application being validated, and wherein the second mobile application is configured to generate and include in the second encryption information an application identifier associated with the second mobile application;
validating an identity of the second mobile application based at least in part on the application identifier included in the second encryption information; and
transferring data securely between the first mobile application and the second mobile application via the data storage location, including by encrypting the data using a second encryption key included in the second encryption information.
3 Assignments
0 Petitions
Accused Products
Abstract
A secure mobile application connection bus is disclosed. First encryption information and an identifier associated with a data storage location on a mobile device are provided from a first application to a second application. Second encryption information associated with the second mobile application is retrieved from the data storage location. The second mobile application is configured to provide data to the data storage location. Data is transferred securely between the first mobile application and the second mobile application via the data storage location.
23 Citations
20 Claims
-
1. A method of secure communication between mobile applications, comprising:
-
providing, from a first mobile application on a mobile device to a second mobile application on the mobile device, a first encryption information and an identifier associated with a data storage location on the mobile device, wherein a library associated with the second mobile application validates an identifier associated with the first mobile application and wherein the data storage location comprises a shared keychain location; retrieving, from the data storage location, a second encryption information associated with the second mobile application, wherein the second mobile application is configured to provide the second encryption information to the data storage location at least in part in response to receiving the first encryption information, the identifier associated with the data storage location, and the first mobile application being validated, and wherein the second mobile application is configured to generate and include in the second encryption information an application identifier associated with the second mobile application; validating an identity of the second mobile application based at least in part on the application identifier included in the second encryption information; and
transferring data securely between the first mobile application and the second mobile application via the data storage location, including by encrypting the data using a second encryption key included in the second encryption information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 19, 20)
-
-
10. A mobile device, comprising:
-
a storage device; and a processor coupled to the storage device and configured to; provide, from a first mobile application on a mobile device to a second mobile application on the mobile device, a first encryption information and an identifier associated with a data storage location on the storage device, wherein a library associated with the second mobile application validates an identifier associated with the first mobile application and wherein the data storage location comprises a paste board; retrieve, from the data storage location, a second encryption information associated with the second mobile application, wherein the second mobile application is configured to provide the second encryption information to the data storage location at least in part in response to receiving the first encryption information, the identifier associated with the data storage location, and the first mobile application being validated, and wherein the second mobile application is configured to generate and include in the second encryption information an application identifier associated with the second mobile application; validate an identity of the second mobile application based at least in part on the application identifier included in the second encryption information; and transfer data securely between the first mobile application and the second mobile application via the data storage location, including by encrypting the data using a second encryption key included in the second encryption information. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A computer program product to provide secure communication between mobile applications, the computer program product being embodied in a non-transitory computer readable medium and comprising computer instructions for:
- providing, from a first mobile application on a mobile device to a second mobile application on the mobile device, a first encryption information and an identifier associated with a data storage location on the mobile device, wherein a library associated with the second mobile application validates an identifier associated with the first mobile application and wherein the data storage location comprises a paste board;
retrieving, from the data storage location, a second encryption information associated with the second mobile application, wherein the second mobile application is configured to provide the second encryption information to the data storage location at least in part in response to receiving the first encryption information, the identifier associated with the data storage location, and the first mobile application being validated, and wherein the second mobile application is configured to generate and include in the second encryption information an application identifier associated with the second mobile application; validating an identity of the second mobile application based at least in part on the application identifier included in the second encryption information; and
transferring data securely between the first mobile application and the second mobile application via the data storage location, including by encrypting the data using a second encryption key included in the second encryption information.
- providing, from a first mobile application on a mobile device to a second mobile application on the mobile device, a first encryption information and an identifier associated with a data storage location on the mobile device, wherein a library associated with the second mobile application validates an identifier associated with the first mobile application and wherein the data storage location comprises a paste board;
Specification