Mobile application morphing system and method

Data processing: software development – installation – and managem – Software installation – Network

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C717S168000, C717S171000, C717S172000, C717S177000

Reexamination Certificate

active

07861242

ABSTRACT:
The morphing system and method alters the behavior and/or state of a jumping application according to the needs and/or requirements of the target host. In more detail, the jumping application system gathers information about the computer hosts to which jumping applications can be sent, and uses that information to alter the code (the computer instructions) or the state (the data) of each jumping application as each jumping application is dispatched.

REFERENCES:
patent: 5633932 (1997-05-01), Davis et al.
patent: 5850516 (1998-12-01), Schneier
patent: 5850517 (1998-12-01), Verkler et al.
patent: 5963731 (1999-10-01), Sagawa et al.
patent: 5968176 (1999-10-01), Nessett et al.
patent: 5974549 (1999-10-01), Golan
patent: 6009456 (1999-12-01), Frew et al.
patent: 6065118 (2000-05-01), Bull et al.
patent: 6141754 (2000-10-01), Choy
patent: 6148327 (2000-11-01), Whitebread et al.
patent: 6173405 (2001-01-01), Nagel
patent: 6189103 (2001-02-01), Nevarez et al.
patent: 6192354 (2001-02-01), Bigus et al.
patent: 6233601 (2001-05-01), Walsh
patent: 6272528 (2001-08-01), Cullen et al.
patent: 6308181 (2001-10-01), Jarvis
patent: 6539416 (2003-03-01), Takewaki et al.
patent: 6615232 (2003-09-01), Suzuki et al.
patent: 6622157 (2003-09-01), Heddaya et al.
patent: 7058699 (2006-06-01), Chiou et al.
patent: 2002/0147974 (2002-10-01), Wookey
patent: 2003/0187660 (2003-10-01), Gong
patent: 0942370 (1999-09-01), None
Zhou et al., “Adaptation and Specialization for High performance Mobile Agents,” USENIX, 1999.
Tahara et al., “Secure and efficient mobile agent application reuse using patterns,” ACM, vol. 26 , Issue 3, pp. 78-85, May 2001.
Ad Astra ,“Jumping Beans,” Ad Astra Engineering, Dec. 3, 1998, pp. 1-44.
Intrusion Detection with Mobile Agents, Computer Communications Journal, Special Issue on Intrusion Detection, Jansen.
Determining Privileges of Mobile Agents, Proceedings of the Computer Security Applications Conference, Dec. 2001. Jansen.
A Privilege Management Scheme for Mobile Agent Systems, First International Workshop on Security of Mobile Multiagent Systems, Autonomous Agents Conference, May 2001. Jansen.
A Denial of Service Resistant Intrusion Detection Architecture, Computer Networks, Special Issue on Intrusion Detection, Elsevier Science BV, Nov. 2000. Mell et al.
Countermeasures for Mobile Agent Security, Computer Communications, Special Issue on Advanced Security Techniques for Network Protection, Elsevier Science BV, Nov. 2000. Jansen.
Privilege Management of Mobile Agents, National Information System Security Conference, Oct. 2000. Jansen et al.
Mobile Agent Attack Resistant Distributed Hierarchical Intrusion Detection Systems, Second International t Workshop on Recent Advances in Intrusion Detection, Sep. 1999, Purdue University. Mell et al.
Applying Mobile Agents to Intrusion Detection and ResponseNISTIR 6416, Sep. 1999. Jansen et al.
Mobile Agent Security, NIST Special Publication 800-19, Aug. 1999. Jansen et al.
Agents for the Masses: Is it Possible To Make Development of Sophisticated Agents Simple Enough To Be Practical? IEEE Intelligent Systems, Special Issue on Agents, May-Jun. 1999. Bradshaw et al.
Network Security Testing Using Mobile AgentsThird International Conference and Exhibition on the Practical Application of Intelligent Agents and multi-Agent Technology. London, UK Mar. 1998. Karygiannis.
A Framework for Multi-Mode Authentication: Overview and Implementation Guide. NISTIR 7046 Aug. 2003. Jansen et al.
Picture Password: A Visual Login Technique for Mobile Devices. NISTIR 7030, Jul. 2003. Jansen et al.
Security Policy Management for Handheld Devices. The Int'l. Conference on Security and Management (SAM'03), Jun. 2003. Jansen et al.
Authenticating Users on Handheld Devices, Proceedings of the Canadian Information Technology Security Symposium, May 2003. Jansen.
Policy Expression and Enforcement for Handheld Devices, NISTIR 6981, May 2003. Jansen et al.
Assigning and Enforcing Security Policies on Handheld Devices, Proceedings of the Canadian Information Technology Security Symposium, May 2002. Jansen et al.
PCT International Search Report dated Jan. 2, 2003 corresponding to PCT US02/21186.
Office Action dated Dec. 18, 2003 for U.S. Appl. No. 09/764,548, filed Jan. 18, 2001.
Office Action dated Dec. 22, 2003 for U.S. Appl. No. 09/591,034, filed Jun. 9, 2000.
Office Action dated Dec. 31, 2003 for U.S. Appl. No. 09/758,941, filed Jan. 10, 2001.
Office Action dated Dec. 31, 2003 for U.S. Appl. No. 09/645,028, filed Aug. 23, 2000.
W.A. Jansen, “A Privilege Management Scheme for Mobile Agent Systems” NIST May 2001.
Wayne Jansen, “Countermeasures for Mobile Agent Security”, NIST Nov. 2000.
Wayne Jansen et al., “Privilege Management of Mobile Agents”, NIST Oct. 2000.
W. Jansen, “Intrusion Detection with Mobile Agents” Computer Communications Journal, Special Issue on Intrusion Detection Oct. 2, 2001.
“Jumping Beans™ White Paper” Ad Astra Engineering, Incorporated Dec. 1998.
Jansen et al., “Mobile Agent Security”, NIST Special Publication 800-19: pp. 1-38, Aug. 1999.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Mobile application morphing system and method does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Mobile application morphing system and method, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Mobile application morphing system and method will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4161267

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.