Mobile application peer-to-peer security system and method

Telecommunications – Radiotelephone system – Programming control

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C455S411000, C455S414200, C455S422100, C455S466000, C455S410000, C701S201000, C701S216000, C370S401000, C370S428000, C370S429000

Reexamination Certificate

active

07046995

ABSTRACT:
The mobile application security system and method in accordance with the invention increases the overall level of security in using a mobile application. In a preferred embodiment, the system may use a peer-to-peer architecture wherein each host of a mobile application is a node of the peer-to-peer network. In operation, when a mobile application jumps between hosts (nodes), information about the mobile application is generated and sent to a central security enforcement node so that the central security enforcement node may perform various security checks. The security checks ensure that the security of the mobile application is not compromised.

REFERENCES:
patent: 5633932 (1997-05-01), Davis et al.
patent: 5850516 (1998-12-01), Schneier
patent: 5850517 (1998-12-01), Verkler et al.
patent: 5963731 (1999-10-01), Sagawa et al.
patent: 5968176 (1999-10-01), Nessett et al.
patent: 5974549 (1999-10-01), Golan
patent: 6009456 (1999-12-01), Frew et al.
patent: 6065118 (2000-05-01), Bull et al.
patent: 6141754 (2000-10-01), Choy
patent: 6148327 (2000-11-01), Whitehead et al.
patent: 6173405 (2001-01-01), Nagel
patent: 6189103 (2001-02-01), Nevarez et al.
patent: 6192354 (2001-02-01), Bigus et al.
patent: 6233601 (2001-05-01), Walsh
patent: 6272528 (2001-08-01), Cullen et al.
patent: 6308181 (2001-10-01), Jarvis
patent: 6539416 (2003-03-01), Takewaki et al.
patent: 6615232 (2003-09-01), Suzuki et al.
patent: 6622157 (2003-09-01), Heddaya et al.
patent: 6931550 (2005-08-01), Rygaard
patent: 0942370 (1999-09-01), None
patent: EP0942370 (1999-09-01), None
Wayne Jansen et al. NIST Special Publication 800-19—Mobile Agent Security, Oct. 1, 1999.
Karygiannis, NIST Network Security Testing Using Mobile Agents, Mar. 1998.
Peter Mell et al., “A Denial of Service Resistant Intrusion Detection Architecture”, NIST, 2000.
Peter Mell et al., “Mobile Agent Attach Resistant Distributed Hierarchical Instrusion Detection” NIST, 1999.
Wayne Jansen et al., “Applying Mobile Agents to Intrusion Detection and Response” NIST Interim Report, Oct. 1999.
Intrusion Detection with Mobile Agents,Computer Communications Journal, Special Issue on Intrusion Detection, Jansen.
Determining Privileges of Mobile Agents,Proceedings of the Computer Security Applications Conference, Dec. 2001. Jansen.
Agents for the Masses: Is it Possible To Make Development of Sophisticated Agents Simple Enough To Be Practical?IEEE Intelligent Systems, Special Issue on Agents, May-Jun., 1999. Bradshaw et al.
Network Security Testing Using Mobile AgentsThird International Conference and Exhibition on the Practical Application of Intelligent Agents and multi-Agent Technology. London, UK Mar. 1998. Karygiannis.
A Framework For Multi-Mode Authentication: Overview and Implementation Guide.NISTIR 7046 Aug. 2003. Jansen et al.
Picture Password: A Visual Login Technique for Mobile Devices.NISTIR 7030, Jul. 2003. Jansen et al.
Security Policy Management for Handheld Devices.The Int'l. Conference on Security and Management (SAM'03), Jun. 2003. Jansen et al.
Authenticating Users on Handheld Devices,Proceedings of the Canadian Information Technology Security Symposium, May 2003. Jansen.
Policy Expression and Enforcement for Handheld Devices,NISTIR 6981, May 2003. Jansen et al.
Assigning and Enforcing Security Policies on Handheld Devices,Proceedings of the Canadian Information Technology Security Symposium, May 2002. Jansen et al.
PCT International Search Report dated Jan. 2, 2003 corresponding to PCT US02/21186.
Office Action dated Dec. 22, 2003 for U.S. Appl. No. 09/591,034, filed Jun. 9, 2000.
Office Action dated Dec. 31, 2003 for U.S. Appl. No. 09/758,941, filed Jan. 10, 2001.
Office Action dated Dec. 31, 2003 for U.S. Patent Application 09/645,028, filed Aug. 23, 2000.
W.A. Jansen, “A Privilege Management Scheme for Mobile Agent Systems” NIST May 2001.
Wayne Jansen, “Countermeasures for Mobile Agent Security”, NIST Nov. 2000.
Wayne Jansen et al., “Privilege Management of Mobile Agents”, NIST Oct. 2000.
W. Jansen, “Intrusion Detection with Mobile Agents” Computer Communications Journal, Special Issue On Intrusion Detection Oct. 2, 2001.
“Jumping Beans™ White Paper” Ad Astra Engineering, Incorporated Dec. 1998.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Mobile application peer-to-peer security system and method does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Mobile application peer-to-peer security system and method, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Mobile application peer-to-peer security system and method will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3589988

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.