Patent application number | Description | Published |
20130091543 | SYSTEM AND METHOD FOR CREATING SECURE APPLICATIONS - A method for generating a secure application is described herein. The method can include the steps of obtaining a target application and decomposing the target application into original files that contain predictable instructions. One or more predictable instructions in the original files may be identified. In addition, the target application may be modified to create the secure application by binding one or more intercepts to the target application. These intercepts can enable the modification of the predictable instructions in accordance with one or more policies such that the behavior of the secure application is different from the original behavior of the target application. Modification of the target application may be conducted without access to the source code of the target application. | 04-11-2013 |
20140096230 | METHOD AND SYSTEM FOR SHARING VPN CONNECTIONS BETWEEN APPLICATIONS - A method for sharing a virtual private network (VPN) connection among applications is described herein. In an environment in which multiple applications exchange data through the use of the virtual file system, a VPN for a first application can be established, and it can be determined that the first application is deactivated. Upon the determination that the first application is deactivated, a state of the VPN can be saved in a shared memory through the virtual file system. It may also be determined that a second application is activated. A VPN connection can be established for the second application by resuming the saved VPN state through the virtual file system. | 04-03-2014 |
20140281499 | METHOD AND SYSTEM FOR ENABLING COMMUNICATIONS BETWEEN UNRELATED APPLICATIONS - A method and system of enabling communications among unrelated applications is described herein. The method includes the step of identifying a paste memory element in an environment of a computing device that restricts communications among unrelated applications. The method also includes the step of imposing a file system on the identified paste memory element. The file system is compatible with the unrelated applications such that a first unrelated application is capable of storing data in the paste memory element using the imposed file system and a second unrelated application is capable of accessing the stored data using the imposed file system. As an example, the first and second unrelated applications may be secure applications. In addition, the method can also include the steps of encrypting the data stored in the paste memory element that is associated with the first unrelated application and decrypting this data on behalf of the second unrelated application. | 09-18-2014 |
20140282876 | METHOD AND SYSTEM FOR RESTRICTING THE OPERATION OF APPLICATIONS TO AUTHORIZED DOMAINS - A method and system of restricting the operation of applications to authorized domains is described herein. The method can include the steps of receiving reference domain restriction data associated with an application and receiving generated domain restriction data associated with the application. A domain restriction check can be performed by comparing the generated domain restriction data with the reference domain restriction data, In addition, a domain restriction approval signal can be generated if the domain restriction check is satisfied. The domain restriction check can ensure that the application will not operate in unauthorized domains. | 09-18-2014 |
20140317679 | SYSTEM AND METHOD FOR CREATING SECURE APPLICATIONS - A method for generating a secure application is described herein. The method can include the steps of obtaining a target application and decomposing the target application into original files that contain predictable instructions. One or more predictable instructions in the original files may be identified. In addition, the target application may be modified to create the secure application by binding one or more intercepts to the target application. These intercepts can enable the modification of the predictable instructions in accordance with one or more policies such that the behavior of the secure application is different from the original behavior of the target application. Modification of the target application may be conducted without access to the source code of the target application. | 10-23-2014 |
20140317704 | METHOD AND SYSTEM FOR ENABLING THE FEDERATION OF UNRELATED APPLICATIONS - A method of enabling the federation of unrelated applications is described herein. The method can include the step of installing a candidate application for inclusion in a secure workspace. A first previously-installed application may have a certificate signed by a first entity, and a second previously-installed application may have a certificate signed by a second entity such that the first and second previously-installed applications have different certificates. The method can also include the steps of generating a federation value for the candidate application for inclusion in the secure workspace and determining the result of a federation check of the candidate application based on the generated federation value. If the federation check for the candidate application is satisfied, the candidate application may be permitted to be part of the secure workspace. | 10-23-2014 |
20150113502 | METHOD AND SYSTEM FOR ENCAPSULATION OF APPLICATION - A system and method for encapsulating a target application are described herein. In particular, an analysis of the target application can be performed to determine one or more characteristics of the target application. Based on the analysis of the target application, a blueprint of the target application can be generated. Based on the blueprint, an encapsulation application can be constructed for the target application. In addition, the target application can be encapsulated with the encapsulation application to create an encapsulated target application to enable adaptive loading of the target application. | 04-23-2015 |
20150113506 | METHOD AND SYSTEM FOR ADAPTIVE LOADING OF APPLICATION - A system and method of adaptively loading a target application is described herein. The method can include the steps of loading an encapsulation application into memory in which the encapsulation application encapsulates the target application and allocating memory for the encapsulated target application. The method can also include the steps of remapping the encapsulated target application into the allocated memory such that the target application is loaded in the memory and configuring the target application to enable calls of the target application to be intercepted by the encapsulation application. | 04-23-2015 |