IBM Invention Protects Mobile Devices

IBM has patented an invention that prevents mobile devices from running compromised code.

Big Blue officials said inventors in IBM Research have patented a technique that can enable businesses to improve cloud security and support secure transactions by preventing mobile devices from accessing software code that has been maliciously or inadvertently modified after it was encrypted.

BYOD security

With the proliferation of bring your own device (BYOD) environments among enterprises, this invention could prove useful for businesses hoping to keep sensitive information secure. Moreover, with the rise of the mobile workforce, many businesses have employees using mobile devices while working at remote, off-site locations.

IBM said these scenarios introduce new security vulnerabilities to corporate networks because employees can unknowingly download and attempt to run cloud apps that have been sabotaged. IBM’s patented invention helps businesses increase their confidence associated with implementing BYOD policies while averting nefarious code before it has a chance to cause any problems.

IBM received US Patent #8,341,747, “Method to provide a secure virtual machine launcher”, for the invention. IBM’s invention provides security controls that restrict and prevent access to apps unless their original, previously encrypted code remains unchanged and uncompromised.

“This patented invention will help organisations confidently and securely embrace the advantages of a mobile workforce while remaining protected against malicious content or intent,” said Andrew Cornwall, an inventor and mobile software developer at IBM, in a statement. “Our technique helps businesses prevent altered apps from running and unleashing their wrath on businesses, their networks and their customers.”

Secure virtual machine launcher

Known as a secure virtual machine launcher, the way IBM’s invention works is if an app is modified after it has been encrypted – without being properly decrypted and re-encrypted – IBM’s patented security mechanism will recognise that the code was altered and prevent it from running. IBM said this approach is differentiated by detecting if an app has been modified before being executed, versus after, and provides businesses with additional control over which apps can be accessed.

According to a recent IBM Institute for Business Value survey, mobile leaders are making key investments in BYOD strategies, recognising it requires a new approach to IT support and customer service. The study showed that leaders understand the importance of making mobile capabilities secure with 79 percent reporting that their organisations have well-documented policies in place for employees using mobile devices – versus 48 percent of non-leaders.

IBM’s secure virtual machine (VM) launcher invention can address the complexity of deploying and improving the security of business-critical cloud-based apps. A VM is a computer application used to create a virtual environment that mirrors physical operation systems, applications and programs. While VMs are frequently used for enterprise tasks, such as remote backup and disaster recovery, they also are increasingly embedded in consumer devices such as mobile phones, tablets and portable game consoles to ease software updates and management.

Encryption

IBM’s invention can be applied to encrypted files that are sent from the cloud or a corporate server to a VM. The objective is to prevent embedded devices from executing code that has been altered – either maliciously or inadvertently.

With billions of embedded VM devices currently in use – from an estimated three billion mobile phones to 125 million smart televisions – and millions of additional applications projected in the future, IBM’s secure VM launcher patent has the potential to deliver improved security to a wide range of devices and applications, the company said.

Along with the IBM MobileFirst portfolio of solutions, this patented invention can help ensure that users have access to the apps they need without risk to the corporate network.

IBM invests more than $6 billion (£4bn) annually in R&D and has topped the list of US patent recipients for 20 consecutive years.

Do you know all about biometric technology? Take our quiz.

Originally published on eWeek.

Darryl K. Taft

Darryl K. Taft covers IBM, big data and a number of other topics for TechWeekEurope and eWeek

View Comments

  • BYOD will continue growing as mobile devices continue to play a greater role in our lives. That's why so many IT players are offering solutions to address such BYOD challenges as security and device management.

    Does BYOD come with headaches? Of course it does. However, security issues and IT management headaches (how do I support all those devices?) can be addressed by using new HTML5 technologies that enable users to connect to applications and systems without requiring IT staff to install anything on user devices. For example, Ericom AccessNow is an HTML5 RDP client that enables remote users to securely connect from iPads, iPhones and Android devices to any RDP host, including Terminal Server and VDI virtual desktops, and run their applications and desktops in a browser. This enhances security by keeping applications and data separate from personal devices.

    Since AccessNow doesn't require any software installation on the end user device – just an HTML5 browser, network connection, URL address and login details - IT staff end up with less support hassles. A user that brings in their own device merely opens their HTML5-compatible browser and connects to the URL given them by the IT admin.

    Visit http://www.ericom.com/BYOD_Workplace.asp?URL_ID=708 for more info.

    Please note that I work for Ericom

Recent Posts

Craig Wright Sentenced For Contempt Of Court

Suspended prison sentence for Craig Wright for “flagrant breach” of court order, after his false…

2 days ago

El Salvador To Sell Or Discontinue Bitcoin Wallet, After IMF Deal

Cash-strapped south American country agrees to sell or discontinue its national Bitcoin wallet after signing…

2 days ago

UK’s ICO Labels Google ‘Irresponsible’ For Tracking Change

Google's change will allow advertisers to track customers' digital “fingerprints”, but UK data protection watchdog…

2 days ago

EU Publishes iOS Interoperability Plans

European Commission publishes preliminary instructions to Apple on how to open up iOS to rivals,…

3 days ago

Momeni Convicted In Bob Lee Murder

San Francisco jury finds Nima Momeni guilty of second-degree murder of Cash App founder Bob…

3 days ago