Lookout, Inc. Patent applications |
Patent application number | Title | Published |
20160066189 | METHODS AND SYSTEMS FOR ADDRESSING MOBILE COMMUNICATIONS DEVICES THAT ARE LOST OR STOLEN BUT NOT YET REPORTED AS SUCH - A method is provided for evaluating the usage of a mobile communications device that itself provides access to a resource. In the method, a detected usage of the mobile communications device is compared to a stored usage pattern of an authorized user. When a measure associated with the difference between the detected usage and the stored usage pattern exceeds a threshold, it is concluded that the mobile communications device is being used by an unauthorized user. In response to this conclusion, a restriction is placed on an ability of the mobile communications device to access the resource. | 03-03-2016 |
20150163121 | DISTRIBUTED MONITORING, EVALUATION, AND RESPONSE FOR MULTIPLE DEVICES - Data is collected from a set of devices. The data is associated with the devices, mobile application programs (apps), web applications, users, or combinations of these. A norm is established using the collected data. The norm is compared with data collected from a particular device. If there is a deviation outside of a threshold deviation between the norm and the data collected from the particular device, a response is initiated. | 06-11-2015 |
20150128205 | METHODS AND SYSTEMS FOR SECURE NETWORK CONNECTIONS - Context information associated with a mobile communications device and a network connection for the mobile communications device is collected. A security policy is applied to determine whether the security offered by the network connection is appropriate for the context. If the security offered by the network connection is not appropriate for the context, the network connection may be made more secure, less secure, or a different network connection having an appropriate level of security may be used for the data associated with the context. | 05-07-2015 |
20150118992 | SYSTEM AND METHOD FOR CREATING AND ASSIGNING A POLICY FOR A MOBILE COMMUNICATIONS DEVICE BASED ON PERSONAL DATA - A system and method to create and assign a policy for a mobile communications device are disclosed. The policy may be created based on personal data associated with the mobile communications device. For example, known sources of personal data on the mobile communications device may be identified and a policy may be created based on the known personal data. The policy may then be used to identify additional personal data associated with the mobile communications device. Thus, the personal data associated with the mobile communications device may be monitored. If an application attempts to access the monitored personal data, the access will be detected. | 04-30-2015 |
20140325586 | METHOD AND SYSTEM FOR EVALUATING SECURITY FOR AN INTERACTIVE SERVICE OPERATION BY A MOBILE DEVICE - A method for evaluating security during an interactive service operation by a mobile communications device includes launching, by a mobile communications device, an interactive service configured to access a server over a network during an interactive service operation, and generating a security evaluation based on a plurality of trust factors related to a current state of the mobile communications device, to a security feature of the application, and/or to a security feature of the network. When the security evaluation is generated, an action is performed based on the security evaluation. | 10-30-2014 |
20140310770 | SYSTEM AND METHOD FOR CREATING AND APPLYING CATEGORIZATION-BASED POLICY TO SECURE A MOBILE COMMUNICATIONS DEVICE FROM ACCESS TO CERTAIN DATA OBJECTS - A server creates categorization-based application policies and selects a specific policy to send to a mobile communications device. In one embodiment, the mobile communication device applies the categorization-based application policy received from the server to information about a data object (e.g., application) that the device wants to access (or has accessed). Based on the application of the categorization-based policy, the device may be permitted to access the data object or the device may not be permitted to access the data object. | 10-16-2014 |
20140304165 | MOBILE COMMUNICATIONS DEVICE PAYMENT METHOD UTILIZING LOCATION INFORMATION - A method includes receiving, by a payment server, a request for a payment from a mobile communication device; and, generating, a request to verify the location of the mobile communication device. In response to receiving the location of the mobile communication device, determining whether or not to authorize the requested payment. | 10-09-2014 |
20140282877 | SYSTEM AND METHOD FOR CHANGING SECURITY BEHAVIOR OF A DEVICE BASED ON PROXIMITY TO ANOTHER DEVICE - The security and convenience of a mobile communication device is enhanced based on a separate key device. If the key device is near the mobile communication device, the mobile communication device may be automatically unlocked without the user having to input an unlock code. The mobile communication device may be automatically unlocked into a first mode having a first level of functionality. If the user inputs a correct unlock code, the mobile communication device may be unlocked into a second mode having a second level of functionality, greater than the first level of functionality. | 09-18-2014 |
20140279111 | SYSTEM AND METHOD FOR AUTHORIZING A MOBILE PAYMENT TRANSACTION - A method for authorizing a mobile payment transaction is provided. The method includes receiving, by a server, a request to authorize a payment transaction which originates from a mobile payment point of sale (POS) module. In an embodiment, the request includes payment information of the payment transaction and location information of the POS module. When the request is received, an authorizing client device for the payment transaction is identified based on the payment information and a disposition of the request to authorize the payment transaction is determined based on whether the authorizing client device is located within a predetermined proximity to the POS module. | 09-18-2014 |
20140201844 | DETECTION OF AND PRIVACY PRESERVING RESPONSE TO OBSERVATION OF DISPLAY SCREEN - The security and privacy of a user is enhanced by monitoring the background environment in which the user is working for changes. In an embodiment, a first or reference image is acquired using a front-facing camera of the user's computing device. A second or target image is acquired using the front-facing camera. The images are compared and an alert is generated if there is a change in background that exceeds a threshold. The change may be a person who has entered the environment and is watching the computing device screen. The alert may include reducing the visibility of information shown on the screen. | 07-17-2014 |
20140201681 | METHOD AND SYSTEM FOR MANAGING AND DISPLAYING ACTIVITY ICONS ON A MOBILE DEVICE - Embodiments are directed to managing applications and displaying icons on a mobile device through processes that monitor usage of the applications by a user, alter a display of an application icon based on the usage of the application and a context of the mobile device, and suggest substitute or additional applications for installation based on the usage of the application. The context may comprise a location of the device, a time and/or frequency of usage of an application, and an activity associated with the usage of the application. The icon may be minimized or eliminated from display if the usage falls below a defined threshold for a context, or it may be maximized if the usage exceeds the defined threshold for the context. | 07-17-2014 |
20140201655 | METHOD AND SYSTEM FOR MANAGING AND DISPLAYING ACTIVITY ICONS ON A MOBILE DEVICE - Embodiments are directed to adapting the display of icons on a mobile device using geographical location, temporal context, and frequency of use of an application. Different display screens are provided depending on the context. The visual appearance of an icon is adjusted by changing icon location, size, border, shape, color, or opacity. | 07-17-2014 |
20140196158 | METHOD AND SYSTEM FOR PROTECTING PRIVACY AND ENHANCING SECURITY ON AN ELECTRONIC DEVICE - A method for protecting privacy and enhancing security on an electronic device is provided. When sensor information associated with at least one user input action is collected by a sensor in an electronic device hosting a plurality of applications, the method includes intercepting a request to access the sensor information from a requesting application of the plurality of applications, and controlling access to the sensor information associated with the at least one user input action based on the requesting application. By controlling access to the sensor information, leakage of sensitive or secure information to a malicious background application is minimized and privacy and security are enhanced. | 07-10-2014 |
20140195604 | CLIENT ACTIVITY DNS OPTIMIZATION - Client and user activity in an application or a browser are monitored to determine whether potential actions will result in a server being contacted. A DNS request to resolve the server's host name is generated to ensure the server's IP address is cached and available. | 07-10-2014 |
20140189808 | MULTI-FACTOR AUTHENTICATION AND COMPREHENSIVE LOGIN SYSTEM FOR CLIENT-SERVER NETWORKS - Embodiments are directed to a system and method for authenticating a user of a client computer making a request to a server computer providing access to a network resource through an authentication platform that issues a challenge in response to the request requiring authentication of the user identity through a reply from the client computer, determining one or more items of context information related to at least one of the user, the request, and the client computer, and determining a disposition of the request based on the reply and the one or more items of context information. The reply includes a user password and may be provided by an authorizing client device coupled to the client computer over a wireless communications link. | 07-03-2014 |
20140188886 | USER CLASSIFICATION BASED ON DATA GATHERED FROM A COMPUTING DEVICE - Data regarding user actions on a user device is gathered from the user device (and/or from another computing device) by a server. The data is analyzed to make a decision. The decision is sent by the server to the user device (e.g., directly or via another computing device) and then used by the user device to implement a new action on the user device. This process may be automatically repeated in order to provide real-time customization of the user device. | 07-03-2014 |
20140187202 | METHOD AND APPARATUS FOR AUXILIARY COMMUNICATIONS WITH MOBILE COMMUNICATIONS DEVICE - A method and apparatus for auxiliary communications capability in a mobile communications device. The mobile communications device is configured with a hidden ROM that configures a security component to work separate and apart from the OS. A secondary transceiver is configured with the security component to send and receive security transmissions, also separate and apart from the OS and the primary transceiver of the OS. Logic to detect specified trigger events is hard-coded into the hidden ROM, and detection of such an event places the mobile communications device into a special security mode. While in the special security mode, the secondary transceiver can send and receive security messages, including the location of the mobile communications device. Further, depending upon the received messages or commands, the security component can take pre-programmed security actions, such as erasing or faking data in the device. | 07-03-2014 |
20140181721 | GRAPHICAL USER INTERFACE FOR IMPROVED TEXT CHARACTER ENTRY - A graphical user interface for improved text character entry is disclosed. In some embodiments, the graphical user interface may be displayed on a mobile communications device. The graphical user interface may display a message field, a soft keyboard, and at least one visual foveal echo field. The message field may display text characters of a message being authored by a user interacting with the soft keyboard. The visual foveal echo field may be placed adjacent to a soft keyboard row and contain a portion of the message being authored by the user. | 06-26-2014 |
20140173026 | METHOD AND APPARATUS FOR CROSS DEVICE NOTIFICATIONS - A method and apparatus for providing cross device notifications. A cross notification component is provided in multiple devices. In some devices, the cross notification component is at least configured to transmit notices to other devices, and to receive responses to its notice transmissions. In some devices, the cross notification component is at least configured to receive the notices transmitted by other devices, and to generate and transmit responses to received notices. | 06-19-2014 |
20140172140 | METHOD AND APPARATUS FOR CROSS DEVICE AUDIO SHARING - A method and apparatus for providing cross device sharing of audio content. Computing devices are configured with an audio sharing component, and the audio sharing components of multiple computing devices are connected through a communications link thus forming a virtual audio channel. One computing device is selected as the destination receiver device, and the other computing devices are source devices for generating audio content. The audio sharing component of the source devices transmits audio content onto the virtual channel, where it is received by the selected destination device. | 06-19-2014 |
20140165190 | METHOD AND APPARATUS FOR ENHANCED FILE SYSTEM MONITORING ON MOBILE COMMUNICATIONS DEVICES - A system and method for using file system events to trigger a security scan. A file system watches all writable directory paths for defined file system events on files in the watched paths. Upon occurrence of a watched event, the file is scanned using known security methods. A data structure stores events and can be used to update and track events. Cookies can be used to correlate MOVE events. A timer can be used to avoid repetitive scanning after discrete WRITE events. | 06-12-2014 |
20140165169 | METHOD AND SYSTEM FOR MANAGING USER LOGIN BEHAVIOR ON AN ELECTRONIC DEVICE FOR ENHANCED SECURITY - Security is enhanced for a user of an electronic device by providing a method for managing user login behavior. When an entered password that is different from a defined password is received, the method includes identifying alternative characters for at least one character of the entered password based on a location of a key corresponding to the character of the entered password on a keyboard used to enter the password. When the alternative characters are identified, a variation of the entered password is generated by replacing a character of the entered password with an alternative character of the character. When information relating to the variation matches information relating to the defined password, the entered password is determined to be valid. | 06-12-2014 |
20140156784 | METHOD AND SYSTEM FOR PROVIDING AN APPLICATION TO AN ELECTRONIC DEVICE FOR ENHANCING USER SECURITY - Security is enhanced for a user of electronic devices by providing a method for providing an application to an electronic device. According to an embodiment, an application in a source electronic device can be cloned from the source electronic device to a target electronic device. According to an embodiment, when the application is selected, the source device can be configured to automatically collect the selected application and configuration information, state information and/or application data associated with the selected application. The collected information is referred to as “cloning data.” Once the cloning data is collected, the source device can be configured to transmit at least a portion of the cloning data to the target electronic device, which can utilize the cloning data to clone the application into the target electronic device. | 06-05-2014 |
20140128047 | SYSTEM AND METHOD FOR CALL BLOCKING AND SMS BLOCKING - Systems and techniques are provided for managing and categorizing undesired phone calls and text messages. In a specific implementation, an electronic communication identified by a phone number is intercepted at a mobile communications device before the electronic communication is received by an application program on the device. The phone number is sent to a server for the server to identify a category associated with the phone number. The category is received at the mobile communication device. Based on the received category, a determination is made as to whether the application program should be allowed to receive the electronic communication. If allowed, the electronic communication is forwarded to the application program; else, the electronic communication is not forwarded. | 05-08-2014 |
20140128021 | SYSTEM AND METHOD FOR USING CONTEXT MODELS TO CONTROL OPERATION OF A MOBILE COMMUNICATIONS DEVICE - User activity on a mobile device is monitored and collected, and a resource usage model is constructed. The resource usage model describes a set of contexts in which the mobile device, and is the basis for determining a first exhaustion point for a resource. Based on the monitored activity, a prediction of a second exhaustion point for the resource time is made. If the second exhaustion point is prior to the first exhaustion point, usage of the resource is reduced. | 05-08-2014 |
20140120961 | SYSTEM AND METHOD FOR SECURE MESSAGE COMPOSITION OF SECURITY MESSAGES - Systems and methods are provided for secure composition of security messages. A text message template may be displayed on a display of a mobile communications device. The text message template may include a first text field associated with a semantic category representing a plurality of items identified based on their meaning. At least one button associated with the semantic category may be presented on the display of the mobile communications device. An input may be received at the at least one button from a user of the mobile communications device. At least some of the plurality of items belonging to the semantic category associated with the first text field may be presented on the display of the mobile communications device. A selection of an item of the plurality of items may be received. The selected item may be presented in the first text field of the text message template. | 05-01-2014 |
20140095298 | SYSTEM AND METHOD FOR GENERATING EFFECTIVE OFFERS TO REPLACE MOBILE DEVICES - A mobile communications device needs to be replaced. An evaluation is made as to which offers were effective in replacing devices of the same type as the mobile communications device. Based on the evaluation, an offer is generated to replace the mobile communications device with a replacement mobile communications device. | 04-03-2014 |
20140075365 | METHOD AND SYSTEM FOR VISUALLY MONITORING THE PROGRESS OF A SECURITY OPERATION OF AN ELECTRONIC DEVICE - Security is enhanced for a user of an electronic device by providing a method for visually monitoring the progress of a security operation on an electronic device that provides a plurality of objects including at least one of an application, a document, a file, an image, and a record. When a security operation is launched for at least some of the plurality of objects, an operation window is displayed on the electronic device's display screen. The operation window includes a first operation icon corresponding to a first object on which the security operation is currently being performed. The first operation icon includes a thumbnail icon representing the first object and an operation completion indicator that visually indicates a completion level of the security operation currently being performed on the first object. | 03-13-2014 |
20140045534 | SYSTEMS AND METHODS FOR TRANSMITTING A COMMUNICATION BASED ON A DEVICE LEAVING OR ENTERING AN AREA - Location information associated with a computing device may be received by a server. For example, the location information may indicate the current physical location of the computing device. The server may compare the current location of the computing device with a set of locations associated with the computing device. The comparison may result in a determination that the computing device has entered or left a location area. In response to such a determination, a communication may be transmitted to a user of the computing device. For example, an email may be transmitted to the user. The email may include information describing that the computing device has entered or left the location area. | 02-13-2014 |
20140045457 | SYSTEMS AND METHODS FOR APPLYING A SECURITY POLICY TO A DEVICE BASED ON A COMPARISON OF LOCATIONS - Location information associated with a computing device may be received by a server. The server may compare the current location of the computing device with a set of locations associated with the computing device. The comparison may result in a determination that the computing device is in a location that has been identified in the set of locations. In response to such a determination, a particular security policy may be applied to the computing device. For example, the server may transmit a command to the computing device to apply a security policy associated with the location. | 02-13-2014 |
20140040981 | SYSTEMS AND METHODS FOR APPLYING A SECURITY POLICY TO A DEVICE BASED ON LOCATION - A security policy may be applied to a mobile communications device based on a location of the mobile communications device. For example, a first location of the mobile communications device may be obtained and a first security policy may be applied to the mobile communications device based on the first location. Furthermore, a change in the location of the mobile communications device may be detected. For example, the location of the mobile communications device may change from the first location to a second location. In response to the mobile communications device now being located at the second location, a second security policy may be applied to the mobile communications device. Thus, different security policies may be applied to a mobile communications device as the current location of the mobile communications device changes. | 02-06-2014 |
20140038641 | SYSTEMS AND METHODS FOR DISPLAYING LOCATION INFORMATION OF A DEVICE - Location information associated with a computing device may be periodically transmitted to a server. A user of the computing device may transmit a request to the server when the computing device is no longer able to communicate with the server. For example, the user request may be associated with locating the computing device. In response to the request, the user may be shown the latest received location information of the computing device. The last received location information may be displayed in a web page. | 02-06-2014 |
20140038564 | SYSTEMS AND METHODS FOR LOCKING AND DISABLING A DEVICE IN RESPONSE TO A REQUEST - A computing device may be locked and contact information associated with an owner of the computing device may be displayed. For example, a request to lock the computing device may be received. In response to such a request, at least some of the functionality of the computing device may be disabled. For example, control input or input keys of the computing device may be at least partially disabled. Furthermore, contact information may be shown on the display of the computing device. For example, the phone number, address, email address, or other information of the owner of the computing device may be displayed. | 02-06-2014 |
20140024345 | ASSESSING THE SECURITY STATE OF A MOBILE COMMUNICATIONS DEVICE - Methods for assessing the current security state of a mobile communications device. A security component installed in either the server or the mobile communications device is configured to assess the current security state by processing security data generated by the mobile communications device. If the security data is not current, then security events on the mobile communications device are evaluated to determine a severity level for the security events, and this determination is used to assess the current security state of the mobile communications device. | 01-23-2014 |
20130326477 | EXPRESSING INTENT TO CONTROL BEHAVIOR OF APPLICATION COMPONENTS - Detection, identification, and control of application behavior dealing with malware, security risks, data privacy, or resource usage can be difficult in an era of complex, composite software applications composed of multiple components. Software applications are analyzed to determine their components and to identify the behaviors associated with each of the components. Components can also be analyzed with respect to similarity of previously known components. Behaviors can include use of personal identifying information or device information, or any actions that can be taken by applications on the device, including user interface displays, notifications, network communications, and file reading or writing actions. Policies to control or restrict the behavior of applications and their components may be defined and applied. In one embodiment this can include the identification of advertising networks and defining policies to permit various opt-out actions for these advertising networks. | 12-05-2013 |
20130326476 | COMPONENT ANALYSIS OF SOFTWARE APPLICATIONS ON COMPUTING DEVICES - Detection, identification, and control of application behavior dealing with malware, security risks, data privacy, or resource usage can be difficult in an era of complex, composite software applications composed of multiple components. Software applications are analyzed to determine their components and to identify the behaviors associated with each of the components. Components can also be analyzed with respect to similarity of previously known components. Behaviors can include use of personal identifying information or device information, or any actions that can be taken by applications on the device, including user interface displays, notifications, network communications, and file reading or writing actions. Policies to control or restrict the behavior of applications and their components may be defined and applied. In one embodiment this can include the identification of advertising networks and defining policies to permit various opt-out actions for these advertising networks. | 12-05-2013 |
20130324090 | SYSTEM AND METHOD FOR PROVIDING OFFERS FOR MOBILE DEVICES - Profile information associated with a mobile communications device belonging to a user is stored at a server system. Upon the server system receiving an indication that the mobile communications device needs to be replaced, the profile information is reviewed. Based on the review of the profile, an offer is generated to replace the mobile communications device. | 12-05-2013 |
20130318568 | Assessing a data object based on application data associated with the data object - A server receives from a mobile communication device application data identifying a data object accessible by the mobile communication device. The server uses at least some of the application data to assess the data object. The application data can include, for example, behavioral data, metadata, parts of the data object, information indicating the data object is installed on the mobile communication device, or combinations of these. | 11-28-2013 |
20130304850 | SYSTEMS AND METHODS FOR REMOTELY CONTROLLING A LOST MOBILE COMMUNICATIONS DEVICE - Systems and methods for remotely controlling a lost mobile communications device are disclosed. Authorization credentials may be received and a command request for an action to be performed by a lost mobile communications device may further be received. A command corresponding to the command request may be transmitted to the lost mobile communications device. In response to the transmission of the command, information about the lost mobile communications device may be received and interpreted to determine whether the transmitted command was performed or not performed by the lost mobile communications device. A notification may be provided based on whether or not the command was performed by the lost mobile communications device. | 11-14-2013 |
20130237204 | SYSTEM AND METHOD FOR UPLOADING LOCATION INFORMATION BASED ON DEVICE MOVEMENT - Systems and methods for uploading location information based on device movement are disclosed. In some embodiments, location information may be received or determined by a mobile communications device. The location information may be associated with a physical location of the mobile communications device. A rate of movement of the mobile communications device may be identified. In some embodiments, the location information may be transmitted or uploaded from the mobile communications device to a server. The frequency of the transmitting or uploading of the location information may be based on the rate of movement of the mobile communications device. | 09-12-2013 |
20130237191 | SYSTEMS AND METHODS FOR DEVICE BROADCAST OF LOCATION INFORMATION WHEN BATTERY IS LOW - Location information associated with a computing device may be transmitted from the computing device to a server. The transmitting of the location information may be performed in response to the battery of the computing device being at a low level. The location information may comprise a location of the computing device or information to identify the location of the computing device. As such, when the battery of the computing device approaches a low level, the location of the computing device may be transmitted from the computing device to a server. Thus, if the battery of the computing device is depleted, a user may obtain the last known location of the computing device that was transmitted when the battery was at a low level. The location information may also be used to identify the last known location for and to apply a security policy to the computing device. | 09-12-2013 |
20130191921 | SECURITY STATUS AND INFORMATION DISPLAY SYSTEM - Systems and methods disclosed herein provide a local security component on a mobile device that may acquire data concerning a current configuration of the mobile device. The local security component may receive raw or partially processed data about events on the mobile device. The received data may be processed against a database containing identification data for security threats and against the current mobile device configuration data to assess a security state of the mobile device. The processing may include assigning a severity level for each event. The local security component may output to the mobile device the security state assessment results, including a first assessed security state of the mobile device. The raw or partially processed data about events on the mobile device may be transmitted to a server for processing. A second assessed security state of the mobile device may be received at the mobile device from the server. | 07-25-2013 |
20130133071 | SYSTEM AND METHOD FOR ATTACK AND MALWARE PREVENTION - The present invention is a system and method for detecting and preventing attacks and malware on mobile devices such as a cell phones, smartphones or PDAs, which are significantly limited in power consumption, computational power, and memory. The invention enables mobile devices to analyze network data, executable data files, and non-executable data files in order to detect and prevent both known and unknown attacks and malware over vectors that are not typically protected by desktop and server security systems. Security analysis is performed by a combination of “known good,” “known bad,” and decision components. The invention identifies known good executables and/or known characteristics of network data or data files that must be present in order for the data to be considered good. Furthermore, known good and known bad identifier databases may be stored on a server which may be queried by a mobile device. | 05-23-2013 |
20130133070 | SYSTEM AND METHOD FOR ATTACK AND MALWARE PREVENTION - The present invention is a system and method for detecting and preventing attacks and malware on mobile devices such as a cell phones, smartphones or PDAs, which are significantly limited in power consumption, computational power, and memory. The invention enables mobile devices to analyze network data, executable data files, and non-executable data files in order to detect and prevent both known and unknown attacks and malware over vectors that are not typically protected by desktop and server security systems. Security analysis is performed by a combination of “known good,” “known bad,” and decision components. The invention identifies known good executables and/or known characteristics of network data or data files that must be present in order for the data to be considered good. Furthermore, known good and known bad identifier databases may be stored on a server which may be queried by a mobile device. | 05-23-2013 |
20130130649 | PROVIDING ACCESS LEVELS TO SERVICES BASED ON MOBILE DEVICE SECURITY STATE - A mobile device's level of access to services provided by a service provider is based on a current security state assessment of the mobile device. Mobile devices are granted different access levels to services based on the security state of the device. A security component can assess the current security state of the mobile device by processing security data generated by the mobile device. In a specific embodiment, the security component is at the mobile device. In another specific embodiment, the security component is at a server. | 05-23-2013 |
20120240236 | CRAWLING MULTIPLE MARKETS AND CORRELATING - A crawler program collects and stores application programs including application binaries and associated metadata from any number of sources such as official application marketplaces and alternative application marketplaces. An analysis including comparisons and correlations are performed among the collected data in order to detect and warn users about pirated or maliciously modified applications. | 09-20-2012 |
20120216292 | User Account Creation Involving a Mobile Device - Mobile devices may often communicate with network (“cloud”) services that require an account. Because it may be undesirable to require user interaction when creating an account, it may be desirable to create an account associating a mobile device to a network service without requiring a user to explicitly enter authentication information, such as a username and password. In an embodiment, data corresponding to a mobile device is obtained to generate authentication information which is then sent to messaging address of a user. In another embodiment, in response to an event, a mobile device obtains an identifier for a user, sends the identifier to a server, where the server transmits one set of authentication information to a messaging address associated with the user and another set of authentication information to the device. | 08-23-2012 |
20120214451 | Remote Application Installation and Control for a Mobile Device - In many cases, it is desirable to remotely install a software application on a mobile device that performs a function without requiring user intervention on the device, such as in the case where a device is lost or stolen. In one embodiment, a method implemented on the mobile device after installation of the software includes: determining an identifier for a computing device associated with the user; performing a function of the mobile device to obtain information regarding the mobile device; and sending the information for delivery to the computing device using the identifier. In one embodiment, software can be remotely installed on a device that, when installed, locates the device and transmits the location to an email address associated with the device so that a user can recover the device if it is lost or stolen. | 08-23-2012 |
20120196571 | SYSTEM AND METHOD FOR REMOTELY-INITIATED AUDIO COMMUNICATION - Mobile devices typically have some form of audio capabilities designed to be operated by the device's user, for example to place phone calls; however, if a device is misplaced or stolen, the user may wish to operate those audio capabilities remotely. Techniques are provided for determining when an audio transmission should be established between a device and one or more clients, and sending a command to initiate the audio transmission. The determination may be based on receiving a request from a client, detecting at a server that the device is lost or stolen, or detecting at the device that the device is missing. The audio transmission may be established without user intervention at the device or in response to user action at the portable electronic device. Device settings such as audio settings at the device may be overridden in connection with the audio transmission. | 08-02-2012 |
20120110174 | SYSTEM AND METHOD FOR A SCANNING API - Application programs for mobile communication devices are stored in a data store. The applications may be collected from any number of different sources such as through an application programming interface (API), from web crawling, from users, or combinations of these. The applications are analyzed and the analysis results reported. The applications may be “continuously” analyzed so that any changes in assessments can be reported. If an application for which an analysis is sought is not in the data store, information about a different, but related application may be provided. | 05-03-2012 |
20120096555 | SYSTEM AND METHOD FOR ATTACK AND MALWARE PREVENTION - The present invention is a system and method for detecting and preventing attacks and malware on mobile devices such as a cell phones, smartphones or PDAs, which are significantly limited in power consumption, computational power, and memory. The invention enables mobile devices to analyze network data, executable data files, and non-executable data files in order to detect and prevent both known and unknown attacks and malware over vectors that are not typically protected by desktop and server security systems. Security analysis is performed by a combination of “known good,” “known bad,” and decision components. The invention identifies known good executables and/or known characteristics of network data or data files that must be present in order for the data to be considered good. Furthermore, known good and known bad identifier databases may be stored on a server which may be queried by a mobile device. | 04-19-2012 |
20120084864 | SYSTEM AND METHOD FOR A MOBILE CROSS-PLATFORM SOFTWARE SYSTEM - The present invention is a system and method for creating, developing and testing cross-platform software for mobile communications devices. The invention enables mobile device software that must be highly-integrated with the operating system on which it runs to be implemented in a cross-platform manner. Security software for mobile devices is a prime beneficiary of the present invention, as a substantial proportion of its functionality is identical between different platforms yet integrated very specifically into each platform it supports. The cross-platform system includes a core platform-independent component, a platform-specific component, and an abstraction layer component, each of which may communicate with each other using a common defined API. The present invention enables the platform-independent component to be completely re-used between platforms and allows the platform-specific and abstraction components to contain minimal amounts of code on each platform. | 04-05-2012 |
20120084836 | Providing access levels to services based on mobile device security state - A mobile device's level of access to services provided by a service provider is based on a current security state assessment of the mobile device. Mobile devices are granted different access levels to services based on the security state of the device. A security component can assess the current security state of the mobile device by processing security data generated by the mobile device. In a specific embodiment, the security component is at the mobile device. In another specific embodiment, the security component is at a server. | 04-05-2012 |
20120060222 | SECURITY STATUS AND INFORMATION DISPLAY SYSTEM - The present invention provides a system and method for reporting security information relating to a mobile device. A security component identifies security events on the mobile device that are processed on the mobile device or by a server. The security component then determines a security assessment for the mobile device based upon the detected security events. The security state assessment can be displayed in various different formats on the mobile device display or on a client computer through a user interface. The display may be persistent in the form of a desktop widget or home-screen item which enables the user or administrator to verify the functioning of security protection on the device and be alerted if the device needs attention without having to specifically seek such information. | 03-08-2012 |
20120042382 | SYSTEM AND METHOD FOR MONITORING AND ANALYZING MULTIPLE INTERFACES AND MULTIPLE PROTOCOLS - The present invention is a system and method for providing security for a mobile device by analyzing data being transmitted or received by multiple types of networks. The invention can provide security for many types of network interfaces on a mobile device, including: Bluetooth, WiFi, cellular networks, USB, SMS, infrared, and near-field communication. Data is gathered at multiple points in a given processing pathway and linked by a protocol tracking component in order to analyze each protocol present in the data after an appropriate amount of processing by the mobile device. Protocol analysis components are utilized dynamically to analyze data and are re-used between multiple data pathways so as to be able to support an arbitrary number of network data pathways on a mobile device without requiring substantial overhead. | 02-16-2012 |
20110145920 | SYSTEM AND METHOD FOR ADVERSE MOBILE APPLICATION IDENTIFICATION - A system and method identifies mobile applications that can have an adverse effect on a mobile device or mobile network. In an implementation, a server monitors behavioral data relating to a mobile application and applies a model to determine if the application has an adverse effect or has the potential to cause an adverse effect on a mobile device or a network the mobile device may connect to. A mobile device may monitor behavioral data, apply a model to the data, and transmit a disposition to the server. The server may aggregate behavioral data or disposition information from multiple devices. The server may transmit or make available the disposition information to a subscriber through a web interface, API, email, or other mechanism. After identifying that an application may have an adverse effect, the server may enact corrective actions, such as generating device or network configuration data. | 06-16-2011 |
20110047033 | SYSTEM AND METHOD FOR MOBILE DEVICE REPLACEMENT - This disclosure describes a system and method for providing relevant offers for a user to replace a mobile communication device in the event that the device is lost, stolen, or otherwise in need of replacement, such as when a device has its SIM card removed or replaced, is inactive for a period of time, is unresponsive to a server monitoring the device, or when other customizable events occur. The disclosed system can determine if and when a mobile communication device may need replacement, and can generate relevant offers to replace the device based upon the user's current device and other factors. The system may also optimize offers to increase the likelihood of acceptance based upon previously accepted offers. In order to provide a comprehensive set of replacement options for a user, the system can aggregate offers from third parties. | 02-24-2011 |