Apparatus and methods for detection and management of unauthorized executable instructions on a wireless device
First Claim
1. A wireless communication device, comprising:
- a memory comprising executable instructions, a device type corresponding to wireless device, and an authorization configuration having an authorization schema that identifies at least one of authorized executable instructions and unauthorized executable instructions, wherein the authorization schema is based on the device type; and
a executable instruction authorization module resident in the memory, the executable instruction authorization module comprising authorization logic operable to scan the memory and generate a log based upon the authorization configuration, the log comprising an identification of the executable instructions determined to be unauthorized based upon the authorization schema.
1 Assignment
0 Petitions
Accused Products
Abstract
Detection and management methods and apparatus for wireless devices may include an executable instruction authorization module operable to scan executable instructions on a wireless device, generate a log indicative of a virus or otherwise unauthorized executable instructions based on a received authorization configuration, and forward the log to a user manager. The user manager may be operable to analyze the log and generate an authorization report which may be viewable by an operator to determine the disposition of unauthorized executable instructions. At least one of the executable instruction authorization module, the user manager, and the operator may be operable to generate a control command operable to delete, or otherwise disable, unauthorized executable instructions on the wireless device, or to restore the executable instructions on the wireless device.
-
Citations
52 Claims
-
1. A wireless communication device, comprising:
-
a memory comprising executable instructions, a device type corresponding to wireless device, and an authorization configuration having an authorization schema that identifies at least one of authorized executable instructions and unauthorized executable instructions, wherein the authorization schema is based on the device type; and
a executable instruction authorization module resident in the memory, the executable instruction authorization module comprising authorization logic operable to scan the memory and generate a log based upon the authorization configuration, the log comprising an identification of the executable instructions determined to be unauthorized based upon the authorization schema. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
10. The device of claim 10, wherein the authorization configuration further comprises at least one of a tracking parameter selected from a plurality of tracking parameters and a reporting parameter selected from a plurality of reporting parameters, wherein the tracking parameter identifies when to scan the executable instructions, and wherein the reporting parameter identifies when to transmit the log across a wireless network.
-
20. An apparatus for managing executable instructions on a wireless device, comprising:
-
a configuration generator operable to generate and transmit an authorization configuration for receipt by a wireless device, the authorization configuration comprising an authorization schema that identifies at least one of authorized executable instructions and unauthorized executable instructions, wherein the authorization schema is based upon a device type associated with the wireless device;
an information repository operable to receive and store a log, the log comprising unauthorized executable instructions on the wireless device based on the authorization configuration; and
a executable instruction control module comprising an analyzer operable to generate an authorization report based on the log. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33)
-
-
34. A method of managing executable instructions on a wireless device, comprising:
-
generating an authorization configuration executable to initiate scanning and logging of executable instructions resident on a wireless device, the authorization configuration comprising an authorization schema that identifies at least one of authorized executable instructions and unauthorized executable instructions, wherein the authorization schema is based upon a device type associated with the wireless device;
forwarding the authorization configuration for receipt by the wireless device;
receiving a generated log from the wireless device based on the authorization configuration; and
generating an authorization report based on the received log. - View Dependent Claims (35, 36, 37, 38, 39, 40)
-
-
41. A method of managing executable instructions on a wireless device, comprising:
-
obtaining an authorization configuration comprising an authorization schema that identifies at least one of authorized executable instructions and unauthorized executable instructions, wherein the authorization schema is based upon a device type associated with the wireless device;
scanning executable instructions based upon the authorization configuration;
logging at least portions of the scanned executable instructions into a log based upon the authorization schema; and
forwarding the log to another device to determine a disposition of the logged executable instructions. - View Dependent Claims (42, 43, 44, 45, 46)
-
-
47. A machine-readable medium comprising instructions which, when executed by a machine, cause the machine to perform operations comprising:
-
obtaining an authorization configuration comprising an authorization schema that identifies at least one of authorized executable instructions and unauthorized executable instructions, wherein the authorization schema is based upon a device type associated with the wireless device;
scanning executable instructions based upon the authorization configuration;
logging at least portions of the scanned executable instructions into a log based upon the authorization schema; and
forwarding the log to another device to determine a disposition of the logged executable instructions.
-
-
48. At least one processor configured to perform the actions of:
-
obtaining an authorization configuration comprising an authorization schema that identifies at least one of authorized executable instructions and unauthorized executable instructions, wherein the authorization schema is based upon a device type associated with the wireless device;
scanning executable instructions based upon the authorization configuration;
logging at least portions of the scanned executable instructions into a log based upon the authorization schema; and
forwarding the log to another device to determine a disposition of the logged executable instructions.
-
-
49. A wireless device, comprising:
-
means for obtaining an authorization configuration comprising an authorization schema that identifies at least one of authorized executable instructions and unauthorized executable instructions, wherein the authorization schema is based upon a device type associated with the wireless device;
means for scanning executable instructions based upon the authorization configuration;
means for logging at least portions of the scanned executable instructions into a log based upon the authorization schema; and
means for forwarding the log to another device to determine a disposition of the logged executable instructions.
-
-
50. A machine-readable medium comprising instructions which, when executed by a machine, cause the machine to perform operations comprising:
-
generating an authorization configuration executable to initiate scanning and logging of executable instructions resident on a wireless device, the authorization configuration comprising an authorization schema that identifies at least one of authorized executable instructions and unauthorized executable instructions, wherein the authorization schema is based upon a device type associated with the wireless device;
forwarding the authorization configuration for receipt by the wireless device;
receiving a generated log from the wireless device based on the authorization configuration; and
generating an authorization report based on the received log.
-
-
51. At least one processor configured to perform the actions of:
-
generating an authorization configuration executable to initiate scanning and logging of executable instructions resident on a wireless device, the authorization configuration comprising an authorization schema that identifies at least one of authorized executable instructions and unauthorized executable instructions, wherein the authorization schema is based upon a device type associated with the wireless device;
forwarding the authorization configuration for receipt by the wireless device;
receiving a generated log from the wireless device based on the authorization configuration; and
generating an authorization report based on the received log.
-
-
52. An apparatus, comprising:
-
means for generating an authorization configuration executable to initiate scanning and logging of executable instructions resident on a wireless device, the authorization configuration comprising an authorization schema that identifies at least one of authorized executable instructions and unauthorized executable instructions, wherein the authorization schema is based upon a device type associated with the wireless device;
means for forwarding the authorization configuration for receipt by the wireless device;
means for receiving a generated log from the wireless device based on the authorization configuration; and
means for generating an authorization report based on the log.
-
Specification