Mobile device system and strategies for determining malicious code activity
First Claim
1. A mobile radio security method, comprising the steps of:
- monitoring for abnormalities or rare activities from a mobile wireless device when attempting a transmission; and
suppressing the transmission when an abnormality or rare activity is detected at the mobile wireless device.
1 Assignment
0 Petitions
Accused Products
Abstract
A system (300) and mobile wireless radio security method (500) can include a transceiver (320) and a processor (302) coupled to the transceiver. The processor can be programmed to monitor (502) for abnormalities or rare activities from a mobile wireless device when attempting a transmission and to suppress (516) the transmission when an abnormality or rare activity is detected at the mobile wireless device (12). The processor can further be programmed to monitor (504) a rate of speed of the mobile wireless device and suppress transmissions when the speed of the mobile wireless device exceeds a predetermined speed. The processor can be programmed to monitor (506) emails or messages to address book or phone book entries that are rarely contacted individually or as a group and programmed to suppress transmissions of such emails or messages until a user manually confirms the transmissions
142 Citations
20 Claims
-
1. A mobile radio security method, comprising the steps of:
-
monitoring for abnormalities or rare activities from a mobile wireless device when attempting a transmission; and
suppressing the transmission when an abnormality or rare activity is detected at the mobile wireless device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A mobile wireless radio security system, comprising:
-
a transceiver; and
a processor coupled to the transceiver, wherein the processor is programmed to;
monitor for abnormalities or rare activities from a mobile wireless device when attempting a transmission; and
suppress the transmission when an abnormality or rare activity is detected at the mobile wireless device. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A machine-readable storage, having stored thereon a computer program having a plurality of code sections executable by a machine for causing the machine to perform the steps of:
-
monitoring for abnormalities or rare activities from a mobile wireless device when attempting a transmission; and
suppressing the transmission when an abnormality or rare activity is detected at the mobile wireless device. - View Dependent Claims (19, 20)
-
Specification