COLLABORATIVE MALWARE DETECTION AND PREVENTION ON MOBILE DEVICES
First Claim
1. An apparatus comprising:
- secure memory configured to host a collaborator database comprising data corresponding to at least one collaborating device; and
secure circuitry configured to monitor the operation of a security threat detection application, wherein if an abnormality in the operation of the security threat detection application is detected by the secure circuitry, the secure circuitry is further configured to cause a security threat notification to be transmitted to the at least one collaborating device based on the data in the collaborator database.
1 Assignment
0 Petitions
Accused Products
Abstract
The present disclosure describes a method and apparatus for collaborative threat detection on mobile devices. A mobile device may comprise a processor, secure memory, and secure circuitry. The processor may be coupled to host memory and may be configured to execute a security threat detection application to detect a malicious program attacking the mobile device. The secure memory may be configured to host a collaborator database comprising data corresponding to at least one collaborating device. The secure circuitry may be configured to determine if the security threat detection application running on the processor is properly operating. If an abnormality in the operation of the security threat detection application is detected, the secure circuitry may be further configured to cause a security threat notification to be transmitted to the collaborating device based on the data in the collaborator database.
78 Citations
24 Claims
-
1. An apparatus comprising:
-
secure memory configured to host a collaborator database comprising data corresponding to at least one collaborating device; and secure circuitry configured to monitor the operation of a security threat detection application, wherein if an abnormality in the operation of the security threat detection application is detected by the secure circuitry, the secure circuitry is further configured to cause a security threat notification to be transmitted to the at least one collaborating device based on the data in the collaborator database. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system comprising a mobile device, the mobile device comprising:
-
a transceiver configured to wirelessly communicate with at least one collaborating device; host memory comprising an operating system; a processor coupled to the host memory, the processor configured to execute the operating system; secure memory configured to host a collaborator database comprising data corresponding to at least one collaborating device; and secure circuitry configured to monitor a security threat detection application executing on the mobile device, wherein if an abnormality is detected by the secure circuitry, the secure circuitry is further configured to cause a security threat notification to be transmitted to the at least one collaborating device based on the data in the collaborator database. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A method for collaborative threat detection on mobile devices, the method comprising:
-
monitoring, via secure circuitry on a mobile device, for local and remote security threats; upon identification of a local or remote security threat, performing, via the secure circuitry, corrective action to address the security threat; and upon identification of a local security threat, identifying, via the secure circuitry, at least one collaborating mobile device stored within a collaborator database hosted in secure memory on the mobile device and notifying the at least one collaborating mobile device of the security threat. - View Dependent Claims (18, 19, 20)
-
-
21. A system comprising one or more storage mediums having stored thereon, individually or in combination, instructions that when executed by one or more processors results in the following operations:
-
monitoring, via secure circuitry on a mobile device, for local and remote security threats; upon identification of a local or remote security threat, performing, via the secure circuitry, corrective action to address the security threat; and upon identification of a local security threat, identifying, via the secure circuitry, at least one collaborating mobile device stored within a collaborator database hosted in secure memory on the mobile device and notifying the at least one collaborating mobile device of the security threat. - View Dependent Claims (22, 23, 24)
-
Specification