MONITORING MOBILE APPLICATION ACTIVITIES FOR MALICIOUS TRAFFIC ON A MOBILE DEVICE
First Claim
1. A method of monitoring mobile application activities for malicious traffic on a mobile device, the method, comprising:
- monitoring application activities of a mobile application on the mobile device;
detecting, from the application activities, suspicious activity;
blocking traffic from which the suspicious activity is detected;
further responsive to detecting that the traffic includes suspicious activity, logging a traffic pattern or sequence of events of the traffic and the mobile application.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for monitoring mobile application activities for malicious traffic on a mobile device are disclosed. One embodiment of a method which can be implemented on a system includes, monitoring application activities of a mobile application on the mobile device, detecting, from the application activities, suspicious activity, and/or blocking traffic from which the suspicious activity is detected. One embodiment includes creating a policy based on the information aggregated from the multiple mobile devices and/or broadcasting the policy to other mobile devices of the suspicious activity detected from the multiple mobile devices.
154 Citations
30 Claims
-
1. A method of monitoring mobile application activities for malicious traffic on a mobile device, the method, comprising:
-
monitoring application activities of a mobile application on the mobile device; detecting, from the application activities, suspicious activity; blocking traffic from which the suspicious activity is detected; further responsive to detecting that the traffic includes suspicious activity, logging a traffic pattern or sequence of events of the traffic and the mobile application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A system for mobile network malware detection, the system, comprising:
-
means for, monitoring application activities of a mobile application on the mobile device; means for, detecting, from the application activities, suspicious activity; means for, blocking traffic from which the suspicious activity is detected; means for, reporting the suspicious activity information to a virus protection entity or a security entity; means for, logging a traffic pattern or sequence of events of the traffic and the mobile application responsive to determining that the traffic includes the suspicious activity. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30)
-
Specification