AUTOMATIC GENERATION AND DISTRIBUTION OF POLICY INFORMATION REGARDING MALICIOUS MOBILE TRAFFIC IN A WIRELESS NETWORK
First Claim
1. A method for automatically generating and distributing policy information for malicious mobile traffic in a wireless network, the method, comprising:
- aggregating suspicious activity information detected across multiple mobile devices in a wireless network;
wherein, the suspicious activity information is detected in mobile application activities occurring on the multiple mobile devices;
generating policy information for malicious mobile traffic using the suspicious activity information;
distributing the policy information among the multiple mobile devices or other mobile devices in the wireless network.
3 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for automatically generating and distributing policy information for malicious mobile traffic in a wireless network are disclosed. One embodiment of a method which can be implemented on a system includes, aggregating suspicious activity information detected across multiple mobile devices in a wireless network, generating policy information for malicious mobile traffic using the suspicious activity information, and/or distributing the policy information among the multiple mobile devices or other mobile devices in the wireless network. The policy information can, for example, be distributed to wireless operators, mobile network carriers, or application service providers.
180 Citations
30 Claims
-
1. A method for automatically generating and distributing policy information for malicious mobile traffic in a wireless network, the method, comprising:
-
aggregating suspicious activity information detected across multiple mobile devices in a wireless network; wherein, the suspicious activity information is detected in mobile application activities occurring on the multiple mobile devices; generating policy information for malicious mobile traffic using the suspicious activity information; distributing the policy information among the multiple mobile devices or other mobile devices in the wireless network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A system for automatically generating and distributing policy information for malicious mobile traffic in a wireless network, the system, comprising:
-
a proxy server able to aggregating suspicious activity information detected across mobile devices in a wireless network; wherein, the suspicious activity information is detected in mobile application activities occurring on the multiple mobile devices; wherein, the proxy server blocks traffic generated by the mobile application activities that is directed to or from the mobile devices; wherein, the proxy server is physically distinct from the mobile device and able to communicate wirelessly with the mobile device. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
Specification