METHOD AND SYSTEM FOR MOBILE INFORMATION SECURITY PROTECTION
First Claim
1. A system for mobile information security protection, the system comprises:
- a local end comprising;
an information collecting module for extracting identification information corresponding to a plurality of applications installed on a mobile device;
a local communication module for sending the extracted identification information to a server and receiving data from the server; and
a display module for presenting information received from the server to an user of the mobile device;
a server end comprising;
a server communication module for receiving data from the mobile device and for sending data to the mobile device; and
a comparator module for matching the identification information to information stored in a database.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system for mobile information security protection are disclosed. According to an embodiment, the method comprises extracting, by a first processor, identification information corresponding to a plurality of applications installed on a mobile device, sending the extracted identification information to a server, matching, by a second processor, the identification information to information stored in a database storage, receiving matched information from the database storage as a result of matching the identification information, sending the matched information to the mobile device, and presenting the matched information to a user of the mobile device.
-
Citations
18 Claims
-
1. A system for mobile information security protection, the system comprises:
-
a local end comprising; an information collecting module for extracting identification information corresponding to a plurality of applications installed on a mobile device; a local communication module for sending the extracted identification information to a server and receiving data from the server; and a display module for presenting information received from the server to an user of the mobile device; a server end comprising; a server communication module for receiving data from the mobile device and for sending data to the mobile device; and a comparator module for matching the identification information to information stored in a database. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for mobile information security protection, the method comprising:
-
extracting, by a first processor, identification information corresponding to a plurality of applications installed on a mobile device; sending the extracted identification information to a server; matching, by a second processor, the identification information to information stored in a database storage; receiving matched information from the database storage as a result of matching the identification information; sending the matched information to the mobile device; and presenting the matched information to a user of the mobile device. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
Specification