SYSTEM AND METHOD FOR SECURITY ANALYSIS BASED ON MULTIPLE PROTOCOLS
First Claim
1. A method of performing a security analysis of data received on a mobile communications device, the method comprising:
- on a mobile communication device having multiple network interfaces for receiving data, in response to receipt of the data by the mobile communications device, gathering information about the data received by the mobile communications device through at least two of the multiple network interfaces, the data received at each of the at least two network interfaces having different protocols;
based upon the gathering step, assigning a first protocol to the data received from a first of the at least two network interfaces and assigning a second protocol to the data received from a second of the at least two network interfaces; and
performing a common security analysis on at least a part of the data received from each of the first and second network interfaces to determine whether the data received by the mobile communications device is safe or malicious.
8 Assignments
0 Petitions
Accused Products
Abstract
A security analysis of data received on a mobile communications device includes gathering information about the data through at least two of multiple network interfaces, each of the at least two network interfaces having different protocols. Based upon the gathering, a first protocol is assigned to the data received from a first of the at least two network interfaces. A second protocol is assigned to the data received from a second of the at least two network interfaces. A common security analysis is performed on at least a part of the data received from each of the first and second network interfaces to determine whether the data received by the mobile communications device is safe or malicious.
20 Citations
24 Claims
-
1. A method of performing a security analysis of data received on a mobile communications device, the method comprising:
-
on a mobile communication device having multiple network interfaces for receiving data, in response to receipt of the data by the mobile communications device, gathering information about the data received by the mobile communications device through at least two of the multiple network interfaces, the data received at each of the at least two network interfaces having different protocols; based upon the gathering step, assigning a first protocol to the data received from a first of the at least two network interfaces and assigning a second protocol to the data received from a second of the at least two network interfaces; and performing a common security analysis on at least a part of the data received from each of the first and second network interfaces to determine whether the data received by the mobile communications device is safe or malicious. - View Dependent Claims (2, 3)
-
-
4. A method of performing a security analysis of data to be transmitted by at least two of multiple network interfaces of a mobile communications device, the method comprising:
-
in response to a request to transmit the data to be transmitted from the mobile communications device, gathering information about the data to be transmitted by the mobile communications device, the data to be transmitted in at least two of a plurality of protocols; identifying a first protocol of the data to be transmitted and a second protocol of the data to be transmitted; and performing a common security analysis on at least a part of the data to be transmitted by each of the at least two network interfaces to determine whether the data to be transmitted by the mobile communications device is safe or malicious. - View Dependent Claims (5, 6)
-
-
7. A method of determining whether to allow or deny use of data received by at least two of multiple network interfaces of a mobile communications device, the method comprising:
-
in response to a request for the mobile communications device to use the received data, identifying a first protocol of the data received from a first of the at least two network interfaces and identifying a second protocol of the data received from a second of the at least two network interfaces; performing a common security analysis on at least a part of the data received by each of the at least two network interfaces according to their respective identified protocols; and permitting further use of the received data based a determination of whether the data received by the mobile communications device is safe or malicious. - View Dependent Claims (8, 9)
-
-
10. A method of determining whether to allow or deny transmission of data by at least two of multiple network interfaces of a mobile communications device, the method comprising:
-
in response to a request to transmit the data from the mobile communications device, identifying a first and a second protocol of the data to be transmitted; performing a common security analysis on at least a part of the data to be transmitted by each of the at least two network interfaces according to their respective identified protocols; and allowing or denying transmission of the data to be transmitted based upon a determination of whether the data to be transmitted by the mobile communications device is safe or malicious. - View Dependent Claims (11, 12)
-
-
13. A method comprising:
-
on a mobile device that employs multiple network interfaces and multiple network protocols for receiving and processing data by mobile device operating system sub-systems, at a mobile device security system, receiving data from at least two network interface sources and in at least two network protocols; in response to the interception or detection of the data received by the at least two network interface sources, at the mobile device security system, before the received data is allowed to reach a downstream destination, identifying at least two of its network protocols; at the mobile device security system, based at least in part upon the identified network protocols, performing a common security analysis on at least part of the received data of each of the at least two network protocols to determine if the received data should be allowed to reach the downstream destination based upon whether the data received by the mobile communications device is safe or malicious. - View Dependent Claims (14, 15)
-
-
16. A method comprising:
-
on a mobile device that employs multiple network protocols for processing data by mobile device operating system sub-systems, and that employs multiple network interfaces for sending data, at a mobile device security system, receiving data from the mobile device operating system sub-system for transmitting through at least two network interface nodes and in at least two network protocols on the mobile device to a downstream destination; in response to a request to transmit the data through the at least two network interface nodes, at the mobile device security system, before the data to be transmitted by the mobile device security system is transmitted to the downstream destination, identifying at least two of its network protocols; at the mobile device security system, performing a common security analysis on the data to be transmitted, based upon each of its identified network protocols, to determine if the data to be transmitted should be allowed to reach the downstream destination based upon whether the data received by the mobile communications device is safe or malicious. - View Dependent Claims (17, 18)
-
-
19. A method comprising:
-
on a mobile device that employs multiple network protocols for processing data by mobile device operating system sub-systems, and that employs multiple network interfaces for receiving and sending data, at a mobile device security system, receiving data from a mobile device operating system sub-system, and in response to receiving_data from the mobile device operating system sub-system, identifying at least one network protocol for the data received from the mobile device operating system sub-system; in response to a request to transmit the data to a downstream destination, before the data to be transmitted is transmitted to the downstream destination, at the mobile device security system, identifying at least one network protocol for the data to be transmitted; based upon the identified protocol for the received data and the identified protocol for the data to be transmitted, respectively, performing a common security analysis of at least a part of the received data and of at least a part of the data to be transmitted to determine whether the data to be transmitted should be allowed to reach the downstream destination based upon whether the data to be transmitted by the mobile communications device is safe or malicious. - View Dependent Claims (20, 21, 22, 23)
-
-
24. On a mobile communication device with an operating system and operating system subsystems, a method comprising:
-
in response to the interception or detection of received data at at least two of multiple network interfaces on the mobile communication device, before the data is permitted to proceed to its target destination with an operating system subsystem, gathering the received data and identifying network protocols of the data received from each of the at least two multiple network interfaces; performing a common classification analysis on at least a part of the received data from each of the at least two multiple network interfaces according to the determined network protocol to determine a classification for the received data; and
,using the determined classification for the received data to determine whether the received data should either be allowed to proceed to its target destination, or be prevented from proceeding to its target destination.
-
Specification