Pre-Identifying Probable Malicious Behavior Based on Configuration Pathways
1 Assignment
0 Petitions
Accused Products
Abstract
The various aspects include systems and methods for enabling mobile computing devices to recognize when they are at risk of experiencing malicious behavior in the near future given a current configuration. Thus, the various aspects enable mobile computing devices to anticipate malicious behaviors before a malicious behavior begins rather than after the malicious behavior has begun. In the various aspects, a network server may receive behavior vector information from multiple mobile computing devices and apply pattern recognition techniques to the received behavior vector information to identify malicious configurations and pathway configurations that may lead to identified malicious configurations. The network server may inform mobile computing devices of identified malicious configurations and the corresponding pathway configurations, thereby enabling mobile computing devices to anticipate and prevent malicious behavior from beginning by recognizing when they have entered a pathway configuration leading to malicious behavior.
43 Citations
32 Claims
-
1-3. -3. (canceled)
-
4. A method of predicting probable malicious behavior on a mobile computing device before it occurs, comprising:
-
receiving a malicious and pathway configuration database; determining a current configuration; determining whether the current configuration is leading to a malicious configuration based on the malicious and pathway configuration database; and implementing preventative measures to avoid the malicious configuration in response to determining that the current configuration is leading to a malicious configuration. - View Dependent Claims (5, 6, 7, 8)
-
-
9-11. -11. (canceled)
-
12. A mobile computing device, comprising:
-
a memory; a transceiver; and a processor coupled to the memory and the transceiver, wherein the processor is configured with processor-executable instructions to perform operations comprising; receiving a malicious and pathway configuration database; determining a current configuration; determining whether the current configuration is leading to a malicious configuration based on the malicious and pathway configuration database; and implementing preventative measures to avoid the malicious configuration in response to determining that the current configuration is leading to a malicious configuration. - View Dependent Claims (13, 14, 15, 16)
-
-
17-19. -19. (canceled)
-
20. A mobile computing device, comprising:
-
means for receiving a malicious and pathway configuration database; means for determining a current configuration; means for determining whether the current configuration is leading to a malicious configuration based on the malicious and pathway configuration database; and means for implementing preventative measures to avoid the malicious configuration in response to determining that the current configuration is leading to a malicious configuration. - View Dependent Claims (21, 22, 23, 24)
-
-
25-27. -27. (canceled)
-
28. A non-transitory processor-readable storage medium having stored thereon processor-executable instructions configured to cause a mobile computing device processor to perform operations comprising:
-
receiving a malicious and pathway configuration database; determining a current configuration; determining whether the current configuration is leading to a malicious configuration based on the malicious and pathway configuration database; and implementing preventative measures to avoid the malicious configuration in response to determining that the current configuration is leading to a malicious configuration. - View Dependent Claims (29, 30, 31, 32)
-
Specification