SYSTEM AND METHOD FOR ASSESSING VULNERABILITY OF A MOBILE DEVICE
First Claim
Patent Images
1. A method for assessing vulnerability of a mobile device comprising:
- at a remote analysis cloud service, receiving at least one vulnerability assessment request that includes an object identifier for an operative object of a mobile computing device, wherein the vulnerability assessment request originates from the mobile computing device;
identifying a vulnerability assessment associated with the identifier of the operative object; and
communicating the identified vulnerability assessment to the mobile computing device.
3 Assignments
0 Petitions
Accused Products
Abstract
A system and method for assessing vulnerability of a mobile device including at a remote analysis cloud service, receiving at least one vulnerability assessment request that includes an object identifier for an operative object of a mobile computing device, wherein the vulnerability assessment request originates from the mobile computing device; identifying a vulnerability assessment associated with the identifier of the operative object; and communicating the identified vulnerability assessment to the mobile computing device.
33 Citations
19 Claims
-
1. A method for assessing vulnerability of a mobile device comprising:
-
at a remote analysis cloud service, receiving at least one vulnerability assessment request that includes an object identifier for an operative object of a mobile computing device, wherein the vulnerability assessment request originates from the mobile computing device; identifying a vulnerability assessment associated with the identifier of the operative object; and communicating the identified vulnerability assessment to the mobile computing device. - View Dependent Claims (2, 3, 4, 6, 7, 8, 9, 10, 11, 12)
-
-
5. The method of 4, wherein the at least one compiled object identifier is a plurality of object identifiers that includes an executable code segment, a device identifier, and component version identifier.
-
13. A method for assessing vulnerability of a mobile device comprising:
-
at a remote analysis cloud service, receiving a plurality of vulnerability assessment requests, wherein a vulnerability assessment request includes at least one object identifier for an operative object of a mobile computing device, and wherein the vulnerability assessment request originates from the mobile computing device; for each vulnerability assessment request, identifying a vulnerability assessment associated with the identifier of the operative object; and communicating the identified vulnerability assessment to the associated mobile computing device. - View Dependent Claims (14, 15, 16, 17, 18, 19)
-
Specification