Security Adjustments In Mobile Devices
First Claim
Patent Images
1. A method comprising:
- receiving one or more base events at an event listener;
storing the one or more base events at a state storage;
providing the one or more base events stored at the state storage to an inference module;
providing a current security configuration to the inference module;
identifying, by the inference module, a security configuration change based on the one or more base events and the current security configuration.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems, device and techniques are disclosed for implementing a security configuration change based on one or more base events and a current security configuration. An inference module may identify a security configuration change based on receiving base events from a state storage/event listener and analyzing the base events to determine if a current security configuration is optimal given the base events.
32 Citations
22 Claims
-
1. A method comprising:
-
receiving one or more base events at an event listener; storing the one or more base events at a state storage; providing the one or more base events stored at the state storage to an inference module; providing a current security configuration to the inference module; identifying, by the inference module, a security configuration change based on the one or more base events and the current security configuration. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A system comprising:
a processor configured to; receive one or more base events at an event listener; store the one or more base events at a state storage; provide the one or more base events stored at the state storage to an inference module; provide a current security configuration to the inference module; identify, by the inference module, a security configuration change based on the one or more base events and the current security configuration. - View Dependent Claims (19, 20, 21, 22)
Specification