Systems and methods for addressing security vulnerabilities on computing devices
First Claim
1. A computer-implemented method for addressing security vulnerabilities on computing devices, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:
- assembling a security vulnerability watch list of a plurality of mobile computing devices with a security system capable of remedying security vulnerabilities;
collecting identifications of programmatic installations on the plurality of mobile computing devices;
storing the identifications of programmatic installations in a database indexed by the security vulnerability watch list on a storage device;
identifying at least one security vulnerability associated with at least one programmatic installation among the programmatic installations on at least one of the mobile computing devices;
querying, in response to identifying the security vulnerability, the database for a list of mobile computing devices that are vulnerable to the security vulnerability;
generating a message to send to each mobile computing device within the list of mobile computing devices, the message comprising a prompt to remedy the security vulnerability;
prompting a user of each mobile computing device within the list of mobile computing devices to remedy the security vulnerability by transmitting the message to each mobile computing device within the list of mobile computing devices via a plurality of push notifications via a telecommunication network.
2 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented method for addressing security vulnerabilities on computing devices may include 1) identifying a security vulnerability associated with a programmatic installation on a mobile computing platform, 2) querying, in response to identifying the security vulnerability, a database for a list of mobile computing devices that include both the programmatic installation and a security system capable of remedying security vulnerabilities, 3) generating a message to send to each mobile computing device within the list of mobile computing devices that includes a prompt to remedy the security vulnerability, and 4) prompting a user of each mobile computing device within the list of mobile computing devices to remedy the security vulnerability by transmitting the message to each mobile computing device within the list of mobile computing devices via a plurality of push notifications. Various other methods, systems, and computer-readable media are also disclosed.
-
Citations
20 Claims
-
1. A computer-implemented method for addressing security vulnerabilities on computing devices, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:
-
assembling a security vulnerability watch list of a plurality of mobile computing devices with a security system capable of remedying security vulnerabilities; collecting identifications of programmatic installations on the plurality of mobile computing devices; storing the identifications of programmatic installations in a database indexed by the security vulnerability watch list on a storage device; identifying at least one security vulnerability associated with at least one programmatic installation among the programmatic installations on at least one of the mobile computing devices; querying, in response to identifying the security vulnerability, the database for a list of mobile computing devices that are vulnerable to the security vulnerability; generating a message to send to each mobile computing device within the list of mobile computing devices, the message comprising a prompt to remedy the security vulnerability; prompting a user of each mobile computing device within the list of mobile computing devices to remedy the security vulnerability by transmitting the message to each mobile computing device within the list of mobile computing devices via a plurality of push notifications via a telecommunication network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for addressing security vulnerabilities on computing devices, the system comprising:
-
an identification module programmed to; assemble a security vulnerability watch list of a plurality of mobile computing devices with a security system capable of remedying security vulnerabilities; collect identifications of programmatic installations on the plurality of mobile computing devices; store the identifications of programmatic installations in a database indexed by the security vulnerability watch list on a storage device; identify at least one security vulnerability associated with at least one programmatic installation among the programmatic installations on at least one of the mobile computing devices; a query module programmed to query, in response to identifying the security vulnerability, the database for a list of mobile computing devices that are vulnerable to the security vulnerability; a generation module programmed to generate a message to send to each mobile computing device within the list of mobile computing devices, the message comprising a prompt to remedy the security vulnerability; a prompting module programmed to prompt a user of each mobile computing device within the list of mobile computing devices to remedy the security vulnerability by transmitting the message to each mobile computing device within the list of mobile computing devices via a plurality of push notifications via a telecommunication network; at least one processor configured to execute the identification module, the query module, the generation module, and the prompting module. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A non-transitory computer-readable-storage medium comprising one or more computer-executable instructions that, when executed by at least one processor of a computing device, cause the computing device to:
-
assemble a security vulnerability watch list of a plurality of mobile computing devices with a security system capable of remedying security vulnerabilities; collect identifications of programmatic installations on the plurality of mobile computing devices; store the identifications of programmatic installations in a database indexed by the security vulnerability watch list on a storage device; identify at least one security vulnerability associated with at least one programmatic installation among the programmatic installations on at least one of the mobile computing devices; query, in response to identifying the security vulnerability, the database for a list of mobile computing devices that are vulnerable to the security vulnerability; generate a message to send to each mobile computing device within the list of mobile computing devices, the message comprising a prompt to remedy the security vulnerability; prompt a user of each mobile computing device within the list of mobile computing devices to remedy the security vulnerability by transmitting the message to each mobile computing device within the list of mobile computing devices via a plurality of push notifications via a telecommunication network. - View Dependent Claims (18, 19, 20)
-
Specification