Event-based security state assessment and display for mobile devices
First Claim
Patent Images
1. A method comprising the steps of:
- providing a local security component on a mobile device;
acquiring by the local security component data concerning a current configuration of the mobile device;
receiving at the local security component from one or more other applications running on the mobile device raw or partially processed data about events on the mobile device;
processing the received data by the local security component against a database containing identification data for security threats and against the current mobile device configuration data to assess a security state of the mobile device, the processing including assigning by the local security component a severity level for each event;
outputting by the local security component to the mobile device the security state assessment results, including a first assessed security state of the mobile device by the local security component for display of the current security state assessment on a mobile device display home screen;
transmitting the raw or partially processed data about events on the mobile device to a server for processing at the server;
receiving, at the mobile device, a second assessed security state of the mobile device from the server; and
displaying the second assessed security state on the mobile device display, wherein the second assessed security state by the server is different from the first assessed security state by the local security component.
8 Assignments
0 Petitions
Accused Products
Abstract
A security component on a mobile device collects data on security events, and determines an assessment of security state and severity levels using a database containing security threat data. A server receives security event data, performs an additional security state assessment, and transmits it for display on the mobile device or a webpage. Display of a security state assessment includes status indicator signals, and lists and charts of security events.
280 Citations
35 Claims
-
1. A method comprising the steps of:
-
providing a local security component on a mobile device; acquiring by the local security component data concerning a current configuration of the mobile device; receiving at the local security component from one or more other applications running on the mobile device raw or partially processed data about events on the mobile device; processing the received data by the local security component against a database containing identification data for security threats and against the current mobile device configuration data to assess a security state of the mobile device, the processing including assigning by the local security component a severity level for each event; outputting by the local security component to the mobile device the security state assessment results, including a first assessed security state of the mobile device by the local security component for display of the current security state assessment on a mobile device display home screen; transmitting the raw or partially processed data about events on the mobile device to a server for processing at the server; receiving, at the mobile device, a second assessed security state of the mobile device from the server; and displaying the second assessed security state on the mobile device display, wherein the second assessed security state by the server is different from the first assessed security state by the local security component. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A method comprising the steps of:
-
providing a local security component on a mobile device; acquiring by the local security component data concerning a current configuration of the mobile device; receiving at the local security component from one or more other applications running on the mobile device raw or partially processed data about events on the mobile device; processing the received data by the local security component against a database containing identification data for security threats and against the current mobile device configuration data to assess a security state of the mobile device, the processing including assigning by the local security component a severity level for each event; and outputting by the local security component to the mobile device the security state assessment results for dynamic display of the current security state assessment on a portion of a mobile device display home screen. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35)
-
Specification