Method and system for mobile information security protection
First Claim
Patent Images
1. A system for mobile information security protection, the system comprises:
- a local end comprising;
an information collecting module executing at a central processing unit (CPU) of a mobile device, the information collecting module operable for extracting identification information corresponding to a plurality of applications installed on a mobile device;
a local communication module executing at the CPU of the mobile device, the local communication module operable for sending the extracted identification information to a server and receiving a security report of the mobile phone from the server; and
a display module executing at the CPU of the mobile device, the display module operable for presenting information received from the server to an user of the mobile device;
a server end comprising;
a server communication module for receiving the extracted identification information from the mobile device and for sending the security report to the mobile device; and
a comparator module for matching the extracted identification information to information stored in a database;
wherein the database includes a plurality of information packages, each information package corresponding to each of the plurality of applications,wherein the plurality of information packages in the database further includes security risk information of the plurality of applications,wherein the security report is generated based on the security risk information associated with at least one application in the matched information, andwherein the security report comprises a collection of applications on the mobile device which can access hardware ID, a collection of applications on the mobile device which can access location information, a collection of applications on the mobile device which can access contacts information, and a collection of applications on the mobile device which can access photos or videos.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system for mobile information security protection may include extracting, by a first processor, identification information corresponding to a plurality of applications installed on a mobile device, sending the extracted identification information to a server, matching, by a second processor, the identification information to information stored in a database storage, receiving matched information from the database storage as a result of matching the identification information, sending the matched information to the mobile device, and presenting the matched information to a user of the mobile device.
-
Citations
13 Claims
-
1. A system for mobile information security protection, the system comprises:
-
a local end comprising; an information collecting module executing at a central processing unit (CPU) of a mobile device, the information collecting module operable for extracting identification information corresponding to a plurality of applications installed on a mobile device; a local communication module executing at the CPU of the mobile device, the local communication module operable for sending the extracted identification information to a server and receiving a security report of the mobile phone from the server; and a display module executing at the CPU of the mobile device, the display module operable for presenting information received from the server to an user of the mobile device; a server end comprising; a server communication module for receiving the extracted identification information from the mobile device and for sending the security report to the mobile device; and a comparator module for matching the extracted identification information to information stored in a database; wherein the database includes a plurality of information packages, each information package corresponding to each of the plurality of applications, wherein the plurality of information packages in the database further includes security risk information of the plurality of applications, wherein the security report is generated based on the security risk information associated with at least one application in the matched information, and wherein the security report comprises a collection of applications on the mobile device which can access hardware ID, a collection of applications on the mobile device which can access location information, a collection of applications on the mobile device which can access contacts information, and a collection of applications on the mobile device which can access photos or videos. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for mobile information security protection, the method comprising:
-
extracting, by a first processor executing at a central processing unit (CPU) of a mobile device, identification information corresponding to a plurality of applications installed on the mobile device; sending the extracted identification information to a server; matching, by a second processor, the identification information to information stored in a database storage, wherein the database storage includes a plurality of information packages, each information package corresponding to each of the plurality of applications, and the plurality of information packages in the database storage further includes security risk information of the plurality of applications; receiving matched information from the database storage as a result of matching the identification information; compiling and generating a security report of the mobile device based on the security risk information associated with at least one application in the matched information; sending the security report to the mobile device; presenting the security report to a user of the mobile device; and wherein the security report comprises a collection of applications on the mobile device which can access hardware ID, a collection of applications on the mobile device which can access location information, a collection of applications on the mobile device which can access contacts information, and a collection of applications on the mobile device which can access photos or videos. - View Dependent Claims (9, 10, 11, 12, 13)
-
Specification