×

Method and system for mobile information security protection

  • US 8,914,893 B2
  • Filed: 08/24/2011
  • Issued: 12/16/2014
  • Est. Priority Date: 08/24/2011
  • Status: Expired due to Fees
First Claim
Patent Images

1. A system for mobile information security protection, the system comprises:

  • a local end comprising;

    an information collecting module executing at a central processing unit (CPU) of a mobile device, the information collecting module operable for extracting identification information corresponding to a plurality of applications installed on a mobile device;

    a local communication module executing at the CPU of the mobile device, the local communication module operable for sending the extracted identification information to a server and receiving a security report of the mobile phone from the server; and

    a display module executing at the CPU of the mobile device, the display module operable for presenting information received from the server to an user of the mobile device;

    a server end comprising;

    a server communication module for receiving the extracted identification information from the mobile device and for sending the security report to the mobile device; and

    a comparator module for matching the extracted identification information to information stored in a database;

    wherein the database includes a plurality of information packages, each information package corresponding to each of the plurality of applications,wherein the plurality of information packages in the database further includes security risk information of the plurality of applications,wherein the security report is generated based on the security risk information associated with at least one application in the matched information, andwherein the security report comprises a collection of applications on the mobile device which can access hardware ID, a collection of applications on the mobile device which can access location information, a collection of applications on the mobile device which can access contacts information, and a collection of applications on the mobile device which can access photos or videos.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×