In-the-cloud sandbox for inspecting mobile applications for malicious content
First Claim
1. A method of inspecting mobile applications for malicious content, the method comprising:
- receiving a request from a mobile device running a mobile operating system to inspect a particular mobile application for malicious content;
in response to receiving the request, receiving the particular mobile application from a mobile application source, installing the particular mobile application in a virtual machine sandbox running in a cloud computer system, and inspecting the particular mobile application for malicious content while the particular mobile application is executing in the virtual machine sandbox; and
sending a result of inspecting the particular mobile application for malicious content to the mobile device.
1 Assignment
0 Petitions
Accused Products
Abstract
A low resource mobile device, such as a smart phone or a tablet running a mobile operating system, requests a cloud computer system to inspect a mobile application for malicious content. The cloud computer system downloads the mobile application from a mobile application source, and installs the mobile application in a virtual machine sandbox. The cloud computer system inspects the mobile application for malicious content while the mobile application executes in the virtual machines sandbox. The result of the inspection is sent to the user in accordance with a setting that may be indicated in a cloud sandbox agent running on the mobile device.
51 Citations
20 Claims
-
1. A method of inspecting mobile applications for malicious content, the method comprising:
-
receiving a request from a mobile device running a mobile operating system to inspect a particular mobile application for malicious content; in response to receiving the request, receiving the particular mobile application from a mobile application source, installing the particular mobile application in a virtual machine sandbox running in a cloud computer system, and inspecting the particular mobile application for malicious content while the particular mobile application is executing in the virtual machine sandbox; and sending a result of inspecting the particular mobile application for malicious content to the mobile device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for inspecting mobile applications for malicious content, the system comprising:
-
a mobile device configured to send a request to inspect a particular mobile application for malicious content, the mobile device running a mobile operating system; a mobile application source storing the particular mobile application; and the cloud computer system comprising one or more computers configured to receive from the mobile device the request to inspect the particular mobile application for malicious content, the cloud computer system being configured in response to the request to download the particular mobile application from the mobile application source over a computer network, to install the particular mobile application in a virtual machine sandbox, to inspect the particular mobile application for malicious content while the particular mobile application is executing in the virtual machine sandbox, and to forward to the mobile device a result of the inspection of the particular mobile application for malicious content. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A method of inspecting mobile applications for malicious content, the method comprising:
-
a smart phone sending a request to inspect a particular mobile application for malicious content to a cloud computer system; in response to receiving the request to inspect the particular mobile application for malicious content, the cloud computer system downloading the particular mobile application from a mobile application source over a computer network, installing the particular mobile application in a virtual machine sandbox, inspecting the particular mobile application for malicious content while the particular mobile application is executing in the virtual machine sandbox, and sending a result of inspecting the particular mobile application for malicious content to the smart phone. - View Dependent Claims (17, 18, 19, 20)
-
Specification