×

System and method for adverse mobile application identification

  • US 8,984,628 B2
  • Filed: 02/23/2011
  • Issued: 03/17/2015
  • Est. Priority Date: 10/21/2008
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • on a server in communication with a plurality of mobile communication devices, the plurality connected to a mobile communication device network, receiving, at the server, first behavioral data associated with monitoring a data object accessed by a first mobile communication device of the plurality of mobile communication devices;

    receiving, at the server, second behavioral data associated with monitoring a copy of the data object accessed by a second mobile communication device, different from the first mobile communication device, of the plurality of mobile communication devices;

    storing in a data store accessible by the server, the first behavioral data for the data object and the second behavioral data for the copy of the data object;

    applying, at the server, a model to at least some of the stored first behavioral data to determine whether or not accessing the data object;

    would have an adverse effect on at least one of the plurality of mobile communication devices, or would violate an application policy by exceeding a network resource limitation;

    based on the application of the model to at least some of the first behavioral data, determining, at the server, that accessing the data object;

    would not have an adverse effect on any of the plurality of mobile communication devices, and would not violate the application policy;

    after the step of determining that accessing the data object would not have an adverse effect on any of the plurality of mobile communication device and would not violate the application policy, analyzing the second behavioral data to determine whether accessing the data object would;

    have an adverse effect on any of the plurality of mobile communication devices, or violate the application policy;

    based on the analysis of the second behavioral data, determining, at the server, that accessing the data object would not have an adverse effect on any of the plurality of mobile communication devices, and would violate the application policy by exceeding the network resource limitation;

    creating disposition information including the determination that accessing the data object would violate the application policy;

    aggregating disposition information, in a data store accessible by the server; and

    ,transmitting, from the server, a notification to a subscriber about aggregated disposition information that includes an overall assessment the data object violates the application policy.

View all claims
  • 8 Assignments
Timeline View
Assignment View
    ×
    ×