Techniques for autonomic reverting to behavioral checkpoints
First Claim
1. A method of checkpointing in a mobile device, comprising:
- observing a mobile device behavior over a period of time to collect behavior information;
using the collected behavior information to generate a behavior vector that includes a plurality of elements that collectively characterize the observed mobile device behavior;
applying a behavior model to the generated behavior vector to generate an analysis result;
using the generated analysis result to determine whether the observed mobile device behavior is not consistent with normal operation patterns of the mobile device;
storing mobile device state information in a memory as a stored checkpoint in response to determining that the observed mobile device behavior is consistent with the normal operation patterns of the mobile device; and
uploading the stored checkpoint to a backup storage system in response to determining that the observed mobile device behavior is not consistent with the normal operation patterns.
2 Assignments
0 Petitions
Accused Products
Abstract
Aspect methods, systems and devices may be configured to create/capture checkpoints without significantly impacting the performance, power consumption, or responsiveness of the mobile device. An observer module of the mobile device may instrument or coordinate various application programming interfaces (APIs) at various levels of the mobile device system and constantly monitor the mobile device (via a low power process, background processes, etc.) to identify the normal operation patterns of the mobile device and/or to identify behaviors that are not consistent with previously computed normal operation patterns. The mobile device may store mobile device state information in a memory as a stored checkpoint when it determines that the mobile device behaviors are consistent with normal operation patterns, and upload a previously stored checkpoint to a backup storage system when it determines that the mobile device behaviors are not consistent with normal operation patterns.
-
Citations
32 Claims
-
1. A method of checkpointing in a mobile device, comprising:
-
observing a mobile device behavior over a period of time to collect behavior information; using the collected behavior information to generate a behavior vector that includes a plurality of elements that collectively characterize the observed mobile device behavior; applying a behavior model to the generated behavior vector to generate an analysis result; using the generated analysis result to determine whether the observed mobile device behavior is not consistent with normal operation patterns of the mobile device; storing mobile device state information in a memory as a stored checkpoint in response to determining that the observed mobile device behavior is consistent with the normal operation patterns of the mobile device; and uploading the stored checkpoint to a backup storage system in response to determining that the observed mobile device behavior is not consistent with the normal operation patterns. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A mobile computing device, comprising:
-
means for observing a mobile device behavior over a period of time to collect behavior information; means for using the collected behavior information to generate a behavior vector that includes a plurality of elements that collectively characterize the observed mobile device behavior; means for applying a behavior model to the generated behavior vector to generate an analysis result; means for using the generated analysis result to determine whether the observed mobile device behavior is not consistent with normal operation patterns; means for storing mobile device state information in a memory as a stored checkpoint in response to determining that the observed mobile device behavior is consistent with the normal operation patterns of the mobile computing device; and means for uploading the stored checkpoint to a backup storage system in response to determining that the observed mobile device behavior is not consistent with the normal operation patterns. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A mobile computing device, comprising:
a processor configured with processor-executable instructions to perform operations comprising; observing a mobile device behavior over a period of time to collect behavior information; using the collected behavior information to generate a behavior vector that includes a plurality of elements that collectively characterize the observed mobile device behavior; applying a behavior model to the generated behavior vector to generate an analysis result; using the generated analysis result to determine whether the observed mobile device behavior is not consistent with normal operation patterns of the mobile computing device; storing mobile device state information in a memory as a stored checkpoint in response to determining that the observed mobile device behavior is consistent with the normal operation patterns of the mobile computing device; and uploading the stored checkpoint to a backup storage system in response to determining that the observed mobile device behavior is not consistent with the normal operation patterns. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
25. A non-transitory computer readable storage medium having stored thereon processor-executable software instructions configured to cause a processor to perform operations for checkpointing in a mobile device, the operations comprising:
-
observing a mobile device behavior over a period of time to collect behavior information; using the collected behavior information to generate a behavior vector that includes a plurality of elements that collectively characterize the observed mobile device behavior; applying a behavior model to the generated behavior vector to generate an analysis result; using the generated analysis result to determine whether the observed mobile device behavior is not consistent with normal operation patterns; storing mobile device state information in a memory as a stored checkpoint in response to determining that the observed mobile device behavior is consistent with the normal operation patterns of the mobile device; and uploading the stored checkpoint to a backup storage system in response to determining that the observed mobile device behavior is not consistent with the normal operation patterns. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32)
-
Specification