×

Location based process-monitoring

  • US 9,330,256 B2
  • Filed: 02/01/2013
  • Issued: 05/03/2016
  • Est. Priority Date: 02/01/2013
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method comprising:

  • determining, by a mobile device, a location of the mobile device;

    providing, by the mobile device, the determined location of the mobile device as location data representative of an identifiable geographic region where the mobile device is located;

    determining, by the mobile device, a security type for an area corresponding to the identifiable geographic region where the mobile device is located;

    controlling, by the mobile device, adjustable monitoring operations to monitor behavior of one or more user-initiated processes for activities performed by the mobile device, the activities initiated by a user of the mobile device and executing on the mobile device, based on the determined security type for the area, the adjustable monitoring operations configured to identify potential one or more security-risky processes from the one or more user-initiated processes and further configured to provide data, with a level of information that depends on the determined security type for the area, for the one or more user-initiated processes, wherein controlling the adjustable monitoring operations further comprises adjusting which processes and which features of the one or more user-initiated processes to monitor based on the determined security type for the area, and wherein at least one of the one or more user-initiated processes for the activities performed by the mobile device causes a potential security risk;

    identifying, by the mobile device, the monitored behavior of at least one of the one or more user-initiated processes executing on the mobile device as potentially malicious behavior based on the data provided by the adjustable monitoring operations and the determined security type for the area; and

    classifying, by the mobile device, the at least one of the one or more user-initiated processes as being a risky or non-risky activity based, at least in part, on whether the monitored behavior of the at least one of the one or more user-initiated processes is identified as potentially malicious behavior and based, at least in part, on the determined security type for the area.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×