Auditing of mobile applications
First Claim
1. In a computerized environment comprising a mobile device and a mobile auditing application in communication with a network, a method of the mobile auditing application auditing tags launched within a target mobile application, the method comprising the acts of:
- intercepting, with the mobile auditing application, a network communication as it is generated, and prior to transferring the network communication to the network, wherein;
the network communication originates from the target mobile application, andthe mobile auditing application and the target mobile application are both installed on the mobile device;
analyzing the network communication to determine if an identifiable tag signature is present within the network communication, wherein an identifiable tag signature comprises one or more attributes that are associated with the firing of a tag;
based upon a detected tag signature, determining that a particular tag fired; and
recording information associated with the particular tag.
3 Assignments
0 Petitions
Accused Products
Abstract
A method for auditing tags launched within a target mobile application comprises analyzing a network communication generated by a target mobile application to determine if an identifiable tag signature is present within the network communication. An identifiable tag signature can comprise one or more attributes that are associated with the firing of a tag. Based upon a detected tag signature, the method can further comprise determining that a particular tag fired. Further the method can comprise recording information associated with the particular tag.
-
Citations
20 Claims
-
1. In a computerized environment comprising a mobile device and a mobile auditing application in communication with a network, a method of the mobile auditing application auditing tags launched within a target mobile application, the method comprising the acts of:
-
intercepting, with the mobile auditing application, a network communication as it is generated, and prior to transferring the network communication to the network, wherein; the network communication originates from the target mobile application, and the mobile auditing application and the target mobile application are both installed on the mobile device; analyzing the network communication to determine if an identifiable tag signature is present within the network communication, wherein an identifiable tag signature comprises one or more attributes that are associated with the firing of a tag; based upon a detected tag signature, determining that a particular tag fired; and recording information associated with the particular tag. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. In a computerized environment comprising an auditing system and a mobile application in communication with a network, a method of the auditing system auditing tags launched within the mobile application, the method comprising the acts of:
-
directing, through a proxy server, an intercepted network communication, wherein the network communication originates from a target mobile application installed on a mobile device; analyzing the network communication to determine if an identifiable tag signature is present within the network communication, wherein an identifiable tag signature comprises one or more attributes that are associated with the firing of a tag; based upon a detected tag signature, determining that a particular tag fired; and recording information associated with the particular tag. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
-
14. In a computerized environment comprising an application interface layer and a target mobile application in communication with a network, a method of the application interface layer auditing tags launched within the target mobile application, the method comprising the acts of:
-
intercepting, with the application interface layer, a network communication as it is generated, and prior to transferring the network communication to the network, wherein; the network communication originates from the target mobile application, the application interface layer is installed on a desktop computer, the target mobile application is installed within the application interface layer, and the target mobile application behaves as if it is installed on a mobile device; analyzing the network communication to determine if an identifiable tag signature is present within the network communication, wherein an identifiable tag signature comprises one or more attributes that are associated with the firing of a tag; based upon a detected tag signature, determining that a particular tag fired; and recording information associated with the particular tag. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification