Application risk analysis
First Claim
1. A mobile communication device, comprising:
- a radio transceiver to communicatively couple the mobile communication device to a radio access network by a wireless communication link;
a non-transitory memory;
a processor; and
a monitoring application stored in the non-transitory memory that, when executed by the processor, is configured todetermine a risk profile of a monitored application installed on the mobile communication device based on;
a comparison of performance of the mobile communication device before and after installation of the monitored application on the mobile communication device,a comparison of requests by the monitored application to access a network associated with the mobile communication device or an application stored on or accessed by the mobile communication device versus requests for access by applications of a same application type as the monitored application, wherein the same application type comprises one of voice communication, data communication, web browsing, email, short message system, texting, multimedia message system, gaming, social networking, informational enhancing, functional enhancing, and performance enhancing, andand at least one of;
community feedback of the monitored application,an amount of time elapsed since release of the monitored application, ora risk profile of a publisher of the monitored application; and
perform an action responsive to the risk profile of the monitored application meeting or exceeding a predefined threshold.
6 Assignments
0 Petitions
Accused Products
Abstract
A method of managing the risk of a monitored application installed on a mobile communication device comprises determining a risk profile of the monitored application based on at least one of: comparison of performance of the mobile communication device before and after installation of the monitored application on the mobile communication device, comparison of permission requests of the monitored application versus a type of the monitored application, community feedback of the monitored application, an amount of time elapsed since release of the monitored application, and a risk profile of a publisher of the monitored application; and performing a first action if the risk profile of the monitored application meets or exceeds a predefined first threshold.
-
Citations
16 Claims
-
1. A mobile communication device, comprising:
-
a radio transceiver to communicatively couple the mobile communication device to a radio access network by a wireless communication link; a non-transitory memory; a processor; and a monitoring application stored in the non-transitory memory that, when executed by the processor, is configured to determine a risk profile of a monitored application installed on the mobile communication device based on; a comparison of performance of the mobile communication device before and after installation of the monitored application on the mobile communication device, a comparison of requests by the monitored application to access a network associated with the mobile communication device or an application stored on or accessed by the mobile communication device versus requests for access by applications of a same application type as the monitored application, wherein the same application type comprises one of voice communication, data communication, web browsing, email, short message system, texting, multimedia message system, gaming, social networking, informational enhancing, functional enhancing, and performance enhancing, and and at least one of; community feedback of the monitored application, an amount of time elapsed since release of the monitored application, or a risk profile of a publisher of the monitored application; and perform an action responsive to the risk profile of the monitored application meeting or exceeding a predefined threshold. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method of managing the risk of a monitored application installed on a mobile communication device, the method comprising:
-
determining a risk profile of the monitored application based on; a comparison of requests by the monitored application to access a network associated with the mobile communication device or an application stored on or accessed by the mobile communication device versus requests for access by applications of a same application type as the monitored application, wherein the same application type comprises one of voice communication, data communication, web browsing, email, short message system, texting, multimedia message system, gaming, social networking, informational enhancing, functional enhancing, and performance enhancing, a comparison of performance of the mobile communication device before and after installation of the monitored application on the mobile communication device, and at least one of; community feedback of the monitored application, an amount of time elapsed since release of the monitored application, or a risk profile of a publisher of the monitored application; and performing an action responsive to the risk profile of the monitored application meeting or exceeding a predefined threshold. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
Specification