System and method for assessing vulnerability of a mobile device
First Claim
Patent Images
1. A method for assessing vulnerability of a mobile device comprising:
- at a vulnerability assessment component (VAC) operable on the mobile device and prior to receiving a vulnerability assessment request at a remote analysis cloud service, compiling at least one object identifier for the vulnerability assessment request, wherein compiling the at least one object identifier includes compiling and sending at least one additional superfluous object identifier;
communicating the vulnerability assessment request to the remote analysis cloud service;
at the remote analysis cloud service, receiving the at least one vulnerability assessment request that includes the object identifier for an operative object of the mobile computing device, wherein the vulnerability assessment request originates from the mobile computing device;
identifying a vulnerability assessment associated with the identifier of the operative object; and
communicating the identified vulnerability assessment to the mobile computing device.
3 Assignments
0 Petitions
Accused Products
Abstract
A system and method for assessing vulnerability of a mobile device including at a remote analysis cloud service, receiving at least one vulnerability assessment request that includes an object identifier for an operative object of a mobile computing device, wherein the vulnerability assessment request originates from the mobile computing device; identifying a vulnerability assessment associated with the identifier of the operative object; and communicating the identified vulnerability assessment to the mobile computing device.
-
Citations
16 Claims
-
1. A method for assessing vulnerability of a mobile device comprising:
-
at a vulnerability assessment component (VAC) operable on the mobile device and prior to receiving a vulnerability assessment request at a remote analysis cloud service, compiling at least one object identifier for the vulnerability assessment request, wherein compiling the at least one object identifier includes compiling and sending at least one additional superfluous object identifier; communicating the vulnerability assessment request to the remote analysis cloud service; at the remote analysis cloud service, receiving the at least one vulnerability assessment request that includes the object identifier for an operative object of the mobile computing device, wherein the vulnerability assessment request originates from the mobile computing device; identifying a vulnerability assessment associated with the identifier of the operative object; and communicating the identified vulnerability assessment to the mobile computing device. - View Dependent Claims (2, 3, 5, 6, 7, 8, 9, 10)
-
-
4. The method of 1, wherein the at least one compiled object identifier is a plurality of object identifiers that includes an executable code segment, a device identifier, and component version identifier.
-
11. A method for assessing vulnerability of a mobile device comprising:
-
at a vulnerability assessment component (VAC) operable on the mobile device and prior to receiving a plurality of vulnerability assessment requests at a remote analysis cloud service, compiling at least one object identifier for the plurality of vulnerability assessment requests, wherein compiling the at least one object identifier includes compiling and sending at least one additional superfluous object identifier; communicating the plurality of vulnerability assessment requests to the remote analysis cloud service; at the remote analysis cloud service, receiving the plurality of vulnerability assessment requests, wherein the vulnerability assessment request includes the at least one object identifier for an operative object of the mobile computing device, and wherein the vulnerability assessment request originates from the mobile computing device; for each vulnerability assessment request, identifying a vulnerability assessment associated with the identifier of the operative object; and communicating the identified vulnerability assessment to the associated mobile computing device. - View Dependent Claims (12, 13, 14, 15, 16)
-
Specification