Apparatus, system and methods for portable device tracking using temporary privileged access
First Claim
Patent Images
1. A method for monitoring a portable device, the method comprising:
- activating, by executing an instruction with a processor, a shell to access at least a kernel layer in the portable device;
verifying whether the shell has an elevated privilege;
in response to detecting that the shell does not have the elevated privilege, gaining the elevated privilege;
configuring a packet capturer to capture packets on the portable device using the elevated privilege when the shell is deactivated, the packet capturer to communicate between the kernel layer and a user layer of the portable device;
deactivating the shell; and
analyzing, by executing an instruction with the processor, the packets captured by the packet capturer to produce media exposure data.
11 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented system, apparatus and method for accessing a portable device to execute monitoring capabilities. The monitoring capabilities include packet detection, which in turn may be processed to produce media exposure data. The monitoring capabilities are installed using privileged access in order to obtain data from a kernel layer of the portable device, and the device is returned to an original state following installation, in order to comply with operating system requirements. Audio media exposure data may further be integrated with the packet-detected media exposure data.
12 Citations
12 Claims
-
1. A method for monitoring a portable device, the method comprising:
-
activating, by executing an instruction with a processor, a shell to access at least a kernel layer in the portable device; verifying whether the shell has an elevated privilege; in response to detecting that the shell does not have the elevated privilege, gaining the elevated privilege; configuring a packet capturer to capture packets on the portable device using the elevated privilege when the shell is deactivated, the packet capturer to communicate between the kernel layer and a user layer of the portable device; deactivating the shell; and analyzing, by executing an instruction with the processor, the packets captured by the packet capturer to produce media exposure data. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A tangible machine-readable storage disk or storage device comprising instructions which, when executed, cause a machine to at least:
-
activate a shell to access at least a kernel layer in the portable device; verify whether the shell has an elevated privilege; in response to detecting that the shell does not have the elevated privilege, gain the elevated privilege; configure a packet capturer to capture packets on the portable device using the elevated privilege when the shell is deactivated, the packet capturer to communicate between the kernel layer and a user layer of the portable device; deactivate the shell; and analyze the packets captured by the packet capturer to produce media exposure data. - View Dependent Claims (8, 9, 10, 11, 12)
-
Specification