Adaptive observation of behavioral features on a mobile device
First Claim
1. A method for observing computing device behaviors over a period of time via a processor of a computing device to recognize the computing device behaviors that are inconsistent with normal operation patterns of the computing device, the method comprising:
- dynamically selecting, via the processor, one or more computing device behaviors for observation;
adaptively observing, via the processor, the dynamically selected computing device behaviors to collect behavior information;
generating a vector data structure that succinctly describes the collected behavior information via a plurality of numbers; and
using, by the processor, the vector data structure to identify a suspicious device behavior.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, devices and systems for detecting suspicious or performance-degrading mobile device behaviors intelligently, dynamically, and/or adaptively determine computing device behaviors that are to be observed, the number of behaviors that are to be observed, and the level of detail or granularity at which the mobile device behaviors are to be observed. The various aspects efficiently identify suspicious or performance-degrading mobile device behaviors without requiring an excessive amount of processing, memory, or energy resources.
187 Citations
96 Claims
-
1. A method for observing computing device behaviors over a period of time via a processor of a computing device to recognize the computing device behaviors that are inconsistent with normal operation patterns of the computing device, the method comprising:
-
dynamically selecting, via the processor, one or more computing device behaviors for observation; adaptively observing, via the processor, the dynamically selected computing device behaviors to collect behavior information; generating a vector data structure that succinctly describes the collected behavior information via a plurality of numbers; and using, by the processor, the vector data structure to identify a suspicious device behavior. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A computing device, comprising a multi-core processor including two or more processor cores, one or more of which is configured with processor-executable instructions to perform operations comprising:
-
dynamically selecting one or more computing device behaviors for observation; adaptively observing the dynamically selected computing device behaviors to collect behavior information; generating a vector data structure that succinctly describes the collected behavior information via a plurality of numbers; and using the vector data structure to identify a suspicious device behavior. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44)
-
-
45. A computing device, comprising:
-
means for dynamically selecting one or more computing device behaviors for observation; means for adaptively observing the dynamically selected computing device behaviors to collect behavior information; means for generating a vector data structure that succinctly describes the collected behavior information via a plurality of numbers; and means for using the vector data structure to identify a suspicious device behavior. - View Dependent Claims (46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66)
-
-
67. A non-transitory processor-readable storage medium having stored thereon processor-executable instructions configured to cause a processor to perform operations comprising:
-
dynamically selecting one or more computing device behaviors for observation; adaptively observing the dynamically selected computing device behaviors to collect behavior information; generating a vector data structure that succinctly describes the collected behavior information via a plurality of numbers; and using the vector data structure to identify a suspicious device behavior. - View Dependent Claims (68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 80, 81, 82, 83, 84, 85, 86, 87, 88)
-
-
89. A method of improving performance on a mobile device, comprising:
-
performing on a mobile device processor real-time behavior analysis of one or more mobile device behaviors to generate coarse observations; identifying suspicious behavior from the coarse observations; dynamically determining the mobile device behaviors that require further observation in greater detail; dynamically determining a level of detail required for the further observation; performing finer observations based on the determined level of detail required for the further observation; generating a vector data structure that succinctly describes the finer observations via a plurality of numbers; and using the vector data structure to identify suspicious behavior from the finer observations. - View Dependent Claims (90)
-
-
91. A computing device, comprising a multi-core processor including two or more processor cores, one or more of which is configured with processor-executable instructions to perform operations comprising:
-
performing on a mobile device processor real-time behavior analysis of one or more mobile device behaviors to generate coarse observations; identifying suspicious behavior from the coarse observations; dynamically determining the mobile device behaviors that require further observation in greater detail; dynamically determining a level of detail required for the further observation; performing finer observations based on the determined level of detail required for the further observation; generating a vector data structure that succinctly describes the finer observations via a plurality of numbers; and using the vector data structure to identify suspicious behavior from the finer observations. - View Dependent Claims (92)
-
-
93. A computing device, comprising:
-
means for performing on a mobile device processor real-time behavior analysis of one or more mobile device behaviors to generate coarse observations; means for identifying suspicious behavior from the coarse observations; means for dynamically determining the mobile device behaviors that require further observation in greater detail; means for dynamically determining a level of detail required for the further observation; means for performing finer observations based on the determined level of detail required for the further observation; means for generating a vector data structure that succinctly describes the finer observations via a plurality of numbers; and means for using the vector data structure to identify suspicious behavior from the finer observations. - View Dependent Claims (94)
-
-
95. A non-transitory processor-readable storage medium having stored thereon processor-executable instructions to cause a processor to perform operations comprising:
-
performing on a mobile device processor real-time behavior analysis of one or more mobile device behaviors to generate coarse observations; identifying suspicious behavior from the coarse observations; dynamically determining the mobile device behaviors that require further observation in greater detail; dynamically determining a level of detail required for the further observation; performing finer observations based on the determined level of detail required for the further observation; generating a vector data structure that succinctly describes the finer observations via a plurality of numbers; and using the vector data structure to identify suspicious behavior from the finer observations. - View Dependent Claims (96)
-
Specification