Pre-identifying probable malicious behavior based on configuration pathways
First Claim
1. A method of predicting probable malicious behavior on a mobile computing device, comprising:
- receiving, via a processor of the mobile computing device, a pathway configuration database from a server computing device, wherein the received pathway configuration database includes information identifying;
a configuration pattern;
a pathway between configurations that lead to a non-benign configuration; and
a probability value that identifies the possibility that the pathway will lead to a non-benign behavior;
determining, via the processor, operations scheduled for execution on the mobile computing device;
determining, via the processor, a probability that execution of scheduled operations will result in the non-benign behavior in the mobile computing device based on the information included in the received pathway configuration database;
andimplementing preventative measures in response to determining that the probability that the execution of scheduled operations will result in the non-benign behavior exceeds a threshold value.
1 Assignment
0 Petitions
Accused Products
Abstract
The various aspects include systems and methods for enabling mobile computing devices to recognize when they are at risk of experiencing malicious behavior in the near future given a current configuration. Thus, the various aspects enable mobile computing devices to anticipate malicious behaviors before a malicious behavior begins rather than after the malicious behavior has begun. In the various aspects, a network server may receive behavior vector information from multiple mobile computing devices and apply pattern recognition techniques to the received behavior vector information to identify malicious configurations and pathway configurations that may lead to identified malicious configurations. The network server may inform mobile computing devices of identified malicious configurations and the corresponding pathway configurations, thereby enabling mobile computing devices to anticipate and prevent malicious behavior from beginning by recognizing when they have entered a pathway configuration leading to malicious behavior.
-
Citations
20 Claims
-
1. A method of predicting probable malicious behavior on a mobile computing device, comprising:
-
receiving, via a processor of the mobile computing device, a pathway configuration database from a server computing device, wherein the received pathway configuration database includes information identifying; a configuration pattern; a pathway between configurations that lead to a non-benign configuration; and a probability value that identifies the possibility that the pathway will lead to a non-benign behavior; determining, via the processor, operations scheduled for execution on the mobile computing device; determining, via the processor, a probability that execution of scheduled operations will result in the non-benign behavior in the mobile computing device based on the information included in the received pathway configuration database; and implementing preventative measures in response to determining that the probability that the execution of scheduled operations will result in the non-benign behavior exceeds a threshold value. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A mobile computing device, comprising:
-
a memory; a transceiver; and a processor coupled to the memory and the transceiver, wherein the processor is configured with processor-executable instructions to perform operations comprising; receiving a pathway configuration database from a server computing device, wherein the received pathway configuration database includes information identifying; a configuration pattern, a pathway between configurations that lead to a non-benign configuration, and a probability value that identifies the possibility that the pathway will lead to a non-benign behavior; determining operations scheduled for execution on the mobile computing device; determining a probability that execution of scheduled operations will result in the non-benign behavior in the mobile computing device based on the information included in the received pathway configuration database; and implementing preventative measures in response to determining that the probability that the execution of scheduled operations will result in the non-benign behavior exceeds a threshold value. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A mobile computing device, comprising:
-
means for receiving a pathway configuration database from a server computing device, wherein the received pathway configuration database includes information identifying; a configuration pattern; a pathway between configurations that lead to a non-benign configuration; and a probability value that identifies the possibility that the pathway will lead to a non-benign behavior; means for determining operations scheduled for execution on the mobile computing device; means for determining a probability that execution of scheduled operations will result in the non-benign behavior in the mobile computing device based on the information included in the received pathway configuration database; and means for implementing preventative measures in response to determining that the probability that the execution of scheduled operations will result in the non-benign behavior exceeds a threshold value. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A non-transitory processor-readable storage medium having stored thereon processor-executable instructions configured to cause a mobile computing device processor of a mobile computing device to perform operations comprising:
-
receiving a pathway configuration database from a server computing device, wherein the received pathway configuration database includes information identifying; a configuration pattern; a pathway between configurations that lead to a non-benign configuration; and a probability value that identifies the possibility that the pathway will lead to a non-benign behavior; determining a probability that execution of scheduled operations will result in the non-benign behavior in the mobile computing device based on the information included in the received pathway configuration database; and implementing preventative measures in response to determining that the probability that the execution of scheduled operations will result in the non-benign behavior exceeds a threshold value. - View Dependent Claims (17, 18, 19, 20)
-
Specification