Methods and systems for sharing risk responses to improve the functioning of mobile communications devices
First Claim
1. A method for sharing security risk responses between a plurality of collections to improve the functioning of mobile communications devices associated with at least one collection based on the shared security risk responses, the method comprising:
- accessing, by a server security component, a security database including a plurality of security risk responses, each security risk response associated with at least one of the plurality of collections;
identifying, by the server security component, a first security risk response in the security database, wherein the first security risk response was implemented by at least one of the plurality of collections;
determining, by the server security component from the security database, a first collection associated with the first security risk response;
accessing, by the server security component, a relationship database, the relationship database including collection profiles related to the sharing of information between the plurality of collections, the collection profiles including collection attributes;
identifying, by the server security component from information related to the first security risk response in the security database, a set of response attributes of the first security risk response;
identifying, for a second collection, a set of collection attributes that are similar to response attributes in set of response attributes;
receiving, by the server security component, a response attribute value for each response attribute in the set of response attributes;
assigning, by the server security component, a collection attribute value to each of the attributes in the set of collection attributes, wherein the collection attribute values are assigned to a collection attribute based on the response attribute value of the similar corresponding response attribute in the set of response attributes;
summing, by the server security component, the assigned collection attribute values; and
,providing, by the server security component, the first security risk response to the second collection;
(i) when a first collection profile indicates that the first collection permits information related to the first security risk response to be provided to the second collection; and
(ii) when the sum of the assigned collection attribute values equals or exceeds a threshold value.
7 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems are provided for sharing security risk information between collections of computing devices, such as mobile communications devices, to improve the functioning of devices associated with the collections. The methods and systems disclosed may share security risk information by identifying a security risk response by a first collection and then providing the security risk response to a second collection when a relationship database profile for the first collection indicates the security response may be shared with the second collection. Methods and systems are also provided for determining whether to allow a request from an originating device where the request may have been initiated by a remote device.
357 Citations
20 Claims
-
1. A method for sharing security risk responses between a plurality of collections to improve the functioning of mobile communications devices associated with at least one collection based on the shared security risk responses, the method comprising:
-
accessing, by a server security component, a security database including a plurality of security risk responses, each security risk response associated with at least one of the plurality of collections; identifying, by the server security component, a first security risk response in the security database, wherein the first security risk response was implemented by at least one of the plurality of collections; determining, by the server security component from the security database, a first collection associated with the first security risk response; accessing, by the server security component, a relationship database, the relationship database including collection profiles related to the sharing of information between the plurality of collections, the collection profiles including collection attributes; identifying, by the server security component from information related to the first security risk response in the security database, a set of response attributes of the first security risk response; identifying, for a second collection, a set of collection attributes that are similar to response attributes in set of response attributes; receiving, by the server security component, a response attribute value for each response attribute in the set of response attributes; assigning, by the server security component, a collection attribute value to each of the attributes in the set of collection attributes, wherein the collection attribute values are assigned to a collection attribute based on the response attribute value of the similar corresponding response attribute in the set of response attributes; summing, by the server security component, the assigned collection attribute values; and
,providing, by the server security component, the first security risk response to the second collection; (i) when a first collection profile indicates that the first collection permits information related to the first security risk response to be provided to the second collection; and (ii) when the sum of the assigned collection attribute values equals or exceeds a threshold value. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method for sharing security risk responses between a plurality of collections to improve the functioning of computing devices associated with at least one collection based on the shared security risk responses, the method comprising:
-
accessing, by a server security component, a security database including information useful for detecting security risk events associated with mobile communications devices; detecting, by the server security component based on the security database information, a security risk event associated with at least one mobile communications device, wherein the at least one mobile communications device is associated with a first collection; notifying, by the server security component, the first collection of the detected security risk event; determining, by the server security component, a first security risk response of the first collection to the detected security risk event; accessing, by the server security component, a relationship database, the relationship database including collection profiles related to the sharing of information between the plurality of collections, the collection profiles include collection attributes; identifying, by the server security component from information related to the first security risk response in the security database, a set of response attributes of the first security risk response; identifying, for a second collection, a set of collection attributes that are similar to response attributes in the set of response attributes; receiving, by the server security component, a response attribute value for each response attribute in the set of response attributes; assigning, by the server security component, a collection attribute value to each of the attributes in the set of collection attributes, wherein the collection attribute values are assigned to a collection attribute based on the response attribute value of the similar corresponding response attribute in the set of response attributes; summing, by the server security component, the assigned collection attribute values; and
,providing, by the server security component, the first security risk response to the second collection; (i) when a first collection profile indicates that the first collection permits information related to the first security risk response to be provided to the second collection; and (ii) when the sum of the assigned collection attribute values equals or exceeds a threshold value. - View Dependent Claims (13, 14, 15)
-
-
16. A method for sharing security risk responses between a plurality of collections to improve the functioning of mobile communications devices associated with at least one collection based on the shared security risk responses, the method comprising:
-
accessing, by a server security component, a security database including information useful for detecting security risk events associated with mobile communications devices; determining, by the server security component from the security database information, a security risk event detected by a device security component on a first mobile communications device; determining, by the server security component from the security database information, a first collection associated with the first mobile communications device; accessing, by the server security component, a relationship database, the relationship database including collection profiles related to the sharing of information between the plurality of collections, the collection profiles including collection attributes; determining, by the server security component from a first collection profile, that the first collection permits information related to the detected security risk event to be provided to a first set of at least one collection of the plurality; providing, by the server security component, information related to the detected security risk event to the first set of at least one collection; determining, by the server security component, a first security risk response to the detected security risk event from a second collection of the first set of at least one collection; accessing, by the server security component, the relationship database; identifying, by the server security component from information related to the first security risk response in the security database, a set of response attributes of the first security risk response; identifying, for a second set of at least one collection, a set of collection attributes that are similar to response attributes in set of response attributes; receiving, by the server security component, a response attribute value for each response attribute in the set of response attributes; assigning, by the server security component, a collection attribute value to each of the attributes in the set of collection attributes, wherein the collection attribute values are assigned to a collection attribute based on the response attribute value of the similar corresponding response attribute in the set of response attributes; summing, by the server security component, the assigned collection attribute values; and providing, by the server security component, information related to the first security risk response to the second set of at least one collection; (i) when the server security component determines from the second collection profile that the second collection permits information related to the first security risk response to be provided to the second set of at least one collection; and (ii) when the sum of the assigned collection attribute values equals or exceeds a threshold value. - View Dependent Claims (17, 18, 19)
-
-
20. A method for sharing security risk responses between a plurality of collections to improve the functioning of mobile communications devices associated with at least one collection based on the shared security risk responses, the method comprising:
-
accessing, by a server security component, a security database including a plurality of security risk responses, each security risk response associated with at least one of the plurality of collections; identifying, by the server security component, a first security risk response in the security database, wherein the first security risk response was implemented by at least one of the plurality of collections; determining, by the server security component from the security database, a first collection associated with the first security risk response; accessing, by the server security component, a relationship database, the relationship database including collection profiles related to the sharing of information between the plurality of collections, the collection profiles including collection attributes; identifying, by the server security component from information related to the first security risk response in the security database, a set of response attributes of the first security risk response; identifying, for a second collection, a set of collection attributes that are similar to response attributes in set of response attributes; receiving, by the server security component, a response attribute value for each response attribute in the set of response attributes; assigning, by the server security component, a collection attribute value to each of the attributes in the set of collection attributes, wherein the collection attribute values are assigned to a collection attribute based on the response attribute value of the similar corresponding response attribute in the set of response attributes; evaluating, by the server security component, the assigned collection attribute values to determine whether the first security risk response is relevant to the second collection; and
,providing, by the server security component, the first security risk response to the second collection; (i) when a first collection profile indicates that the first collection permits information related to the first security risk response to be provided to the second collection; and (ii) when the evaluation of the assigned collection attribute values indicates the first security risk response is relevant to the second collection.
-
Specification