×

Methods and systems for sharing risk responses to improve the functioning of mobile communications devices

  • US 9,779,253 B2
  • Filed: 12/28/2016
  • Issued: 10/03/2017
  • Est. Priority Date: 10/21/2008
  • Status: Active Grant
First Claim
Patent Images

1. A method for sharing security risk responses between a plurality of collections to improve the functioning of mobile communications devices associated with at least one collection based on the shared security risk responses, the method comprising:

  • accessing, by a server security component, a security database including a plurality of security risk responses, each security risk response associated with at least one of the plurality of collections;

    identifying, by the server security component, a first security risk response in the security database, wherein the first security risk response was implemented by at least one of the plurality of collections;

    determining, by the server security component from the security database, a first collection associated with the first security risk response;

    accessing, by the server security component, a relationship database, the relationship database including collection profiles related to the sharing of information between the plurality of collections, the collection profiles including collection attributes;

    identifying, by the server security component from information related to the first security risk response in the security database, a set of response attributes of the first security risk response;

    identifying, for a second collection, a set of collection attributes that are similar to response attributes in set of response attributes;

    receiving, by the server security component, a response attribute value for each response attribute in the set of response attributes;

    assigning, by the server security component, a collection attribute value to each of the attributes in the set of collection attributes, wherein the collection attribute values are assigned to a collection attribute based on the response attribute value of the similar corresponding response attribute in the set of response attributes;

    summing, by the server security component, the assigned collection attribute values; and

    ,providing, by the server security component, the first security risk response to the second collection;

    (i) when a first collection profile indicates that the first collection permits information related to the first security risk response to be provided to the second collection; and

    (ii) when the sum of the assigned collection attribute values equals or exceeds a threshold value.

View all claims
  • 7 Assignments
Timeline View
Assignment View
    ×
    ×