SYSTEM AND METHOD OF REPORTING AND VISUALIZING MALWARE ON MOBILE NETWORKS
First Claim
Patent Images
1. A system that monitors malware within a mobile network, comprising:
- a receiver component that obtains data regarding the malware in the mobile network, said data is obtained from a first source and a second source, said first source is of a different type than said second source; and
an analysis component that generates a malware analysis of the mobile network as a function of said data.
4 Assignments
0 Petitions
Accused Products
Abstract
A network management system monitors malware within a mobile network. The system comprises a receiver component that obtains data regarding malware in the mobile network. The data is obtained from a first source and a second source, where the first source is of a different type than the second source. The monitoring system also includes an analysis component that generates a malware analysis of the mobile network as a function of the data.
280 Citations
20 Claims
-
1. A system that monitors malware within a mobile network, comprising:
-
a receiver component that obtains data regarding the malware in the mobile network, said data is obtained from a first source and a second source, said first source is of a different type than said second source; and an analysis component that generates a malware analysis of the mobile network as a function of said data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method of monitoring a mobile network, comprising:
-
obtaining a malware data from which mobile device identity information is derived; and processing said malware data to produce a malware analysis that facilitates operator comprehension of a malware on the mobile network. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
-
19. A system that facilitates mitigation of malware in a mobile network, comprising:
-
means for scanning data to obtain first malware data obtained from a first source and second malware data obtained from a second source, said first source is of a different type than said second source; and means for generating a malware analysis based at least in part upon said first malware data and said second malware data. - View Dependent Claims (20)
-
Specification