METHOD AND SYSTEM FOR EVALUATING SECURITY FOR AN INTERACTIVE SERVICE OPERATION BY A MOBILE DEVICE
First Claim
1. A method for evaluating security during an interactive service operation by a mobile communications device, the method comprising:
- identifying, by a mobile communications device, a launch of an interactive service configured to communicate with a server over a network during an interactive service operation;
generating, by the mobile communications device, a security evaluation based on a plurality of trust factors, wherein at least one of the plurality of trust factors is related to a current state of the mobile communications device, to a security feature of the interactive service, and/or to a security feature of the network; and
performing, by the mobile communications device, an action based on the security evaluation.
7 Assignments
0 Petitions
Accused Products
Abstract
A method for evaluating security during an interactive service operation by a mobile communications device includes launching, by a mobile communications device, an interactive service configured to access a server over a network during an interactive service operation, and generating a security evaluation based on a plurality of trust factors related to a current state of the mobile communications device, to a security feature of the application, and/or to a security feature of the network. When the security evaluation is generated, an action is performed based on the security evaluation.
32 Citations
28 Claims
-
1. A method for evaluating security during an interactive service operation by a mobile communications device, the method comprising:
-
identifying, by a mobile communications device, a launch of an interactive service configured to communicate with a server over a network during an interactive service operation; generating, by the mobile communications device, a security evaluation based on a plurality of trust factors, wherein at least one of the plurality of trust factors is related to a current state of the mobile communications device, to a security feature of the interactive service, and/or to a security feature of the network; and performing, by the mobile communications device, an action based on the security evaluation. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A method for evaluating security during an interactive service operation by a mobile communications device, the method comprising:
-
identifying, by a mobile communications device, a launch of an interactive service configured to communicate with a server over a network during an interactive service operation; determining, by the mobile communications device, a security score based on a plurality of trust factors, wherein at least one of the plurality of trust factors is related to a current state of the mobile communications device, to a security feature of the interactive service, and/or to a security feature of the network; generating a security evaluation for the interactive service based on the security score; and displaying, by the mobile communications device, the security evaluation for the interactive service and/or a contextual information overlay associated with the interactive service comprising a checklist that includes information regarding a current security status of the mobile communications device, a security status of the interactive service, and/or to a security status of the network, wherein the security evaluation and/or the contextual information overlay is displayed while the user is using the interactive service.
-
-
24. A method for evaluating security during an interactive service operation by a mobile communications device, the method comprising:
-
receiving, by a server, an indication from a mobile communications device that an interactive service on the mobile communications device is launched, wherein the interactive service is configured to communicate with another server over a network during an interactive service operation; and generating, by the server, a security evaluation based on a plurality of trust factors, wherein at least one of the plurality of trust factors is related to a current state of the mobile communications device, to a security feature of the interactive service, and/or to a security feature of the network. - View Dependent Claims (25, 26, 27, 28)
-
Specification