Method for the monitoring of system security in electronic devices
First Claim
Patent Images
1. A method, comprising:
- detecting a user interface action in said electronic device;
initiating a security monitoring application in said electronic device in response to said user interface action;
gathering security information on at least a first application process among at least one application process executing in said electronic device to said security monitoring application, said security information comprising identification of a remote party with which said first application process is communicating, a port number or a protocol name for the protocol used by said first application process and a name of at least one file open in said first application process;
forming a security information list using said security information, said security information list comprising an entry for said first application process, said entry comprising a name of said first application process, said identification of said remote party, said port number or said protocol name and said name of the at least one file; and
presenting said security information list on a display in said electronic device.
2 Assignments
0 Petitions
Accused Products
Abstract
A method, an electronic device and a computer program, for the monitoring of system security in an electronic device. In the method a security monitoring entity initiation event provided by a user is detected. Security information on at least one application process executing in the electronic device is gathered. The security information is presented on a display in the electronic device. After the presentation of the security information, the user is, for example, allowed to select at least one of the at least one application process and the at least one of the at least one application process is terminated.
13 Citations
21 Claims
-
1. A method, comprising:
-
detecting a user interface action in said electronic device; initiating a security monitoring application in said electronic device in response to said user interface action; gathering security information on at least a first application process among at least one application process executing in said electronic device to said security monitoring application, said security information comprising identification of a remote party with which said first application process is communicating, a port number or a protocol name for the protocol used by said first application process and a name of at least one file open in said first application process; forming a security information list using said security information, said security information list comprising an entry for said first application process, said entry comprising a name of said first application process, said identification of said remote party, said port number or said protocol name and said name of the at least one file; and presenting said security information list on a display in said electronic device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An apparatus comprising:
-
a memory to store at least a security monitor application and at least one application process; a display to show a security monitor dialog; a keypad; a processor coupled to the memory, the display and the keypad, wherein the processor is configured to detect a user interface action, to initiate a security monitoring application in said electronic device in response to said user interface action, to gather security information on at least a first application process among said at least one application process executing in said electronic device to said security monitoring application, said security information comprising identification of a remote party with which said first application process is communicating, a port number or a protocol name for the protocol used by said first application process and a name of at least one file open in said first application process, to form a security information list using said security information, said security information list comprising an entry for said first application process, said entry comprising a name of said first application process, said identification of said remote party. said port number or said protocol name and said name of the at least one file, and to present said security information list on said display. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A computer program embodied on a computer readable medium, the computer program comprising code for controlling a processor to execute a method comprising:
-
detecting a user interface action in an electronic device; initiating a security monitoring application in response to said user interface action; gathering security information on at least a first application process among at least one application process executing in said electronic device to said security monitoring application, said security information comprising identification of a remote party with which said first application process is communicating, a port number or a protocol name for the protocol used by said first application process and a name of at least one file open in said first application process; forming a security information list using said security information, said security information list comprising an entry for said first application process, said entry comprising a name of said first application process, said identification of said remote party, said port number or said protocol name and said name of the at least one file; and presenting said security information on a display in said electronic device. - View Dependent Claims (20, 21)
-
Specification