×

Analyzing data gathered through different protocols

  • US 9,065,846 B2
  • Filed: 06/17/2013
  • Issued: 06/23/2015
  • Est. Priority Date: 10/21/2008
  • Status: Active Grant
First Claim
Patent Images

1. A method of performing a security analysis of a set of data received on a mobile communications device, the method comprising:

  • on a mobile communications device having multiple network hardware interfaces for receiving data, in response to receipt of the set of data by the mobile communications device through a first type of network hardware interface and a second type of network hardware interface, gathering information about the set of data received by the mobile communications device, a first subset of the set of data received at the first type of network hardware interface and a second subset of the set of data received at the second type of network hardware interface having different protocols;

    based upon the gathering step, assigning a first protocol to the first subset of data received from the first type of network hardware interface and assigning a second protocol to the second subset of data received from the second type of network hardware interface; and

    performing a common security analysis on at least a part of the data received from each of the first and second types of network hardware interfaces to determine whether the set of data received by the mobile communications device is safe or malicious, the common security analysis including;

    analyzing the first subset of data formatted according to the first protocol using a first protocol analysis component, andanalyzing the second subset of data formatted according to the second protocol using a second protocol analysis component.

View all claims
  • 8 Assignments
Timeline View
Assignment View
    ×
    ×