Patent application number | Description | Published |
20080282020 | DETERMINATION OF SAMPLING CHARACTERISTICS BASED ON AVAILABLE MEMORY - A portion of data records of a full input data set are imported into memory of a computer system for processing by an executing application. The full input data set includes data records of a dimensionally-modeled fact collection. An amount of the data of the full input set to import is determined based on an amount of available memory of the computer system. The sampling characteristics for sampling the full input data set are determined based on the amount of the data that can be imported and on characteristics of the full input data set and application involved. The full input data set is then sampled and a portion of the records are imported into the memory of the computer system for processing. The sampling characteristics are determined such that analysis as a result of processing by the executing application of the sampled portion of the records imported is representative of the analysis that could otherwise be carried out on the full input data set, with a calculable statistical relevance. | 11-13-2008 |
20080288445 | Interactive aggregation of data on a scatter plot - A computer-implemented method, which comprises the following: aggregating a plurality of records in accordance with an aggregation specification, wherein the records are part of a dimensionally-modeled fact collection; graphically representing the records in un-aggregated form; graphically representing the records in aggregated form; and causing the graphical representation of the records to be switched between aggregated form and un-aggregated form based on a user indication. | 11-20-2008 |
20080288527 | User interface for graphically representing groups of data - A technique of operating a user interface that enables the user to graphically manipulate records of a dimensionally-modeled fact collection, which comprises the following: receiving a graphical selection of a subset from a set of data points, each data point representing at least one record of the dimensionally-modeled fact collection; receiving a graphical manipulation of the selected subset of data points; defining at least one data group using the selected subset of data points and based on the graphical manipulation, wherein each data group comprises between 0 to n records represented by the selected subset of data points, wherein n is the total number of data points in the set of data points; and graphically representing the at least one data group. Alternatively, the technique comprises the following: performing an operation on at least one data group as described above; and graphically representing a result of the operation. | 11-20-2008 |
20080294595 | VISUAL INTERFACE TO INDICATE CUSTOM BINNING OF ITEMS - Records representing items in a dimensionally-modeled fact collection are assigned to bins. A count-based portion of a user interface receives user bin assignment specification of the records based on user-specified counts of records. Actual counts for bin assignment are determined by constraining records having a same data value at a specified particular dimension to be within the same bin. A user-observable indication of the determined actual counts is provided. The user interface may include a value-based portion. The value-based portion of the user interface may be operated to receive user indication of bin assignment specification of records based on user-specified at least one value at the particular dimension. Determining actual counts includes reconciling the user indication of bin assignment specification in the count-based portion with the user indication of bin assignment specification in the value-based portion. | 11-27-2008 |
20080294671 | EXPORTING AGGREGATED AND UN-AGGREGATED DATA - A computer-implemented method, which comprises the following: receiving a graphical selection of a subset of data points from a set of data points, each data point representing at least one record of a dimensionally-modeled fact collection; and exporting information associated with the selected subset of data points. | 11-27-2008 |
20090063250 | Controlled Targeted Experimentation - A method of advertising selects an attribute value for a test. The attribute value is for representing a relationship between a user activity and one or more of a user segment, a publisher group, and an ad category. The method optionally constructs a test case that includes the attribute value and one or more of: the user segment, the publisher group, and the ad category. The method selectively places the test case in an inventory location of the publisher group, presents the test case to the user segment, and monitors the status of the attribute value based on user activity. The method of some embodiments tracks a confidence metric for measuring the reliability of the attribute value. If, for instance, the confidence metric is below a predetermined threshold, then the method performs the test. Alternatively, or in conjunction with the foregoing, the method applies a set of rules for determining the importance of the test. If the importance of the test according to the set of rules is low, then the method advantageously forgoes the test. | 03-05-2009 |
20090063268 | Targeting Using Historical Data - A method of advertising receives a data log that includes the activities of users. The users have unique identifiers and associated profiles that form a user base. The method segments the user base into user segments by types of users. Hence, a first user segment is formed. The users within the first user segment have a profile similarity. The method groups publisher inventory, and forms a first publisher group. The publishers provide content to the users. The method categorizes advertisements and thereby generates a first ad category. The advertisements relate to a marketer, which has various marketer data. The method targets a first advertisement within the first ad category based on at least one of the first ad category, the publisher grouping, and the user segments. A system for ad targeting includes a user module, a publisher module, a marketer and/or advertisement module, and a matching engine. The user module is for receiving a plurality of users and segmenting the users into user segments including a first user segment. The publisher module is for receiving several publishers' inventory and grouping the publishers' inventory into publisher groups that include a first publisher group that has a first inventory location for the presentation of advertising. The marketer-ad module is for receiving advertisements and categorizing the advertisements into ad categories that include a first ad category. The matching engine is for matching the first publisher group and/or the first user segment to the first ad category. The matching engine is also for ranking ads and placing within the first inventory location a first advertisement from the first ad category. | 03-05-2009 |
Patent application number | Description | Published |
20080281756 | TRUSTED THIRD PARTY CLEARING HOUSE FOR LEAD TRACKING - A method for tracking sales leads, including a lead clearing house logging receipt in a log of one or more encrypted leads received from a participant of the lead clearing house, the one or more leads including personal lead information having been encrypted with a one-way hash algorithm; comparing the received one or more encrypted leads with stored encrypted leads to find any matches; updating the log related to the one or more encrypted leads with unencrypted log information associated with the matching one or more encrypted leads; and communicating a status to the participant based on the log relating to the one or more leads. | 11-13-2008 |
20090018770 | MOBILE NOTIFICATION SYSTEM - A method for providing information to a traveler during a vehicle trip is provided, which comprises the following: monitoring a current location of a vehicle and at least one aspect of the vehicle trip other than the current location of the vehicle; and providing information to the traveler in response to as least one status change with respect to the at least one aspect of the vehicle trip based on the current location of the vehicle. | 01-15-2009 |
20090024621 | METHOD TO SET UP ONLINE BOOK COLLECTIONS AND FACILITATE SOCIAL INTERACTIONS ON BOOKS - A computer-implemented method for recommending books is provided, which comprises the following: receiving data representing at least one image of a collection of books; automatically determining at least one piece of standard information about the collection of books by processing the image data; and recommending at least one book that is not included in the collection of books to a person associated with the collection of books based on the collection of books. | 01-22-2009 |
20090106081 | INTERNET ADVERTISING USING PRODUCT CONVERSION DATA - Methods and apparatus for determining the effectiveness of web pages are described. For each of a plurality of conversion points corresponding to a particular product or service, a plurality of paths leading to the conversion point are determined. Each of the plurality of paths leading to the conversion point includes a plurality of web pages connected by links. Each web page is characterized with respect to each of selected ones of the plurality of conversion points which may be reached from the web page via at least one of the paths. Characterizing each web page and/or its content includes determining a measure of effectiveness which represents a likelihood that viewing of the web page will lead to one or more of the selected conversion points. | 04-23-2009 |
20090171748 | USING PRODUCT AND SOCIAL NETWORK DATA TO IMPROVE ONLINE ADVERTISING - Methods and apparatus for improving word-of-mouth online advertising are provided. Construct a social network including multiple users based on the users' social network data and optionally further based on the users' demographical and/or other personal information. Categorize the users in the social network with respect to a type of product in terms of their propensity to adopt the type of product and to influence others in the social network in adopting the type of product. Determine appropriate content object(s) for each category of users, and send the content object(s) to each category of users via different channels at the appropriate time during the product's lifecycle. | 07-02-2009 |
20130226811 | TRUSTED THIRD PARTY CLEARING HOUSE FOR LEAD TRACKING - A method and system for tracking sales leads includes receiving, with a processor of a lead clearing house server and over a network, messages that include personal lead information encrypted with a one-way hash algorithm, each message comprising at least one encrypted lead. The processor may store the received encrypted leads in memory of the server in relation to a log containing activity history with relation to respective encrypted leads. The processor may compare the encrypted personal lead information of the stored encrypted leads with personal lead information of received encrypted leads. The processor may update the log of respective encrypted leads responsive to identifying a match between personal lead information of a received and a stored encrypted lead. The processor may communicate, over the network to a participant that sent the matching encrypted lead, a status based on the updated log related to the matching encrypted lead. | 08-29-2013 |
20140206397 | MOBILE NOTIFICATION SYSTEM - A method for providing information to a traveler during a vehicle trip is provided, which comprises the following: monitoring a current location of a vehicle and at least one aspect of the vehicle trip other than the current location of the vehicle; and providing information to the traveler in response to as least one status change with respect to the at least one aspect of the vehicle trip based on the current location of the vehicle. | 07-24-2014 |
20150237161 | SYSTEM AND METHOD TO PROVIDE PRE-POPULATED PERSONAL PROFILE ON A SOCIAL NETWORK - Methods, systems, and media are directed to the creation of a user-controlled, pre-populated personal information profile to be used in conjunction with social networks. The creation of the personal profile information includes electronically transmitting first instructions requesting entry of unique personal identification information of the potential new user, determining the validity of the received unique personal identifier information, and electronically transmitting second instructions requesting entry of profile information of the new user. Furthermore, processing the received profile information to generate a pre-populated personal profile of the new user, electronically transmitting the pre-populated personal profile in a form that is viewable and revisable to facilitate changes thereof, completing the registration process and establishing the newly-registered user personal information profile in the social network site. | 08-20-2015 |
20150331552 | SYSTEM AND METHOD FOR HYPERLINK BADGES WITH DYNAMICALLY UPDATED POP-UP SUMMARY INFORMATION - Methods, systems, and media are directed to providing a pop-up display having dynamically updated summary data on a website, is presented. In particular, electronically submitting updated informational content to a third party source repository and providing a graphical item having embedding linking instructions configured to bilaterally communicate with the third party source repository and render a pop-up display containing the updated informational content. Thus, upon actuation of the graphical item, the embedded linking instructions causes establishment of bilateral communications with the third party source repository, accesses the corresponding updated informational content stored in the third party source repository, retrieves the updated informational content, and automatically displays the updated informational content in a pop-up display. | 11-19-2015 |
20150339494 | SYSTEM AND METHOD FOR DYNAMICALLY CONTROLLED RANKINGS AND SOCIAL NETWORK PRIVACY SETTINGS - A system, method, and media for dynamically controlling rankings and privacy settings for a social network is presented. Upon receipt of an electronic communication from a second user of the social network directed to a first user of the social network, determining whether the first and second users of the social network are connected and determining whether the second user has been blocked from electronically communicating with the first user. in response to determining that the second user is not blocked, executing a ranking process on the second user, based on privacy level settings criteria pre-specified by the first user. The privacy level settings criteria includes preferred attributes of communicating users and a threshold ranking score and the ranking process compares the attributes of the second user to the privacy level settings criteria. Upon satisfying the threshold ranking score, the social network allows the electronic communication from the second user to be conveyed to the first user of the social network. | 11-26-2015 |
20150371266 | SYSTEM AND METHOD FOR DELIVERING CERTAIN WORK POSTED ON A SOCIAL NETWORK TO A TARGETED AUDIENCE - Methods, systems, and media are directed to outbound messaging for a social networking site. A server stores profile information and project information of users of the social networking site and a targeted outbound messaging template. The targeted outbound messaging template includes a recipient section that lists intended recipients of a message, a messaging text section that accommodates entry of text, a hyperlinked source section containing hyperlinked preview images of user projects to be included and displayed in the message, and a ranked collaborators section that identifies and ranks collaborative relationships associated with a sender and the recipients of the message. Upon activation of the targeted outbound messaging template, the server operates to automatically display the recipient section, the messaging text section, and the hyperlinked preview images of projects for sender selection, and upon transmission of the message, the server operates to automatically include the ranked collaborators section in the message. | 12-24-2015 |
20160026641 | SYSTEM AND METHOD TO DISPLAY SEARCH SPECIFIC PAGES - Methods, systems, and media are directed to providing dynamically optimized search results in conjunction with a social networking site. The dynamically optimized search includes a search utility of the social networking site to receive search criteria, a processing unit configured to execute a profile search of profile pages that match the search criteria, to rank the profile search results, in view of the search criteria, and to compile an interim list of relevant profile information. The processing unit is also configured to select highest ranking results of the interim list of relevant profile information and extract associated profile information therefrom, and to rank the extracted profile information, in view of the search criteria, to provide optimized content. A display unit displays the customized profile pages to present the optimized content, in which the customized profile pages are configured to prominently display the optimized content in accordance with the search criteria. | 01-28-2016 |
20160085868 | DIGITAL SEARCH FILTER THAT PRESENTS RESULTS FOCUSED ONLY ON THE MOST RELEVANT SOLUTIONS - A method for answering at least one query directed by a user to a target comprises: obtaining a set of data from the target; obtaining at least a first term of a query from the user; searching within the set of data for at least the first term; categorizing the query, wherein the categorization is based at least in part on the search within the set of data for at least the first term; obtaining an initial set of one or more results for the query based at least in part on the first term; filtering the initial set of one or more results for the query based at least in part on the categorization of the query; and displaying the filtered initial set of one or more results to the user. | 03-24-2016 |
Patent application number | Description | Published |
20100100591 | SYSTEM AND METHOD FOR A MOBILE CROSS-PLATFORM SOFTWARE SYSTEM - The present invention is a system and method for creating, developing and testing cross-platform software for mobile communications devices. The invention enables mobile device software that must be highly-integrated with the operating system on which it runs to be implemented in a cross-platform manner. Security software for mobile devices is a prime beneficiary of the present invention, as a substantial proportion of its functionality is identical between different platforms yet integrated very specifically into each platform it supports. The cross-platform system includes a core platform-independent component, a platform-specific component, and an abstraction layer component, each of which may communicate with each other using a common defined API. The present invention enables the platform-independent component to be completely re-used between platforms and allows the platform-specific and abstraction components to contain minimal amounts of code on each platform. | 04-22-2010 |
20100100939 | SECURE MOBILE PLATFORM SYSTEM - The present invention is directed toward a secure platform which enables mobile devices, such as a cell phones, smartphones, or PDAs, to have relationships with services or service providers that are controlled by the state of security on each device. In an embodiment, the platform is comprised of a server that receives data from security software on a mobile device regarding the device's security state. The platform enables access to a service to be granted, denied, or limited based on the security state of the mobile device. The platform may provide two-way communications between a mobile device and a service so that the platform can enforce access security both from the client to the service and from the service to the client. Furthermore, the platform allows services or service providers to evaluate the security state of a device independently of using the platform to communicate with the device. | 04-22-2010 |
20100100964 | SECURITY STATUS AND INFORMATION DISPLAY SYSTEM - The present invention provides a system and method for reporting security information relating to a mobile device. The invention enables a security assessment to be displayed in various formats on the mobile device display or on a client computer. A security component identifies security events on the mobile device that are processed on the mobile device or by a server. The security component then determines a security assessment for the mobile device based upon the detected security events. The security assessment display may be persistent in the form of a desktop widget or dashboard on a client computer, or home-screen item on the mobile device. This allows a user or administrator to verify that security protection on the device is functioning and to be alerted if the device needs attention without having to specifically seek the information, thereby enabling immediate response to potential security problems. | 04-22-2010 |
20100210240 | SYSTEM AND METHOD FOR REMOTELY SECURING OR RECOVERING A MOBILE DEVICE - The present invention provides a system and method for remotely securing, accessing, and managing a mobile device or group of mobile devices. The invention enables a remote access web page to be generated by a server and displayed on a client computer. The server receives requested actions from the client computer and interacts with the mobile device to perform the actions. In the case of a lost or stolen device, the invention enables a user to take actions leading to the recovery or destruction of the device and data stored on it. The invention enables multiple types of remote access, including: locking the device, backing up data from the device, restoring data to the device, locating the device, playing a sound on the device, and wiping data from the device. The invention may be used to provide both self-help and administrator-assisted security for a device or group of devices. | 08-19-2010 |
20110119765 | SYSTEM AND METHOD FOR IDENTIFYING AND ASSESSING VULNERABILITIES ON A MOBILE COMMUNICATION DEVICE - The invention is a system and method for identifying, assessing, and responding to vulnerabilities on a mobile communication device. Information about the mobile communication device, such as its operating system, firmware version, or software configuration, is transmitted to a server for assessment. The server accesses a data storage storing information about vulnerabilities. Based on the received information, the server may identify those vulnerabilities affecting the mobile communication device, and may transmit a notification to remediate those vulnerabilities. The server may also transmit result information about the vulnerabilities affecting the mobile communication device. The server may also store the received information about the device, so that in the event the server learns of new vulnerabilities, it may continue to assess whether the device is affected, and may accordingly notify or remediate the device. The server may provide an interface for an administrator to manage the system and respond to security issues. | 05-19-2011 |
Patent application number | Description | Published |
20120060222 | SECURITY STATUS AND INFORMATION DISPLAY SYSTEM - The present invention provides a system and method for reporting security information relating to a mobile device. A security component identifies security events on the mobile device that are processed on the mobile device or by a server. The security component then determines a security assessment for the mobile device based upon the detected security events. The security state assessment can be displayed in various different formats on the mobile device display or on a client computer through a user interface. The display may be persistent in the form of a desktop widget or home-screen item which enables the user or administrator to verify the functioning of security protection on the device and be alerted if the device needs attention without having to specifically seek such information. | 03-08-2012 |
20120084836 | Providing access levels to services based on mobile device security state - A mobile device's level of access to services provided by a service provider is based on a current security state assessment of the mobile device. Mobile devices are granted different access levels to services based on the security state of the device. A security component can assess the current security state of the mobile device by processing security data generated by the mobile device. In a specific embodiment, the security component is at the mobile device. In another specific embodiment, the security component is at a server. | 04-05-2012 |
20120084864 | SYSTEM AND METHOD FOR A MOBILE CROSS-PLATFORM SOFTWARE SYSTEM - The present invention is a system and method for creating, developing and testing cross-platform software for mobile communications devices. The invention enables mobile device software that must be highly-integrated with the operating system on which it runs to be implemented in a cross-platform manner. Security software for mobile devices is a prime beneficiary of the present invention, as a substantial proportion of its functionality is identical between different platforms yet integrated very specifically into each platform it supports. The cross-platform system includes a core platform-independent component, a platform-specific component, and an abstraction layer component, each of which may communicate with each other using a common defined API. The present invention enables the platform-independent component to be completely re-used between platforms and allows the platform-specific and abstraction components to contain minimal amounts of code on each platform. | 04-05-2012 |
20120188064 | SYSTEM AND METHOD FOR REMOTELY INITIATING PLAYING OF SOUND ON A MOBILE DEVICE - When attempting to recover a lost or stolen mobile device, it is often desirable to remotely command the device to play a sound in order to allow the device to be located or alert nearby people. In order to allow the owner of a lost device to remotely initiate the sound, a server generates a remote access user interface and it is displayed on a client computer that allows the owner to send a request the server to initiate the playing of the sound on the device. The interface may allow the user to customize the sound by selecting from a list of pre-configured sounds, recording a sound, uploading a sound, or purchasing a sound. The sound may also be input as text and converted to sound for playing on the mobile device. | 07-26-2012 |
20130191921 | SECURITY STATUS AND INFORMATION DISPLAY SYSTEM - Systems and methods disclosed herein provide a local security component on a mobile device that may acquire data concerning a current configuration of the mobile device. The local security component may receive raw or partially processed data about events on the mobile device. The received data may be processed against a database containing identification data for security threats and against the current mobile device configuration data to assess a security state of the mobile device. The processing may include assigning a severity level for each event. The local security component may output to the mobile device the security state assessment results, including a first assessed security state of the mobile device. The raw or partially processed data about events on the mobile device may be transmitted to a server for processing. A second assessed security state of the mobile device may be received at the mobile device from the server. | 07-25-2013 |
20130237191 | SYSTEMS AND METHODS FOR DEVICE BROADCAST OF LOCATION INFORMATION WHEN BATTERY IS LOW - Location information associated with a computing device may be transmitted from the computing device to a server. The transmitting of the location information may be performed in response to the battery of the computing device being at a low level. The location information may comprise a location of the computing device or information to identify the location of the computing device. As such, when the battery of the computing device approaches a low level, the location of the computing device may be transmitted from the computing device to a server. Thus, if the battery of the computing device is depleted, a user may obtain the last known location of the computing device that was transmitted when the battery was at a low level. The location information may also be used to identify the last known location for and to apply a security policy to the computing device. | 09-12-2013 |
20130304850 | SYSTEMS AND METHODS FOR REMOTELY CONTROLLING A LOST MOBILE COMMUNICATIONS DEVICE - Systems and methods for remotely controlling a lost mobile communications device are disclosed. Authorization credentials may be received and a command request for an action to be performed by a lost mobile communications device may further be received. A command corresponding to the command request may be transmitted to the lost mobile communications device. In response to the transmission of the command, information about the lost mobile communications device may be received and interpreted to determine whether the transmitted command was performed or not performed by the lost mobile communications device. A notification may be provided based on whether or not the command was performed by the lost mobile communications device. | 11-14-2013 |
20140038564 | SYSTEMS AND METHODS FOR LOCKING AND DISABLING A DEVICE IN RESPONSE TO A REQUEST - A computing device may be locked and contact information associated with an owner of the computing device may be displayed. For example, a request to lock the computing device may be received. In response to such a request, at least some of the functionality of the computing device may be disabled. For example, control input or input keys of the computing device may be at least partially disabled. Furthermore, contact information may be shown on the display of the computing device. For example, the phone number, address, email address, or other information of the owner of the computing device may be displayed. | 02-06-2014 |
20140038641 | SYSTEMS AND METHODS FOR DISPLAYING LOCATION INFORMATION OF A DEVICE - Location information associated with a computing device may be periodically transmitted to a server. A user of the computing device may transmit a request to the server when the computing device is no longer able to communicate with the server. For example, the user request may be associated with locating the computing device. In response to the request, the user may be shown the latest received location information of the computing device. The last received location information may be displayed in a web page. | 02-06-2014 |
20140040981 | SYSTEMS AND METHODS FOR APPLYING A SECURITY POLICY TO A DEVICE BASED ON LOCATION - A security policy may be applied to a mobile communications device based on a location of the mobile communications device. For example, a first location of the mobile communications device may be obtained and a first security policy may be applied to the mobile communications device based on the first location. Furthermore, a change in the location of the mobile communications device may be detected. For example, the location of the mobile communications device may change from the first location to a second location. In response to the mobile communications device now being located at the second location, a second security policy may be applied to the mobile communications device. Thus, different security policies may be applied to a mobile communications device as the current location of the mobile communications device changes. | 02-06-2014 |
20140045457 | SYSTEMS AND METHODS FOR APPLYING A SECURITY POLICY TO A DEVICE BASED ON A COMPARISON OF LOCATIONS - Location information associated with a computing device may be received by a server. The server may compare the current location of the computing device with a set of locations associated with the computing device. The comparison may result in a determination that the computing device is in a location that has been identified in the set of locations. In response to such a determination, a particular security policy may be applied to the computing device. For example, the server may transmit a command to the computing device to apply a security policy associated with the location. | 02-13-2014 |
20140045534 | SYSTEMS AND METHODS FOR TRANSMITTING A COMMUNICATION BASED ON A DEVICE LEAVING OR ENTERING AN AREA - Location information associated with a computing device may be received by a server. For example, the location information may indicate the current physical location of the computing device. The server may compare the current location of the computing device with a set of locations associated with the computing device. The comparison may result in a determination that the computing device has entered or left a location area. In response to such a determination, a communication may be transmitted to a user of the computing device. For example, an email may be transmitted to the user. The email may include information describing that the computing device has entered or left the location area. | 02-13-2014 |
20140373162 | SECURITY STATUS AND INFORMATION DISPLAY SYSTEM - Systems and methods disclosed herein provide a security component on a server that may be in communication with a database containing mobile device security information. The server security component may receive event information regarding a mobile device from a local security component on the mobile device. The event information may be processed by the server to assess the security state of the mobile device by comparing the event information to the mobile device security information. Based on the processing, an assessment of the security state of the mobile device may be output by the server for display. | 12-18-2014 |
Patent application number | Description | Published |
20110047033 | SYSTEM AND METHOD FOR MOBILE DEVICE REPLACEMENT - This disclosure describes a system and method for providing relevant offers for a user to replace a mobile communication device in the event that the device is lost, stolen, or otherwise in need of replacement, such as when a device has its SIM card removed or replaced, is inactive for a period of time, is unresponsive to a server monitoring the device, or when other customizable events occur. The disclosed system can determine if and when a mobile communication device may need replacement, and can generate relevant offers to replace the device based upon the user's current device and other factors. The system may also optimize offers to increase the likelihood of acceptance based upon previously accepted offers. In order to provide a comprehensive set of replacement options for a user, the system can aggregate offers from third parties. | 02-24-2011 |
20110047594 | SYSTEM AND METHOD FOR MOBILE COMMUNICATION DEVICE APPLICATION ADVISEMENT - This disclosure is directed to a system and method for providing advisement about applications on mobile communication devices such as smartphones, netbooks, and tablets. A server gathers data about mobile applications, analyzes the applications, and produces an assessment that may advise users on a variety of factors, including security, privacy, battery impact, performance impact, and network usage. The disclosure helps users understand the impact of applications to improve the experience in using their mobile device. The disclosure also enables a server to feed information about applications to other protection systems such as application policy systems and network infrastructure. The disclosure also enables advisement about applications to be presented in a variety of forms, such as through a mobile application, as part of a web application, or integrated into other services via an API. | 02-24-2011 |
20110047597 | SYSTEM AND METHOD FOR SECURITY DATA COLLECTION AND ANALYSIS - Disclosed herein is a system and method for efficiently gathering information about applications for mobile communication devices (e.g., smartphones, netbooks, and tablets). This disclosure is also directed to a server producing assessments for applications by analyzing data from multiple sources. To gather information, a device sends information about an application to a server, which stores some or all of the information and may request additional information, if necessary. The server collects information from many devices, including devices that have varied configurations and different operating systems, by only collecting the appropriate information from each device. The server gathers the appropriate data to perform in-depth, granular mobile application analysis while minimizing overhead on devices, wireless networks, and the server. The server may collect portions of data from multiple devices, combining them on the server to produce an assessment for an application. | 02-24-2011 |
20110047620 | SYSTEM AND METHOD FOR SERVER-COUPLED MALWARE PREVENTION - This disclosure is directed to a system and method for preventing malware, spyware and other undesirable applications from affecting mobile communication devices (e.g., smartphones, netbooks, and tablets). A mobile communication device uses a server to assist in identifying and removing undesirable applications. When scanning an application, a device transmits information about the application to a server for analysis. The server receives the information, produces an assessment for the application, and transmits the assessment to the device. By performing analysis on a server, the invention allows a device to reduce the battery and performance cost of protecting against undesirable applications. The servers transmits notifications to devices that have installed applications that are discovered to be undesirable. The server receives data about applications from many devices, using the combined data to minimize false positives and provide comprehensive protection against known and unknown threats. | 02-24-2011 |
20110145920 | SYSTEM AND METHOD FOR ADVERSE MOBILE APPLICATION IDENTIFICATION - A system and method identifies mobile applications that can have an adverse effect on a mobile device or mobile network. In an implementation, a server monitors behavioral data relating to a mobile application and applies a model to determine if the application has an adverse effect or has the potential to cause an adverse effect on a mobile device or a network the mobile device may connect to. A mobile device may monitor behavioral data, apply a model to the data, and transmit a disposition to the server. The server may aggregate behavioral data or disposition information from multiple devices. The server may transmit or make available the disposition information to a subscriber through a web interface, API, email, or other mechanism. After identifying that an application may have an adverse effect, the server may enact corrective actions, such as generating device or network configuration data. | 06-16-2011 |
20120233695 | SYSTEM AND METHOD FOR SERVER-COUPLED APPLICATION RE-ANALYSIS TO OBTAIN TRUST, DISTRIBUTION AND RATINGS ASSESSMENT - A system and method for preventing malware, spyware and other undesirable applications from affecting mobile communication devices uses a server to assist in identifying and removing undesirable applications. When scanning an application, a device transmits information about the application to a server for analysis. The server receives the information, produces a characterization assessment and can also provide a characterization re-assessment for the application, or data object, and transmits the assessment to the device. By performing analysis on a server, the invention allows a device to reduce the battery and performance cost of protecting against undesirable applications. The servers transmit notifications to devices that have installed applications that are discovered to be undesirable. The server can accumulate this data and then perform a characterization re-assessment of a data object it has previously assessed to provide an assessment based upon one of trust, distribution and ratings information. | 09-13-2012 |
20120290640 | SYSTEM AND METHOD FOR SERVER-COUPLED APPLICATION RE-ANALYSIS - To prevent malware, spyware and other undesirable applications from affecting mobile communication devices (e.g., smartphones, netbooks, and tablets), a device uses a server to assist in identifying and removing undesirable applications. When scanning an application, a device transmits information about the application to a server for analysis. The server receives the information, produces a categorization assessment and can provide a categorization re-assessment, and transmits the assessment to the device. By performing analysis on a server, a device can reduce its battery and performance cost of protecting against undesirable applications. The server transmits notifications to devices that have installed applications that are discovered to be undesirable. The server receives data about applications from many devices, using the combined data to minimize false positives and provide comprehensive protection against known and unknown threats. The server can accumulate this data and perform a categorization re-assessment of a data object previously assessed. | 11-15-2012 |
20130086682 | SYSTEM AND METHOD FOR PREVENTING MALWARE ON A MOBILE COMMUNICATION DEVICE - A server receives from a mobile communication device information about a data object (e.g., application) on the device when the device cannot assess the data object. The server uses the information along with other information stored at the server to assess the data object. Based on the assessment, the device may be permitted to access the data object or the device may not be permitted to access the data object. The other information stored at the server can include data objects known to be bad, data objects known to be good, or both. | 04-04-2013 |
20130117846 | SYSTEM AND METHOD FOR SERVER-COUPLED APPLICATION RE-ANALYSIS TO OBTAIN CHARACTERIZATION ASSESSMENT - This disclosure is directed to a system and method for preventing malware, spyware and other undesirable applications from affecting mobile communication devices (e.g., smartphones, netbooks, and tablets). A mobile communication device uses a server to assist in identifying and removing undesirable applications. When scanning an application, a device transmits information about the application to a server for analysis. The server receives the information, produces a characterization assessment and can also provide a characterization re-assessment for the application, or data object, and transmits the assessment to the device. By performing analysis on a server, the invention allows a device to reduce the battery and performance cost of protecting against undesirable applications. The servers transmits notifications to devices that have installed applications that are discovered to be undesirable. The server receives data about applications from many devices, using the combined data to minimize false positives and provide comprehensive protection against known and unknown threats. The server can accumulate this data and then perform a characterization re-assessment of a data object it has previously assessed. | 05-09-2013 |
20130130649 | PROVIDING ACCESS LEVELS TO SERVICES BASED ON MOBILE DEVICE SECURITY STATE - A mobile device's level of access to services provided by a service provider is based on a current security state assessment of the mobile device. Mobile devices are granted different access levels to services based on the security state of the device. A security component can assess the current security state of the mobile device by processing security data generated by the mobile device. In a specific embodiment, the security component is at the mobile device. In another specific embodiment, the security component is at a server. | 05-23-2013 |
20130263260 | SYSTEM AND METHOD FOR ASSESSING AN APPLICATION TO BE INSTALLED ON A MOBILE COMMUNICATION DEVICE - A system and method checks for harmful behavior of an application to be installed on a mobile communication device. A server computer receives from the mobile communication device data pertaining to the application to be installed and information pertaining to the mobile communication device. The server processes the data and information to determine an assessment for the application to be installed. The assessment is provided to the mobile communication device and the assessment is displayed on the device if the assessment is one of dangerous and potentially dangerous. | 10-03-2013 |
20130318568 | Assessing a data object based on application data associated with the data object - A server receives from a mobile communication device application data identifying a data object accessible by the mobile communication device. The server uses at least some of the application data to assess the data object. The application data can include, for example, behavioral data, metadata, parts of the data object, information indicating the data object is installed on the mobile communication device, or combinations of these. | 11-28-2013 |
20130324090 | SYSTEM AND METHOD FOR PROVIDING OFFERS FOR MOBILE DEVICES - Profile information associated with a mobile communications device belonging to a user is stored at a server system. Upon the server system receiving an indication that the mobile communications device needs to be replaced, the profile information is reviewed. Based on the review of the profile, an offer is generated to replace the mobile communications device. | 12-05-2013 |
20140024345 | ASSESSING THE SECURITY STATE OF A MOBILE COMMUNICATIONS DEVICE - Methods for assessing the current security state of a mobile communications device. A security component installed in either the server or the mobile communications device is configured to assess the current security state by processing security data generated by the mobile communications device. If the security data is not current, then security events on the mobile communications device are evaluated to determine a severity level for the security events, and this determination is used to assess the current security state of the mobile communications device. | 01-23-2014 |
20140095298 | SYSTEM AND METHOD FOR GENERATING EFFECTIVE OFFERS TO REPLACE MOBILE DEVICES - A mobile communications device needs to be replaced. An evaluation is made as to which offers were effective in replacing devices of the same type as the mobile communications device. Based on the evaluation, an offer is generated to replace the mobile communications device with a replacement mobile communications device. | 04-03-2014 |
20150188924 | ASSESSING A SECURITY STATE OF A MOBILE COMMUNICATIONS DEVICE TO DETERMINE ACCESS TO SPECIFIC TASKS - Methods for assessing the current security state of a mobile communications device to determine access to specific tasks is presented. A security component on a server is configured to receive a request to access services from a mobile communications device for a specific task. The security component on the server is further configured to determine whether a security state for the mobile communications device is acceptable for access to the services. Based on the security state for the mobile device being determined to be acceptable for access to the services, access to the services is granted and a determination is whether the security state is acceptable for access to the specific task requested. Based on the security state being determined to be acceptable for access to the specific task requested, access to the specific task requested is granted by the server security component. | 07-02-2015 |
20150222636 | SYSTEM AND METHOD FOR ASSESSING AN APPLICATION BASED ON DATA FROM MULTIPLE DEVICES - Disclosed herein is a system and method for efficiently gathering information about applications for mobile communications devices (e.g., smartphones, netbooks, and tablets) and using that information to produce assessments of the applications. To gather information, a server may send a request for application data to a mobile communications device. In response, the server may receive some but not all of the first-requested application data. The server may then a second request for application data to a second mobile communications device that also has access to the application. The server may receive application data from the second mobile communications device, and store the received first- and second-requested application data. The server then uses the stored application data to assess the application. | 08-06-2015 |
20160066189 | METHODS AND SYSTEMS FOR ADDRESSING MOBILE COMMUNICATIONS DEVICES THAT ARE LOST OR STOLEN BUT NOT YET REPORTED AS SUCH - A method is provided for evaluating the usage of a mobile communications device that itself provides access to a resource. In the method, a detected usage of the mobile communications device is compared to a stored usage pattern of an authorized user. When a measure associated with the difference between the detected usage and the stored usage pattern exceeds a threshold, it is concluded that the mobile communications device is being used by an unauthorized user. In response to this conclusion, a restriction is placed on an ability of the mobile communications device to access the resource. | 03-03-2016 |
20160099963 | METHODS AND SYSTEMS FOR SHARING RISK RESPONSES BETWEEN COLLECTIONS OF MOBILE COMMUNICATIONS DEVICES - Methods are provided for determining an enterprise risk level, for sharing security risk information between enterprises by identifying a security response by a first enterprise and then sharing the security response to a second enterprise when a relationship database profile for the first collection indicates the security response may be shared. Methods are also provided for determining whether to allow a request from an originating device where the request may have been initiated by a remote device. | 04-07-2016 |