Systems and methods for dynamically modifying rules for selecting suitable mobile networks
    1.
    发明授权
    Systems and methods for dynamically modifying rules for selecting suitable mobile networks 有权
    用于动态修改规则以选择合适的移动网络的系统和方法

    公开(公告)号:US09107147B1

    公开(公告)日:2015-08-11

    申请号:US13493569

    申请日:2012-06-11

    IPC分类号: H04W72/00 H04W48/18

    CPC分类号: H04W48/18 H04W24/02

    摘要: A computer-implemented method for dynamically modifying rules for selecting suitable mobile networks. The method may include (1) identifying a set of predefined rules for selecting suitable mobile networks with which to connect, (2) obtaining a training data set that includes data about at least one candidate mobile network, (3) using machine learning to dynamically adjust, based at least in part on the training data set, the set of predefined rules, and (4) connecting to a suitable mobile network identified by the dynamically adjusted set of predefined rules. Various other methods, systems, and computer-readable media are also disclosed.

    摘要翻译: 一种用于动态修改选择合适的移动网络的规则的计算机实现的方法。 该方法可以包括(1)识别用于选择与之连接的合适移动网络的一组预定义规则,(2)获得包括关于至少一个候选移动网络的数据的训练数据集,(3)使用机器学习来动态地 至少部分地基于训练数据集,预定义规则的集合进行调整,以及(4)连接到由动态调整的预定规则集合识别的合适的移动网络。 还公开了各种其它方法,系统和计算机可读介质。

    Systems and methods for detecting malware
    2.
    发明授权
    Systems and methods for detecting malware 有权
    用于检测恶意软件的系统和方法

    公开(公告)号:US08726386B1

    公开(公告)日:2014-05-13

    申请号:US13422702

    申请日:2012-03-16

    IPC分类号: G06F11/00

    摘要: A computer-implemented method for detecting malware may include 1) identifying an application configured to use a permission on a mobile computing platform, the permission enabling the application to access a feature of the mobile computing platform, 2) determining that the application is configured to use the permission while executing as a background application on the mobile computing platform, 3) determining that the use of the permission is suspect based on the application being configured to use the permission while executing as the background application, and 4) performing a remediation action in response to determining that the use of the permission is suspect. Various other methods, systems, and computer-readable media are also disclosed.

    摘要翻译: 用于检测恶意软件的计算机实现的方法可以包括:1)识别配置为在移动计算平台上使用许可的应用,允许应用访问移动计算平台的特征的许可,2)确定应用被配置为 在所述移动计算平台上作为后台应用程序执行时,使用所述权限; 3)根据所述应用被配置为在执行所述后台应用时使用所述权限,确定所述权限的使用是可疑的,以及4)执行修复动作 以确定使用权限是可疑的。 还公开了各种其它方法,系统和计算机可读介质。