Mobile application sampling for performance and network behavior profiling

    公开(公告)号:US09734037B1

    公开(公告)日:2017-08-15

    申请号:US12560328

    申请日:2009-09-15

    IPC分类号: G06F9/44 G06F11/34

    摘要: Applications on a mobile device are sampled for detecting applications causing performance problems on the device. The method includes periodically logging performance information for a mobile device suspected to be having performance problems. The method further includes periodically logging identifying information about multiple applications on the mobile device. The method also includes periodically providing to a security server the logged performance information for the mobile device and the logged identifying information about the applications. In addition, the method includes, in response to a request from the security server for more information about one of the applications, providing a copy of the application to the security server for analysis of the impact by the application on performance of the mobile device. The method can further include receiving from the security server an indication that the application for which the copy was provided is causing a performance problem on the mobile device.

    Systems and methods for aggregating event information
    6.
    发明授权
    Systems and methods for aggregating event information 有权
    用于聚合事件信息的系统和方法

    公开(公告)号:US09148392B1

    公开(公告)日:2015-09-29

    申请号:US13397601

    申请日:2012-02-15

    IPC分类号: G06F15/16 H04L12/18 H04L12/58

    摘要: A computer-implemented method for aggregating event information may include 1) identifying a plurality of social networking data feeds, 2) identifying a time and a location of an event involving at least one person associated with at least one social networking data feed within the plurality of social networking data feeds, 3) mining the plurality of social networking data feeds for event data about the event, and 4) creating an event document from the event data to describe the event. Various other methods, systems, and computer-readable media are also disclosed.

    摘要翻译: 用于聚合事件信息的计算机实现的方法可以包括:1)识别多个社交网络数据馈送,2)识别涉及至少一个人的事件的时间和位置,所述至少一个人与所述多个社交网络数据馈送中的至少一个社交网络数据馈送相关联 的社交网络数据馈送,3)挖掘关于事件的事件数据的多个社交网络数据馈送,以及4)从事件数据创建事件文档以描述事件。 还公开了各种其它方法,系统和计算机可读介质。

    Switch construction
    7.
    发明授权
    Switch construction 失效
    开关结构

    公开(公告)号:US3952178A

    公开(公告)日:1976-04-20

    申请号:US561684

    申请日:1975-03-25

    IPC分类号: H01H9/02

    CPC分类号: H01H9/02

    摘要: A limit switch construction is provided in which a first component is affixed to a first section of a housing and a second component is affixed to a second section of the housing. When the two sections of the housing are assembled, the components electrically engage one another and are encompassed by the housing. The first component includes a pair of stationary contact means and a third contact means selectively movable into electrical contact with either of said stationary contact means. The second component is provided with a plurality of terminals which are electrically connected to corresponding contact means of the first component when the housing sections are assembled. The contact means and terminals are located adjacent one of the side walls of the first and the second sections and the second housing section is provided with an elongated pocket for accommodating portions of the electrical leads extending into the housing and connected to the terminals.

    摘要翻译: 提供限位开关结构,其中第一部件固定在壳体的第一部分上,而第二部件固定到壳体的第二部分。 当壳体的两个部分组装时,部件彼此电耦合并被壳体包围。 第一部件包括一对固定接触装置和选择性地可移动地与任一个所述固定接触装置电接触的第三接触装置。 第二部件设置有多个端子,当壳体部分组装时,该端子电连接到第一部件的对应接触装置。 接触装置和端子位于第一和第二部分的一个侧壁附近,并且第二壳体部分设置有细长的凹部,用于容纳延伸到壳体中并连接到端子的电引线的部分。

    Short-range mobile honeypot for sampling and tracking threats
    8.
    发明授权
    Short-range mobile honeypot for sampling and tracking threats 失效
    用于采样和跟踪威胁的短距离移动蜜罐

    公开(公告)号:US08528080B2

    公开(公告)日:2013-09-03

    申请号:US12560326

    申请日:2009-09-15

    IPC分类号: G06F11/00

    摘要: Files received by a mobile device are sampled for malware tracking. The method includes configuring file transfer mechanisms that use short-range communication technology on the mobile device to appear, to other devices, to be open for accepting all attempts to transfer files. The method further comprises intercepting files transferred via the short-range communication technology to the mobile device from another device. The method also comprises quarantining the files transferred to the mobile device and logging identifying information about each of the files quarantined and about the other devices from which each of the files originated. The method further includes providing the logged identifying information for the files received to a security server. The method can also include, responsive to a request from the security server for more information about one of the files, providing a copy of that file to the security server for malware analysis and for updating a reputation system tracking mobile device malware.

    摘要翻译: 移动设备收到的文件将进行采样,以进行恶意软件跟踪。 该方法包括在移动设备上配置使用短距离通信技术的文件传输机制,以显示其他设备,以接受所有传送文件的尝试。 该方法还包括从另一设备截取通过短程通信技术传送的文件到移动设备。 该方法还包括隔离传输到移动设备的文件,并记录关于隔离的每个文件的标识信息和关于每个文件源自的其他设备。 该方法还包括向接收到的安全服务器提供记录的识别信息。 该方法还可以包括响应于来自安全服务器的关于关于文件之一的更多信息的请求,将该文件的副本提供给安全服务器用于恶意软件分析和用于更新跟踪移动设备恶意软件的信誉系统。

    SHORT-RANGE MOBILE HONEYPOT FOR SAMPLING AND TRACKING THREATS
    9.
    发明申请
    SHORT-RANGE MOBILE HONEYPOT FOR SAMPLING AND TRACKING THREATS 失效
    短距离移动蜂蜜用于采样和跟踪威胁

    公开(公告)号:US20130091570A1

    公开(公告)日:2013-04-11

    申请号:US12560326

    申请日:2009-09-15

    IPC分类号: G06F11/00

    摘要: Files received by a mobile device are sampled for malware tracking. The method includes configuring file transfer mechanisms that use short-range communication technology on the mobile device to appear, to other devices, to be open for accepting all attempts to transfer files. The method further comprises intercepting files transferred via the short-range communication technology to the mobile device from another device. The method also comprises quarantining the files transferred to the mobile device and logging identifying information about each of the files quarantined and about the other devices from which each of the files originated. The method further includes providing the logged identifying information for the files received to a security server. The method can also include, responsive to a request from the security server for more information about one of the files, providing a copy of that file to the security server for malware analysis and for updating a reputation system tracking mobile device malware.

    摘要翻译: 移动设备收到的文件将进行采样,以进行恶意软件跟踪。 该方法包括在移动设备上配置使用短距离通信技术的文件传输机制,以显示其他设备,以接受所有传送文件的尝试。 该方法还包括从另一设备截取通过短程通信技术传送的文件到移动设备。 该方法还包括隔离传输到移动设备的文件,并记录关于隔离的每个文件的标识信息和关于每个文件源自的其他设备。 该方法还包括向接收到的安全服务器提供记录的识别信息。 该方法还可以包括响应于来自安全服务器的关于关于文件之一的更多信息的请求,将该文件的副本提供给安全服务器用于恶意软件分析和用于更新跟踪移动设备恶意软件的信誉系统。