Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Determining model protection level on-device based on malware detection in similar devices

A computing device, type of technology, applied in computer security devices, platform integrity maintenance, instrumentation, etc., capable of solving complex, identifying and correcting power utilization levels affecting the long-term and continuous performance of mobile devices, and affecting the long-term and continuous performance of mobile devices. performance and power utilization levels

Inactive Publication Date: 2017-09-26
QUALCOMM INC
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

To keep pace with these service improvements, mobile electronic devices (e.g., cellular phones, tablet computers, laptop computers, etc.) have become ever more powerful and complex
This complexity creates new opportunities for malware, software conflicts, hardware failures, and other similar errors or phenomena to adversely affect the long-term and sustained performance and power utilization levels of mobile devices
Accordingly, it would be beneficial to consumers to identify and correct conditions and / or mobile device behavior that may adversely affect the long-term and sustained performance and power utilization levels of a mobile device

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Determining model protection level on-device based on malware detection in similar devices
  • Determining model protection level on-device based on malware detection in similar devices
  • Determining model protection level on-device based on malware detection in similar devices

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] Various embodiments will be described in detail with reference to the accompanying drawings. Wherever possible, the same reference numbers will be used throughout the drawings to refer to the same or like parts. References made to particular examples and implementations are for illustrative purposes, and are not intended to limit the scope of the invention or the claims.

[0025] The word "exemplary" is used herein to mean "serving as an example, instance, or illustration." Any implementation described herein as "exemplary" should not necessarily be construed as preferred or advantageous over other implementations.

[0026] In summary, various embodiments include effectively identifying, classifying, modeling, preventing and / or correcting conditions that typically degrade computing device performance, power utilization levels, network usage levels, security and / or privacy over time Methods and acts and computing devices configured to implement the methods. The comput...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Methods, systems and devices for identifying, classifying, modeling, and responding to mobile device behaviors may include using lightweight processes to monitor and analyze various conditions and device behaviors to detect an instance of a non-benign behavior, increasing a level of security or scrutiny to identify other instances of non-benign behavior, and notifying select computing devices of the increased security risk so that they may also increase their security / scrutiny levels. For example, a computing device may be configured to perform a first type of analysis operations (e.g., lightweight analysis operations) to determine whether there is an increased security risk, and perform a second type of analysis operations (e.g., robust analysis operations) in response to determining that there is an increased security risk to determine whether there are additional security risks that are different from the security risk detected via the performance of the first type of analysis operations.

Description

Background technique [0001] Cellular and wireless communication technologies have grown tremendously in recent years. Better communication hardware, larger networks, and more reliable protocols have fueled this growth. Wireless service providers are now able to offer their customers an ever-expanding set of features and services, and provide users with unprecedented levels of access to information, resources, and communications. To keep pace with these service improvements, mobile electronic devices (eg, cellular phones, tablet computers, laptop computers, etc.) have become ever more powerful and complex. This complexity creates new opportunities for malware, software conflicts, hardware failures, and other similar errors or phenomena to adversely affect the long-term and ongoing performance and power utilization levels of the mobile device. Accordingly, it would be beneficial to consumers to identify and correct conditions and / or mobile device behavior that may adversely af...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/55G06F21/56
CPCG06F21/552G06F21/56G06F21/566G06F21/564
Inventor 拉贾什·古普塔比约恩·马库斯·雅各布松维纳伊·斯里达拉
Owner QUALCOMM INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products