System and method for developing, updating, and using user device behavioral context models to modify user, device, and application state, settings and behavior for enhanced user security
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
H04M-011/00
H04B-001/38
H04B-001/16
G06F-001/32
G06F-001/26
출원번호
US-0686028
(2012-11-27)
등록번호
US-8655307
(2014-02-18)
발명자
/ 주소
Walker, Samuel Alexander
Mandal, Ayan Kanti
Senapati, Devesh
Mahaffey, Kevin Patrick
Richardson, David Luke
Buck, Brian James
출원인 / 주소
Lookout, Inc.
대리인 / 주소
Dergosits & Noah LLP
인용정보
피인용 횟수 :
58인용 특허 :
106
초록▼
Security is enhanced for a user of a mobile device by monitoring and controlling resource usage. Usage information associated with a mobile device is collected. The collected information is used to build a usage model for a user of the mobile device that describes a set of contexts in which the mobi
Security is enhanced for a user of a mobile device by monitoring and controlling resource usage. Usage information associated with a mobile device is collected. The collected information is used to build a usage model for a user of the mobile device that describes a set of contexts in which the mobile device is used. User activity on the device is monitored and the model is consulted to determine a first time after which it will be acceptable for a battery of the mobile device to fall below a threshold charge level. Based on the monitored activity, a prediction of a second time is made for when the battery will fall below the threshold charge level. If the second time is before or a predetermined amount of time before the first time, usage of the battery is reduced, else, usage of the battery is not reduced.
대표청구항▼
1. A method comprising: obtaining, by a server, context information including usage information and location information of a mobile communication device;analyzing, by the server, the collected context information to determine a first time and a first place when and where it will be acceptable for a
1. A method comprising: obtaining, by a server, context information including usage information and location information of a mobile communication device;analyzing, by the server, the collected context information to determine a first time and a first place when and where it will be acceptable for a battery of the mobile communication device to fall below a threshold charge level;examining, by the server, current usage information for the mobile communication device to predict a second time at which the battery will fall below the threshold charge level;examining, by the server, the context information for the mobile communication device to predict a place where the mobile communication device will be at the second time; andif the second time is at least a predetermined amount of time before the first time and if the predicted place at the second time is different than the first place, reducing usage of the battery by transmitting instructions from the server to the mobile communication device to change a setting on the mobile communication device from a first value to a second value, wherein the mobile communication device consumes less of the battery when the setting is at the second value than when the setting is at the first value. 2. The method of claim 1 wherein the behavior information is collected by the server. 3. The method of claim 1 wherein the reducing the usage of the battery comprises: receiving at the mobile communication device an instruction from the server to disable one or more services on the mobile communication device. 4. The method of claim 1 comprising: not reducing the usage of the battery if the second time is a predetermined amount of time after the first time. 5. A method comprising: determining, by a server, using context information including usage information and location information of a mobile communication device, a first time and a first place when and where it will be acceptable for a battery of the mobile communication device to fall below a threshold charge level;predicting, by the server, a second time at which the battery will fall below the threshold charge level; andpredicting, by the server, using the context information, a place where the mobile communication device will be at the second time; andif the second time is at least a predetermined amount of time before the first time and if the predicted place is not the same as the first place, reducing usage of the battery by transmitting instructions from the server to the mobile communication device to change a setting on the mobile communication device from a first value to a second value, wherein the mobile communication device consumes less of the battery when the setting is at the second value than when the setting is at the first value. 6. The method of claim 5 comprising: not reducing the usage of the battery if the second time is at least a predetermined amount of time after the first time. 7. The method of claim 5 comprising: interpolating between a first data point and a second data point to predict the second time, wherein the first data point corresponds to a first charge level of the battery that is recorded at a third time, and the second data point corresponds to a second charge level of the battery that is recorded at a fourth time. 8. The method of claim 5 wherein the reducing the usage of the battery comprises: automatically reducing the usage of the battery. 9. The method of claim 5 comprising: before the reducing the usage of the battery, prompting a user of the mobile communication device with a suggestion on how to reduce the usage of the battery. 10. The method of claim 5 comprising: before the reducing the usage of the battery, prompting a user of the mobile communication device for permission to reduce the usage of the battery. 11. The method of claim 5 wherein the reducing the usage of the battery comprises at least one of dimming a brightness of a screen of the mobile communication device, disabling Wi-Fi network connectivity on the mobile communication device, disabling Bluetooth connectivity on the mobile communication device, starting an application on the mobile communication device, closing an application on the mobile communication device, or disabling a global positioning system (GPS) receiver on the mobile communication device. 12. The method of claim 5 wherein when the battery falls below the threshold charge level, the mobile communication device automatically shuts down. 13. A method comprising: determining, by a server, using context information including usage information and location information of a mobile communication device, a first time and a first place when and where it will be acceptable for a battery of the mobile communication device to fall below a threshold charge level;storing a plurality of data points, each data point corresponding to a specific charge level of the battery measured at a specific time;predicting, by the server, using the stored plurality of data points, a second time at which the battery will fall below the threshold charge level;predicting, by the server, using the context information, a place where the mobile communication device will be at the second time;determining, by the server, that the second time is at least a predetermined amount of time before the first time; andif the second time is at least a predetermined amount of time before the first time and the predicted place at the second time is different than the first place, reducing usage of the battery by transmitting instructions from the server to the mobile communication device to change a setting on the mobile communication device from a first value to a second value, wherein the mobile communication device consumes less of the battery when the setting is at the second value than when the setting is at the first value. 14. The method of claim 13 wherein the reducing the usage of the battery comprises: substituting services provided by a first application program currently running on the mobile communication device with services provided by a second application program not currently running on the mobile communication device, wherein the second application program consumes less of the battery than the first application program. 15. The method of claim 13 comprising: before the reducing the usage of the battery, prompting a user of the mobile communication device to change a setting of the mobile communication device from a first value to a second value. 16. The method of claim 13 comprising: before the reducing the usage of the battery, prompting a user of the mobile communication device for permission to change a setting of the mobile communication device;receiving the permission; andupon receipt of the permission, changing the setting. 17. The method of claim 13 wherein the reducing the usage of the battery comprises: storing a location of the mobile communication device;intercepting a request from an application program for a current location of the mobile communication device;retrieving the stored location; andproviding the stored location to the application program in response to the request, wherein the location of the mobile communication device is stored on the mobile communication device before the intercepting the request from the application program. 18. A method comprising the steps of: on a mobile communications device having an activity monitor component, collecting by the activity monitor component context information including a plurality of activities associated with usage of the mobile communications device and location information of the mobile communications device, and receiving at the mobile communications device a plurality of activity policies from a server;on the mobile communication device, analyzing the context information collected by the activity monitor component to estimate a first time and a first place when and where the mobile communications device battery will fall below a predetermined charge level;on the mobile communication device, subsequent to the estimation of the first time and the first place, collecting by the activity monitor component current context information about the mobile communications device;on the mobile communications device, using the current context information collected by the activity monitor component, estimating a second time and a place when and where the mobile communications device battery will fall below the predetermined charge level based upon current context information; and,if the estimated second time is a predetermined amount of time before the first estimated time and if the estimated place at the second time is different than the first place, then employing an activity policy manager on the mobile communications device to implement at least one activity policy on the mobile communications device to reduce battery usage by changing a setting on the mobile communication device from a first value to a second value, wherein the mobile communication device consumes less of the battery when the setting is at the second value than when the setting is at the first value, such that upon re-estimating in view of the implemented at least one activity policy, the estimated second time is the same as or later than the estimated first time. 19. A method comprising the steps of: on a mobile communication device, using context information including usage information and location information of a mobile communication device, determining an original battery glide path projection with a first battery exhaustion point and a first battery exhaustion place;on the mobile communication device, at a time subsequent to the determination of the original battery glide path projection, determining a current battery glide path projection with a second battery exhaustion point and a place; andif the second battery exhaustion point is more than a predetermined amount of time before the first battery exhaustion point, and before an earliest acceptable exhaustion point, and if the place at the second battery exhaustion point is different than the first place, then, on the mobile communication device, employing an activity policy manager to cause a reduction in battery usage by changing a setting on the mobile communication device from a first value to a second value, wherein the mobile communication device consumes less of the battery when the setting is at the second value than when the setting is at the first value, the reduction in battery usage sufficient to allow a third battery exhaustion point to occur at the same time or later than the first exhaustion point, wherein the first battery exhaustion point is after the earliest acceptable exhaustion point. 20. A method comprising the steps of: on a mobile communications device, using context information including usage information and location information of a mobile communication device, determining a first projected battery exhaustion point and a first projected battery exhaustion place;on the mobile communication device, at a time subsequent to the determination of the first projected battery exhaustion point, determining a second projected battery exhaustion point and a place based upon information about the battery and about the then-current context information of the mobile communication device; andif the second projected battery exhaustion point is more than a predetermined amount of time before the first projected battery exhaustion point, and before an earliest acceptable exhaustion point, and if the place at the second projected battery exhaustion point is different than the first battery exhaustion place, then, on the mobile communication device, employing an activity policy manager to cause a reduction in battery usage by changing a setting on the mobile communication device from a first value to a second value, wherein the mobile communication device consumes less of the battery when the setting is at the second value than when the setting is at the first value, the reduction in battery usage sufficient to allow a third battery exhaustion point to occur at the same time or later than the first projected battery exhaustion point, wherein the first projected battery exhaustion point is after the earliest acceptable exhaustion point. 21. The method of claim 1 wherein the first time is associated with the mobile communication device being in a specific context, and the reducing usage of the battery comprises: reducing usage of the battery if the second time is at least a predetermined amount of time before the first time, and if the second time is before a starting time of the specific context. 22. The method of claim 21 wherein the specific context comprises an indication that the battery of the mobile communication device is charged during the specific context.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (106)
Kouznetsov,Victor; Libenzi,Davide; Pak,Michael C.; Urakawa,Yasutaka; Ishii,Kenji; Fujita,Masanori, API system, method and computer program product for accessing content/security analysis functionality in a mobile communication framework.
Alizadeh Shabdiz, Farshid; Pahlavan, Kaveh; Brachet, Nicolas, Calculation of quality of wlan access point characterization for use in a wlan positioning system.
Morgan,Edward James; Shean,Michael George; Alizadeh Shabdiz,Farshid; Jones,Russel K., Continuous data optimization of new access points in positioning systems.
Bennett, James D.; Karaoguz, Jeyhan, Enabling remote and anonymous control of mobile and portable multimedia devices for security, tracking and recovery.
Alizadeh Shabdiz, Farshid; Pahlavan, Kaveh, Estimation of position using WLAN access point radio propagation characteristics in a WLAN positioning system.
Alizadeh-Shabdiz, Farshid; Pahlavan, Kaveh, Estimation of position using WLAN access point radio propagation characteristics in a WLAN positioning system.
Alizadeh Shabdiz, Farshid; Pahlavan, Kaveh; Morgan, Edward J., Estimation of speed and direction of travel in a WLAN positioning system using multiple position estimations.
Alizadeh-Shabdiz, Farshid; Pahlavan, Kaveh; Morgan, Edward J., Estimation of speed of travel using the dynamic signal strength variation of multiple WLAN access points.
Alizadeh Shabdiz,Farshid; Jones,Russel Kipp; Morgan,Edward James; Shean,Michael George, Location-based services that choose location algorithms based on number of detected access points within range of user device.
Alizadeh-Shabdiz, Farshid; Jones, Russel K.; Morgan, Edward J.; Shean, Michael G., Location-based services that choose location algorithms based on number of detected wireless signal stations within range of user device.
Kouznetsov, Victor; Libenzi, Davide; Fallenstedt, Martin; Palmer, David W.; Pak, Michael C., Malware scanning wireless service agent system and method.
Gleichauf Robert E. ; Randall William A. ; Teal Daniel M. ; Waddell Scott V. ; Ziese Kevin J., Method and system for adaptive network security using network vulnerability assessment.
Byers, Charles Calvin; Lassig, Mark Alan; Miller, Steven Mark; Paulson, William Brohmer; Posthuma, Carl Robert, Method for determining the security status of transmissions in a telecommunications network.
Brachet,Nicolas; Alizadeh Shabdiz,Farshid, Methods and systems for estimating a user position in a WLAN positioning system based on user assigned access point locations.
Thomas,Theodosios; Morris,Robert P.; Bardsley,Jeffrey S., Methods, systems, and computer program products for providing context-based, hierarchical security for a mobile device.
Morota,Satoru; Urakawa,Yasutaka; Kato,Tatsuya; Ishii,Kenji; Fujita,Masanori, Mobile communication terminal, information processing apparatus, relay server apparatus, information processing system, and information processing method.
Alizadeh-Shabdiz, Farshid, System and method of improving sampling of WLAN packet information to improve estimates of Doppler frequency of a WLAN positioning device.
Miller ; II Robert R. (Morris Township ; Morris County NJ) Partridge ; III B. Waring (Mendham NJ) Russell Jesse E. (Piscataway NJ) Schroeder Robert E. (Morris Township ; Morris County NJ), Universal wireless radiotelephone system.
Pierce, Jeffrey Scott; Walendowski, Alan John; Aylesworth, William; Lee, Chunkwok, Computing system with configuration update mechanism and method of operation thereof.
Cudak, Gary D.; Hardee, Christopher J.; Humes, Randall C.; Roberts, Adam, Dynamic task completion scaling of system resources for a battery operated device.
Nolan, Julian; Lawrenson, Matthew John; Biswas, Debmalya, Method and apparatus for providing privacy profile adaptation based on physiological state change.
Cavanaugh, Steven, Methods of dynamically securing electronic devices and other communications through environmental and system measurements leveraging tailored trustworthy spaces and continuous authentication.
Mahaffey, Kevin Patrick; Richardson, David Luke; Salomon, Ariel; Croy, R. Tyler; Walker, Samuel Alexander; Buck, Brian James; Marcin Gorrino, Sergio Ivan; Golombek, David, Multi-factor authentication and comprehensive login system for client-server networks.
Vaidya, Sachin Mohan; Lambeth, W. Andrew; Stabile, James Joseph; Ghannadian, Farzad, Multi-layer policy definition and enforcement framework for network virtualization.
Chang, Patricia R.; Draznin, Sagiv; Aksu, Arda; Rados, Steven R.; Haynes, Thomas W.; Kakadia, Deepak; Lau, Priscilla; Macias, John F.; Polehn, Donna L., Presenting information based on user profiles.
Edwards, Stephen J.; Nandwani, Ankur Bharatbhushan; Ramakrishna, Rohan Nagarakere; Buck, Brian James; Yerra, Kesava Abhinav, System and method for call blocking and SMS blocking.
Stockwell, Will; Sydell, Alex; Grue, Tony; Consalus, Kyle; Wen, Tina; Bartelma, Jeff; Sood, Aseem, System and method for regulating the upload of files for a mobile device.
Grobelny, Nicholas D.; Teshome, Abeye, System to schedule and perform automated software tasks during unattended system time using predicted knowledge of individual user behavior.
Clancy, III, Thomas Charles; White, Christopher Jules, Systems and methods for enforcing access control policies on privileged accesses for mobile devices.
White, Christopher Jules; Dougherty, Brian; Hamrick, David Alexander; Sharpe, Grayson Gates; Hanlin, Robert Austin; Zienkiewicz, Krzysztof Kamil; Thompson, Christopher Michael; Clancy, III, Thomas Charles, Systems and methods for enforcing security in mobile computing.
White, Christopher Jules; Clancy, III, Thomas Charles, Systems and methods to enforce security policies on the loading, linking, and execution of native code by mobile applications running inside of virtual machines.
White, Christopher Jules; Dougherty, Brian; Clancy, III, Thomas Charles; Hamrick, David Alexander; Sharpe, Grayson Gates; Hanlin, Robert Austin; Zienkiewicz, Krzysztof Kamil; Thompson, Christopher Michael, Systems and methods to synchronize data to a mobile device based on a device usage context.
Rangarajan, Kumar; Murthy, Giridhar Sreenivasa; Kandula, Veera Venkata Naga Rama; Kakkirala, Naga Venkata Surya Maruthi Lakshman, Techniques for predictive power management of a mobile device.
Cockerill, Aaron; Richardson, David; Thanos, Daniel; Robinson, William Neil; Buck, Brian James; Mahaffey, Kevin Patrick, Use of device risk evaluation to manage access to services.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.