Verizon Communications Inc.
Shadow profile and environment for mobile security
Last updated:
Abstract:
A user device receives a communication that contains a link or an attachment and sends the link or the attachment to a virtual user device stored externally with respect to the user device. Actions to be performed with respect to the user device are executed on the virtual user device. The virtual user device determines whether the link or attachment is malicious. The user device receives an indication of whether the link or the attachment is malicious and displays an indication that the link or the attachment is safe to open when the link or attachment is not malicious.
Status:
Grant
Type:
Utility
Filling date:
30 May 2019
Issue date:
9 Nov 2021