×

METHODS AND APPARATUS FOR RATING DEVICE SECURITY AND AUTOMATICALLY ASSESSING SECURITY COMPLIANCE

  • US 20100333168A1
  • Filed: 08/31/2009
  • Published: 12/30/2010
  • Est. Priority Date: 06/26/2009
  • Status: Active Grant
First Claim
Patent Images

1. An Automatic Security Compliance Assessment (ASCA) method, the method comprising the steps of:

  • generating, at a control server, a plurality of Settings Objects, wherein each of the plurality of Settings Objects corresponds to a particular Settings Class of a plurality of different Settings Classes for a wireless computing device and is designed to configure a particular subsystem of a plurality of subsystems of the wireless computing device, wherein the plurality of Settings Objects have an expected overall device security rating (ODSR);

    generating, at the control server in response to the plurality of Settings Objects, a security interaction template (SIT) corresponding to the plurality of Settings Objects; and

    a security test script comprising overall security test cases corresponding to the plurality of Settings Objects and the security interaction template (SIT);

    applying at least some of the plurality of Settings Objects to corresponding ones of the plurality of subsystems at the wireless computing device to configure the corresponding ones of the plurality of subsystems;

    sending a request to the subsystems for actual Settings Objects currently applied to the subsystems, and determining if the subsystems are configured as specified by the plurality of Settings Objects by comparing actual Settings Objects currently applied to the subsystems to the plurality of Settings Objects;

    when the subsystems are determined to be configured as specified by the plurality of Settings Objects, determining an Actual ODSR for the wireless computing device based on the SIT and the actual Settings Objects currently applied to the subsystems; and

    determining, based on the actual Settings Objects currently applied to the subsystems, relevant ones of the overall security test cases that are to be executed, and executing the relevant ones of the overall security test cases on the subsystems to compute a verified ODSR for the wireless computing device.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×