MOBILE RISK ASSESSMENT
First Claim
Patent Images
1. A method comprising:
- identifying at least one available wireless access point at a particular location;
establishing a connection to the available wireless access point;
attempting to communicate with a trusted endpoint over the wireless access point; and
monitoring the attempted communication with the trusted endpoint over the wireless access point to assess risk associated with the wireless access point.
10 Assignments
0 Petitions
Accused Products
Abstract
At least one available wireless access point is identified at a particular location and a connection is established with the available wireless access point. Communication is attempted with a trusted endpoint over the wireless access point and the attempted communication with the trusted endpoint over the wireless access point is monitored to assess risk associated with the wireless access point. Results of the assessment, in some instances, can be reported to an access point risk manager and risk associated with future attempts to use the wireless access point can be assessed based at least in part on the reported assessment results.
-
Citations
23 Claims
-
1. A method comprising:
-
identifying at least one available wireless access point at a particular location; establishing a connection to the available wireless access point; attempting to communicate with a trusted endpoint over the wireless access point; and monitoring the attempted communication with the trusted endpoint over the wireless access point to assess risk associated with the wireless access point. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. Logic encoded in non-transitory media that includes code for execution and when executed by a processor is operable to perform operations comprising:
-
identifying at least one available wireless access point at a particular location; establishing a connection to the available wireless access point; attempting to communicate with a trusted endpoint over the wireless access point; and monitoring the attempted communication with the trusted endpoint over the wireless access point to assess risk associated with the wireless access point.
-
-
22. A system comprising:
-
at least one processor device; at least one memory element; and a wireless access point monitor, adapted when executed by the at least one processor device to; identify at least one available wireless access point at a particular location; establish a connection to the available wireless access point; attempt to communicate with a trusted endpoint over the wireless access point; and monitor the attempted communication with the trusted endpoint over the wireless access point to assess risk associated with the wireless access point. - View Dependent Claims (23)
-
Specification