Mobile risk assessment
First Claim
1. A method comprising:
- receiving a query from a particular endpoint device identifying a particular wireless access point encountered by the particular endpoint device;
determining whether pre-existing risk assessment data exists for the identified particular wireless access point; and
participating in a risk assessment of the particular wireless access point with the particular endpoint device, wherein the risk assessment includes;
the particular endpoint device attempting to communicate with a trusted endpoint over the particular wireless access point; and
monitoring the attempted communication with the trusted endpoint over the particular wireless access point to assess risk associated with the particular wireless access point.
10 Assignments
0 Petitions
Accused Products
Abstract
A query is received from a particular endpoint device identifying a particular wireless access point encountered by the particular endpoint device. Pre-existing risk assessment data is identified for the identified particular wireless access point and query result data is sent to the particular endpoint device characterizing pre-assessed risk associated with the particular wireless access point. In some instances, the query result data is generated based on the pre-existing risk assessment data. In some instances, pre-existing risk assessment data can be the result of an earlier risk assessment carried-out at least in part by an endpoint device interfacing with and testing the particular wireless access point.
45 Citations
23 Claims
-
1. A method comprising:
-
receiving a query from a particular endpoint device identifying a particular wireless access point encountered by the particular endpoint device; determining whether pre-existing risk assessment data exists for the identified particular wireless access point; and participating in a risk assessment of the particular wireless access point with the particular endpoint device, wherein the risk assessment includes; the particular endpoint device attempting to communicate with a trusted endpoint over the particular wireless access point; and monitoring the attempted communication with the trusted endpoint over the particular wireless access point to assess risk associated with the particular wireless access point. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. At least one non-transitory machine accessible storage medium having instructions stored thereon, the instructions when executed on a machine, cause the machine to:
-
receive a query from a particular endpoint device identifying a particular wireless access point encountered by the particular endpoint device; determine whether pre-existing risk assessment data exists for the identified particular wireless access point; and participate in a risk assessment of the particular wireless access point with the particular endpoint device, wherein the risk assessment includes; the particular endpoint device attempting to communicate with a trusted endpoint over the particular wireless access point; and monitoring the attempted communication with the trusted endpoint over the particular wireless access point to assess risk associated with the particular wireless access point.
-
-
22. A system comprising:
-
at least one processor device; at least one memory element; and a wireless access point risk assessor, adapted when executed by the at least one processor device to; receive a query from a particular endpoint device identifying a particular wireless access point encountered by the particular endpoint device; determine whether pre-existing risk assessment data exists for the identified particular wireless access point pre-existing risk assessment data for the identified particular wireless access point; and participate in a risk assessment of the particular wireless access point with the particular endpoint device, wherein the risk assessment includes; the particular endpoint device attempting to communicate with a trusted endpoint over the particular wireless access point; and monitoring the attempted communication with the trusted endpoint over the particular wireless access point to assess risk associated with the particular wireless access point. - View Dependent Claims (23)
-
Specification