System, method, and computer program product for selecting a wireless network based on security information
First Claim
Patent Images
1. A method implemented by an apparatus, the method comprising:
- receiving a request, from a first client device, identifying one of a plurality of wireless networks;
collecting security information associated with the one of the wireless networks from a second client device, wherein the security information includes an indication of an operating system of the second client device;
receiving an indication of an operating system utilized by the first client device to identify a vulnerability of the first client device;
determining, with the apparatus, a security state of the one of the wireless networks based, at least in part, on the vulnerability and the security information; and
sending the security state for the one of the wireless networks to the first client device.
9 Assignments
0 Petitions
Accused Products
Abstract
A system, method, and computer program product are provided for selecting a wireless network based on security information. In use, a plurality of wireless networks is identified. Further, security information associated with each of the wireless networks is collected, such that one of the wireless networks is selected based on the security information.
-
Citations
24 Claims
-
1. A method implemented by an apparatus, the method comprising:
-
receiving a request, from a first client device, identifying one of a plurality of wireless networks; collecting security information associated with the one of the wireless networks from a second client device, wherein the security information includes an indication of an operating system of the second client device; receiving an indication of an operating system utilized by the first client device to identify a vulnerability of the first client device; determining, with the apparatus, a security state of the one of the wireless networks based, at least in part, on the vulnerability and the security information; and sending the security state for the one of the wireless networks to the first client device. - View Dependent Claims (2, 3, 4, 5, 7, 9, 12)
-
-
6. One or more non-transitory, computer-readable storage media storing instructions that, when executed, cause a method to be performed, the method comprising:
-
receiving a request, from a first client device, identifying one of a plurality of wireless networks; collecting security information associated with the one of the wireless networks from a second client device, wherein the security information includes an indication of an operating system of the second client device; receiving an indication of an operating system utilized by the first client device to identify a vulnerability of the first client device; determining a security state of the one of the wireless networks based, at least in part, on the vulnerability and the security information; and sending the security state for the one of the wireless networks to the first client device. - View Dependent Claims (8, 10, 11, 13, 18, 19, 20)
-
-
14. A server, comprising:
-
a processor; and a memory coupled to the processor, wherein the server is configured to receive a request, from a first client device, to identify one of a plurality of wireless networks; collect security information associated with the one of the wireless networks from a second client device, wherein the security information includes an indication of an operating system of the second client device; receive an indication of an operating system utilized by the first client device to identify a vulnerability of the first client device; determine a security state of the one of the wireless networks based, at least in part, on the vulnerability and the security information; and send a security state for the one of the wireless networks to the first client device. - View Dependent Claims (15, 16, 17, 21, 22, 23, 24)
-
Specification