Mobile risk assessment
First Claim
1. At least one non-transitory machine accessible storage medium having instructions stored thereon, the instructions when executed on a machine, cause the machine to:
- receive, at an endpoint device, information to indicate one or more wireless access points for one or more wireless networks at a location;
send, to a remote security server, information to identify at least a particular one of the one or more wireless access points;
receive a request from the remote security server for the endpoint device to participate in a risk assessment of the particular wireless access point;
attempt to communicate with a trusted endpoint over the particular wireless access point to assess the particular wireless access point; and
determine whether data responsive to the attempt to communicate is consistent with data expected from the trusted endpoint; and
report results of the attempt to communicate to the security server.
9 Assignments
0 Petitions
Accused Products
Abstract
A query is received from a particular endpoint device identifying a particular wireless access point encountered by the particular endpoint device. Pre-existing risk assessment data is identified for the identified particular wireless access point and query result data is sent to the particular endpoint device characterizing pre-assessed risk associated with the particular wireless access point. In some instances, the query result data is generated based on the pre-existing risk assessment data. In some instances, pre-existing risk assessment data can be the result of an earlier risk assessment carried-out at least in part by an endpoint device interfacing with and testing the particular wireless access point.
-
Citations
25 Claims
-
1. At least one non-transitory machine accessible storage medium having instructions stored thereon, the instructions when executed on a machine, cause the machine to:
-
receive, at an endpoint device, information to indicate one or more wireless access points for one or more wireless networks at a location; send, to a remote security server, information to identify at least a particular one of the one or more wireless access points; receive a request from the remote security server for the endpoint device to participate in a risk assessment of the particular wireless access point; attempt to communicate with a trusted endpoint over the particular wireless access point to assess the particular wireless access point; and determine whether data responsive to the attempt to communicate is consistent with data expected from the trusted endpoint; and report results of the attempt to communicate to the security server. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A method comprising:
-
receiving, at an endpoint device, information to indicate one or more wireless access points for one or more wireless networks at a location; sending, to a remote security server, information to identify at least a particular one of the one or more wireless access points; receiving a request from the remote security server for the endpoint device to participate in a risk assessment of the particular wireless access point; attempting to communicate with a trusted endpoint over the particular wireless access point to assess the particular wireless access point; determining whether data responsive to the attempt to communicate is consistent with data expected from the trusted endpoint; and reporting results of the attempt to communicate to the security server.
-
-
23. A system comprising:
-
at least one processor device; at least one memory element; and an endpoint device comprising a security tool comprising logic to; receive, at an endpoint device, information to indicate one or more wireless access points for one or more wireless networks at a location; send, to a remote security server, information to identify at least a particular one of the one or more wireless access points; receive a request from the remote security server for the endpoint device to participate in a risk assessment of the particular wireless access point; attempt to communicate with a trusted endpoint over the particular wireless access point to assess the particular wireless access point; determine whether data responsive to the attempt to communicate is consistent with data expected from the trusted endpoint; and report results of the attempt to communicate to the security server. - View Dependent Claims (24, 25)
-
Specification