×

User device security profile

  • US 9,323,935 B2
  • Filed: 12/18/2012
  • Issued: 04/26/2016
  • Est. Priority Date: 12/18/2012
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • collecting first attribute data at an endpoint computing device describing attributes of the endpoint computing device at a first instance, wherein the attributes at the first instance indicate that the endpoint computing device is located in a first geographical location at the first instance;

    sending the first attribute data over a network to a remote security score generator;

    receiving, at the endpoint computing device, first security score data for the endpoint computing device from the remote security score generator corresponding to the first attribute data; and

    determining, from the first security score data, a first set of security ratings comprising a respective security rating for each of a plurality of different user activities capable of being performed by a user on the endpoint computing device, wherein each security rating indicates an amount of risk determined to be associated with the corresponding user activity when performed on the endpoint device based at least in part on the endpoint computing device being located in the first geographical location;

    causing a graphical dashboard interface to be presented on a display device of the endpoint computing device, the dashboard interface presenting graphical representations of each of the first set of security ratings determined for the plurality of user activities, when the endpoint computing device is in the first geographical location;

    collecting second attribute data at the endpoint computing device describing attributes of the endpoint computing device at a second instance, wherein the attributes at the second instance indicate that the endpoint computing device is located in a second geographical location at the second instance;

    sending the second attribute data from the endpoint computing device to the remote security score generator;

    receiving, at the endpoint computing device, second security score data for the endpoint computing device from the remote security score generator corresponding to the second attribute data;

    determining, from the second security score data, a second set of security ratings comprising a respective security rating for each of the plurality of different user activities based at least in part on the endpoint computing device being located in the second geographical location; and

    causing the dashboard interface to present graphical representations of each of the second set of security ratings determined for the plurality of user activities, when it is determined that the endpoint computing device is in the second geographical location.

View all claims
  • 11 Assignments
Timeline View
Assignment View
    ×
    ×