×

System and method for security and quality assessment of wireless access points

  • US 9,686,302 B2
  • Filed: 12/17/2014
  • Issued: 06/20/2017
  • Est. Priority Date: 12/30/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method for security risk assessment of wireless access point devices, the method comprising performing, by a computer system:

  • receiving, from one of a first device and a second device, a first report of a first access of an access point having a unique identifier, the first report including attributes of the first access of the access point;

    receiving, from the one of the first device, the second device and a third device, a second report of access of the access point occurring after the first access of the access point, the second report including attributes of the second access of the access point;

    aggregating the attributes of the first and second accesses to obtain aggregate attributes, each aggregate attribute being an aggregation of values of a corresponding attribute of the attributes of the first and second accesses;

    determining, that the aggregate attributes of the first access and the second access indicate that the access point is not secure;

    transmitting, to the first device, a message indicating that the access point is not secure;

    wherein aggregating the attributes of the first and second accesses to obtain aggregate attributes further comprises;

    computing a first value that is a function of a number of reconnects per session for each of the first and second accesses;

    at least one ofcomputing a second value that is a function of the a number of local internet protocol (IP) addresses detected during the first and second accesses;

    computing a third value that is a function of an elapsed time between the first and second accesses; and

    computing a fourth value that is a number of unique users that have accessed the access point and have transmitted reports to the computer system;

    generating a score that is a combination of the first, and at least one of the second, third, and fourth values;

    wherein determining, that the aggregate attributes of the first access and the second access indicate that the access point is not secure comprises determining that the score indicates the access point is not secure.

View all claims
  • 20 Assignments
Timeline View
Assignment View
    ×
    ×