System, method, and computer program product for selecting a wireless network based on security information
First Claim
Patent Images
1. A method, comprising:
- identifying a plurality of wireless networks;
collecting security information associated with each of the wireless networks, wherein the security information is collected from a plurality of agents, each agent located on a different device that includes an antivirus scanner for identifying unwanted activity;
rating each of the wireless networks based, at least in part, on identifying whether a threshold amount of unwanted data is present on each of the wireless networks, wherein one of the wireless networks is selected based on the security information and a respective rating, wherein the security information includes an indication of a location of a device on which the security information is identified, and an indication of an operating system of the device on which the security information is identified; and
displaying a pictorial representation of a security state of each of the wireless networks.
10 Assignments
0 Petitions
Accused Products
Abstract
A system, method, and computer program product are provided for selecting a wireless network based on security information. In use, a plurality of wireless networks is identified. Further, security information associated with each of the wireless networks is collected, such that one of the wireless networks is selected based on the security information.
10 Citations
15 Claims
-
1. A method, comprising:
-
identifying a plurality of wireless networks; collecting security information associated with each of the wireless networks, wherein the security information is collected from a plurality of agents, each agent located on a different device that includes an antivirus scanner for identifying unwanted activity; rating each of the wireless networks based, at least in part, on identifying whether a threshold amount of unwanted data is present on each of the wireless networks, wherein one of the wireless networks is selected based on the security information and a respective rating, wherein the security information includes an indication of a location of a device on which the security information is identified, and an indication of an operating system of the device on which the security information is identified; and displaying a pictorial representation of a security state of each of the wireless networks. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A computer program product embodied on a non-transitory computer readable medium for performing operations, comprising:
-
identifying a plurality of wireless networks; and collecting security information associated with each of the wireless networks, wherein the security information is collected from a plurality of agents, each agent located on a different device that includes an antivirus scanner for identifying unwanted activity; rating each of the wireless networks based, at least in part, on identifying whether a threshold amount of unwanted data is present on each of the wireless networks, wherein one of the wireless networks is selected based on the security information and a respective rating, wherein the security information includes an indication of a location of a device on which the security information is identified, and an indication of an operating system of the device on which the security information is identified; and displaying a pictorial representation of a security state of each of the wireless networks.
-
-
14. A system, comprising:
a processor coupled to a memory and configured for executing instructions such that the system is configured for; identifying a plurality of wireless networks; and collecting security information associated with each of the wireless networks, wherein the security information is collected from a plurality of agents, each agent located on a different device that includes an antivirus scanner for identifying unwanted activity; rating each of the wireless networks based, at least in part, on identifying whether a threshold amount of unwanted data is present on each of the wireless networks, wherein one of the wireless networks is selected based on the security information and a respective rating, wherein the security information includes an indication of a location of a device on which the security information is identified, and an indication of an operating system of the device on which the security information is identified; and displaying a pictorial representation of a security state of each of the wireless networks. - View Dependent Claims (15)
Specification