User device security profile
First Claim
Patent Images
1. A method comprising:
- collecting first attribute data at an endpoint computing device describing attributes of the endpoint computing device at a first instance, wherein the attributes at the first instance indicate that the endpoint computing device is located in a first geographical location at the first instance;
sending the first attribute data over a network to a remote security score generator;
receiving, at the endpoint computing device, first security score data for the endpoint computing device from the remote security score generator corresponding to the first attribute data; and
determining, from the first security score data, a first set of security ratings comprising a respective security rating for each of a plurality of different user activities capable of being performed by a user on the endpoint computing device, wherein each security rating indicates an amount of risk determined to be associated with the corresponding user activity when performed on the endpoint device based at least in part on the endpoint computing device being located in the first geographical location;
causing a graphical dashboard interface to be presented on a display device of the endpoint computing device, the dashboard interface presenting graphical representations of each of the first set of security ratings determined for the plurality of user activities, when the endpoint computing device is in the first geographical location;
collecting second attribute data at the endpoint computing device describing attributes of the endpoint computing device at a second instance, wherein the attributes at the second instance indicate that the endpoint computing device is located in a second geographical location at the second instance;
sending the second attribute data from the endpoint computing device to the remote security score generator;
receiving, at the endpoint computing device, second security score data for the endpoint computing device from the remote security score generator corresponding to the second attribute data;
determining, from the second security score data, a second set of security ratings comprising a respective security rating for each of the plurality of different user activities based at least in part on the endpoint computing device being located in the second geographical location; and
causing the dashboard interface to present graphical representations of each of the second set of security ratings determined for the plurality of user activities, when it is determined that the endpoint computing device is in the second geographical location.
11 Assignments
0 Petitions
Accused Products
Abstract
Attribute data of an endpoint computing device is collected that describes attributes of the endpoint computing device. The attribute data is communicated to a security score generator and security score data is received for the endpoint computing device. A graphical dashboard interface is caused to be presented on a display device, the dashboard interface presenting a plurality of security ratings based on the security score data, each security rating representing an amount of risk determined to be associated with a corresponding user activity on the endpoint device in a plurality of user activities.
30 Citations
23 Claims
-
1. A method comprising:
-
collecting first attribute data at an endpoint computing device describing attributes of the endpoint computing device at a first instance, wherein the attributes at the first instance indicate that the endpoint computing device is located in a first geographical location at the first instance; sending the first attribute data over a network to a remote security score generator; receiving, at the endpoint computing device, first security score data for the endpoint computing device from the remote security score generator corresponding to the first attribute data; and determining, from the first security score data, a first set of security ratings comprising a respective security rating for each of a plurality of different user activities capable of being performed by a user on the endpoint computing device, wherein each security rating indicates an amount of risk determined to be associated with the corresponding user activity when performed on the endpoint device based at least in part on the endpoint computing device being located in the first geographical location; causing a graphical dashboard interface to be presented on a display device of the endpoint computing device, the dashboard interface presenting graphical representations of each of the first set of security ratings determined for the plurality of user activities, when the endpoint computing device is in the first geographical location; collecting second attribute data at the endpoint computing device describing attributes of the endpoint computing device at a second instance, wherein the attributes at the second instance indicate that the endpoint computing device is located in a second geographical location at the second instance; sending the second attribute data from the endpoint computing device to the remote security score generator; receiving, at the endpoint computing device, second security score data for the endpoint computing device from the remote security score generator corresponding to the second attribute data; determining, from the second security score data, a second set of security ratings comprising a respective security rating for each of the plurality of different user activities based at least in part on the endpoint computing device being located in the second geographical location; and causing the dashboard interface to present graphical representations of each of the second set of security ratings determined for the plurality of user activities, when it is determined that the endpoint computing device is in the second geographical location. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. At least one non-transitory machine accessible storage medium having instructions stored thereon, the instructions when executed on a machine, cause the machine to:
-
collect attribute data at an endpoint computing device describing attributes of the endpoint computing device including networks to which the endpoint computing device is connected; communicate the attribute data to a remote security score generator, wherein first attribute data is communicated by the endpoint device when the endpoint computing device is connected to a first network and second attribute data is communicated by the endpoint device when the endpoint computing device is connected to a second network; receive, at the endpoint computing device, first and second security score data for the endpoint computing device from the remote security score generator, wherein the first security score data is returned from the security score generator at a first instance and corresponds to the first attribute data, and the second security score data is returned from the security score generator at a second instance and corresponds to the second attribute data; determine, from the first security score data, a first set of security ratings comprising a respective security rating for each of a plurality of different user activities capable of being performed by a user on the endpoint computing device, wherein each security rating indicates an amount of risk determined to be associated with the corresponding user activity when performed on the endpoint device based at least in part on the endpoint computing device being connected to the first network; determine, from the second security score data, a second set of security ratings comprising a respective security rating for each of the plurality of different user activities based at least in part on the endpoint computing device being connected to the second network; and cause a graphical dashboard interface to be presented on a display device of the endpoint computing device, the dashboard interface presenting graphical representations of the sets of security ratings determined for the plurality of user activities, when the endpoint computing device is connected to the first and second networks, respectively. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A system comprising:
-
at least one processor device; at least one memory element; and a security dashboard generator, adapted when executed by the at least one processor device to; collect attribute data at an endpoint computing device describing attributes of the endpoint computing device including networks to which the endpoint computing device is connected; communicate the attribute data to a remote security score generator, wherein first attribute data is communicated by the endpoint device when the endpoint computing device is connected to a first network and second attribute data is communicated by the endpoint device when the endpoint computing device is connected to a second network; receive, at the endpoint computing device, first and second security score data for the endpoint computing device from the remote security score generator, wherein the first security score data is returned from the security score generator at a first instance and corresponds to the first attribute data, and the second security score data is returned from the security score generator at a second instance and corresponds to the second attribute data; determine, from the first security score data, a first set of security ratings comprising a respective security rating for each of a plurality of different user activities capable of being performed by a user on the endpoint computing device, wherein each security rating indicates an amount of risk determined to be associated with the corresponding user activity when performed on the endpoint device based at least in part on the endpoint computing device being connected to the first network; determine, from the second security score data, a second set of security ratings comprising a respective security rating for each of the plurality of different user activities based at least in part on the endpoint computing device being connected to the second network; and cause a graphical dashboard interface to be presented on a display device of the endpoint computing device based on the received security score data, the dashboard interface presenting graphical representations of the sets of security ratings determined for the plurality of user activities, when the endpoint computing device is connected to the first and second networks, respectively. - View Dependent Claims (23)
-
Specification