System, method, and computer program product for selecting a wireless network based on security information

SS Dey - US Patent 8,572,745, 2013 - Google Patents
BACKGROUND Traditionally, security systems have been utilized for iden tifying and
preventing unwanted activity (eg malware, etc.) on computer systems, networks, etc …

Determining security factors associated with an operating environment

PB French, J Healy, NJ Lucey, M Truss - US Patent 9,246,943, 2016 - Google Patents
Embodiments of the present invention disclose a method, computer program product, and
system for determining security factors associated with an operating environment for a …

Determining security factors associated with an operating environment

PB French, J Healy, NJ Lucey, M Truss - US Patent 9,667,659, 2017 - Google Patents
Embodiments of the present invention disclose a method, computer program product, and
system for determining security factors associated with an operating environment for a …

Determining security factors associated with an operating environment

PB French, J Healy, NJ Lucey, M Truss - US Patent 9,219,754, 2015 - Google Patents
Embodiments of the present invention disclose a method, computer program product, and
system for determining Secu rity factors associated with an operating environment for a …

Malware scanning user interface for wireless devices

V Kouznetsov, D Libenzi, M Fallenstedt… - US Patent …, 2010 - Google Patents
A system, method and computer program product are provided for scanning a mobile
wireless device for malware. Initially, an update command is received from a user utilizing a …

Method and system for providing wireless vulnerability management for local area computer networks

S Palnitkar, V Bhagwat - US Patent 8,032,939, 2011 - Google Patents
(57) ABSTRACT Related US Application Data A Software-as-a-Service (SaaS) based
method for providing (63) Continuation-in-part of application No. 1 1/954,007, wireless …

Method and system for securing and monitoring a wireless network

T Rogers - US Patent App. 10/936,103, 2005 - Google Patents
A common software interface simplifies a process of configuring the network security
features provided by network controlled devices. A real-time threat entity detection system …

Detecting unauthorized wireless devices in a network

CC Chang, L Lin - US Patent 7,672,283, 2010 - Google Patents
Computer implemented techniques for detecting the presence and identity of unauthorized
wireless devices (“UWD”) on a network. The technique is capable of detecting the presence …

System, method and computer program product for equipping wireless devices with malware scanning capabilities

V Kouznetsov, D Libenzi, M Fallenstedt… - US Patent …, 2006 - Google Patents
2002-04-10 Assigned to NETWORKS ASSOCIATES TECHNOLOGY, INC. reassignment
NETWORKS ASSOCIATES TECHNOLOGY, INC. ASSIGNMENT OF ASSIGNORS …

Method, apparatus and system for protecting security keys on a wireless platform

K Sood, N Smith - US Patent 8,422,678, 2013 - Google Patents
BACKGROUND Wireless networks are proliferating at a rapid pace as com puter users
become increasingly mobile. Wireless networks offer users significant flexibility to …