| CPC G06F 21/82 (2013.01) [G06F 13/102 (2013.01); G06F 13/4282 (2013.01); G06F 2213/0042 (2013.01)] | 20 Claims |

|
1. A computer-implemented method, comprising:
detecting, at a client device, a connection of a peripheral device with an externally accessible port of the client device;
receiving, from the peripheral device via the connection, peripheral device data including an indicator of the peripheral device;
generating a risk factor for the peripheral device by comparing the indicator received from the peripheral device to a connection pattern of the client device determined based on historical usage information of previous connections of the client device via the externally accessible port with previous peripheral devices, including comparing a geographical location of the client device at a time the connection of the peripheral device is initially detected to previous geographical connection locations of the previous connections;
determining a level of trust for the peripheral device based on the risk factor; and
enumerating the peripheral device on the client device according to the level of trust.
|