US 12,081,540 B2
Configuring access to a network service based on a security state of a mobile device
Aaron Cockerill, Los Gatos, CA (US); David Richardson, Moraga, CA (US); Daniel Thanos, Burlington, CA (US); William Neil Robinson, Brentwood, CA (US); Brian James Buck, Livermore, CA (US); and Kevin Patrick Mahaffey, San Francisco, CA (US)
Assigned to Lookout, Inc., Boston, MA (US)
Filed by Lookout, Inc., Boston, MA (US)
Filed on May 4, 2021, as Appl. No. 17/307,332.
Application 17/307,332 is a continuation of application No. 16/241,504, filed on Jan. 7, 2019, granted, now 11,038,876.
Application 16/241,504 is a continuation of application No. 15/619,356, filed on Jun. 9, 2017, granted, now 10,218,697, issued on Feb. 26, 2019.
Prior Publication US 2021/0258304 A1, Aug. 19, 2021
This patent is subject to a terminal disclaimer.
Int. Cl. H04L 9/40 (2022.01)
CPC H04L 63/0853 (2013.01) [H04L 63/0823 (2013.01); H04L 63/083 (2013.01); H04L 63/0876 (2013.01); H04L 63/105 (2013.01); H04L 63/12 (2013.01); H04L 63/1433 (2013.01); H04L 63/1441 (2013.01)] 21 Claims
OG exemplary drawing
 
1. A method, comprising:
receiving, from prior computing devices, data regarding prior software associated with the prior computing devices;
storing, in a database, the data regarding the prior software;
receiving, by a first computing device, a request from a second computing device other than the prior computing devices, wherein the request is for access by the second computing device to a service provided by a third computing device, wherein the third computing device is separate from the first computing device;
in response to receiving the request, performing, by the first computing device, an evaluation of the second computing device, wherein the evaluation comprises determining a source of first software on the second computing device by comparing the first software to the prior software using the stored data in the database, and further comprises determining a security state of the second computing device, the security state including a risk level, and the security state based on the source of the first software;
generating, by the first computing device based on the evaluation, a token for the second computing device, the token comprising first data encoding the risk level; and
sending the token to at least one of the second computing device or the third computing device, wherein the first data is used to configure the service provided to the second computing device.