US 11,818,129 B2
Communicating with client device to determine security risk in allowing access to data of a service provider
Réda Zerrad, San Francisco, CA (US); Dhruva Gopal, Campbell, CA (US); Sneha Sachidananda, San Mateo, CA (US); Dayyan Yoon Lord, Oakland, CA (US); Varun Shimoga Prakash, Fremont, CA (US); Christopher Brandon Leach, Pacifica, CA (US); Brian James Buck, Livermore, CA (US); and Jeroen Martijn Wijdogen, Haarlem (NL)
Assigned to Lookout, Inc., Boston, MA (US)
Filed by Lookout, Inc., Boston, MA (US)
Filed on Jun. 5, 2020, as Appl. No. 16/894,566.
Application 16/894,566 is a continuation in part of application No. 16/666,063, filed on Oct. 28, 2019, granted, now 10,785,230.
Application 16/666,063 is a continuation in part of application No. 16/296,060, filed on Mar. 7, 2019, granted, now 10,491,603, issued on Nov. 26, 2019.
Prior Publication US 2020/0304503 A1, Sep. 24, 2020
Int. Cl. H04L 9/40 (2022.01); H04W 12/63 (2021.01)
CPC H04L 63/10 (2013.01) [H04W 12/63 (2021.01)] 21 Claims
OG exemplary drawing
 
1. A method comprising:
receiving, via a processor from an identity broker, a request regarding access by a client device to a service provided by a service provider;
in response to receiving the request, determining a first security state of the client device representing a risk of compromise associated with the client device;
determining that the first security state of the client device is a secure state representing a risk level below a threshold risk;
in response to determining that the first security state of the client device is the secure state, sending to the identity broker an indication that the client device is in the secure state indicating to the identity broker permission to authorize direct access by the client device to the service provider, wherein the identity broker is configured to, in response to receiving the permission, send a communication to the service provider that approves the direct access by the client device;
determining that the client device has changed to a new security state; and
in response to determining that the client device has changed to the new security state, replacing a component of an application in the client device corresponding to the new security state.