×

Systems and methods for endpoint management classification

  • US 10,009,344 B2
  • Filed: 06/19/2017
  • Issued: 06/26/2018
  • Est. Priority Date: 06/29/2016
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for mitigating security vulnerabilities of a computer network by detecting a management status of an endpoint computing device attempting to authenticate to one or more computing resources accessible via the computer network, the method comprising:

  • at a computer security platform comprising one or more servers that function to;

    (i) detect an authentication attempt by the endpoint computing device to the computer network, wherein detecting the authentication attempt comprises receiving an authentication request originating from the endpoint computing device for accessing the computer network;

    (ii) during the authentication attempt, collect management status indicia from the endpoint computing device, wherein the management status indicia comprise data used to determine a management status of the endpoint computing device, the management status indicating whether the endpoint computing device is actively managed by an entity maintaining the computer network or by an affiliate of the entity maintaining the computer network, wherein collecting management status indicia from the endpoint computing device includes;

    implementing at least one inline frame within a web interface; and

    using the at least one inline frame to collect (a) authentication attempt data and (b) the management status indicia during the authentication attempt, wherein the authentication attempt data comprises identifying data of the endpoint computing device and authentication credentials;

    (iii) use the management status indicia to identify the management status of the endpoint computing device and identifying the management status of the endpoint computing device; and

    (iv) control access to the computer network based on (a) whether the authentication attempt by the endpoint computing device is successful and (b) the identified management status of the endpoint computing device.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×