End point reputation credential for controlling network access
First Claim
Patent Images
1. A method for controlling access to a resource, the method comprising:
- monitoring, by one or more hardware processors, a first set of usage of an endpoint computing device within a network, wherein the first set of usage includes usage data received and sent by the endpoint computing device;
calculating, by one or more hardware processors, an endpoint computing device reputation for the endpoint computing device based on the monitored first set of usage of the endpoint computing device;
associating, by one or more hardware processors, the endpoint computing device reputation with the endpoint computing device;
receiving, by one or more hardware processors, a request from the endpoint computing device to access a resource within the network, wherein the resource is at least one of a database, an email program, and a server; and
determining, by one or more hardware processors, whether the endpoint computing device shall be granted access to the resource based on a comparison of a minimum reputation requirement of the resource to the endpoint computing device reputation;
monitoring, by one or more hardware processors, a second set of usage of the endpoint computing device;
determining, by one or more hardware processors, that the second set of usage of the endpoint computing device affects the endpoint computing device reputation;
adjusting;
by one or more hardware processors, the endpoint computing device reputation based on the second set of usage of the endpoint computing device; and
determining, by one or more hardware processors, whether the endpoint computing device is granted access to the resource based on a comparison of a minimum reputation requirement of the resource to the adjusted endpoint computing device reputation.
1 Assignment
0 Petitions
Accused Products
Abstract
In an approach for controlling access to a resource a processor monitors a first set of traffic of a computing device. A processor calculates reputation based on the first set of traffic of the computing device. A processor associates the reputation with the computing device. A processor receives a request to access a resource from the computing device. A processor determines whether the computing device shall be granted access to the resource based on the reputation.
12 Citations
16 Claims
-
1. A method for controlling access to a resource, the method comprising:
-
monitoring, by one or more hardware processors, a first set of usage of an endpoint computing device within a network, wherein the first set of usage includes usage data received and sent by the endpoint computing device; calculating, by one or more hardware processors, an endpoint computing device reputation for the endpoint computing device based on the monitored first set of usage of the endpoint computing device; associating, by one or more hardware processors, the endpoint computing device reputation with the endpoint computing device; receiving, by one or more hardware processors, a request from the endpoint computing device to access a resource within the network, wherein the resource is at least one of a database, an email program, and a server; and determining, by one or more hardware processors, whether the endpoint computing device shall be granted access to the resource based on a comparison of a minimum reputation requirement of the resource to the endpoint computing device reputation; monitoring, by one or more hardware processors, a second set of usage of the endpoint computing device; determining, by one or more hardware processors, that the second set of usage of the endpoint computing device affects the endpoint computing device reputation; adjusting;
by one or more hardware processors, the endpoint computing device reputation based on the second set of usage of the endpoint computing device; anddetermining, by one or more hardware processors, whether the endpoint computing device is granted access to the resource based on a comparison of a minimum reputation requirement of the resource to the adjusted endpoint computing device reputation. - View Dependent Claims (2, 3, 4, 5, 14, 15, 16)
-
-
6. A computer program product for controlling access to a resource, the computer program product comprising:
-
one or more computer readable storage devices and program instructions stored on the one or more computer readable storage devices, the program instructions comprising; program instructions to monitor a first set of usage of an endpoint computing device within a network, wherein the first set of usage includes usage data received and sent by the endpoint computing device; program instructions to calculate an endpoint computing device reputation for the endpoint computing device based on the monitored first set of usage of the endpoint computing device; program instructions to associate the endpoint computing device reputation with the endpoint computing device; program instructions to receive a request from the endpoint computing device to access a resource within the network, wherein the resource is at least one of a database, an email program, and a server; program instructions to determine whether the endpoint computing device shall be granted access to the resource based on a comparison of a minimum reputation requirement of the resource to the endpoint computing device reputation; program instructions to monitor a second set of usage of the endpoint computing device within the network; program instructions to determine that the second set of usage of the endpoint computing device affects the endpoint computing device reputation; program instructions to adjust the endpoint computing device reputation based on the second set of usage of the endpoint computing device; and program instructions to determine whether the endpoint computing device is granted access to the resource based on a comparison of a minimum reputation requirement of the resource to the adjusted endpoint computing device reputation. - View Dependent Claims (7, 8, 9)
-
-
10. A computer system for controlling access to a resource, the computer program product comprising:
one or more computer hardware processors, one or more computer readable storage devices, and program instructions stored on the one or more computer readable storage devices for execution by at least one of the one or more hardware processors, the program instructions comprising; program instructions to monitor a first set of usage of an endpoint computing device within a network, wherein the first set of usage includes usage data received and sent by the endpoint computing device; program instructions to calculate an endpoint computing device reputation for the endpoint computing device based on the monitored first set of usage of the endpoint computing device; program instructions to associate the endpoint computing device reputation with the endpoint computing device; program instructions to receive a request from the endpoint computing device to access a resource within the network, wherein the resource is at least one of a database, an email program, and a server; and program instructions to determine whether the endpoint computing device shall be granted access to the resource based on a comparison of a minimum reputation requirement of the resource to the endpoint computing device reputation; program instructions to monitor a second set of usage of the endpoint computing device within the network; program instructions to determine that the second set of usage of the endpoint computing device affects the endpoint computing device reputation; program instructions to adjust the endpoint computing device reputation based on the second set of usage of the endpoint computing device; and program instructions to determine whether the endpoint computing device is granted access to the resource based on a comparison of a minimum reputation requirement of the resource to the adjusted endpoint computing device reputation. - View Dependent Claims (11, 12, 13)
Specification