Method and system for assessing and mitigating access control to a managed network
First Claim
1. A method for controlling access to a network, comprising the steps of:
- detecting that a device is attempting to obtain access to the network;
examining historical information relating to behavior of the device while the device was not accessing the network; and
determining whether to grant access to the network based on the historical information.
1 Assignment
0 Petitions
Accused Products
Abstract
A method, system, and computer program product for controlling access to a network that adds a new type of policy and new types of mitigation based on profiles of historical information about what the device did since last connected. This historical information will be used to create a historical based risk profile to determine whether or not to grant a device access to the network. A method for controlling access to a network comprises the steps of detecting that a device is attempting to obtain access to the network, examining historical information relating to behavior of the device while the device was not accessing the network, and determining whether to grant access to the network based on the historical information.
348 Citations
18 Claims
-
1. A method for controlling access to a network, comprising the steps of:
-
detecting that a device is attempting to obtain access to the network; examining historical information relating to behavior of the device while the device was not accessing the network; and determining whether to grant access to the network based on the historical information. - View Dependent Claims (2, 3, 4, 5, 6, 14, 15, 16, 17, 18)
-
-
7. A system for controlling access to a network comprising:
-
a processor operable to execute computer program instructions; a memory operable to store computer program instructions executable by the processor; and computer program instructions stored in the memory and executable to perform the steps of; detecting that a device is attempting to obtain access to the network; examining historical information relating to behavior of the device while the device was not accessing the network; and determining whether to grant access to the network based on the historical information. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A computer program product for controlling access to a network comprising:
-
a computer readable storage medium; computer program instructions, recorded on the computer readable storage medium, executable by a processor, for performing the steps of detecting that a device is attempting to obtain access to the network; examining historical information relating to behavior of the device while the device was not accessing the network; and determining whether to grant access to the network based on the historical information.
-
Specification