×

DEVICES AND METHODS FOR THREAT-BASED AUTHENTICATION FOR ACCESS TO COMPUTING RESOURCES

  • US 20160021117A1
  • Filed: 07/16/2015
  • Published: 01/21/2016
  • Est. Priority Date: 07/18/2014
  • Status: Active Grant
First Claim
Patent Images

1. An apparatus, comprising:

  • a communication module implemented in at least one of a memory or a processor, the communication module configured to electronically communicate with a client device and a set of resources;

    a policy definition module configured to define a resource confidence criterion for each resource from the set of resources based on (1) a threat confidence vector associated with a set of risk mitigation scores for each threat from a set of threats and (2) a set of resource vulnerability scores for each threat from the set of threats; and

    a policy application module configured to (1) receive a signal via the communication module indicative of an authentication request associated with a resource from the set of resources and (2) define a resource confidence value for the resource from the set of resources based on a threat confidence vector associated with the authentication request and the set of resource vulnerability scores,the policy application module configured to (1) compare the resource confidence value for the resource from the set of resources and the resource confidence criterion for the resource from the set of resources and (2) send a signal via the communication module indicative of a positive authentication, when the resource confidence criterion for the resource from the set of resources is satisfied, such that the client device is granted access to the resource.

View all claims
  • 10 Assignments
Timeline View
Assignment View
    ×
    ×