END POINT REPUTATION CREDENTIAL FOR CONTROLLING NETWORK ACCESS
First Claim
Patent Images
1. A method for controlling access to a resource, the method comprising:
- monitoring, by one or more hardware processors, a first set of usage of a computing device;
calculating, by one or more hardware processors, a reputation based on the first set of usage of the computing device;
associating, by one or more hardware processors, the reputation with the computing device;
receiving, by one or more hardware processors, a request to access a resource from the computing device; and
determining, by one or more hardware processors, whether the computing device shall be granted access to the resource based on the reputation.
1 Assignment
0 Petitions
Accused Products
Abstract
In an approach for controlling access to a resource a processor monitors a first set of traffic of a computing device. A processor calculates reputation based on the first set of traffic of the computing device. A processor associates the reputation with the computing device. A processor receives a request to access a resource from the computing device. A processor determines whether the computing device shall be granted access to the resource based on the reputation.
12 Citations
23 Claims
-
1. A method for controlling access to a resource, the method comprising:
-
monitoring, by one or more hardware processors, a first set of usage of a computing device; calculating, by one or more hardware processors, a reputation based on the first set of usage of the computing device; associating, by one or more hardware processors, the reputation with the computing device; receiving, by one or more hardware processors, a request to access a resource from the computing device; and determining, by one or more hardware processors, whether the computing device shall be granted access to the resource based on the reputation. - View Dependent Claims (2, 3, 4, 5, 6, 21, 22, 23)
-
-
7. (canceled)
-
8. A computer program product for controlling access to a resource,
the computer program product comprising: -
one or more computer readable storage devices and program instructions stored on the one or more computer readable storage devices, the program instructions comprising; program instructions to monitor a first set of usage of a computing device; program instructions to calculate a reputation based on the first set of usage of the computing device; program instructions to associate the reputation with the computing device; program instructions to receive a request to access a resource from the computing device; and program instructions to determine whether the computing device shall be granted access to the resource based on the reputation. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. (canceled)
-
15. A computer system for controlling access to a resource, the computer program product comprising:
-
one or more computer hardware processors, one or more computer readable storage devices, and program instructions stored on the one or more computer readable storage devices for execution by at least one of the one or more hardware processors, the program instructions comprising; program instructions to monitor a first set of traffic of a computing device; program instructions to calculate a reputation based on the first set of traffic of the computing device; program instructions to associate the reputation with the computing device; program instructions to receive a request to access a resource from the computing device; and program instructions to determine whether the computing device shall be granted access to the resource based on the reputation. - View Dependent Claims (16, 17, 18, 19)
-
-
20. (canceled)
Specification