Information Security
First Claim
1. A computer-implemented method of implementing information security, the method comprising:
- in response to receiving an interaction request for a requesting entity, a request receiving component starting a timer for an approval time period;
in response to receiving the interaction request, the request receiving component sending a request for approval or disproval of the interaction request; and
in response to receiving the interaction request, the request receiving component forwarding the request for processing by a request processing component.
0 Assignments
0 Petitions
Accused Products
Abstract
An information security system that incorporates time, feedback, and/or varying trust in analyzing and responding to attacks. A solution can defer processing of a request for a period of time, which can be sufficient to allow the request to be approved or disproved. The solution can be configured to automatically approve or disprove the request after the period of time if no affirmative response is received. Trust for an entity can be periodically determined and can automatically decay over time. Feedback can be used as part of the approval/disproval process and/or to reevaluate trust.
-
Citations
20 Claims
-
1. A computer-implemented method of implementing information security, the method comprising:
-
in response to receiving an interaction request for a requesting entity, a request receiving component starting a timer for an approval time period; in response to receiving the interaction request, the request receiving component sending a request for approval or disproval of the interaction request; and in response to receiving the interaction request, the request receiving component forwarding the request for processing by a request processing component. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer system comprising:
a computing device including a request receiving component for receiving interaction requests and a request processing component for processing the interaction requests, wherein the request receiving component is configured to; in response to receiving an interaction request for a requesting entity, start a timer for an approval time period; in response to receiving the interaction request, send a request for approval or disproval of the interaction request; and in response to receiving the interaction request, forward the request for processing by the request processing component. - View Dependent Claims (13, 14, 15, 16, 17, 18)
-
19. A computer system comprising:
a computing device including; a request receiving component for receiving interaction requests; a request processing component for processing the interaction requests; and an attack protection component for evaluating the interaction requests with respect to at least one type of attack, wherein, in response to receiving an interaction request for a requesting entity; the request receiving component starts a timer for an approval time period; the request receiving component sends a request for approval or disproval of the interaction request for processing by the attack protection component; the request receiving component forwards the request for processing by the request processing component; the attack protection component evaluates the interaction request and approves or disproves the interaction request; and the request processing component halts further processing the interaction request in response to the attack protection component disproving the interaction request or continues processing the interaction request in response to the attack protection component approving the interaction request. - View Dependent Claims (20)
Specification