Controlling enterprise access by mobile devices
First Claim
Patent Images
1. A system comprising:
- at least one component running on at least one server and receiving device data for a plurality of devices and generating from the device data configuration data of processing components hosted on the device;
wherein the at least one component receives vulnerability data of a national database comprising a plurality of vulnerabilities of the processing components, wherein each vulnerability includes a severity rating;
wherein the at least one component generates a mapping of the vulnerability data to the configuration data of each device; and
wherein the at least one component selects for each device of the plurality of devices a set of the processing components and calculates for the set a trust score, wherein the calculating comprises calculating for each vulnerability of each processing component a vulnerability trust score that is proportional to the severity rating of each vulnerability, and calculating the trust score by combining the vulnerability trust score of each vulnerability, wherein access by each device to an enterprise is granted based on the trust score.
6 Assignments
0 Petitions
Accused Products
Abstract
A system comprising at least one component running on at least one server and receiving vulnerability data and, for each device of a plurality of devices, device data that includes data of at least one device component. The system includes a trust score corresponding to each device of the plurality of devices and representing a level of security applied to the device. The trust score is generated using a severity of the vulnerability data. The system includes an access control component coupled to the at least one component and controlling access of the plurality of devices to an enterprise using the trust score.
4 Citations
48 Claims
-
1. A system comprising:
-
at least one component running on at least one server and receiving device data for a plurality of devices and generating from the device data configuration data of processing components hosted on the device; wherein the at least one component receives vulnerability data of a national database comprising a plurality of vulnerabilities of the processing components, wherein each vulnerability includes a severity rating; wherein the at least one component generates a mapping of the vulnerability data to the configuration data of each device; and wherein the at least one component selects for each device of the plurality of devices a set of the processing components and calculates for the set a trust score, wherein the calculating comprises calculating for each vulnerability of each processing component a vulnerability trust score that is proportional to the severity rating of each vulnerability, and calculating the trust score by combining the vulnerability trust score of each vulnerability, wherein access by each device to an enterprise is granted based on the trust score. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47)
-
-
48. A method comprising:
-
receiving device data for a plurality of devices; generating from the device data configuration data of processing components hosted on the device; receiving vulnerability data of a national database comprising a plurality of vulnerabilities of the processing components, wherein each vulnerability includes a severity rating; generating a mapping of the vulnerability data to the device data; and selecting for each device of the plurality of devices a set of the processing components and calculating for the set a trust score, wherein the calculating comprises calculating for each vulnerability of each processing component a vulnerability trust score that is proportional to the severity rating of each vulnerability, and calculating the trust score by combining the vulnerability trust score of each vulnerability, wherein access by each device to an enterprise is granted based on the trust score.
-
Specification