End point context and trust level determination
First Claim
1. A method performed by a server device, the method comprising:
- receiving, by the server device and from a proxy server, a request, by a user device, to access a network associated with the server device;
obtaining, by the server device and in response to the request, information associated with the user device, including;
obtaining, from the request, all or fewer than all of one or more identifiers associated with the user device,retrieving, from another server device, all or a portion of context information associated with the user device, andsending, to the user device, a query to obtain more of the one or more identifiers or the context information when a quantity of the one or more identifiers or the context information, obtained from the request or retrieved from the other server device, is less than a threshold;
determining, by the server device, a level of trust associated with the user device based on the one or more identifiers and the context information, where the level of trust is a measure of security risk associated with each of the one or more identifiers and the context information;
generating, by the server device, an access token based on the level of trust, where the access token identifies a level at which the user device is authorized to access the network; and
sending, by the server device and to the user device via the proxy server, the access token, where the access token enables the proxy server to authorize the user device to access the network at the level identified by the access token.
1 Assignment
0 Petitions
Accused Products
Abstract
A server device is configured to receive, from a proxy server, a request by a user device to access a network; obtain information associated with the user device that includes an identifier associated with the user device and context information associated with the user device; determine a level of trust associated with the user device based on the identifier and the context information, where the level of trust is a measure of security risk associated with the user device; generate an access token based on the level of trust, where the access token identifies a level at which the user device is authorized to access the network; and send, to the user device via the proxy server, the access token that enables the proxy server to authorize the user device to access the network at the level identified by the access token.
-
Citations
22 Claims
-
1. A method performed by a server device, the method comprising:
-
receiving, by the server device and from a proxy server, a request, by a user device, to access a network associated with the server device; obtaining, by the server device and in response to the request, information associated with the user device, including; obtaining, from the request, all or fewer than all of one or more identifiers associated with the user device, retrieving, from another server device, all or a portion of context information associated with the user device, and sending, to the user device, a query to obtain more of the one or more identifiers or the context information when a quantity of the one or more identifiers or the context information, obtained from the request or retrieved from the other server device, is less than a threshold; determining, by the server device, a level of trust associated with the user device based on the one or more identifiers and the context information, where the level of trust is a measure of security risk associated with each of the one or more identifiers and the context information; generating, by the server device, an access token based on the level of trust, where the access token identifies a level at which the user device is authorized to access the network; and sending, by the server device and to the user device via the proxy server, the access token, where the access token enables the proxy server to authorize the user device to access the network at the level identified by the access token. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A server device comprising:
-
a memory to store one or more data items corresponding to information associated with a user device; and a processor to; receive, from a proxy server, a request, associated with the user device, to access a network associated with the server device, retrieve, from the memory and in response to the request, the one or more data items, assign a respective value to each of the one or more data items and to each of at least one data item obtained from the request, where the value assigned to the each of the one or more data items and the each of at least one data item corresponds to a relative quantity of security risk associated with the user device; and determine a level of trust, associated with the user device, based on a sum of the values assigned to the one or more data items and the at least one data item, identify a level at which the user device is authorized to access the network based on the level of trust associated with the user device; and send, to the proxy server, a notification that instructs the proxy server to permit the user device to access the network at the level at which the user device is authorized to access the network. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable medium containing instructions executable by at least one processor, the computer-readable medium comprising:
-
one or more instructions to receive, from a proxy server, a request by a user device to receive services from a network; one or more instructions to obtain, in response to the request, information associated with the user device; one or more instructions to assign a respective value to each of a plurality of data items that correspond to the information associated with the user device, where the assigned values correspond to a relative quantity of security risk associated with the each of the plurality of data items; one or more instructions to determine a level of trust associated with the user device based on the assigned values, where the level of trust is a measure of security risk associated with the user device; one or more instructions to generate a notification that directs the proxy server not to authorize the user device to access the network when the level of trust is less than a threshold; one or more instructions to generate an access token that indicates a level to which the user device is authorized to access the network when the level of trust is not less than the threshold, where the level to which the user device is authorized to access the network corresponds to the level of trust; and one or more instructions to send the notification or the access token to the proxy server. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22)
-
Specification