×

Systems and methods for modifying security based on reputation information

  • US 9,384,336 B1
  • Filed: 10/08/2012
  • Issued: 07/05/2016
  • Est. Priority Date: 10/08/2012
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method to assign a security policy, comprising:

  • detecting, by a processor, a plurality of components of a device;

    determining, by the processor, an individual reputation for each of the plurality of components, wherein each individual reputation is categorized based on two or more categories of trust, the two or more categories of trust including at least a suspicious category and an untrusted category;

    determining, by the processor, an overall reputation of the device based on the individual reputations, wherein determining an overall reputation comprises determining whether a tally of components categorized into the untrusted category satisfies a first threshold and determining whether a tally of components categorized into the suspicious category satisfies a second threshold;

    upon satisfying at least one of the first or second threshold, adjusting, by the processor, the overall reputation of the device, wherein the overall reputation is downgraded if the tally of components categorized into the untrusted category includes at least one component, and wherein the overall reputation is downgraded if the tally of components categorized into the suspicious category includes multiple components;

    assigning, by the processor, a security policy based at least in part on the overall reputation of the device, wherein the security policy assigned includes at least one of a restrictive security policy and a non-restrictive security policy, the restrictive security policy restricting access to components associated with sensitive information;

    identifying, by the processor, a first component among the plurality of components having a high sensitivity level based on the first component comprising sensitive information;

    identifying, by the processor, a second component among the plurality of components having a low sensitivity level based on the second component not comprising sensitive information;

    upon determining the restrictive security policy is assigned, restricting, by the processor, access to the first component on the device based on the high sensitivity level of the first component, while allowing access to the second component based on the low sensitivity level of the second component; and

    upon determining the non-restrictive security policy is assigned, allowing, by the processor, access to both the first and second components based on the non-restricted security policy.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×