×

Controlling enterprise access by mobile devices

  • US 9,668,137 B2
  • Filed: 03/07/2012
  • Issued: 05/30/2017
  • Est. Priority Date: 03/07/2012
  • Status: Active Grant
First Claim
Patent Images

1. A system comprising:

  • a component running on a device and configured to transfer device data of the device into at least one server;

    at least one component running on a hardware processor of the at least one server and receiving vulnerability data of a national database comprising a plurality of vulnerabilities of a set of processing components hosted on the device and included in the device data, wherein each vulnerability is represented by a severity rating;

    wherein the at least one component generates a mapping between the device data and the vulnerability data, and uses the mapping to identify in the device data a set of vulnerabilities that corresponds to the set of processing components hosted on the device;

    wherein the at least one component generates a severity score for each vulnerability of each processing component using a formula D=(i2÷

    6)−

    ((2·

    i)÷

    3), wherein variable D represents the severity score and variable i represents the severity rating of the vulnerability, and generates a trust score for the device by combining the severity score of each vulnerability and adjusting a base score using the combined severity scores of each vulnerability, wherein access by the device to an enterprise is granted based on the trust score.

View all claims
  • 6 Assignments
Timeline View
Assignment View
    ×
    ×