×

Incremental compliance remediation

  • US 10,652,242 B2
  • Filed: 03/15/2013
  • Issued: 05/12/2020
  • Est. Priority Date: 03/15/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method, comprising:

  • receiving, using at least one computing device, a request from a client device to access a first networked resource;

    determining, using the at least one computing device, that a second networked resource is associated with accessing the first networked resource for the client device based on a resource group identifier, the resource group identifier being associated with a pairing of a user credential and a device identifier associated with the client device;

    associating, using the at least one computing device, a compliance rule with the client device based on the resource group identifier, the compliance rule being associated with the first networked resource and the second networked resource;

    determining, using the at least one computing device, whether the compliance rule is violated;

    responsive to determining that the compliance rule is violated, determining, using the at least one computing device, whether the compliance rule is associated with an alternative setting that is more stringent than a current setting associated with the client device;

    responsive to determining that the compliance rule is associated with the alternative setting that is more stringent than the current setting associated with the client device, changing, using the at least one computing device, the current setting to the alternative setting, wherein changing the current setting to the alternative setting comprises increasing a password complexity requirement, wherein increasing the password complexity requirement causes access to at least one of the client device, a network, a client device resource, or a network resource to be restricted until a user of the client device has configured a new password that complies with the password complexity requirement; and

    responsive to determining that the compliance rule is not associated with the alternative setting that is more stringent than the current setting associated with the client device, causing, using the at least one computing device, access to at least one of the client device, the network, the client device resource, or the network resource to be restricted.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×