×

Devices and methods for threat-based authentication for access to computing resources

  • US 9,787,723 B2
  • Filed: 07/16/2015
  • Issued: 10/10/2017
  • Est. Priority Date: 07/18/2014
  • Status: Active Grant
First Claim
Patent Images

1. An apparatus, comprising:

  • a memory storing instructions and a processor operably coupled via a computer network to both (1) a compute device including a set of resources and (2) a client device, the processor configured to execute the instructions to;

    to define a resource confidence criterion for each resource from the set of resources based on (1) a threat confidence vector associated with a set of risk mitigation scores for each threat from a set of threats and (2) a set of resource vulnerability scores for each threat from the set of threats;

    receive from the client device a signal indicative of an authentication request (1) for a resource from the set of resources and (2) including a credential associated with an authentication mode from a set of authentication modes;

    define a resource confidence value for the resource requested by the client device based on a threat confidence vector associated with the authentication mode and the set of resource vulnerability scores;

    compare the resource confidence value for the resource and the resource confidence criterion for the resource to determine whether the resource confidence criterion for the resource is satisfied; and

    send a signal indicative of a positive authentication when the resource confidence criterion for the resource is satisfied such that the client device is granted access to the resource.

View all claims
  • 10 Assignments
Timeline View
Assignment View
    ×
    ×