DEVICES AND METHODS FOR THREAT-BASED AUTHENTICATION FOR ACCESS TO COMPUTING RESOURCES
摘要
In some embodiments, a method includes receiving, at a host device, a signal indicative of an authentication request for a client device to access a resource from a set of resources. A resource confidence value associated with the authentication request is calculated based at least in part on (1) a threat confidence vector associated with at least one risk mitigation score for each threat from a set of threats and (2) a set of resource vulnerability scores associated with the resource and each threat from the set of threats. The resource confidence value is compared to a resource confidence criterion associated with the resource from the set of resources. A signal indicative of a positive authentication is sent from the host device to the client device when the resource confidence value satisfies the resource confidence criterion such that the client device is granted access to the resource.
申请公布号
WO2016011363(A1)
申请公布日期
2016.01.21
申请号
WO2015US40923
申请日期
2015.07.17
申请人
PING IDENTITY CORPORATION;HARMON, MANCE;BARID, LEEMON C., III;CHASE, DAVID;WAITE, DAVID
发明人
HARMON, MANCE;BARID, LEEMON C., III;CHASE, DAVID;WAITE, DAVID