Risk-Based Factor Selection
    1.
    发明公开

    公开(公告)号:US20240250942A1

    公开(公告)日:2024-07-25

    申请号:US18156974

    申请日:2023-01-19

    CPC classification number: H04L63/0853 H04L63/1433

    Abstract: The present technology provides for altering an authentication technique in response to a detection of a possible attack to which the authentication technique is vulnerable. An authentication provider can receive an authentication request to authenticate to a first resource, where the authentication to the first resource is permitted using a particular authentication technique, includes contextual information associated with the first access device and information identifying the first resource. Based on the contextual information, the authentication provider can determine that the authentication request is subject to an ongoing attack, and determine, an alternative authentication technique that is less vulnerable to the ongoing attack than the particular authentication technique. The authentication provider can require the first user account to authenticate with the first resource using the alternative authentication technique that is less vulnerable to the ongoing attack than the particular authentication technique.

    MID-SESSION TRUST ASSESSMENT
    2.
    发明公开

    公开(公告)号:US20240297887A1

    公开(公告)日:2024-09-05

    申请号:US18177502

    申请日:2023-03-02

    CPC classification number: H04L63/108 H04L63/0876 H04L63/105

    Abstract: The present technology provides for receiving communications at an authentication service, and the communication is indicative of a change in a security posture of an authenticated session between a user device and a secure service. The authentication service can then determine that the change in the security posture of the authenticated session impacts the trust level associated with the user device and causes the trust level to fall below the threshold. The authentication service can then send an enforcement signal to a security agent on a network device that provides remedial actions that a user can undertake to improve the security posture of the authenticated session.

Patent Agency Ranking