OPTIMIZING APPLICATION SECURITY BASED ON MALICIOUS USER INTENT

    公开(公告)号:US20220417267A1

    公开(公告)日:2022-12-29

    申请号:US17489359

    申请日:2021-09-29

    Abstract: An example method identifying a request to access or modify a data resource. The request is made by a user. The example method further includes authenticating the user. Based on authenticating the user, the example method includes determining that the request is associated with a malicious intent based on a characteristic of the user. Further, based on determining that the request is associated with the malicious intent, the example method includes blocking the user from accessing or modifying the data resource.

    ADJUSTING SECURITY POLICIES BASED ON ENDPOINT LOCATIONS

    公开(公告)号:US20220255922A1

    公开(公告)日:2022-08-11

    申请号:US17178199

    申请日:2021-02-17

    Abstract: This disclosure describes techniques for setting and/or adjusting a security policy associated with a device based on the physical locations of endpoint devices exchanging data with the device. An example method includes performing, at a first time, a first authentication of a first device connecting to a service; determining addresses of second devices exchanging data with the first device; determining physical locations of the second devices based on the addresses; and defining a reauthentication interval based on the physical locations of the second devices. At a second time that is after the first time by the reauthentication interval, the example method further includes disconnecting the first device from the service; and based on disconnecting the first device from the service, triggering a second authentication of the first device.

Patent Agency Ranking