-
公开(公告)号:US20240250942A1
公开(公告)日:2024-07-25
申请号:US18156974
申请日:2023-01-19
Applicant: Cisco Technology, Inc.
Inventor: Shayne Miel , Joshua Terry , Richard Harang , Kevin Tyler Burchfield , Gillian Gacusan , Patrick McMahon , Robert Small , Jake Ingman
IPC: H04L9/40
CPC classification number: H04L63/0853 , H04L63/1433
Abstract: The present technology provides for altering an authentication technique in response to a detection of a possible attack to which the authentication technique is vulnerable. An authentication provider can receive an authentication request to authenticate to a first resource, where the authentication to the first resource is permitted using a particular authentication technique, includes contextual information associated with the first access device and information identifying the first resource. Based on the contextual information, the authentication provider can determine that the authentication request is subject to an ongoing attack, and determine, an alternative authentication technique that is less vulnerable to the ongoing attack than the particular authentication technique. The authentication provider can require the first user account to authenticate with the first resource using the alternative authentication technique that is less vulnerable to the ongoing attack than the particular authentication technique.
-
公开(公告)号:US20240297887A1
公开(公告)日:2024-09-05
申请号:US18177502
申请日:2023-03-02
Applicant: Cisco Technology, Inc.
Inventor: Shayne Miel , Josh Matz , Nancy Cam-Winget , Joshua Terry , Brian Lindauer , David William Matteson , Jen Bammel , Courtney Irwin
IPC: H04L9/40
CPC classification number: H04L63/108 , H04L63/0876 , H04L63/105
Abstract: The present technology provides for receiving communications at an authentication service, and the communication is indicative of a change in a security posture of an authenticated session between a user device and a secure service. The authentication service can then determine that the change in the security posture of the authenticated session impacts the trust level associated with the user device and causes the trust level to fall below the threshold. The authentication service can then send an enforcement signal to a security agent on a network device that provides remedial actions that a user can undertake to improve the security posture of the authenticated session.
-