PASSIVE SECURITY ENFORCEMENT

Technology is described for enabling passive enforcement of security at computing systems. A component of a computing system can passively authenticate or authorize a user based on observations of the user's interactions with the computing system. The technology may increase or decrease an auth...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: STEEVES, David J, CARPENTER, Todd L, CAMERON, Kim, MILLER, Quentin S, FOSTER, David
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator STEEVES, David J
CARPENTER, Todd L
CAMERON, Kim
MILLER, Quentin S
FOSTER, David
description Technology is described for enabling passive enforcement of security at computing systems. A component of a computing system can passively authenticate or authorize a user based on observations of the user's interactions with the computing system. The technology may increase or decrease an authentication or authorization level based on the observations. The level can indicate what level of access the user should be granted. When the user or a component of the computing device initiates a request, an application or service can determine whether the level is sufficient to satisfy the request. If the level is insufficient, the application or service can prompt the user for credentials so that the user is actively authenticated. The technology may enable computing systems to "trust" authentication so that two proximate devices can share authentication levels.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US2019312865A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US2019312865A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US2019312865A13</originalsourceid><addsrcrecordid>eNrjZJAJcAwO9gxzVQh2dQ4N8gyJVHD1c_MPcnb1dfUL4WFgTUvMKU7lhdLcDMpuriHOHrqpBfnxqcUFicmpeakl8aHBRgaGlsaGRhZmpo6GxsSpAgASuyIK</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>PASSIVE SECURITY ENFORCEMENT</title><source>esp@cenet</source><creator>STEEVES, David J ; CARPENTER, Todd L ; CAMERON, Kim ; MILLER, Quentin S ; FOSTER, David</creator><creatorcontrib>STEEVES, David J ; CARPENTER, Todd L ; CAMERON, Kim ; MILLER, Quentin S ; FOSTER, David</creatorcontrib><description>Technology is described for enabling passive enforcement of security at computing systems. A component of a computing system can passively authenticate or authorize a user based on observations of the user's interactions with the computing system. The technology may increase or decrease an authentication or authorization level based on the observations. The level can indicate what level of access the user should be granted. When the user or a component of the computing device initiates a request, an application or service can determine whether the level is sufficient to satisfy the request. If the level is insufficient, the application or service can prompt the user for credentials so that the user is actively authenticated. The technology may enable computing systems to "trust" authentication so that two proximate devices can share authentication levels.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRIC DIGITAL DATA PROCESSING ; ELECTRICITY ; PHYSICS ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION ; WIRELESS COMMUNICATIONS NETWORKS</subject><creationdate>2019</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20191010&amp;DB=EPODOC&amp;CC=US&amp;NR=2019312865A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25542,76290</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20191010&amp;DB=EPODOC&amp;CC=US&amp;NR=2019312865A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>STEEVES, David J</creatorcontrib><creatorcontrib>CARPENTER, Todd L</creatorcontrib><creatorcontrib>CAMERON, Kim</creatorcontrib><creatorcontrib>MILLER, Quentin S</creatorcontrib><creatorcontrib>FOSTER, David</creatorcontrib><title>PASSIVE SECURITY ENFORCEMENT</title><description>Technology is described for enabling passive enforcement of security at computing systems. A component of a computing system can passively authenticate or authorize a user based on observations of the user's interactions with the computing system. The technology may increase or decrease an authentication or authorization level based on the observations. The level can indicate what level of access the user should be granted. When the user or a component of the computing device initiates a request, an application or service can determine whether the level is sufficient to satisfy the request. If the level is insufficient, the application or service can prompt the user for credentials so that the user is actively authenticated. The technology may enable computing systems to "trust" authentication so that two proximate devices can share authentication levels.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>ELECTRICITY</subject><subject>PHYSICS</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><subject>WIRELESS COMMUNICATIONS NETWORKS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2019</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZJAJcAwO9gxzVQh2dQ4N8gyJVHD1c_MPcnb1dfUL4WFgTUvMKU7lhdLcDMpuriHOHrqpBfnxqcUFicmpeakl8aHBRgaGlsaGRhZmpo6GxsSpAgASuyIK</recordid><startdate>20191010</startdate><enddate>20191010</enddate><creator>STEEVES, David J</creator><creator>CARPENTER, Todd L</creator><creator>CAMERON, Kim</creator><creator>MILLER, Quentin S</creator><creator>FOSTER, David</creator><scope>EVB</scope></search><sort><creationdate>20191010</creationdate><title>PASSIVE SECURITY ENFORCEMENT</title><author>STEEVES, David J ; CARPENTER, Todd L ; CAMERON, Kim ; MILLER, Quentin S ; FOSTER, David</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US2019312865A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2019</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>ELECTRICITY</topic><topic>PHYSICS</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><topic>WIRELESS COMMUNICATIONS NETWORKS</topic><toplevel>online_resources</toplevel><creatorcontrib>STEEVES, David J</creatorcontrib><creatorcontrib>CARPENTER, Todd L</creatorcontrib><creatorcontrib>CAMERON, Kim</creatorcontrib><creatorcontrib>MILLER, Quentin S</creatorcontrib><creatorcontrib>FOSTER, David</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>STEEVES, David J</au><au>CARPENTER, Todd L</au><au>CAMERON, Kim</au><au>MILLER, Quentin S</au><au>FOSTER, David</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>PASSIVE SECURITY ENFORCEMENT</title><date>2019-10-10</date><risdate>2019</risdate><abstract>Technology is described for enabling passive enforcement of security at computing systems. A component of a computing system can passively authenticate or authorize a user based on observations of the user's interactions with the computing system. The technology may increase or decrease an authentication or authorization level based on the observations. The level can indicate what level of access the user should be granted. When the user or a component of the computing device initiates a request, an application or service can determine whether the level is sufficient to satisfy the request. If the level is insufficient, the application or service can prompt the user for credentials so that the user is actively authenticated. The technology may enable computing systems to "trust" authentication so that two proximate devices can share authentication levels.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_US2019312865A1
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
ELECTRIC COMMUNICATION TECHNIQUE
ELECTRIC DIGITAL DATA PROCESSING
ELECTRICITY
PHYSICS
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
WIRELESS COMMUNICATIONS NETWORKS
title PASSIVE SECURITY ENFORCEMENT
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-01T21%3A01%3A59IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=STEEVES,%20David%20J&rft.date=2019-10-10&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS2019312865A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true