Tracking and identifying operations from un-trusted clients

Tracking data operations associated with unauthenticated computing devices to enable subsequent identification and remediation thereof. In embodiments in which one computing device has to trust another computing device without authenticating the other computing device, a machine identifier and a cre...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: ELLIS JOHN LEO, BADWE ASHUTOSH, WILLIAMS JUANYA DAVON
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Tracking data operations associated with unauthenticated computing devices to enable subsequent identification and remediation thereof. In embodiments in which one computing device has to trust another computing device without authenticating the other computing device, a machine identifier and a credential group value are associated with data operations in communications from the unauthenticated computing device. The data operations may be subsequently identified based on the machine identifier and credential group value. Remedial action may be taken on the identified data operations to restore data integrity.