17521147. ENDPOINT AND REMOTE SERVER PROTECTION simplified abstract (International Business Machines Corporation)

From WikiPatents
Jump to navigation Jump to search

ENDPOINT AND REMOTE SERVER PROTECTION

Organization Name

International Business Machines Corporation

Inventor(s)

VIKAS KUMAR Manoria of Bengaluru (IN)

Anuj Shrivastava of Bangalore (IN)

Prasad Velagapudi of Visakhapatnam (IN)

Nikhil Bhavsar of Thane (IN)

ENDPOINT AND REMOTE SERVER PROTECTION - A simplified explanation of the abstract

This abstract first appeared for US patent application 17521147 titled 'ENDPOINT AND REMOTE SERVER PROTECTION

Simplified Explanation

Abstract: A processor can install an imposter security client (ISC) on a device to protect it from unauthorized users. The processor can also install a subscription-based imposter security service (ISS) as part of an identity and access management (IAM) system. The ISC and ISS can exchange information, triggered by the ISS receiving an imposter identification (ID) from the IAM system associated with an unauthorized endpoint user.

Patent/Innovation Explanation:

  • A processor installs an imposter security client (ISC) on an endpoint device.
  • The processor also installs a subscription-based imposter security service (ISS) as part of an identity and access management (IAM) system.
  • The ISC and ISS exchange information to protect the endpoint from unauthorized users.
  • The exchange is triggered when the ISS receives an imposter identification (ID) from the IAM system.
  • The imposter ID is associated with an unauthorized endpoint user.

Potential Applications:

  • Endpoint security systems for protecting devices from unauthorized users.
  • Identity and access management systems for managing user authentication and authorization.
  • Imposter security services for detecting and preventing unauthorized access attempts.

Problems Solved:

  • Unauthorized access to endpoint devices can lead to data breaches and security vulnerabilities.
  • Traditional security measures may not be sufficient to detect and prevent imposter attacks.
  • Managing user identities and access rights can be challenging without a robust IAM system.

Benefits:

  • Enhanced endpoint security by detecting and protecting against unauthorized users.
  • Improved user authentication and access management through the IAM system.
  • Real-time detection and prevention of imposter attacks for better overall security.


Original Abstract Submitted

A processor may install an imposter security client (ISC) at an endpoint. The processor may install a subscription based imposter security service (ISS). The ISS may be part of an identity and access management (IAM) system. The processor may exchange information between the ISC and the ISS. The exchange may be automatically triggered when the ISS receives an imposter identification (ID) from the IAM system. The imposter ID may be associated with an unauthorized endpoint user. The processor may protect the endpoint from the unauthorized endpoint user.