Cisco technology, inc. (20240297887). MID-SESSION TRUST ASSESSMENT simplified abstract
Contents
MID-SESSION TRUST ASSESSMENT
Organization Name
Inventor(s)
Josh Matz of Ann Arbor MI (US)
Nancy Cam-winget of Mountain View CA (US)
Joshua Terry of Round Rock TX (US)
Brian Lindauer of Austin TX (US)
David William Matteson of Dexter MI (US)
Courtney Irwin of Ann Arbor MI (US)
MID-SESSION TRUST ASSESSMENT - A simplified explanation of the abstract
This abstract first appeared for US patent application 20240297887 titled 'MID-SESSION TRUST ASSESSMENT
The present technology involves a system for receiving communications at an authentication service, which indicate a change in the security posture of an authenticated session between a user device and a secure service.
- The authentication service can determine if the change in security posture impacts the trust level associated with the user device.
- If the trust level falls below a certain threshold, the authentication service can send an enforcement signal to a security agent on a network device.
- The security agent provides remedial actions that the user can take to improve the security posture of the authenticated session.
Potential Applications: - Enhancing security measures for user devices accessing secure services. - Improving trust levels and enforcing security protocols in real-time.
Problems Solved: - Addressing changes in security posture that may compromise the trust level of user devices. - Providing immediate remedial actions to enhance security measures.
Benefits: - Increased security for user devices and secure services. - Real-time monitoring and enforcement of security protocols.
Commercial Applications: Title: Real-Time Security Enhancement System This technology can be utilized in industries such as finance, healthcare, and government agencies to ensure secure communication and data protection.
Questions about the technology: 1. How does this technology impact the overall security of user devices and secure services? 2. What are the potential implications of falling below the trust level threshold in terms of security risks and vulnerabilities?
Original Abstract Submitted
the present technology provides for receiving communications at an authentication service, and the communication is indicative of a change in a security posture of an authenticated session between a user device and a secure service. the authentication service can then determine that the change in the security posture of the authenticated session impacts the trust level associated with the user device and causes the trust level to fall below the threshold. the authentication service can then send an enforcement signal to a security agent on a network device that provides remedial actions that a user can undertake to improve the security posture of the authenticated session.
- Cisco technology, inc.
- Shayne Miel of Durham NC (US)
- Josh Matz of Ann Arbor MI (US)
- Nancy Cam-winget of Mountain View CA (US)
- Joshua Terry of Round Rock TX (US)
- Brian Lindauer of Austin TX (US)
- David William Matteson of Dexter MI (US)
- Jen Bammel of Dexter MI (US)
- Courtney Irwin of Ann Arbor MI (US)
- H04L9/40
- CPC H04L63/108