-
公开(公告)号:US10671747B2
公开(公告)日:2020-06-02
申请号:US15932439
申请日:2017-04-10
申请人: Dipankar Dasgupta , Arunava Roy , Debasis Ghosh
发明人: Dipankar Dasgupta , Arunava Roy , Debasis Ghosh
摘要: A system and related methods for providing greater security and control over access to classified files and documents and other forms of sensitive information based upon a multi-user, multi-modality permission strategy centering on organizational structure, thereby making authentication strategy unpredictable so to significantly reduce the risk of exploitation. Based on the sensitivity or classification of the information being requested by a user, approvers are selected dynamically based on the work environment, e.g., mobility, use of the computing device seeking access, authentication factors under applicable environmental settings, access policy, and the like.
-
公开(公告)号:US09912657B2
公开(公告)日:2018-03-06
申请号:US14968676
申请日:2015-12-14
CPC分类号: H04L63/083 , G06F21/316 , G06F21/32 , G06F21/36 , G06F21/40 , G06F21/45 , H04L63/08 , H04L63/0861 , H04L2463/082
摘要: A system and methodology for adaptive selection of multiple modalities for authentication in different operating environments, thereby making authentication strategy unpredictable so to significantly reduce the risk of exploitation by authentication-guessing attacks. The system calculates trustworthiness values of different authentication factors under various environmental settings, and combines a trust-based adaptive, robust and scalable software-hardware framework for the selection of authentication factors for continuous and triggered authentication with optimal algorithms to determine the security parameters of each of the authentication factors. A subset of authentication factors thus are determined for application at triggering events on-the-fly, thereby leaving no exploitable a priori pattern or clue for hackers to exploit.
-
公开(公告)号:US11038896B2
公开(公告)日:2021-06-15
申请号:US16387839
申请日:2019-04-18
IPC分类号: H04L29/06
摘要: Systems and related methods for providing greater security and control over access to protected or classified resources, files and documents and other forms of sensitive information based upon an initial adaptive selection of multiple modalities for authentication in different operating environments, with subsequent multi-user permission strategy centering on organizational structure. The system calculates trustworthiness values of different authentication factors under various environmental settings, and combines a trust-based adaptive, robust and scalable software-hardware framework for the selection of authentication factors for continuous and triggered authentication with optimal algorithms to determine the security parameters of each of the authentication factors. A subset of authentication factors thus are determined for application at triggering events on-the-fly, thereby leaving no exploitable a priori pattern or clue for hackers to exploit. Upon authentication of an access request, based on the sensitivity or classification of the information being requested by a user, approvers are selected dynamically based on the work environment (e.g., mobility, use of the computing device seeking access, access policy, and the like). The selected sets of approvers are non-repetitive in nature.
-
公开(公告)号:US20190130124A1
公开(公告)日:2019-05-02
申请号:US15932439
申请日:2017-04-10
申请人: DIPANKAR DASGUPTA , ARUNAVA ROY , DEBASIS GHOSH
发明人: DIPANKAR DASGUPTA , ARUNAVA ROY , DEBASIS GHOSH
摘要: A system and related methods for providing greater security and control over access to classified files and documents and other forms of sensitive information based upon a multi-user, multi-modality permission strategy centering on organizational structure, thereby making authentication strategy unpredictable so to significantly reduce the risk of exploitation. Based on the sensitivity or classification of the information being requested by a user, approvers are selected dynamically based on the work environment, e.g., mobility, use of the computing device seeking access, authentication factors under applicable environmental settings, access policy, and the like.
-
5.
公开(公告)号:US20200014702A1
公开(公告)日:2020-01-09
申请号:US16387839
申请日:2019-04-18
IPC分类号: H04L29/06
摘要: Systems and related methods for providing greater security and control over access to protected or classified resources, files and documents and other forms of sensitive information based upon an initial adaptive selection of multiple modalities for authentication in different operating environments, with subsequent multi-user permission strategy centering on organizational structure. The system calculates trustworthiness values of different authentication factors under various environmental settings, and combines a trust-based adaptive, robust and scalable software-hardware framework for the selection of authentication factors for continuous and triggered authentication with optimal algorithms to determine the security parameters of each of the authentication factors. A subset of authentication factors thus are determined for application at triggering events on-the-fly, thereby leaving no exploitable a priori pattern or clue for hackers to exploit. Upon authentication of an access request, based on the sensitivity or classification of the information being requested by a user, approvers are selected dynamically based on the work environment (e.g., mobility, use of the computing device seeking access, access policy, and the like). The selected sets of approvers are non-repetitive in nature.
-
公开(公告)号:US20190312881A1
公开(公告)日:2019-10-10
申请号:US15949111
申请日:2018-04-10
申请人: DIPANKAR DASGUPTA , ARUNAVA ROY , DEBASIS GHOSH
发明人: DIPANKAR DASGUPTA , ARUNAVA ROY , DEBASIS GHOSH
IPC分类号: H04L29/06
摘要: A system and related methods for providing greater security and control over access to classified files and documents and other forms of sensitive information based upon a multi-user permission strategy centering on organizational structure. Based on the sensitivity or classification of the information being requested by a user, approvers are selected dynamically based on the work environment (e.g., mobility, use of the computing device seeking access, access policy, and the like). The selected sets of approvers are non-repetitive in nature, making it very hard to guess which approvers will be selected for a particular request.
-
公开(公告)号:US20160359838A1
公开(公告)日:2016-12-08
申请号:US14968676
申请日:2015-12-14
CPC分类号: H04L63/083 , G06F21/316 , G06F21/32 , G06F21/36 , G06F21/40 , G06F21/45 , H04L63/08 , H04L63/0861 , H04L2463/082
摘要: A system and methodology for adaptive selection of multiple modalities for authentication in different operating environments, thereby making authentication strategy unpredictable so to significantly reduce the risk of exploitation by authentication-guessing attacks. The system calculates trustworthiness values of different authentication factors under various environmental settings, and combines a trust-based adaptive, robust and scalable software-hardware framework for the selection of authentication factors for continuous and triggered authentication with optimal algorithms to determine the security parameters of each of the authentication factors. A subset of authentication factors thus are determined for application at triggering events on-the-fly, thereby leaving no exploitable a priori pattern or clue for hackers to exploit.
摘要翻译: 用于在不同操作环境中自适应选择认证的多种模式的系统和方法,从而使认证策略不可预测,从而通过认证猜测攻击显着降低利用的风险。 该系统在各种环境设置下计算不同认证因子的可信赖度值,并结合基于信任的自适应,稳健和可扩展的软件 - 硬件框架,用于选择用于连续和触发认证的认证因子,并使用最优算法确定每个 的认证因素。 因此,鉴定因素的一个子集被确定为即时触发事件时的应用,从而不会为黑客利用提供可利用的先验模式或线索。
-
-
-
-
-
-