Multi-user permission strategy to access sensitive information

    公开(公告)号:US10671747B2

    公开(公告)日:2020-06-02

    申请号:US15932439

    申请日:2017-04-10

    IPC分类号: H04L29/06 G06F21/62 G06F21/40

    摘要: A system and related methods for providing greater security and control over access to classified files and documents and other forms of sensitive information based upon a multi-user, multi-modality permission strategy centering on organizational structure, thereby making authentication strategy unpredictable so to significantly reduce the risk of exploitation. Based on the sensitivity or classification of the information being requested by a user, approvers are selected dynamically based on the work environment, e.g., mobility, use of the computing device seeking access, authentication factors under applicable environmental settings, access policy, and the like.

    Adaptive multi-factor authentication system with multi-user permission strategy to access sensitive information

    公开(公告)号:US11038896B2

    公开(公告)日:2021-06-15

    申请号:US16387839

    申请日:2019-04-18

    IPC分类号: H04L29/06

    摘要: Systems and related methods for providing greater security and control over access to protected or classified resources, files and documents and other forms of sensitive information based upon an initial adaptive selection of multiple modalities for authentication in different operating environments, with subsequent multi-user permission strategy centering on organizational structure. The system calculates trustworthiness values of different authentication factors under various environmental settings, and combines a trust-based adaptive, robust and scalable software-hardware framework for the selection of authentication factors for continuous and triggered authentication with optimal algorithms to determine the security parameters of each of the authentication factors. A subset of authentication factors thus are determined for application at triggering events on-the-fly, thereby leaving no exploitable a priori pattern or clue for hackers to exploit. Upon authentication of an access request, based on the sensitivity or classification of the information being requested by a user, approvers are selected dynamically based on the work environment (e.g., mobility, use of the computing device seeking access, access policy, and the like). The selected sets of approvers are non-repetitive in nature.

    MULTI-USER PERMISSION STRATEGY TO ACCESS SENSITIVE INFORMATION

    公开(公告)号:US20190130124A1

    公开(公告)日:2019-05-02

    申请号:US15932439

    申请日:2017-04-10

    IPC分类号: G06F21/62 H04L29/06

    摘要: A system and related methods for providing greater security and control over access to classified files and documents and other forms of sensitive information based upon a multi-user, multi-modality permission strategy centering on organizational structure, thereby making authentication strategy unpredictable so to significantly reduce the risk of exploitation. Based on the sensitivity or classification of the information being requested by a user, approvers are selected dynamically based on the work environment, e.g., mobility, use of the computing device seeking access, authentication factors under applicable environmental settings, access policy, and the like.

    ADAPTIVE MULTI-FACTOR AUTHENTICATION SYSTEM WITH MULTI-USER PERMISSION STRATEGY TO ACCESS SENSITIVE INFORMATION

    公开(公告)号:US20200014702A1

    公开(公告)日:2020-01-09

    申请号:US16387839

    申请日:2019-04-18

    IPC分类号: H04L29/06

    摘要: Systems and related methods for providing greater security and control over access to protected or classified resources, files and documents and other forms of sensitive information based upon an initial adaptive selection of multiple modalities for authentication in different operating environments, with subsequent multi-user permission strategy centering on organizational structure. The system calculates trustworthiness values of different authentication factors under various environmental settings, and combines a trust-based adaptive, robust and scalable software-hardware framework for the selection of authentication factors for continuous and triggered authentication with optimal algorithms to determine the security parameters of each of the authentication factors. A subset of authentication factors thus are determined for application at triggering events on-the-fly, thereby leaving no exploitable a priori pattern or clue for hackers to exploit. Upon authentication of an access request, based on the sensitivity or classification of the information being requested by a user, approvers are selected dynamically based on the work environment (e.g., mobility, use of the computing device seeking access, access policy, and the like). The selected sets of approvers are non-repetitive in nature.

    MULTI-USER PERMISSION STRATEGY TO ACCESS SENSITIVE INFORMATION

    公开(公告)号:US20190312881A1

    公开(公告)日:2019-10-10

    申请号:US15949111

    申请日:2018-04-10

    IPC分类号: H04L29/06

    摘要: A system and related methods for providing greater security and control over access to classified files and documents and other forms of sensitive information based upon a multi-user permission strategy centering on organizational structure. Based on the sensitivity or classification of the information being requested by a user, approvers are selected dynamically based on the work environment (e.g., mobility, use of the computing device seeking access, access policy, and the like). The selected sets of approvers are non-repetitive in nature, making it very hard to guess which approvers will be selected for a particular request.

    ADAPTIVE MULTI-FACTOR AUTHENTICATION SYSTEM
    7.
    发明申请
    ADAPTIVE MULTI-FACTOR AUTHENTICATION SYSTEM 审中-公开
    自适应多因素认证系统

    公开(公告)号:US20160359838A1

    公开(公告)日:2016-12-08

    申请号:US14968676

    申请日:2015-12-14

    摘要: A system and methodology for adaptive selection of multiple modalities for authentication in different operating environments, thereby making authentication strategy unpredictable so to significantly reduce the risk of exploitation by authentication-guessing attacks. The system calculates trustworthiness values of different authentication factors under various environmental settings, and combines a trust-based adaptive, robust and scalable software-hardware framework for the selection of authentication factors for continuous and triggered authentication with optimal algorithms to determine the security parameters of each of the authentication factors. A subset of authentication factors thus are determined for application at triggering events on-the-fly, thereby leaving no exploitable a priori pattern or clue for hackers to exploit.

    摘要翻译: 用于在不同操作环境中自适应选择认证的多种模式的系统和方法,从而使认证策略不可预测,从而通过认证猜测攻击显着降低利用的风险。 该系统在各种环境设置下计算不同认证因子的可信赖度值,并结合基于信任的自适应,稳健和可扩展的软件 - 硬件框架,用于选择用于连续和触发认证的认证因子,并使用最优算法确定每个 的认证因素。 因此,鉴定因素的一个子集被确定为即时触发事件时的应用,从而不会为黑客利用提供可利用的先验模式或线索。