-
公开(公告)号:US20190180039A1
公开(公告)日:2019-06-13
申请号:US15838691
申请日:2017-12-12
Applicant: FMR LLC
Inventor: Eoghan Considine , John Egan , Anthony Lernihan
Abstract: A computerized method is provided for automatically authorizing an access request from a user to perform a task with respect to a computing application of an application lifecycle management (ALM) system. The computerized method includes receiving, by a computing device, the access request from the user to perform the task with respect to the application in the ALM system and calculating, by the computing device, a risk score associated with the access request. Calculating the risk score includes determining a plurality of factors including: (i) at least one factor associated with the application indicative of an importance level of the application and (ii) at least one factor characterizing technical experience of the user, and computing the risk score as a weighted sum of the plurality of factors. The method further includes determining, by the computing device, whether to authorize the user access request based on the risk score.
-
公开(公告)号:US10803186B2
公开(公告)日:2020-10-13
申请号:US15838691
申请日:2017-12-12
Applicant: FMR LLC
Inventor: Eoghan Considine , John Egan , Anthony Lernihan
Abstract: A computerized method is provided for automatically authorizing an access request from a user to perform a task with respect to a computing application of an application lifecycle management (ALM) system. The computerized method includes receiving, by a computing device, the access request from the user to perform the task with respect to the application in the ALM system and calculating, by the computing device, a risk score associated with the access request. Calculating the risk score includes determining a plurality of factors including: (i) at least one factor associated with the application indicative of an importance level of the application and (ii) at least one factor characterizing technical experience of the user, and computing the risk score as a weighted sum of the plurality of factors. The method further includes determining, by the computing device, whether to authorize the user access request based on the risk score.
-