Identity risk score generation and implementation

作者: George M. Moore

DOI:

关键词:

摘要: Embodiments are directed to providing an identity risk score as part of authentication assertion, applying operating heuristics determine application's validity and scores requesting third parties. In one scenario, server receives from a cloud service portal various user credentials user. The identify the server. verifies user's using received generates based on or more factors. factors indicate likelihood that is valid encapsulates generated in assertion sends includes portal.

参考文章(40)
Paul A. Donfried, Guy S. Tallent, Steven T. Archer, Ashley Evans, Method and system for providing behavioral bi-directional authentication ,(2011)
Vadim Draluk, Jan-Willem Maarse, Francois Goldfain, Avery Audrey Kwan, Authentication using physical interaction characteristics ,(2012)
Ravi Pritmani, Cris T. Paltenghe, Igor Baikalov, Craig Kirby, Craig Froelich, Dynamic employee security risk scoring ,(2010)
Yakov I. Sverdlov, Mark Jeffrey Waks, John Edward O'Malley, Maria Margaret Loughlin, System and method for managing a fraud exchange ,(2011)
Ryan McGeehan, Robert J. Read, Christopher William Palow, Lev Timourovich Popov, Pedram Keyani, Preventing phishing attacks based on reputation of user locations ,(2009)
Daniel D Houser, Trust governance framework ,(2004)