The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Jun. 26, 2018

Filed:

Jun. 19, 2017
Applicant:

Duo Security, Inc., Ann Arbor, MI (US);

Inventors:

Jon Oberheide, Ann Arbor, MI (US);

Adam Goodman, Ann Arbor, MI (US);

Michael Hanley, Ann Arbor, MI (US);

Peter Johnson, Ann Arbor, MI (US);

Omar Abduljaber, Ann Arbor, MI (US);

James Barclay, Ann Arbor, MI (US);

Assignee:

Duo Security, Inc., Ann Arbor, MI (US);

Attorneys:
Primary Examiner:
Assistant Examiner:
Int. Cl.
CPC ...
H04L 29/06 (2006.01); H04W 12/06 (2009.01); H04W 12/08 (2009.01); G06F 21/62 (2013.01);
U.S. Cl.
CPC ...
H04L 63/0876 (2013.01); H04L 63/101 (2013.01); H04L 63/102 (2013.01); H04W 12/06 (2013.01); G06F 21/62 (2013.01); H04L 63/08 (2013.01); H04W 12/08 (2013.01);
Abstract

A system and method for mitigating security vulnerabilities of a computer network by detecting a management status of an endpoint computing device attempting to authenticate to one or more computing resources accessible via the computer network includes: detecting an authentication attempt by the endpoint computing device to the computer network; during the authentication attempt, collecting management status indicia from the endpoint computing device, wherein the management status indicia comprise data used to determine a management status of the endpoint computing device; using the management status indicia to identify the management status of the endpoint computing device and identifying the management status of the endpoint computing device; and controlling access to the computer network based on (a) whether the authentication attempt by the endpoint computing device is successful and (b) the identified management status of the endpoint computing device.


Find Patent Forward Citations

Loading…