-
公开(公告)号:US11831642B2
公开(公告)日:2023-11-28
申请号:US17235066
申请日:2021-04-20
Applicant: Duo Security, Inc.
Inventor: Jon Oberheide , Adam Goodman , Michael Hanley , Peter Johnson , Omar Abduljaber , James Barclay
CPC classification number: H04L63/0876 , H04L63/101 , H04L63/102 , H04L63/205 , H04W12/06 , G06F21/62 , H04L63/08 , H04W12/08
Abstract: A system and method for mitigating security vulnerabilities of a computer network by detecting a management status of an endpoint computing device attempting to authenticate to one or more computing resources accessible via the computer network includes: detecting an authentication attempt by the endpoint computing device to the computer network; during the authentication attempt, collecting management status indicia from the endpoint computing device, wherein the management status indicia comprise data used to determine a management status of the endpoint computing device; using the management status indicia to identify the management status of the endpoint computing device and identifying the management status of the endpoint computing device; and controlling access to the computer network based on (a) whether the authentication attempt by the endpoint computing device is successful and (b) the identified management status of the endpoint computing device.
-
公开(公告)号:US20210258307A1
公开(公告)日:2021-08-19
申请号:US17235066
申请日:2021-04-20
Applicant: Duo Security, Inc.
Inventor: Jon Oberheide , Adam Goodman , Michael Hanley , Peter Johnson , Omar Abduljaber , James Barclay
Abstract: A system and method for mitigating security vulnerabilities of a computer network by detecting a management status of an endpoint computing device attempting to authenticate to one or more computing resources accessible via the computer network includes: detecting an authentication attempt by the endpoint computing device to the computer network; during the authentication attempt, collecting management status indicia from the endpoint computing device, wherein the management status indicia comprise data used to determine a management status of the endpoint computing device; using the management status indicia to identify the management status of the endpoint computing device and identifying the management status of the endpoint computing device; and controlling access to the computer network based on (a) whether the authentication attempt by the endpoint computing device is successful and (b) the identified management status of the endpoint computing device.
-
公开(公告)号:US11019057B2
公开(公告)日:2021-05-25
申请号:US16741858
申请日:2020-01-14
Applicant: Duo Security, Inc.
Inventor: Jon Oberheide , Adam Goodman , Michael Hanley , Peter Johnson , Omar Abduljaber , James Barclay
Abstract: A system and method for mitigating security vulnerabilities of a computer network by detecting a management status of an endpoint computing device attempting to authenticate to one or more computing resources accessible via the computer network includes: detecting an authentication attempt by the endpoint computing device to the computer network; during the authentication attempt, collecting management status indicia from the endpoint computing device, wherein the management status indicia comprise data used to determine a management status of the endpoint computing device; using the management status indicia to identify the management status of the endpoint computing device and identifying the management status of the endpoint computing device; and controlling access to the computer network based on (a) whether the authentication attempt by the endpoint computing device is successful and (b) the identified management status of the endpoint computing device.
-
公开(公告)号:US10742626B2
公开(公告)日:2020-08-11
申请号:US16045601
申请日:2018-07-25
Applicant: Duo Security, Inc.
Inventor: Jon Oberheide , Adam Goodman
Abstract: A method for key rotation includes initiating key rotation for a user account of a multi-factor authentication platform enabling one-time password authentication using a first symmetric cryptographic key; generating, at an authenticating device, a second symmetric cryptographic key; transmitting, at the authenticating device, the second symmetric cryptographic key to the multi-factor authentication platform; configuring the multi-factor authentication platform and the authenticating device to disable authentication that uses the first symmetric cryptographic key; and configuring the multi-factor authentication platform and the authenticating device to enable authentication that uses the second symmetric cryptographic key.
-
公开(公告)号:US20180007046A1
公开(公告)日:2018-01-04
申请号:US15626421
申请日:2017-06-19
Applicant: Duo Security, Inc.
Inventor: John Oberheide , Adam Goodman , Michael Hanley , Peter Johnson , Omar Abduljaber , James Barclay
CPC classification number: H04L63/0876 , G06F21/62 , H04L63/08 , H04L63/101 , H04L63/102 , H04L63/205 , H04W12/06 , H04W12/08
Abstract: A system and method for mitigating security vulnerabilities of a computer network by detecting a management status of an endpoint computing device attempting to authenticate to one or more computing resources accessible via the computer network includes: detecting an authentication attempt by the endpoint computing device to the computer network; during the authentication attempt, collecting management status indicia from the endpoint computing device, wherein the management status indicia comprise data used to determine a management status of the endpoint computing device; using the management status indicia to identify the management status of the endpoint computing device and identifying the management status of the endpoint computing device; and controlling access to the computer network based on (a) whether the authentication attempt by the endpoint computing device is successful and (b) the identified management status of the endpoint computing device.
-
公开(公告)号:US20180007025A1
公开(公告)日:2018-01-04
申请号:US15685626
申请日:2017-08-24
Applicant: Duo Security, Inc.
Inventor: Jon Oberheide , Adam Goodman
CPC classification number: H04L63/068 , H04L9/0863 , H04L9/0891 , H04L9/14 , H04L9/30 , H04L9/3228 , H04L63/083 , H04L2463/082
Abstract: A method for key rotation includes initiating key rotation for a user account of a multi-factor authentication platform enabling one-time password authentication using a first symmetric cryptographic key; generating, at an authenticating device, a second symmetric cryptographic key; transmitting, at the authenticating device, the second symmetric cryptographic key to the multi-factor authentication platform; configuring the multi-factor authentication platform and the authenticating device to disable authentication that uses the first symmetric cryptographic key; and configuring the multi-factor authentication platform and the authenticating device to enable authentication that uses the second symmetric cryptographic key.
-
公开(公告)号:US08893251B2
公开(公告)日:2014-11-18
申请号:US13953343
申请日:2013-07-29
Applicant: Duo Security, Inc.
Inventor: Jon Oberheide , Douglas Song , Adam Goodman
CPC classification number: H04L63/0853 , G06F21/335 , H04L63/0272 , H04L63/0807
Abstract: Various systems and methods of embedded authentication are described herein. One method of the preferred embodiment can include receiving at an authentication server a transaction token from a host website, the host website including an embeddable interface and prompting a user challenge by the authentication server at the embeddable interface. The method of the preferred embodiment can also include creating a signed authentication token in response to a successful user challenge, and transmitting the signed authentication token from the authentication server to the embeddable interface.
Abstract translation: 这里描述了嵌入式认证的各种系统和方法。 优选实施例的一种方法可以包括在认证服务器处接收来自主机网站的交易令牌,所述主机网站包括可嵌入接口,并且在所述可嵌入接口处提示所述认证服务器的用户质询。 优选实施例的方法还可以包括响应于成功的用户质询而创建签名的认证令牌,以及将签名的认证令牌从认证服务器发送到可嵌入接口。
-
公开(公告)号:US10594692B2
公开(公告)日:2020-03-17
申请号:US15983399
申请日:2018-05-18
Applicant: Duo Security, Inc.
Inventor: Jon Oberheide , Adam Goodman , Michael Hanley , Peter Johnson , Omar Abduljaber , James Barclay
Abstract: A system and method for mitigating security vulnerabilities of a computer network by detecting a management status of an endpoint computing device attempting to authenticate to one or more computing resources accessible via the computer network includes: detecting an authentication attempt by the endpoint computing device to the computer network; during the authentication attempt, collecting management status indicia from the endpoint computing device, wherein the management status indicia comprise data used to determine a management status of the endpoint computing device; using the management status indicia to identify the management status of the endpoint computing device and identifying the management status of the endpoint computing device; and controlling access to the computer network based on (a) whether the authentication attempt by the endpoint computing device is successful and (b) the identified management status of the endpoint computing device.
-
公开(公告)号:US20190028467A1
公开(公告)日:2019-01-24
申请号:US16138007
申请日:2018-09-21
Applicant: Duo Security, Inc.
Inventor: Jon Oberheide , Douglas Song , Adam Goodman
Abstract: A method including registering an authority device for an account on an auth platform; receiving transaction request from an initiator to the auth platform; messaging the authority device with the transaction request; receiving an authority agent response from the authority device to the auth platform; if the authority agent response confirms the transaction, communicating a confirmed transaction to the initiator; and if the authority agent response denies the transaction, communicating a denied transaction to the initiator.
-
公开(公告)号:US10129250B2
公开(公告)日:2018-11-13
申请号:US15971193
申请日:2018-05-04
Applicant: Duo Security, Inc.
Inventor: Jon Oberheide , Douglas Song , Adam Goodman
Abstract: A method including registering an authority device for an account on an auth platform; receiving transaction request from an initiator to the auth platform; messaging the authority device with the transaction request; receiving an authority agent response from the authority device to the auth platform; if the authority agent response confirms the transaction, communicating a confirmed transaction to the initiator; and if the authority agent response denies the transaction, communicating a denied transaction to the initiator.
-
-
-
-
-
-
-
-
-