Dynamic optimizing scanner for identity and access management (IAM) compliance verification

An identity and access management (IAM) system is associated with a set of data sources from which data is collected. A set of vulnerabilities that the IAM system should attempt to detect is identified. For each vulnerability to be detected, a prioritized list of strategies used to detect that vulne...

Full description

Saved in:
Bibliographic Details
Main Authors Harter John Leslie, Palmieri David Walsh, Robke Jeffrey Tobias
Format Patent
LanguageEnglish
Published 10.04.2018
Subjects
Online AccessGet full text

Cover

Loading…
Abstract An identity and access management (IAM) system is associated with a set of data sources from which data is collected. A set of vulnerabilities that the IAM system should attempt to detect is identified. For each vulnerability to be detected, a prioritized list of strategies used to detect that vulnerability is generated. Preferably, each strategy specifies the type(s) of data required to detect that vulnerability. An algorithm to determine a best strategy to be used for detecting each vulnerability, preferably based on the data available from the data sources, is then identified. The IAM system then collects data in an optimized manner. In particular, during the collection process, the IAM system preferably collects only what is necessary based on the configuration, even if the data source is capable of providing additional data. The collected data is then processed to detect security vulnerabilities associated with the IAM accounts.
AbstractList An identity and access management (IAM) system is associated with a set of data sources from which data is collected. A set of vulnerabilities that the IAM system should attempt to detect is identified. For each vulnerability to be detected, a prioritized list of strategies used to detect that vulnerability is generated. Preferably, each strategy specifies the type(s) of data required to detect that vulnerability. An algorithm to determine a best strategy to be used for detecting each vulnerability, preferably based on the data available from the data sources, is then identified. The IAM system then collects data in an optimized manner. In particular, during the collection process, the IAM system preferably collects only what is necessary based on the configuration, even if the data source is capable of providing additional data. The collected data is then processed to detect security vulnerabilities associated with the IAM accounts.
Author Robke Jeffrey Tobias
Palmieri David Walsh
Harter John Leslie
Author_xml – fullname: Harter John Leslie
– fullname: Palmieri David Walsh
– fullname: Robke Jeffrey Tobias
BookMark eNqNyrsOwjAMQNEMMPD6B48wMFAqpI48BQMTMDFUlutUlhonSiKk8vUw8AFMdzh3bAbqlUfmeegVnRD4kMXJW7SFRKjKEayPIA1rltwDagNIxCmBQ8WW3RdgftleF0DehU5QieHFUawQZvE6NUOLXeLZrxMDp-N9f15y8DWngMTKuX7cqqosis1qV6z_WD4qYjzG
ContentType Patent
DBID EVB
DatabaseName esp@cenet
DatabaseTitleList
Database_xml – sequence: 1
  dbid: EVB
  name: esp@cenet
  url: http://worldwide.espacenet.com/singleLineSearch?locale=en_EP
  sourceTypes: Open Access Repository
DeliveryMethod fulltext_linktorsrc
Discipline Medicine
Chemistry
Sciences
Physics
ExternalDocumentID US9942261B2
GroupedDBID EVB
ID FETCH-epo_espacenet_US9942261B23
IEDL.DBID EVB
IngestDate Fri Jul 19 16:50:48 EDT 2024
IsOpenAccess true
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-epo_espacenet_US9942261B23
Notes Application Number: US201715464746
OpenAccessLink https://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20180410&DB=EPODOC&CC=US&NR=9942261B2
ParticipantIDs epo_espacenet_US9942261B2
PublicationCentury 2000
PublicationDate 20180410
PublicationDateYYYYMMDD 2018-04-10
PublicationDate_xml – month: 04
  year: 2018
  text: 20180410
  day: 10
PublicationDecade 2010
PublicationYear 2018
RelatedCompanies International Business Machines Corporation
RelatedCompanies_xml – name: International Business Machines Corporation
Score 3.138149
Snippet An identity and access management (IAM) system is associated with a set of data sources from which data is collected. A set of vulnerabilities that the IAM...
SourceID epo
SourceType Open Access Repository
SubjectTerms CALCULATING
COMPUTING
COUNTING
ELECTRIC COMMUNICATION TECHNIQUE
ELECTRIC DIGITAL DATA PROCESSING
ELECTRICITY
PHYSICS
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
Title Dynamic optimizing scanner for identity and access management (IAM) compliance verification
URI https://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20180410&DB=EPODOC&locale=&CC=US&NR=9942261B2
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LS8NAEB5Kfd40KtYXe5Cgh2BqtklzCEJeFKEPbCsFDyWbbCCHJqWJiP56Z7dp9aLXDSzZmXwzu9nvmwG4pSJPG-gB9HCqUW4mGosNpnVoxJLU5rFpCb1zf2D2pvR51pk1INtoYWSd0A9ZHBERFSPeKxmvlz8_sXzJrSwfWIZDxVM4cXy1Ph23RTUdXfVdJxgN_aGnep4zHauDF8e2hWS07WK03sFdtCXAELy6QpSy_J1RwiPYHeFkeXUMDZ4rcOBtGq8psN-v77sV2JMEzbjEwRqE5Qm8-esu8qRAuC-yL0w-pEQL5XxFcAtKsrX29pNEeUIi2RCRLLYsF3KHh_d7sqaSC5cT_JgFX0iu-hRIGEy8nobvO9_aZj4db1dmnEEzL3J-DsSmUYQRMO3qBqdRmjLLYnrcpfzR7sYGZy1o_TnNxT_PLuFQGFncprT1K2hWq3d-jUm5YjfSnN9-a5Mp
link.rule.ids 230,309,783,888,25576,76876
linkProvider European Patent Office
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LT4NAEJ409VFvihrrcw-G6IFIZQvlQEwKbVD7iqWmiQfC0iXhUNoUjNFf7-z2oRe9LsmGneGb2WW_bwbgmoo8baAH0MOJRrk50VhsMK1OIzZJbB6bltA7d3umP6JP4_q4BOlaCyPrhH7I4oiIqBjxXsh4Pf_5ieVJbmV-x1Icmj20A8dTV6fjmqimo6te02kN-l7fVV3XGQ3V3otj20IyWmtitN7CHbYlwNB6bQpRyvx3Rmnvw_YAJ8uKAyjxTIGKu268psBud3XfrcCOJGjGOQ6uQJgfwpu37CJPZgj3afqFyYfkaKGMLwhuQUm61N5-kiibkEg2RCTTDcuF3ODh_ZYsqeTC5QQ_ZsEXkqs-AtJuBa6v4fuGG9uEo-FmZcYxlLNZxk-A2DSKMAImDd3gNEoSZllMjxuU39uN2OCsCtU_pzn959kVVPyg2wk7j73nM9gTBhc3KzX9HMrF4p1fYIIu2KU07TeSFZYc
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Apatent&rft.title=Dynamic+optimizing+scanner+for+identity+and+access+management+%28IAM%29+compliance+verification&rft.inventor=Harter+John+Leslie&rft.inventor=Palmieri+David+Walsh&rft.inventor=Robke+Jeffrey+Tobias&rft.date=2018-04-10&rft.externalDBID=B2&rft.externalDocID=US9942261B2