US 11,895,159 B2
Security capability determination
Christopher J Colonna, Ossining, NY (US); Stephen Robert Guendert, Poughkeepsie, NY (US); Pasquale A. Catalano, Wallkill, NY (US); and Michael James Becht, Poughkeepsie, NY (US)
Assigned to International Business Machines Corporation, Armonk, NY (US)
Filed by International Business Machines Corporation, Armonk, NY (US)
Filed on Jun. 30, 2021, as Appl. No. 17/363,070.
Prior Publication US 2023/0007051 A1, Jan. 5, 2023
Int. Cl. H04L 9/40 (2022.01); H04L 43/065 (2022.01); G06Q 10/10 (2023.01); G06Q 10/0635 (2023.01)
CPC H04L 63/205 (2013.01) [G06Q 10/0635 (2013.01); G06Q 10/10 (2013.01); H04L 43/065 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A computer-implemented method for improving endpoint security, the computer-implemented method comprising:
requesting security capabilities from one or more endpoints;
analyzing a difference between the security capabilities;
negotiating a security capability supported by the one or more endpoints;
determining if the negotiating succeeded;
responsive to the negotiating succeeding, dynamically changing a security level between the one or more endpoints to a higher security level based on at least one of endpoint hardware or endpoint firmware capabilities;
responsive to the negotiating not succeeding, creating a report describing capabilities associated with the one or more endpoints and suggesting changes for at least one of the one or more endpoints and sending the report to predetermined interested personnel.