US 11,757,879 B2
Security control for an enterprise network
Baiju D. Mandalia, Boca Raton, FL (US); and Tung OuYang, Apex, NC (US)
Assigned to Kyndryl, Inc., New York, NY (US)
Filed by Kyndryl, Inc., New York, NY (US)
Filed on Jan. 24, 2022, as Appl. No. 17/582,103.
Application 17/582,103 is a continuation of application No. 14/818,495, filed on Aug. 5, 2015, granted, now 11,265,317.
Prior Publication US 2022/0150247 A1, May 12, 2022
This patent is subject to a terminal disclaimer.
Int. Cl. H04L 9/40 (2022.01); H04W 12/12 (2021.01); H04W 12/06 (2021.01); H04W 12/63 (2021.01); H04W 12/71 (2021.01); H04W 12/64 (2021.01)
CPC H04L 63/0876 (2013.01) [H04L 63/107 (2013.01); H04L 63/1408 (2013.01); H04W 12/06 (2013.01); H04W 12/12 (2013.01); H04W 12/63 (2021.01); H04W 12/64 (2021.01); H04W 12/71 (2021.01)] 18 Claims
OG exemplary drawing
 
1. A method, comprising the steps of:
detecting, by one or more processors that a computing device has connected to a network;
determining, by the one or more processors, whether the computing device is valid,
based on determining that the computing device is valid, determining, by the one or more processors, whether the computing device is being utilized for one or more suspicious activities;
based on determining that the computing device is being utilized for one or more suspicious activities:
determining, by the one or more processors, a location of the computing device;
determining, by the one or more processors, whether a user of the computing device can be identified based on facial recognition;
based on determining that the user associated with the computing device cannot be identified, disabling the computing device; and
based on determining that the computing device is valid and is not being utilized for one or more suspicious activities, repeating the step of determining whether the computing device is being utilized for one or more suspicious activities until the computing device is no longer connected to the network.