US 12,284,182 B2
Zero trust architecture with end user self-remediation
Jason Meller, Winchester, MA (US); and Frederick Ifert-Miller, Atlanta, GA (US)
Assigned to AgileBits Inc., Toronto (CA)
Filed by Kolide, Inc., Malden, MA (US)
Filed on Jun. 26, 2023, as Appl. No. 18/214,373.
Prior Publication US 2024/0430259 A1, Dec. 26, 2024
Int. Cl. H04L 9/40 (2022.01); G06F 21/55 (2013.01); G06F 21/33 (2013.01)
CPC H04L 63/0876 (2013.01) [H04L 63/0227 (2013.01); H04L 63/20 (2013.01)] 15 Claims
OG exemplary drawing
 
1. A method of facilitating access to a protected resource from a client device associated with a user, wherein the method is executed at a cloud-based application, comprising:
during an authentication flow that seeks access to the protected resource:
determining whether a security posture of the client device satisfies one or more security compliance requirements;
in response to determining that the client device does not satisfy a given security compliance requirement, providing a notification identifying for the user a failure associated with the given security compliance requirement, the notification including self-remediation instructions about how the user can rectify the failure; and
following the providing of the notification that includes the self-remediation instructions, and in response to receipt of a security posture re-check request from the user following completion of a remediation workflow based on the self-remediation instructions, re-checking the security posture of the client device against the given security compliance requirement.