US 12,339,949 B2
System and method for selecting security questions for device authentication based on security scores of data
Ofir Ezrielev, Be'er Sheva (IL); Jehuda Shemer, Kfar Saba (IL); and Ronen Rabani, Kibuts Telalim (IL)
Assigned to Dell Products L.P., Round Rock, TX (US)
Filed by Dell Products L.P., Round Rock, TX (US)
Filed on Mar. 22, 2023, as Appl. No. 18/188,002.
Prior Publication US 2024/0320319 A1, Sep. 26, 2024
Int. Cl. G06F 21/45 (2013.01); G06F 21/31 (2013.01); H04L 9/40 (2022.01)
CPC G06F 21/45 (2013.01) [G06F 21/316 (2013.01); H04L 63/08 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method of authenticating a data processing system by a network core throughout a distributed environment, the method comprising:
obtaining telemetry data from the data processing system, the telemetry data being based on historic activities of the data processing system;
identifying a listing of candidate data points from the telemetry data, the listing of the candidate data points comprising data points of the telemetry data with security scores that that exceed a security score threshold;
attempting to improve a security profile of an activity log using the listing of the candidate data points to obtain an updated activity log; and
performing a validation of the data processing system using a security questionnaire, the security questionnaire comprising security questions based on the updated activity log.