| CPC G06F 21/45 (2013.01) [G06F 21/316 (2013.01); H04L 63/08 (2013.01)] | 20 Claims |

|
1. A method of authenticating a data processing system by a network core throughout a distributed environment, the method comprising:
obtaining telemetry data from the data processing system, the telemetry data being based on historic activities of the data processing system;
identifying a listing of candidate data points from the telemetry data, the listing of the candidate data points comprising data points of the telemetry data with security scores that that exceed a security score threshold;
attempting to improve a security profile of an activity log using the listing of the candidate data points to obtain an updated activity log; and
performing a validation of the data processing system using a security questionnaire, the security questionnaire comprising security questions based on the updated activity log.
|