US 12,361,139 B2
System-metrics based trust scoring in a zero-trust computing environment
Deepak Gaikwad, Natick, MA (US); Judith A. Furlong, Natick, MA (US); Raj Suryavanshi, Leander, TX (US); Biraj Silwal, Pflugerville, TX (US); Berke Belge, Westford, MA (US); Chenhao Huang, Acton, MA (US); and Sarthak Madrecha, Milpitas, CA (US)
Assigned to Dell Products, L.P., Round Rock, TX (US)
Filed by Dell Products, L.P., Round Rock, TX (US)
Filed on Aug. 1, 2023, as Appl. No. 18/363,258.
Prior Publication US 2025/0045415 A1, Feb. 6, 2025
Int. Cl. G06F 21/57 (2013.01)
CPC G06F 21/577 (2013.01) [G06F 2221/034 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method for controlling access to resources in a zero-trust computing environment, the method comprising:
tracking requests for access to a plurality of resources of the zero-trust computing environment, wherein the tracking comprises monitoring determinations to grant access to a first of the plurality resource and monitoring determinations to deny access to the first resource;
based on the tracked requests, calculating an identity tenant trust score for the first resource based on users that request access to the first resource and further based on a number of granted requests and a number of denied requests by users to access the first resource;
based on the tracked requests, calculating a hardware tenant trust score for the first resource based on hardware that request access to the first resource and further based on a number of granted requests and a number of denied requests by hardware to access the first resource;
based on the tracked requests, calculating a software tenant trust score for the first resource based on software applications that request access to the first resource and further based on a number of granted requests and a number of denied requests by software applications to access the first resource;
aggregating the identity tenant trust score, hardware tenant trust score and software tenant trust score to generate a trust score for the first resource;
receiving a request from a first user for access to the first resource; and
evaluating the request from the first user based on one or more policies of the zero-trust computing environment that govern access to the first resource, where a first policy grants access to the first resource based in part on the trust score of the first resource.