CPC H04L 63/0853 (2013.01) [H04L 63/0823 (2013.01); H04L 63/083 (2013.01); H04L 63/0876 (2013.01); H04L 63/105 (2013.01); H04L 63/12 (2013.01); H04L 63/1433 (2013.01); H04L 63/1441 (2013.01)] | 21 Claims |
1. A method, comprising:
receiving, from prior computing devices, data regarding prior software associated with the prior computing devices;
storing, in a database, the data regarding the prior software;
receiving, by a first computing device, a request from a second computing device other than the prior computing devices, wherein the request is for access by the second computing device to a service provided by a third computing device, wherein the third computing device is separate from the first computing device;
in response to receiving the request, performing, by the first computing device, an evaluation of the second computing device, wherein the evaluation comprises determining a source of first software on the second computing device by comparing the first software to the prior software using the stored data in the database, and further comprises determining a security state of the second computing device, the security state including a risk level, and the security state based on the source of the first software;
generating, by the first computing device based on the evaluation, a token for the second computing device, the token comprising first data encoding the risk level; and
sending the token to at least one of the second computing device or the third computing device, wherein the first data is used to configure the service provided to the second computing device.
|