Cobalt Iron Earns Patent For ML-Driven Authentication Control

Cobalt Iron, a provider of SaaS-based enterprise data protection, has announced that it has been granted a patent on its technology for machine learning (ML) optimization of authentication control.

Issued on April 19, U.S. Patent 11310237 describes new capabilities for Cobalt Iron Compass, an enterprise SaaS backup platform. Compass already has the patented ability to optimize user authentication and access to IT resources dynamically based on what’s happening in the environment. This new patent extends that capability by applying new ML techniques — adding yet another layer of intelligence and security to enterprise IT resources and operations.

Controlling authorization and access to IT resources such as data, data centers, hardware devices, and applications is a critical part of securing any enterprise business. Yet authentication controls in practice today are static, seldom changed, and unresponsive to changing conditions and events. Often these controls are not monitored or analyzed to determine whether they are effective or optimized to achieve company security and safety objectives. And sometimes security administrators must change user authentication roles temporarily to ensure business security and safety under unusual circumstances, such as a fire or major weather event. The result is security holes that leave enterprise data, operations, and infrastructure vulnerable to attack.

The techniques disclosed in this patent are:

  • Collect training data, including environmental event data, permission access patterns of users, access control duration data, security events and alerts, project data, cyber event information, security event logs, data protection operational results, and such.
  • Analyze training data to determine the effectiveness of authentication controls during previous conditions and events.
  • Generate ML rules to potentially adjust authentication controls during future conditions and events.
  • Monitor for various conditions and events, including environmental events.
  • Dynamically adjust user authentication privileges based on generated ML rules.
  • Modify durations of user authentication privilege adjustments responsive to generated ML rules.

Security administrators and other IT professionals who are responsible for maintaining security, authentication, and access control in their environments may be able to leverage Cobalt Iron’s new patented techniques to, for example, restrict physical access automatically and temporarily to data center buildings or rooms during a fire or flood. In another example, access privileges for key IT personnel to data, data centers, or applications may be temporarily increased prior to a weather event to expedite emergency backup procedures.

You might also like...

HDR & WCG For Broadcast: Part 3 - Achieving Simultaneous HDR-SDR Workflows

Welcome to Part 3 of ‘HDR & WCG For Broadcast’ - a major 10 article exploration of the science and practical applications of all aspects of High Dynamic Range and Wide Color Gamut for broadcast production. Part 3 discusses the creative challenges of HDR…

IP Security For Broadcasters: Part 4 - MACsec Explained

IPsec and VPN provide much improved security over untrusted networks such as the internet. However, security may need to improve within a local area network, and to achieve this we have MACsec in our arsenal of security solutions.

Standards: Part 23 - Media Types Vs MIME Types

Media Types describe the container and content format when delivering media over a network. Historically they were described as MIME Types.

Building Software Defined Infrastructure: Part 1 - System Topologies

Welcome to Part 1 of Building Software Defined Infrastructure - a new multi-part content collection from Tony Orme. This series is for broadcast engineering & IT teams seeking to deepen their technical understanding of the microservices based IT technologies that are…

IP Security For Broadcasters: Part 3 - IPsec Explained

One of the great advantages of the internet is that it relies on open standards that promote routing of IP packets between multiple networks. But this provides many challenges when considering security. The good news is that we have solutions…