Optimizing authentication and management of wireless devices in zero trust computing environments
Abstract:
Aspects of the disclosure relate to optimizing authentication and management of wireless devices in zero trust computing environments. In some embodiments, a computing platform may receive, from a user computing device, a connection request. Subsequently, the computing platform may generate, using an artificial-intelligence engine, a profile for the connection request. Based on the profile for the connection request generated using the artificial-intelligence engine, the computing platform may determine that the connection request is valid. In response to determining that the connection request is valid, the computing platform may establish a connection with the user computing device. Based on establishing the connection with the user computing device, the computing platform may assign an identity to the user computing device. After assigning the identity to the user computing device, the computing platform may monitor behavior of the user computing device based on the identity assigned to the user computing device.
Information query
Patent Agency Ranking
0/0