Dynamic adjustment of authentication mechanism
First Claim
Patent Images
1. A method, comprising:
- collecting, by a data processing system, colony proximity data of one or more agents relative to an agent attempting to authenticate to the data processing system, the data processing system including first and second authentication schemes, the second authentication scheme being lower in strength than the first authentication scheme, the data processing system configured to apply the first authentication scheme for authentication requests;
collecting, by the data processing system, colony size data of the one or more agents;
combining the colony proximity data and the colony size data to derive a colony value;
determining if the colony value meets a threshold value; and
responsive to the colony value meeting the threshold value, dynamically selecting the second authentication scheme instead of the first authentication scheme to apply for authenticating the attempting agent to the data processing system.
1 Assignment
0 Petitions
Accused Products
Abstract
According to one aspect of the present disclosure, a method and technique for dynamic adjustment of authentication mechanism is disclosed. The method includes: collecting location data of one or more agents relative to an agent attempting to authenticate to a data processing system; determining if the location data meets a threshold value; and responsive to the location data meeting the threshold value, relaxing an authentication scheme for the attempting agent to authenticate to the data processing system.
-
Citations
20 Claims
-
1. A method, comprising:
-
collecting, by a data processing system, colony proximity data of one or more agents relative to an agent attempting to authenticate to the data processing system, the data processing system including first and second authentication schemes, the second authentication scheme being lower in strength than the first authentication scheme, the data processing system configured to apply the first authentication scheme for authentication requests; collecting, by the data processing system, colony size data of the one or more agents; combining the colony proximity data and the colony size data to derive a colony value; determining if the colony value meets a threshold value; and responsive to the colony value meeting the threshold value, dynamically selecting the second authentication scheme instead of the first authentication scheme to apply for authenticating the attempting agent to the data processing system. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system, comprising:
-
a processor and a memory; and logic executable by the processor to; collect colony proximity data of one or more agents relative to an agent attempting to authenticate to a data processing system, the data processing system including first and second authentication schemes, the second authentication scheme being lower in strength than the first authentication scheme, the data processing system configured to apply the first authentication scheme for authentication requests; collect colony size data of the one or more agents; combine the colony proximity data and the colony size data to derive a colony value; determine if the colony value meets a threshold value; and responsive to the colony value meeting the threshold value, dynamically select the second authentication scheme instead of the first authentication scheme to apply for authenticating the attempting agent to the data processing system. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer program product for dynamic adjustment of authentication mechanism, the computer program product comprising:
a non-transitory computer readable medium having computer readable program code embodied therewith, the computer readable program code comprising computer readable program code configured to; collect colony proximity data of one or more agents relative to an agent attempting to authenticate to a data processing system, the data processing system including first and second authentication schemes, the second authentication scheme being lower in strength than the first authentication scheme, the data processing system configured to apply the first authentication scheme for authentication requests; collect colony size data of the one or more agents; combine the colony proximity data and the colony size data to derive a colony value; determine if the colony value meets a threshold value; and responsive to the colony value meeting the threshold value, dynamically select the second authentication scheme instead of the first authentication scheme to apply for authenticating the attempting agent to the data processing system. - View Dependent Claims (16, 17, 18, 19, 20)
Specification