DYNAMIC ADJUSTMENT OF AUTHENTICATION POLICY
First Claim
Patent Images
1. A computer program product for managing an authentication policy for a user on a network of an organization, the computer program product comprising:
- a computer readable storage medium having program instructions embodied therewith, the program instructions readable by a processing circuit to cause the processing circuit to perform a method comprising;
determining an organizational role of a user within an organization;
assigning an organizational risk value for the user based on the organizational role of the user, wherein a first organizational role within the organization results in a higher organizational risk value than a second organizational role within the organization;
determining a history of historical violations committed by the user;
assiging a historical risk value based on the history of historical violations committed by the user;
calculating a current risk assessment score of the user based on a weighted combination of the organizational risk value and the historical risk value; and
determining the authentication policy for the user based on the current risk assessment score.
2 Assignments
0 Petitions
Accused Products
Abstract
Embodiments relate to managing authentication policies for users on a network of an organization. A computer-implemented method for managing an authentication policy for a user on a network of an organization is provided. The method maintains a current risk assessment score of the user based on an organizational role of the user within the organization and a history of security violations on the network. The method determines the authentication policy for the user based on the current risk assessment score.
94 Citations
20 Claims
-
1. A computer program product for managing an authentication policy for a user on a network of an organization, the computer program product comprising:
- a computer readable storage medium having program instructions embodied therewith, the program instructions readable by a processing circuit to cause the processing circuit to perform a method comprising;
determining an organizational role of a user within an organization; assigning an organizational risk value for the user based on the organizational role of the user, wherein a first organizational role within the organization results in a higher organizational risk value than a second organizational role within the organization; determining a history of historical violations committed by the user; assiging a historical risk value based on the history of historical violations committed by the user; calculating a current risk assessment score of the user based on a weighted combination of the organizational risk value and the historical risk value; and determining the authentication policy for the user based on the current risk assessment score. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
- a computer readable storage medium having program instructions embodied therewith, the program instructions readable by a processing circuit to cause the processing circuit to perform a method comprising;
-
9. A computer system for managing an authentication policy for a user on a network of an organization:
-
a memory having computer readable instructions; and a processor configured to execute the computer readable instructions, the instructions comprising; determining an organizational role of a user within an organization; assigning an organizational risk value for the user based on the organizational role of the user, wherein a first organizational role within the organization results in a higher organizational risk value than a second organizational role within the organization; determining a history of historical violations committed by the user; assigning a historical risk value based on the history of historical violations committed by the user; calculating a current risk assessment score of the user based on a weighted combination of the organizational risk value and the historical risk value; and determining the authentication policy for the user based on the current risk assessment score. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A computer-implemented method for managing an authentication policy for a user on a network of an organization, the method comprising:
-
determining an organizational role of a user within an organization; assigning an organizational risk value for the user based on the organizational role of the user, wherein a first organizational role within the organization results in a higher organizational risk value than a second organizational role within the organization; determining a history of historical violations committed by the user; assigning a historical risk value based on the history of historical violations committed by the user; calculating a current risk assessment score of the user based on a weighted combination of the organizational risk value and the historical risk value; and determining the authentication policy for the user based on the current risk assessment score. - View Dependent Claims (17, 18, 19, 20)
-
Specification