QUEUE MANAGEMENT AND LOAD SHEDDING FOR COMPLEX AUTHENTICATION SCHEMES
First Claim
Patent Images
1. A method comprising:
- obtaining a stochastic queuing model of a computerized authentication system, a set of preferences for handling authentication requests, and a set of operational parameter values;
determining, based at least in part on the model and the operational values, that adjusting a value of a first request handling parameter will improve a probable degree to which the authentication system will meet the set of preferences; and
responsive to the determination that adjusting the value of the first request handling parameter will improve the probable degree to which the authentication system will meet the set of preferences, adjusting the first request handling parameter of the computerized authentication system.
1 Assignment
0 Petitions
Accused Products
Abstract
Using a stochastic queuing model to determine adjustments to be made to authentication system operation. In light of operational parameter values and the stochastic queuing model, a determination is made that adjusting the value of a particular parameter for handling authentication requests is likely to improve some aspect of system performance, and the request handling parameter is adjusted accordingly.
-
Citations
20 Claims
-
1. A method comprising:
-
obtaining a stochastic queuing model of a computerized authentication system, a set of preferences for handling authentication requests, and a set of operational parameter values; determining, based at least in part on the model and the operational values, that adjusting a value of a first request handling parameter will improve a probable degree to which the authentication system will meet the set of preferences; and responsive to the determination that adjusting the value of the first request handling parameter will improve the probable degree to which the authentication system will meet the set of preferences, adjusting the first request handling parameter of the computerized authentication system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A computer program product comprising a computer readable storage medium having stored thereon:
-
first instructions executable by a device to cause the device to obtain a stochastic queuing model of a computerized authentication system, a set of preferences for handling authentication requests, and a set of operational parameter values; second instructions executable by a device to cause the device to determine, based at least in part on the model and the operational values, that adjusting a value of a first request handling parameter will improve a probable degree to which the authentication system will meet the set of preferences; and third instructions executable by a device to cause the device to adjust, responsive to the determination that adjusting the value of the first request handling parameter will improve the probable degree to which the authentication system will meet the set of preferences, the first request handling parameter of the computerized authentication system. - View Dependent Claims (15, 16)
-
-
17. A computer system comprising:
-
a processor(s) set; and a computer readable storage medium; wherein; the processor set is structured, located, connected and/or programmed to execute instructions stored on the computer readable storage medium; and the instructions include; first instructions executable by the processor set to cause the system to obtain a stochastic queuing model of a computerized authentication system, a set of preferences for handling authentication requests, and a set of operational parameter values; second instructions executable by the processor set to cause the system to determine, based at least in part on the model and the operational values, that adjusting a value of a first request handling parameter will improve a probable degree to which the authentication system will meet the set of preferences; and third instructions executable by the processor set to cause the system to adjust, responsive to the determination that adjusting the value of the first request handling parameter will improve the probable degree to which the authentication system will meet the set of preferences, the first request handling parameter of the computerized authentication system. - View Dependent Claims (18, 19, 20)
-
Specification