INTEGRATED BIOMETRICS FOR APPLICATION SECURITY
First Claim
1. A method comprising:
- identifying an attempt to authenticate to a system resource using a particular device and particular credentials;
determining an identity of a user associated with the particular credentials;
determining, in association with the attempt to authenticate, a location associated with the particular device;
accessing sensor data generated by a set of sensors deployed in an environment, wherein at least some of the sensor data comprises biometric data;
using the sensor data to detect a location of the user;
determining a degree of proximity between the location associated with the particular device and the location of the user; and
triggering performance an authentication action corresponding to the attempt to authenticate based on the degree of proximity.
1 Assignment
0 Petitions
Accused Products
Abstract
An attempt to authenticate to a system resource using a particular device and particular credentials is identified and an identity of a user associated with the particular credentials is determined. In association with the attempt to authenticate, a location associated with the particular device is determined and sensor data generated by a set of sensors deployed in an environment is accessed, at least some of the sensor data including biometric data. The sensor data is used to detect a location of the user, and a degree of proximity between the location associated with the particular device and the location of the user is determined. An authentication action is caused to be performed corresponding to the attempt to authenticate based on the degree of proximity.
-
Citations
20 Claims
-
1. A method comprising:
-
identifying an attempt to authenticate to a system resource using a particular device and particular credentials; determining an identity of a user associated with the particular credentials; determining, in association with the attempt to authenticate, a location associated with the particular device; accessing sensor data generated by a set of sensors deployed in an environment, wherein at least some of the sensor data comprises biometric data; using the sensor data to detect a location of the user; determining a degree of proximity between the location associated with the particular device and the location of the user; and triggering performance an authentication action corresponding to the attempt to authenticate based on the degree of proximity. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A computer program product comprising a computer readable storage medium comprising computer readable program code embodied therewith, the computer readable program code comprising:
-
computer readable program code configured to detect a location of a particular computing device within an environment; computer readable program code configured to define a plurality of proximity zones corresponding to the location of the particular computing device, wherein a first one of the plurality of proximity zones represents locations collocated with the location of the particular computing device and a second one of the plurality of proximity zones represents locations within a zone outside the first proximity zone; computer readable program code configured to detect an authentication attempt using a set of credentials associated with a particular user; computer readable program code configured to determine a location of the particular user from sensor data generated by a plurality of sensors in the environment, wherein the sensor data comprises biometric information; computer readable program code configured to determine that the location of the particular user is within one of the plurality of proximity zones; computer readable program code configured to determine a response to the authentication attempt based on the proximity zone containing the location of the particular user.
-
-
17. A system comprising:
-
a processor apparatus; a memory element; a premise security manager, executable by the processor apparatus to; detect a location of a particular computing device within an environment; define a plurality of proximity zones corresponding to the location of the particular computing device, wherein a first one of the plurality of proximity zones represents locations collocated with the location of the particular computing device and a second one of the plurality of proximity zones represents locations within a zone outside the first proximity zone; detect an authentication attempt using a set of credentials associated with a particular user; determine a location of the particular user from sensor data generated by a plurality of sensors in the environment, wherein the sensor data comprises biometric information; determine that the location of the particular user is within one of the plurality of proximity zones; determine a response to the authentication attempt based on the proximity zone containing the location of the particular user. - View Dependent Claims (18, 19, 20)
-
Specification