×

Determining security factors associated with an operating environment

  • US 9,219,754 B2
  • Filed: 08/25/2014
  • Issued: 12/22/2015
  • Est. Priority Date: 04/11/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method for determining security factors associated with an operating environment for a computer through a wireless network, the method comprising:

  • the computer identifying one or more local computers, wherein the one or more local computers are computing devices that are operating within a range of wireless communications to the computer through the wireless network;

    the computer determining a current operating environment of computing devices that includes the computer and the one or more identified local computers that are operating within a range of wireless communications to the computer through the wireless network;

    the computer determining a current security value for the determined current operating environment of computing devices utilizing information corresponding to identities of the one or more identified local computers in the determined current operating environment of computing devices, and a security of the one or more identified local computers in the determined current operating environment of computing devices;

    the computer identifying data corresponding to the determined current operating environment of computing devices, wherein the data corresponds to a current time period of the determined current operating environment of computing devices;

    the computer determining security information corresponding to the determined current operating environment of computing devices,wherein the determined security information includes a familiarity of the computer to the determined current operating environment of computing devices based on information indicating how frequently the computer is operating in the determined current operating environment of computing devices during the current time period, andwherein a historical security of the computer in the determined current operating environment of computing devices based on information indicating how frequently authentication failures occur on the computer when the computer is operating in the determined current operating environment of computing devices during the current time period.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×