Determining security factors associated with an operating environment
First Claim
1. A computer program product for determining security factors associated with an operating environment for a computer through a wireless network, the computer program product comprising:
- one or more computer-readable storage devices and program instructions stored on the one or more computer-readable storage devices, the program instructions comprising;
program instructions to identify one or more local computers, wherein the one or more local computers are computing devices that are operating within a range of wireless communications to the computer through the wireless network;
program instructions to determine a current operating environment of computing devices that includes the computer and the one or more identified local computers that are operating within a range of wireless communications to the computer through the wireless network;
program instructions to determine a current security value for the determined current operating environment of computing devices utilizing information corresponding to identities of the one or more identified local computers in the determined current operating environment of computing devices, and a security of the one or more identified local computers in the determined current operating environment of computing devices;
program instructions to identify data corresponding to the determined current operating environment of computing devices, wherein the data corresponds to a current time period of the determined current operating environment of computing devices;
program instructions to determine security information corresponding to the determined current operating environment of computing devices,wherein the determined security information includes a familiarity of the computer to the determined current operating environment of computing devices based on information indicating how frequently the computer is operating in the determined current operating environment of computing devices during the current time period, andwherein a historical security of the computer in the determined current operating environment of computing devices based on information indicating how frequently authentication failures occur on the computer when the computer is operating in the determined current operating environment of computing devices during the current time period.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments of the present invention disclose a method, computer program product, and system for determining security factors associated with an operating environment for a computer through a wireless network. The computer identifies one or more local computers operating within range of wireless communications to the computer through a wireless network. The computer determines a current operating environment corresponding to the one or more identified local computers. The computer determines a current security value for the current operating environment corresponding to identities and security of the identified local computers. The computer identifies data corresponding to the current operating environment, the data corresponding to a current time period of the current operating environment. The computer determines security information corresponding to the current operating environment, wherein the security information includes a familiarity of the computer to the current operating environment, and a historical security of the computer in the current operating environment.
-
Citations
14 Claims
-
1. A computer program product for determining security factors associated with an operating environment for a computer through a wireless network, the computer program product comprising:
-
one or more computer-readable storage devices and program instructions stored on the one or more computer-readable storage devices, the program instructions comprising; program instructions to identify one or more local computers, wherein the one or more local computers are computing devices that are operating within a range of wireless communications to the computer through the wireless network; program instructions to determine a current operating environment of computing devices that includes the computer and the one or more identified local computers that are operating within a range of wireless communications to the computer through the wireless network; program instructions to determine a current security value for the determined current operating environment of computing devices utilizing information corresponding to identities of the one or more identified local computers in the determined current operating environment of computing devices, and a security of the one or more identified local computers in the determined current operating environment of computing devices; program instructions to identify data corresponding to the determined current operating environment of computing devices, wherein the data corresponds to a current time period of the determined current operating environment of computing devices; program instructions to determine security information corresponding to the determined current operating environment of computing devices, wherein the determined security information includes a familiarity of the computer to the determined current operating environment of computing devices based on information indicating how frequently the computer is operating in the determined current operating environment of computing devices during the current time period, and wherein a historical security of the computer in the determined current operating environment of computing devices based on information indicating how frequently authentication failures occur on the computer when the computer is operating in the determined current operating environment of computing devices during the current time period. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer system for determining security factors associated with an operating environment for a computer through a wireless network, the computer system comprising:
-
one or more computer processors; and one or more computer-readable storage devices; program instructions stored on the computer-readable storage devices for execution by at least one of the one or more processors, the program instructions comprising; program instructions to identify one or more local computers, wherein the one or more local computers are computing devices that are operating within a range of wireless communications to the computer through the wireless network; program instructions to determine a current operating environment of computing devices that includes the computer and the one or more identified local computers that are operating within a range of wireless communications to the computer through the wireless network; program instructions to determine a current security value for the determined current operating environment of computing devices utilizing information corresponding to identities of the one or more identified local computers in the determined current operating environment of computing devices, and a security of the one or more identified local computers in the determined current operating environment of computing devices; program instructions to identify data corresponding to the determined current operating environment of computing devices, wherein the data corresponds to a current time period of the determined current operating environment of computing devices; program instructions to determine security information corresponding to the determined current environment of computing devices, wherein the determined security information includes a familiarity of the computer to the determined current operating environment of computing devices based on information indicating how frequently the computer is operating in the determined current operating environment of computing devices during the current time period, and wherein a historical security of the computer in the determined current operating environment of computing devices based on information indicating how frequently authentication failures occur on the computer when the computer is operating in the determined current operating environment of computing devices during the current time period. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
Specification