×

Determining security factors associated with an operating environment

  • US 9,246,943 B2
  • Filed: 04/11/2013
  • Issued: 01/26/2016
  • Est. Priority Date: 04/11/2013
  • Status: Active Grant
First Claim
Patent Images

1. A computer program product for determining security factors associated with an operating environment for a computer through a wireless network, the computer program product comprising:

  • one or more computer-readable storage devices and program instructions stored on the one or more computer-readable storage devices, the program instructions comprising;

    program instructions to identify one or more local computers, wherein the one or more local computers are computing devices that are operating within a range of wireless communications to the computer through the wireless network;

    program instructions to determine a current operating environment of computing devices that includes the computer and the one or more identified local computers that are operating within a range of wireless communications to the computer through the wireless network;

    program instructions to determine a current security value for the determined current operating environment of computing devices utilizing information corresponding to identities of the one or more identified local computers in the determined current operating environment of computing devices, and a security of the one or more identified local computers in the determined current operating environment of computing devices;

    program instructions to identify data corresponding to the determined current operating environment of computing devices, wherein the data corresponds to a current time period of the determined current operating environment of computing devices;

    program instructions to determine security information corresponding to the determined current operating environment of computing devices,wherein the determined security information includes a familiarity of the computer to the determined current operating environment of computing devices based on information indicating how frequently the computer is operating in the determined current operating environment of computing devices during the current time period, andwherein a historical security of the computer in the determined current operating environment of computing devices based on information indicating how frequently authentication failures occur on the computer when the computer is operating in the determined current operating environment of computing devices during the current time period.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×