×

Dynamic adjustment of authentication policy

  • US 9,286,453 B2
  • Filed: 05/06/2014
  • Issued: 03/15/2016
  • Est. Priority Date: 05/06/2014
  • Status: Active Grant
First Claim
Patent Images

1. A computer program product for managing an authentication policy for a user on a network of an organization, the computer program product comprising a non-transitory computer readable storage medium having program instructions embodied therewith, the program instructions readable by a hardware processor to cause the processing circuit to perform a method comprising:

  • determining an organizational role of a user within an organization;

    assigning an organizational risk value for the user based on the organizational role of the user, wherein a first organizational role within the organization results in a higher organizational risk value than a second organizational role within the organization;

    determining a history of historical violations committed by the user;

    assigning a historical risk value based on the history of historical violations committed by the user;

    determining at least one social media attribute of the user, the at least one social media attribute comprising at least one of;

    how many social media accounts the user has, how many social media postings the user has made, how many social media friends the user has, and one or more associations of social media friends of the user;

    assigning a social media risk value based on the at least one social media attribute of the user;

    calculating a current risk assessment score of the user based on a weighted combination of the organizational risk value and the historical risk value, and is further based on the social media risk value;

    wherein the calculating the current risk assessment score is further based on at least one of;

    a number of devices that the user uses to access the network, a type of device that the user uses to access the network, and an operating system running on a device that the user uses to access the network; and

    determining the authentication policy for the user based on the current risk assessment score.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×