Dynamic adjustment of authentication mechanism
First Claim
Patent Images
1. A method, comprising:
- collecting location data of one or more agents relative to an agent attempting to authenticate to a data processing system, wherein collecting the location data comprises;
determining a distance of each of the one or more agents from the attempting agent for the one or more agents located within a first proximity zone relative to the attempting agent;
determining a distance of each of the one or more agents from the attempting agent for the one or more agents located within a second proximity zone relative to the attempting agent, the second proximity zone extending farther from the attempting agent than the first proximity zone;
determining a first average distance based on the determined distances within the first proximity zone;
determining a second average distance based on the determined distances within the second proximity zone;
assigning a first weighted value to the first average distance;
assigning a second weighted value to the second average distance; and
calculating a value to be compared to the threshold value based on the first and second weighted values;
determining if the value meets a threshold value; and
responsive to the value meeting the threshold value, enabling authentication for the attempting agent to the data processing system using a relaxed authentication scheme.
1 Assignment
0 Petitions
Accused Products
Abstract
According to one aspect of the present disclosure, a method and technique for dynamic adjustment of authentication mechanism is disclosed. The method includes: collecting location data of one or more agents relative to an agent attempting to authenticate to a data processing system; determining if the location data meets a threshold value; and responsive to the location data meeting the threshold value, relaxing an authentication scheme for the attempting agent to authenticate to the data processing system.
-
Citations
9 Claims
-
1. A method, comprising:
-
collecting location data of one or more agents relative to an agent attempting to authenticate to a data processing system, wherein collecting the location data comprises; determining a distance of each of the one or more agents from the attempting agent for the one or more agents located within a first proximity zone relative to the attempting agent; determining a distance of each of the one or more agents from the attempting agent for the one or more agents located within a second proximity zone relative to the attempting agent, the second proximity zone extending farther from the attempting agent than the first proximity zone; determining a first average distance based on the determined distances within the first proximity zone; determining a second average distance based on the determined distances within the second proximity zone; assigning a first weighted value to the first average distance; assigning a second weighted value to the second average distance; and calculating a value to be compared to the threshold value based on the first and second weighted values; determining if the value meets a threshold value; and responsive to the value meeting the threshold value, enabling authentication for the attempting agent to the data processing system using a relaxed authentication scheme. - View Dependent Claims (2, 3)
-
-
4. A system, comprising:
-
a processor; and logic executable by the processor to; collect location data of one or more agents relative to an agent attempting to authenticate to a data processing system, wherein the logic is executable to; determine a distance of each of the one or more agents from the attempting agent for the one or more agents located within a first proximity zone relative to the attempting agent; determine a distance of each of the one or more agents from the attempting agent for the one or more agents located within a second proximity zone relative to the attempting agent, the second proximity zone extending farther from the attempting agent than the first proximity zone; determine a first average distance based on the determined distances within the first proximity zone; determine a second average distance based on the determined distances within the second proximity zone; assign a first weighted value to the first average distance; assign a second weighted value to the second average distance; and calculate a value to be compared to the threshold value based on the first and second weighted values; determine if the value meets a threshold value; and responsive to the value meeting the threshold value, enable authentication for the attempting agent to the data processing system using a relaxed authentication scheme. - View Dependent Claims (5, 6)
-
-
7. A computer program product for dynamic adjustment of authentication mechanism, the computer program product comprising:
a non-transitory computer readable medium having computer readable program code embodied therewith, the computer readable program code comprising computer readable program code configured to; collect location data of one or more agents relative to an agent attempting to authenticate to a data processing system, wherein the program code is configured to; determine a distance of each of the one or more agents from the attempting agent for the one or more agents located within a first proximity zone relative to the attempting agent; determine a distance of each of the one or more agents from the attempting agent for the one or more agents located within a second proximity zone relative to the attempting agent, the second proximity zone extending farther from the attempting agent than the first proximity zone; determine a first average distance based on the determined distances within the first proximity zone; determine a second average distance based on the determined distances within the second proximity zone; assign a first weighted value to the first average distance; assign a second weighted value to the second average distance; and calculate a value to be compared to the threshold value based on the first and second weighted values; determine if the value meets a threshold value; and responsive to the value meeting the threshold value, enable authentication for the attempting agent to the data processing system using a relaxed authentication scheme. - View Dependent Claims (8, 9)
Specification