Proximity based authentication for striped data
First Claim
1. A method for authentication, the method comprising:
- receiving, by one or more computer processors, an indication an account is attempting to access striped data;
identifying, by one or more computer processors, at least two computing devices that are associated with the account, wherein at least a portion of the striped data is located on at least one computing device associated with the account;
determining, by one or more computer processors, a distance from a first computing device of the identified at least two computing devices to a second computing device of the identified one or more computing devices;
determining, by one or more computer processors, whether the distance from the first computing device to the second computing device is within a threshold proximity;
identifying, by one or more computer processors, the computing devices associated with the account;
determining, by one or more computing devices, whether a preset number of the computing devices associated with the account are within a threshold proximity of one anotheradjusting, by one or more computer processors, the threshold proximity for the account based on a probability of a data breach; and
determining, by one or more computer processors, whether to grant access to the striped data based at least in part on the determination of threshold proximity.
2 Assignments
0 Petitions
Accused Products
Abstract
An approach for authentication is provided. The approach performs identifying, by one or more computer processors, an account attempting to access striped data. The approach performs identifying, by one or more computer processors, one or more computing devices that are associated with the account. The approach performs determining, by one or more computer processors, a distance from a first computing device of the identified one or more computing devices to a second computing device of the identified one or more computing devices. The approach performs determining, by one or more computer processors, whether the distance from the first computing device to the second computing device is within a threshold proximity. The approach further grants or denies access to striped data based on threshold proximity being met or exceeded.
30 Citations
17 Claims
-
1. A method for authentication, the method comprising:
-
receiving, by one or more computer processors, an indication an account is attempting to access striped data; identifying, by one or more computer processors, at least two computing devices that are associated with the account, wherein at least a portion of the striped data is located on at least one computing device associated with the account; determining, by one or more computer processors, a distance from a first computing device of the identified at least two computing devices to a second computing device of the identified one or more computing devices; determining, by one or more computer processors, whether the distance from the first computing device to the second computing device is within a threshold proximity; identifying, by one or more computer processors, the computing devices associated with the account; determining, by one or more computing devices, whether a preset number of the computing devices associated with the account are within a threshold proximity of one another adjusting, by one or more computer processors, the threshold proximity for the account based on a probability of a data breach; and determining, by one or more computer processors, whether to grant access to the striped data based at least in part on the determination of threshold proximity. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer program product for authentication, the computer program product comprising:
-
one or more computer readable storage media and program instructions stored on the one or more computer readable storage media, the program instructions comprising; program instructions to receive an indication an account is attempting to access striped data; program instructions to identify at least two computing devices that are associated with the account, wherein at least a portion of the striped data is located on at least one computing device associated with the account; program instructions to determine a distance from a first computing device of the identified at least two computing devices to a second computing device of the identified one or more computing devices; program instructions to determine whether the distance from the first computing device to the second computing device is within a threshold proximity; program instructions to identify the computing devices associated with the account; program instructions to determine whether a preset number of the computing devices associated with the account are within a threshold proximity of one another program instructions to adjust the threshold proximity for the account based on a probability of a data breach; and determining, by one or more computer processors, whether to grant access to the striped data based at least in part on the determination of threshold proximity. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A computer system for authentication, the computer system comprising:
-
one or more computer processors; one or more computer readable storage media; program instructions stored on the computer readable storage media for execution by at least one of the one or more computer processors, the program instructions comprising; program instructions to receive an indication an account is attempting to access striped data; program instructions to identify at least two computing devices that are associated with the account, wherein at least a portion of the striped data is located on at least one computing device associated with the account; program instructions to determine a distance from a first computing device of the identified at least two computing devices to a second computing device of the identified one or more computing devices; program instructions to determine whether the distance from the first computing device to the second computing device is within a threshold proximity; program instructions to identify the computing devices associated with the account; program instructions to determine whether a preset number of the computing devices associated with the account are within a threshold proximity of one another program instructions to adjust the threshold proximity for the account based on a probability of a data breach; and determining, by one or more computer processors, whether to grant access to the striped data based at least in part on the determination of threshold proximity. - View Dependent Claims (14, 15, 16, 17)
-
Specification