Multi-user authentication
First Claim
1. A method for multi-user authentication, the method comprising:
- receiving, by one or more computer processors, a first user login;
determining, by the one or more computer processors, whether at least one additional user login is received, wherein the first user login and the at least one additional user login employ one or more of a multi-factor authentication, and wherein the first user login utilizes a biometric characteristic and the at least one additional user login utilizes a password;
responsive to determining at least one additional user login is received, receiving, by the one or more computer processors, a first access request to a resource from the first user;
receiving, by the one or more computer processors, a second access request to the resource from the at least one additional user;
responsive to receiving the first access request from the first user and the second access request from the at least one additional user, determining, by the one or more computer processors, whether the first user and the at least one additional user are authorized to make the access requests, wherein determining whether the first user and the at least one additional user are authorized includes determining whether the first user and the at least one additional user are located within a pre-defined geographic radius around the resource;
responsive to receiving the first access request from the first user and the second access request from the at least one additional user, determining, by the one or more computer processors, whether the first access request from the first user and the second access request from the at least one additional user are received as a simultaneous authentication within the pre-defined geographic radius around the resource and within a pre-defined threshold duration of time; and
responsive to determining the access requests are received as a simultaneous authentication within the pre-defined geographic radius around the resource and within a pre-defined threshold duration of time, authorizing, by the one or more computer processors, the first access request of the first user and the second access request of the at least one additional user.
1 Assignment
0 Petitions
Accused Products
Abstract
In an approach to multi-user authentication, one or more computer processors receive a first user login. The one or more computer processors determine whether at least one additional user login is received. The one or more computer processors receive an access request from the first user. The one or more computer processors receive an access request from the at least one additional user. In response to receiving the access request from the first user and the access request from the at least one additional user, the one or more computer processors determine whether the access request from the first user and the access request from the at least one additional user meet pre-defined criteria. In response to determining the access requests meet pre-defined criteria, the one or more computer processors authorize the access request of the first user and the access request of the at least one additional user.
-
Citations
8 Claims
-
1. A method for multi-user authentication, the method comprising:
-
receiving, by one or more computer processors, a first user login; determining, by the one or more computer processors, whether at least one additional user login is received, wherein the first user login and the at least one additional user login employ one or more of a multi-factor authentication, and wherein the first user login utilizes a biometric characteristic and the at least one additional user login utilizes a password; responsive to determining at least one additional user login is received, receiving, by the one or more computer processors, a first access request to a resource from the first user; receiving, by the one or more computer processors, a second access request to the resource from the at least one additional user; responsive to receiving the first access request from the first user and the second access request from the at least one additional user, determining, by the one or more computer processors, whether the first user and the at least one additional user are authorized to make the access requests, wherein determining whether the first user and the at least one additional user are authorized includes determining whether the first user and the at least one additional user are located within a pre-defined geographic radius around the resource; responsive to receiving the first access request from the first user and the second access request from the at least one additional user, determining, by the one or more computer processors, whether the first access request from the first user and the second access request from the at least one additional user are received as a simultaneous authentication within the pre-defined geographic radius around the resource and within a pre-defined threshold duration of time; and responsive to determining the access requests are received as a simultaneous authentication within the pre-defined geographic radius around the resource and within a pre-defined threshold duration of time, authorizing, by the one or more computer processors, the first access request of the first user and the second access request of the at least one additional user. - View Dependent Claims (2, 3)
-
-
4. A computer program product for multi-user authentication, the computer program product comprising:
-
one or more computer readable storage device and program instructions stored on the one or more computer readable storage device, the stored program instructions comprising; program instructions to receive a first user login; program instructions to determine whether at least one additional user login is received, wherein the first user login and the at least one additional user login employ one or more of a multi-factor authentication, and wherein the first user login utilizes a biometric characteristic and the at least one additional user login utilizes a password; responsive to determining at least one additional user login is received, program instructions to receive a first access request to a resource from the first user; program instructions to receive a second access request to the resource from the at least one additional user; responsive to receiving the first access request from the first user and the second access request from the at least one additional user, program instructions to determine whether the first user and the at least one additional user are authorized to make the access requests, wherein determining whether the first user and the at least one additional user are authorized includes determining whether the first user and the at least one additional user are located within a pre-defined geographic radius around the resource; responsive to receiving the first access request from the first user and the second access request from the at least one additional user, program instructions to determine whether the first access request from the first user and the second access request from the at least one additional user are received as a simultaneous authentication within the pre-defined geographic radius around the resource and within a pre-defined threshold duration of time; and responsive to determining the access requests are received as a simultaneous authentication within the pre-defined geographic radius around the resource and within a pre-defined threshold duration of time, program instructions to authorize the first access request of the first user and the second access request of the at least one additional user. - View Dependent Claims (5, 6)
-
-
7. A computer system for multi-user authentication, the computer system comprising:
-
one or more computer processors; one or more computer readable storage device; program instructions stored on the one or more computer readable storage device for execution by at least one of the one or more computer processors, the stored program instructions comprising; program instructions to receive a first user login; program instructions to determine whether at least one additional user login is received, wherein the first user login and the at least one additional user login employ one or more of a multi-factor authentication, and wherein the first user login utilizes a biometric characteristic and the at least one additional user login utilizes a password; responsive to determining at least one additional user login is received, program instructions to receive a first access request to a resource from the first user; program instructions to receive a second access request to the resource from the at least one additional user; responsive to receiving the first access request from the first user and the second access request from the at least one additional user, program instructions to determine whether the first user and the at least one additional user are authorized to make the access requests, wherein determining whether the first user and the at least one additional user are authorized includes determining whether the first user and the at least one additional user are located within a pre-defined geographic radius around the resource; responsive to receiving the first access request from the first user and the second access request from the at least one additional user, program instructions to determine whether the first access request from the first user and the second access request from the at least one additional user are received as a simultaneous authentication within the pre-defined geographic radius around the resource and within a pre-defined threshold duration of time; and responsive to determining the access requests are received as a simultaneous authentication within the pre-defined geographic radius around the resource and within a pre-defined threshold duration of time, program instructions to authorize the first access request of the first user and the second access request of the at least one additional user. - View Dependent Claims (8)
-
Specification