System for escalating security protocol requirements
First Claim
1. A system for escalating security protocol requirements, comprising:
- a computer apparatus including a processor and a memory; and
a security protocol module stored in the memory, executable by the processor and configured for;
monitoring first electronic activities being performed by a user, the first electronic activities being performed on a first local network;
monitoring a frequency and a success rate of the first electronic activities performed by the user on the first local network;
based on the frequency and the success rate of the first electronic activities performed by the user on the first local network, determining that the first local network is a preferred local network;
collecting device identification information for local network devices associated with the preferred local network;
receiving from the user a request to perform a subsequent electronic activity using a first computing device, the first computing device being in communication with a second local network;
based on receiving the request to perform the subsequent electronic activity, collecting device identification information for the first computing device;
based on receiving the request to perform the subsequent electronic activity, identifying one or more local network devices in communication with the second local network and collecting device identification information for the local network devices in communication with the second local network; and
based on determining that the device identification information for the first computing device matches the collected device identification information for one of the local network devices associated with the preferred local network, automatically decreasing a level of authentication required to complete the subsequent electronic activity.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed is a system for escalating security protocol requirements. The system typically includes a processor, a memory, and a security protocol module stored in the memory. The module is typically configured for: monitoring electronic activities associated with a user and collecting device identification information for local network devices associated with the electronic activities; receiving from the user a request to perform a subsequent electronic activity using a first computing device in communication with a first local network; collecting device identification information associated with the first computing device; identifying one or more local network devices in communication with the first local network and collecting device identification information associated with the local network devices in communication with the first local network; and denying the subsequent electronic activity or increasing or decreasing a level of authentication required to complete the subsequent electronic activity based on the collected device identification information.
-
Citations
20 Claims
-
1. A system for escalating security protocol requirements, comprising:
-
a computer apparatus including a processor and a memory; and a security protocol module stored in the memory, executable by the processor and configured for; monitoring first electronic activities being performed by a user, the first electronic activities being performed on a first local network; monitoring a frequency and a success rate of the first electronic activities performed by the user on the first local network; based on the frequency and the success rate of the first electronic activities performed by the user on the first local network, determining that the first local network is a preferred local network; collecting device identification information for local network devices associated with the preferred local network; receiving from the user a request to perform a subsequent electronic activity using a first computing device, the first computing device being in communication with a second local network; based on receiving the request to perform the subsequent electronic activity, collecting device identification information for the first computing device; based on receiving the request to perform the subsequent electronic activity, identifying one or more local network devices in communication with the second local network and collecting device identification information for the local network devices in communication with the second local network; and based on determining that the device identification information for the first computing device matches the collected device identification information for one of the local network devices associated with the preferred local network, automatically decreasing a level of authentication required to complete the subsequent electronic activity. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer program product embodied on a non-transitory computer-readable storage medium having computer-executable instructions for:
-
monitoring first electronic activities being performed by a user, the first electronic activities being performed on a first local network; monitoring a frequency and a success rate of the first electronic activities by the user on the first local network; based on the frequency and the success rate of the first electronic activities performed by the user on the first local network, determining that the first local network is a preferred local network; collecting device identification information for local network devices associated with the preferred local network; receiving from the user a request to perform a subsequent electronic activity using a first computing device, the first computing device being in communication with a second local network; based on receiving the request to perform the subsequent electronic activity, collecting device identification information for the first computing device; based on receiving the request to perform the subsequent electronic activity, identifying one or more local network devices in communication with the second local network and collecting device identification information for the local network devices in communication with the second local network; and based on determining that the device identification information for the first computing device matches the collected device identification information for one of the local network devices associated with the preferred local network, automatically decreasing a level of authentication required to complete the subsequent electronic activity. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. A method for escalating security protocol requirements, comprising:
-
monitoring, via a hardware computer processor, first electronic activities being performed by a user, the first electronic activities being performed on a first local network; monitoring, via a hardware computer processor, a frequency and a success rate of the first electronic activities by the user on the first local network; based on the frequency and the success rate of the first electronic activities performed by the user on the first local network, determining, via a hardware computer processor, that the first local network is a preferred local network; collecting, via a hardware computer processor, device identification information for local network devices associated with the preferred local network; receiving, via a hardware computer processor, from the user a request to perform a subsequent electronic activity using a first computing device, the first computing device being in communication with a second local network; based on receiving the request to perform the subsequent electronic activity, collecting, via a hardware computer processor, device identification information for the first computing device; based on receiving the request to perform the subsequent electronic activity, identifying, via a hardware computer processor, one or more local network devices in communication with the second local network and collecting, via a hardware computer processor, device identification information for the local network devices in communication with the second local network; and based on determining, via a hardware computer processor, that the device identification information associated with the first computing device matches the collected device identification information for one of the local network devices associated with the preferred local network, automatically decreasing a level of authentication required to complete the subsequent electronic activity. - View Dependent Claims (18, 19, 20)
-
Specification