Queue management and load shedding for complex authentication schemes
First Claim
Patent Images
1. A method comprising:
- performing, by a hardware processor, operations of a pre-authentication process comprising;
obtaining a stochastic queuing model of a computerized system for authenticating users, a set of preferences for handling authentication requests, and a set of operational parameter values, wherein the stochastic queuing model includes two or more classes of users, a queue for each class of users, and quantifies an overall authentication delay of the computerized system for authenticating users;
determining, based at least in part on the model and the operational values, that adjusting an authentication scheme will improve a probable degree to which the authentication system will meet the set of preferences;
responsive to the determination that adjusting the authentication scheme will improve the probable degree to which the system for authenticating users will meet the set of preferences, adjusting the authentication scheme of the computerized system for authenticating users; and
performing, by the hardware processor, an authentication based on authentication scheme determined by the pre-authentication process.
1 Assignment
0 Petitions
Accused Products
Abstract
Using a stochastic queuing model to determine adjustments to be made to authentication system operation. In light of operational parameter values and the stochastic queuing model, a determination is made that adjusting the value of a particular parameter for handling authentication requests is likely to improve some aspect of system performance, and the request handling parameter is adjusted accordingly.
-
Citations
20 Claims
-
1. A method comprising:
-
performing, by a hardware processor, operations of a pre-authentication process comprising; obtaining a stochastic queuing model of a computerized system for authenticating users, a set of preferences for handling authentication requests, and a set of operational parameter values, wherein the stochastic queuing model includes two or more classes of users, a queue for each class of users, and quantifies an overall authentication delay of the computerized system for authenticating users; determining, based at least in part on the model and the operational values, that adjusting an authentication scheme will improve a probable degree to which the authentication system will meet the set of preferences; responsive to the determination that adjusting the authentication scheme will improve the probable degree to which the system for authenticating users will meet the set of preferences, adjusting the authentication scheme of the computerized system for authenticating users; and performing, by the hardware processor, an authentication based on authentication scheme determined by the pre-authentication process. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A non-transitory computer program product comprising a non- transitory computer readable storage medium having stored thereon:
-
instructions stored on the computer readable storage medium for a hardware processor to perform a pre-authentication process that includes; instructions executable by a device to cause the device to obtain a stochastic queuing model of a computerized system for authenticating users, a set of preferences for handling authentication requests, and a set of operational parameter values, wherein the stochastic queuing model includes two or more classes of users, a queue for each class of user, and quantifies an overall authentication delay of the computerized system for authenticating users; instructions executable by a device to cause the device to determine, based at least in part on the model and the operational values, that adjusting an authentication scheme will improve a probable degree to which the authentication system will meet the set of preferences; instructions executable by a device to cause the device to adjust, responsive to the determination that adjusting the authentication scheme will improve the probable degree to which the system for authenticating users will meet the set of preferences, the authentication scheme of the computerized system for authenticating users; and instructions stored on the computer readable storage medium for the hardware processor to perform an authentication based on the authentication scheme determined by the pre- authentication process. - View Dependent Claims (15, 16)
-
-
17. A computer system comprising:
-
a hardware processor(s) set; and a non-transitory computer readable storage medium; wherein; the processor set is structured, located, connected or programmed to execute instructions for a pre-authentication process stored on the computer readable storage medium, the instructions including; instructions executable by a device to obtain a stochastic queuing model of a computerized system for authenticating users, a set of preferences for handling authentication requests, and a set of operational parameter values, wherein the stochastic queuing model includes two or more classes of users, a queue for each class of user, and quantifies an overall authentication delay of the computerized system for authenticating users; instructions executable by a device to cause the device to determine, based at least in part on the model and the operational values, that adjusting an authentication scheme will improve a probable degree to which the authentication system will meet the set of preferences; instructions executable by a device to cause the device to adjust, responsive to the determination that adjusting the authentication scheme will improve the probable degree to which the system for authenticating users will meet the set of preferences, the authentication scheme of the computerized system for authenticating users; and the processor set is structured, located, connected or programmed to execute instructions for an authentication based on the authentication scheme determined by the pre-authentication process. - View Dependent Claims (18, 19, 20)
-
Specification