Authentication mechanism utilizing location corroboration

Described are techniques for collaboration-based authentication including a method comprising storing a user profile comprising information related to a user account, a plurality of user devices, and a user calendar. The method further comprises detecting an authentication attempt associated with th...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Carolina Garcia Delgado, Humberto Orozco Cervantes, Paul Llamas Virgen
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Described are techniques for collaboration-based authentication including a method comprising storing a user profile comprising information related to a user account, a plurality of user devices, and a user calendar. The method further comprises detecting an authentication attempt associated with the user account and retrieving device information associated with a first device initiating the authentication attempt, a first location of the first device, a second location of a second device of the plurality of user devices, and a scheduled location based on the user calendar. The method further comprises determining that the authentication attempt comprises a security risk based on the device information associated with the first device, the first location of the first device, the second location of the second device, and the scheduled location. The method further comprises performing a mitigation action in response to determining that the authentication attempt comprises the security risk.