主权项 |
1. A method for authentication, the method comprising:
identifying, by one or more computer processors, a mobile computing device attempting to access content; receiving, by one or more computer processors, a username and a password from the mobile computing device; identifying, by one or more computer processors, a first geopolygon that is associated with the content, wherein the a first geopolygon defines a first set of longitudinal and latitudinal coordinates, and wherein the mobile computing device is permitted to access the content from within the first geopolygon; determining, by one or more computer processors, longitudinal and latitudinal coordinates of a location from which the mobile computing device attempted to access the content; and in response to determining, by one or more computer processors, (i) that the received username and the received password match authentication information that is associated with the mobile computing device, (ii) that the longitudinal and latitudinal coordinates of the location from which the mobile computing device attempted to access the content are not within the first geopolygon, and (iii) that the mobile computing device has made a threshold count of total attempts to access the content:
defining, by one or more computer processors, a second geopolygon such that (i) the second geopolygon encompasses the longitudinal coordinates of the location from which the mobile computing device attempted to access the content and the second geopolygon defines a second set of longitudinal and latitudinal coordinates, and (ii) a threshold percentage of the threshold count of attempts to access the content from the mobile computing device originated from within the first geopolygon and the second geopolygon;associating, by one or more computer processors, the second geopolygon with the content such that the mobile computing device is permitted to access the content from longitudinal and latitudinal coordinates within the second geopolygon; andgranting, by one or more computer processors, the mobile computing device access to the content based, at least in part, on the location from which the mobile computing device attempted to access the content. |