Electronic devices having adaptive security profiles and methods for selecting the same
First Claim
Patent Images
1. An electronic device, comprising:
- a display;
one or more hardware processors;
memory; and
one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs including instructions for;
determining one or more trusted zones in which the electronic device may be located, wherein at least one of the one or more trusted zones is defined by a user using at least part of an address associated with a respective trusted zone;
determining a current location of the electronic device;
determining whether the current location of the electronic device is in one or more of the trusted zones;
requiring a first authentication process for the user to access the electronic device when the electronic device is located within one or more of the trusted zones;
requiring a second authentication process for the user to access the electronic device when the electronic device is located outside of any trusted zones;
receiving at least part of an address associated with a desired trusted zone; and
adding a new trusted zone corresponding to the desired trusted zone to the one or more trusted zones.
0 Assignments
0 Petitions
Accused Products
Abstract
Adaptive security profiles are supported on an electronic device. One or more security profiles may be automatically or selectively applied to the device based on the device'"'"'s location and one or more geographic zone definitions. The security profiles may be used to determine the level of authentication or number of invalid authentication attempts for a particular feature or application or set of features or applications.
30 Citations
102 Claims
-
1. An electronic device, comprising:
-
a display; one or more hardware processors; memory; and one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs including instructions for; determining one or more trusted zones in which the electronic device may be located, wherein at least one of the one or more trusted zones is defined by a user using at least part of an address associated with a respective trusted zone; determining a current location of the electronic device; determining whether the current location of the electronic device is in one or more of the trusted zones; requiring a first authentication process for the user to access the electronic device when the electronic device is located within one or more of the trusted zones; requiring a second authentication process for the user to access the electronic device when the electronic device is located outside of any trusted zones; receiving at least part of an address associated with a desired trusted zone; and adding a new trusted zone corresponding to the desired trusted zone to the one or more trusted zones. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method, comprising:
-
at an electronic device with a display; determining one or more trusted zones in which the electronic device may be located, wherein at least one of the one or more trusted zones is defined by a user using at least part of an address associated with a respective trusted zone; determining a current location of the electronic device; determining whether the current location of the electronic device is in one or more of the trusted zones; requiring a first authentication process for the user to access the electronic device when the electronic device is located within a trusted zone; requiring a second authentication process for the user to access the electronic device when the electronic device is located outside of any trusted zones; receiving at least part of an address associated with a desired trusted zone; and adding a new trusted zone corresponding to the desired trusted zone to the one or more trusted zones. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A non-transitory computer readable storage medium storing one or more programs, the one or more programs comprising instructions, which when executed by an electronic device with a display, cause the device to:
-
determine one or more trusted zones in which the electronic device may be located, wherein at least one of the one or more trusted zones is defined by a user using at least part of an address associated with a respective trusted zone; determine a current location of the electronic device; determine whether the current location of the electronic device is in one or more of the trusted zones; require a first authentication process for the user to access the electronic device when the electronic device is located within a trusted zone; require a second authentication process for the user to access the electronic device when the electronic device is located outside of any trusted zones; receive at least part of an address associated with a desired trusted zone; and add a new trusted zone corresponding to the desired trusted zone to the one or more trusted zones. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27)
-
-
28. An electronic device, comprising:
-
a display; one or more hardware processors; memory; and one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs including instructions for; determining one or more trusted zones in which the electronic device may be located, wherein at least one of the one or more trusted zones is defined by a user using at least part of an address associated with a respective trusted zone; determining a current location of the electronic device; determining whether the current location of the electronic device is in one or more of the trusted zones; granting the user access to the electronic device when the current location of the electronic device is in one or more of the trusted zones; requiring an authentication process for the user to access the electronic device when the current location of the electronic device is located outside of any trusted zones; receiving at least part of an address associated with a desired trusted zone; and adding a new trusted zone corresponding to the desired trusted zone to the one or more trusted zones. - View Dependent Claims (29, 30, 31, 32, 33, 34, 35)
-
-
36. A method, comprising:
-
at an electronic device with a display; determining one or more trusted zones in which the electronic device may be located, wherein at least one of the one or more trusted zones is defined by a user using at least part of an address associated with a respective trusted zone; determining a current location of the electronic device; determining whether the current location of the electronic device is in one or more of the trusted zones; granting the user access to the electronic device when the current location of the electronic device is in one or more of the trusted zones; requiring an authentication process for the user to access the electronic device when the current location of the electronic device is located outside of any trusted zones; receiving at least part of an address associated with a desired trusted zone; and adding a new trusted zone corresponding to the desired trusted zone to the one or more trusted zones. - View Dependent Claims (37, 38, 39, 40, 41, 42, 43)
-
-
44. A non-transitory computer readable storage medium storing one or more programs, the one or more programs comprising instructions, which when executed by an electronic device with a display, cause the device to:
-
determine one or more trusted zones in which the electronic device may be located, wherein at least one of the one or more trusted zones is defined by a user using at least part of an address associated with a respective trusted zone; determine a current location of the electronic device; determine whether the current location of the electronic device is in one or more of the trusted zones; grant the user access to the electronic device when the current location of the electronic device is in one or more of the trusted zones; require an authentication process for the user to access the electronic device when the current location of the electronic device is located outside of any trusted zones; receive at least part of an address associated with a desired trusted zone; and add a new trusted zone corresponding to the desired trusted zone to the one or more trusted zones. - View Dependent Claims (45, 46, 47, 48, 49, 50, 51)
-
-
52. An electronic device, comprising:
-
a display; one or more hardware processors; memory; and one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs including instructions for; determining one or more trusted zones in which the electronic device may be located; determining a current location of the electronic device; determining whether the current location of the electronic device is in one or more of the trusted zones; requiring a first authentication process for a user to access the electronic device when the electronic device is located within one or more of the trusted zones; requiring a second authentication process for the user to access the electronic device when the electronic device is located outside of any trusted zones; receiving a request to define a trusted zone; in response to receiving the request to define a trusted zone, displaying a map on the display of the electronic device; receiving user input at a location on the map; and adding a new trusted zone corresponding to the location of the user input on the map to the one or more trusted zones. - View Dependent Claims (53, 54, 55, 56, 57, 58, 59, 60)
-
-
61. A method, comprising:
-
at an electronic device with a display; determining one or more trusted zones in which the electronic device may be located; determining a current location of the electronic device; determining whether the current location of the electronic device is in one or more of the trusted zones; requiring a first authentication process for a user to access the electronic device when the electronic device is located within a trusted zone; requiring a second authentication process for the user to access the electronic device when the electronic device is located outside of any trusted zones; receiving a request to define a trusted zone; in response to receiving the request to define a trusted zone, displaying a map on the display of the electronic device; receiving user input at a location on the map; and adding a new trusted zone corresponding to the location of the user input on the map to the one or more trusted zones. - View Dependent Claims (62, 63, 64, 65, 66, 67, 68, 69)
-
-
70. A non-transitory computer readable storage medium storing one or more programs, the one or more programs comprising instructions, which when executed by an electronic device with a display, cause the device to:
-
determine one or more trusted zones in which the electronic device may be located; determine a current location of the electronic device; determine whether the current location of the electronic device is in one or more of the trusted zones; require a first authentication process for a user to access the electronic device when the electronic device is located within a trusted zone; require a second authentication process for the user to access the electronic device when the electronic device is located outside of any trusted zones; receive a request to define a trusted zone; in response to receiving the request to define a trusted zone, display a map on the display of the electronic device; receive user input at a location on the map; and add a new trusted zone corresponding to the location of the user input on the map to the one or more trusted zones. - View Dependent Claims (71, 72, 73, 74, 75, 76, 77, 78)
-
-
79. An electronic device, comprising:
-
a display; one or more hardware processors; memory; and one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs including instructions for; determining one or more trusted zones in which the electronic device may be located; determining a current location of the electronic device; determining whether the current location of the electronic device is in one or more of the trusted zones; granting a user access to the electronic device when the current location of the electronic device is in one or more of the trusted zones; requiring an authentication process for the user to access the electronic device when the current location of the electronic device is located outside of any trusted zones; receiving a request to define a trusted zone; in response to receiving the request to define a trusted zone, displaying a map on the display of the electronic device; receiving user input at a location on the map; and adding a new trusted zone corresponding to the location of the user input on the map to the one or more trusted zones. - View Dependent Claims (80, 81, 82, 83, 84, 85, 86)
-
-
87. A method, comprising:
-
at an electronic device with a display; determining one or more trusted zones in which the electronic device may be located; determining a current location of the electronic device; determining whether the current location of the electronic device is in one or more of the trusted zones; granting a user access to the electronic device when the current location of the electronic device is in one or more of the trusted zones; requiring an authentication process for the user to access the electronic device when the current location of the electronic device is located outside of any trusted zones; receiving a request to define a trusted zone; in response to receiving the request to define a trusted zone, displaying a map on the display of the electronic device; receiving user input at a location on the map; and adding a new trusted zone corresponding to the location of the user input on the map to the one or more trusted zones. - View Dependent Claims (88, 89, 90, 91, 92, 93, 94)
-
-
95. A non-transitory computer readable storage medium storing one or more programs, the one or more programs comprising instructions, which when executed by an electronic device with a display, cause the device to:
-
determine one or more trusted zones in which the electronic device may be located; determine a current location of the electronic device; determine whether the current location of the electronic device is in one or more of the trusted zones; grant a user access to the electronic device when the current location of the electronic device is in one or more of the trusted zones; require an authentication process for the user to access the electronic device when the current location of the electronic device is located outside of any trusted zones; receive a request to define a trusted zone; in response to receiving the request to define a trusted zone, display a map on the display of the electronic device; receive user input at a location on the map; and add a new trusted zone corresponding to the location of the user input on the map to the one or more trusted zones. - View Dependent Claims (96, 97, 98, 99, 100, 101, 102)
-
Specification