Method and system for implementing zone-restricted behavior of a computing device
First Claim
1. A method for implementing zone-restricted behavior of a computing device, the method comprising:
- identifying wireless access points using the computing device;
calculating, by the computing device, a total quantity of a plurality of authorized wireless access points from the identified wireless access points by receiving digital fingerprints of the identified wireless access points and comparing each of the received digital fingerprints to digital fingerprints of authorized wireless access points, wherein each of said identified wireless access points having a received digital fingerprint that matches one of said digital fingerprints of authorized wireless access points is deemed to be an authorized wireless access point;
determining that the computing device is located within a restricted access zone when said total quantity of a plurality of authorized wireless access points accessible by the computing device from a fixed location exceeds a predetermined threshold of a plurality of authorized wireless access points; and
enabling a zone mode of the computing device when the computing device is determined to be located within the restricted access zone.
3 Assignments
0 Petitions
Accused Products
Abstract
A method for implementing zone-restricted behavior of a computing device includes identifying wireless access points using the computing device, determining a number of authorized wireless access points from the wireless access points identified by the computing device, determining that the computing device is located within a restricted access zone when the number of authorized wireless access points identified by the computing device exceeds a predetermined threshold of authorized wireless access points identified, and enabling a zone mode of the computing device when the computing device is determined to be located within the restricted access zone.
-
Citations
7 Claims
-
1. A method for implementing zone-restricted behavior of a computing device, the method comprising:
-
identifying wireless access points using the computing device; calculating, by the computing device, a total quantity of a plurality of authorized wireless access points from the identified wireless access points by receiving digital fingerprints of the identified wireless access points and comparing each of the received digital fingerprints to digital fingerprints of authorized wireless access points, wherein each of said identified wireless access points having a received digital fingerprint that matches one of said digital fingerprints of authorized wireless access points is deemed to be an authorized wireless access point; determining that the computing device is located within a restricted access zone when said total quantity of a plurality of authorized wireless access points accessible by the computing device from a fixed location exceeds a predetermined threshold of a plurality of authorized wireless access points; and enabling a zone mode of the computing device when the computing device is determined to be located within the restricted access zone. - View Dependent Claims (2, 4, 5, 6)
-
-
3. A method for implementing zone-restricted behavior of a mobile computing device seeking access to a network server, the method comprising the following steps executed by the mobile computing device:
-
detecting signal strength of each of a plurality of wireless access points;
for each of said plurality of wireless access point having signal strength above a predetermined threshold, receiving a digital fingerprint of the wireless access points and comparing the digital fingerprint to digital fingerprints of authorized wireless access points, wherein each of said plurality of wireless access points having a digital fingerprint that matches one of said digital fingerprints of authorized wireless access points is deemed to be an authorized wireless access point;calculating, by the computing device, a total quantity of a plurality of authorized wireless access points; determining that the mobile computing device is located within a restricted access zone when said total quantity of a plurality of authorized wireless access points exceeds a predetermined threshold; and enabling a zone mode of the computing device when the computing device is determined to be located within the restricted access zone. - View Dependent Claims (7)
-
Specification