Social and proximity based access control for mobile applications
First Claim
Patent Images
1. A computer-implemented method for proximity-based access control, comprising:
- determining a distance from a first mobile device to each of one or more safe mobile devices which falls below a threshold distance by receiving an identifier and a signal strength magnitude from one or more of the safe mobile devices;
determining a number of safe mobile devices within the threshold distance which exceeds a safe gathering threshold with a processor; and
activating a safe gathering policy in accordance with the safe gathering threshold that decreases a security level in the first mobile device.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems for proximity-based access control include determining whether a distance from a first mobile device to each of one or more safe mobile devices falls below a threshold distance; determining whether a number of safe mobile devices within the threshold distance exceeds a safe gathering threshold with a processor; and activating a safe gathering policy in accordance with the safe gathering threshold that decreases a security level in the first mobile device.
28 Citations
18 Claims
-
1. A computer-implemented method for proximity-based access control, comprising:
-
determining a distance from a first mobile device to each of one or more safe mobile devices which falls below a threshold distance by receiving an identifier and a signal strength magnitude from one or more of the safe mobile devices; determining a number of safe mobile devices within the threshold distance which exceeds a safe gathering threshold with a processor; and activating a safe gathering policy in accordance with the safe gathering threshold that decreases a security level in the first mobile device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer-implemented method for proximity-based access control, comprising:
-
determining a distance from a first mobile device to each of one or more safe mobile devices which falls below a threshold distance by receiving an identifier and a signal strength magnitude from one or more of the safe mobile devices; determining a number of safe mobile devices within the threshold distance which exceeds a safe gathering threshold with a processor; activating a safe gathering policy in accordance with the safe gathering threshold that decreases a security level in the first mobile device that implements one or more authentication schemes that are less strict than a default authentication scheme. - View Dependent Claims (13, 14, 15, 16, 17)
-
-
18. A computer-implemented method for proximity-based access control, comprising:
-
determining a distance from a first mobile device to each of one or more safe mobile devices which falls below a threshold distance by receiving an identifier and a signal strength magnitude from one or more of the safe mobile devices; determining a number of safe mobile devices within the threshold distance which exceeds a safe gathering threshold with a processor; activating a safe gathering policy in accordance with the safe gathering threshold that decreases a security level in a first mobile device.
-
Specification