Systems and methods for location-based device security
First Claim
1. A system for device security comprising:
- a non-transitory memory; and
one or more hardware processors coupled to the non-transitory memory and configured to read instructions from the non-transitory memory to cause the system to perform operations comprising;
determining whether a first device is located within a first distance of a second device based on wireless communications between the first device and the second device;
in response to determining that the first device is located within the first distance of the second device, determining a number of times the first device had been previously accessed while the first device was within the first distance of the second device;
activating, in response to determining that the first device is located within the first distance of the second device and that the number of times meets or exceeds a predefined threshold, a first authentication requirement for accessing the first device; and
in response to determining that the wireless communications comprise a security profile for disabling one or more features of mobile devices, restricting phone calls on the first device or automatically placing the first device in a vibration mode.
2 Assignments
0 Petitions
Accused Products
Abstract
A device may collect environmental information surrounding the device. Based on the collected environmental information, the device may automatically identify a potentially secured location that has lower security risk. When a potentially secured location is identified, the device may prompt the user to setup a security profile having reduced security requirement for the secured location. The device may store and associate the security profile with the secured location. The device may activate the security profile with reduced security requirement when the device is in the secured area. Further, the security profile may require that certain features of the device be disabled when the device is in the secured location.
-
Citations
20 Claims
-
1. A system for device security comprising:
-
a non-transitory memory; and one or more hardware processors coupled to the non-transitory memory and configured to read instructions from the non-transitory memory to cause the system to perform operations comprising; determining whether a first device is located within a first distance of a second device based on wireless communications between the first device and the second device; in response to determining that the first device is located within the first distance of the second device, determining a number of times the first device had been previously accessed while the first device was within the first distance of the second device; activating, in response to determining that the first device is located within the first distance of the second device and that the number of times meets or exceeds a predefined threshold, a first authentication requirement for accessing the first device; and in response to determining that the wireless communications comprise a security profile for disabling one or more features of mobile devices, restricting phone calls on the first device or automatically placing the first device in a vibration mode. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method, comprising:
-
detecting, by a first device, a WiFi signal or a Bluetooth signal emitted from a wireless beacon located at a public place; determining, based at least in part on the detecting, whether the first device is located within a first distance of the wireless beacon; and in response to the determining, automatically restricting phone calls on the first device or automatically placing the first device in a vibration mode. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
-
19. A method, comprising:
-
detecting, by a first device of a user, an NFC signal or a Bluetooth signal emitted from a second device of the user different from the first device; determining, based at least in part on the detecting of the NFC signal or the Bluetooth signal, that the first device is located within a first distance of the second device; determining that a number of times the first device had been previously accessed while the first device was within the first distance of the second device exceeds a predefined threshold; activating, in response to determining that the first device is located within the first distance of the second device and determining that the number of times exceeds the predefined threshold, a reduced security requirement for accessing the first device; detecting a wireless signal emitted from a wireless beacon located at a public place; and restricting phone calls on the first device or placing the first device in a non-ringing mode in response to the detecting of the wireless signal emitted from the wireless beacon. - View Dependent Claims (20)
-
Specification