×

System and method for location-based security

  • US 10,244,347 B2
  • Filed: 06/28/2017
  • Issued: 03/26/2019
  • Est. Priority Date: 09/18/2014
  • Status: Active Grant
First Claim
Patent Images

1. A mobile computing device, comprising:

  • a first memory device having first computer-readable instructions tangibly recorded thereon;

    a first hardware processor configured to execute the first computer-readable instructions recorded on the first memory device; and

    an RFID component that includes a transceiver and a second memory device, the transceiver of the RFID component being configured to receive a first proximity signal from a first RFID reader when the RFID component is within a predetermined range of the first RFID reader, and to receive a second proximity signal from a second RFID reader when the RFID component is within a predetermined range of the second RFID reader, the second memory device of the RFID component being configured to store the first and second proximity signals,wherein the first proximity signal includes a first control policy identifying a first set of operations that are performable by the mobile computing device, and the second proximity signal includes a second control policy identifying a second set of operations that are performable by the mobile computing device,wherein the first hardware processor is configured to, upon executing the instructions recorded on the first memory device, enable the mobile computing device to perform the first set of operations identified in the first control policy when the transceiver of the RFID component receives the first proximity signal while the RFID component is within the predetermined range of the first RFID reader, and to disable the mobile computing device from performing the first set of operations when the transceiver of the RFID component does not receive the first proximity signal while the RFID component is not within the predetermined range of the first RFID reader to receive the first proximity signal, andwherein the first hardware processor is configured to, upon executing the instructions recorded on the first memory device, enable the mobile computing device to perform the second set of operations identified in the second control policy when the transceiver of the RFID component receives the second proximity signal while the RFID component is within the predetermined range of the second RFID reader, and to disable the mobile computing device from performing the second set of operations when the transceiver of the RFID component does not receive the second proximity signal while the RFID component is not within the predetermined range of the second RFID reader to receive the second proximity signal.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×