Systems and methods for authenticating a user of a computer application, network, or device using a wireless device
First Claim
Patent Images
1. A method comprising:
- providing a location of a wireless device and wireless device identifier to an authentication system, the wireless device being in communication with a mobile access point via a short range wireless connection, where the authentication system (a) determines whether the wireless device is authorized based on a previously registered association between the wireless device identifier associated with the wireless device and an application identifier associated with an application, and approves a user to use the application based on a predetermined location criterion, wherein the predetermined location criterion is that the wireless device is within a predetermined distance of the mobile access point, and (b) produces an indication for one or more of the mobile access point or the wireless device that the user was authenticated when the user was approved; and
receiving, by the wireless device, the indication.
0 Assignments
0 Petitions
Accused Products
Abstract
A method and system for authenticating a user includes providing an invocation element capable of being activated by a single user action, receiving an indication that the invocation element has been activated, obtaining a location of a wireless device associated with the user, determining whether the wireless device is associated with an authorized user, approving the user to use the application based on a predetermined location criterion, and producing an indication that the user has been authenticated.
-
Citations
20 Claims
-
1. A method comprising:
-
providing a location of a wireless device and wireless device identifier to an authentication system, the wireless device being in communication with a mobile access point via a short range wireless connection, where the authentication system (a) determines whether the wireless device is authorized based on a previously registered association between the wireless device identifier associated with the wireless device and an application identifier associated with an application, and approves a user to use the application based on a predetermined location criterion, wherein the predetermined location criterion is that the wireless device is within a predetermined distance of the mobile access point, and (b) produces an indication for one or more of the mobile access point or the wireless device that the user was authenticated when the user was approved; and receiving, by the wireless device, the indication. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system comprising:
-
a mobile access point; a wireless device comprising a first processor, and a first non-transitory computer readable medium coupled to the first processor, the first non-transitory computer readable medium comprising code, executable by the first processor, to implement a method comprising providing a location of the wireless device and a wireless device identifier associated with the wireless device to an authentication system, the wireless device being in communication with the mobile access point via a short range wireless connection, and receiving an indication; and the authentication system comprising a second processor, and a second non-transitory computer readable medium coupled to the second processor, the second non-transitory computer readable medium comprising code executable by the second processor to (a) determine whether the wireless device is authorized based on a previously registered association between the wireless device identifier associated with the wireless device and an application identifier associated with an application, and approves a user to use the application based on a predetermined location criterion, wherein the predetermined location criterion is that the wireless device is within a predetermined distance of the mobile access point, and (b) produce the indication, the indication being for one or more of the mobile access point or the wireless device and indicating that the user was authenticated when the user was approved. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification