Location based security modification system and method
First Claim
1. A method of adjusting security for a network user node in communication with a network based upon the location of the node, comprising:
- determining the location of a network user node;
selecting a single level of security from a group of more than two security levels based on the determined location; and
modifying the security protection for the network user node based upon the selected level of security.
9 Assignments
0 Petitions
Accused Products
Abstract
A method or system for providing a level of data security dependent on the location of the user of a wireless device is disclosed. One exemplary embodiment relates to a method of adjusting security for a network user node in communication with a network based upon the location of the node. The method is performed by determining the location of a network user node, selecting a single level of security from a group of more than two security levels based on the determined location, and modifying the security protection for the network user node based upon the selected level of security.
-
Citations
49 Claims
-
1. A method of adjusting security for a network user node in communication with a network based upon the location of the node, comprising:
-
determining the location of a network user node;
selecting a single level of security from a group of more than two security levels based on the determined location; and
modifying the security protection for the network user node based upon the selected level of security. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A computer system for modifying security settings for a network user node based on the location of the node comprising:
-
an input device having a communicative coupling with a system for determining the location of a network user node;
a storage device for storing a table of security modifications to be performed based on a plurality of locations for the network user node, the security modifications including more than two levels;
a processor coupled to a storage device for processing information, storing on a storage device, and generating a security modification instruction;
and a communication device capable of transmitting a data signal to the network user node containing instructions to modify the security protection for the node. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. A method of adjusting security for a network user node having a processor, a memory coupled to the processor, a wireless transceiver, and a location determining device in communication with a network based upon the location of the node, comprising:
-
receiving location information using a network user node; and
using a network user node to modify security protection for data to a single level from a group of more than two levels, based upon the location information. - View Dependent Claims (31, 32, 33, 34, 35, 36, 37)
-
-
38. A system implemented on a network user node for modifying security settings based on the location of the node comprising:
-
a system for determining the location of the network user node coupled to the network user node;
a processor for processing information, storing information on a storage device, and accessing a table of security modification instructions, the table including more than two unique security modifications; and
a storage device coupled to the network user node for storing a table of security modifications to be performed based on a plurality of locations for the network user node. - View Dependent Claims (39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49)
-
Specification