Location-based security rules
First Claim
Patent Images
1. A computer-readable medium containing computer readable instruction when executed by a computing device perform a method of securely accessing information, the method comprising:
- receiving an access request for information from a location, receiving location information associated with the location, comparing the location information to a database of predefined locations, requiring a location-based input based on a security rule associated with a comparison of the location information to the predefined locations of the database, and providing access to the information if the location-based input satisfies an acceptable response.
8 Assignments
0 Petitions
Accused Products
Abstract
Location based security rules are provided for preventing unauthorized access to a device, application, system, content, and/or network, etc. The location-based security rules enable a user, computing device, system, etc. to access the requested item or information when the user provides proper identification information. The proper identification information is based in part on the location of the user and/or the user'"'"'s access request.
-
Citations
20 Claims
-
1. A computer-readable medium containing computer readable instruction when executed by a computing device perform a method of securely accessing information, the method comprising:
-
receiving an access request for information from a location, receiving location information associated with the location, comparing the location information to a database of predefined locations, requiring a location-based input based on a security rule associated with a comparison of the location information to the predefined locations of the database, and providing access to the information if the location-based input satisfies an acceptable response. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer-readable medium having computer executable instructions when executed by a computer perform a method of secure access to information, the method comprising:
-
identifying a location associated with an access request, and providing a number of location-based security rules requiring user specific identifiers based on the location of the access request and content of the access request, wherein each location-based security rule is associated with at least one of an access request and location of the access request. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A system including a processor for executing computer executable instructions for performing a method of enabling access to information, the system comprising:
-
means for examining an access request for the information, means for identifying a location associated with the access request, and means for providing a level of security including requiring user specific identifiers based in part on the location, wherein the level of security is based at least in part on the location associated with the access request. - View Dependent Claims (19, 20)
-
Specification