Location based security modification system and method
First Claim
Patent Images
1. A method of adjusting security for a mobile computing device, comprising:
- determining the location of the mobile computing device; and
configuring a security level for the mobile computing device at the mobile computing device, the security level being associated with the location.
4 Assignments
0 Petitions
Accused Products
Abstract
A method or system for providing a level of data security dependent on the location of the user of a wireless device is disclosed. One exemplary embodiment relates to a method of adjusting security for a network user node in communication with a network based upon the location of the node. The method is performed by determining the location of a network user node, selecting a single level of security from a group of more than two security levels based on the determined location, and modifying the security protection for the network user node based upon the selected level of security.
111 Citations
20 Claims
-
1. A method of adjusting security for a mobile computing device, comprising:
-
determining the location of the mobile computing device; and
configuring a security level for the mobile computing device at the mobile computing device, the security level being associated with the location. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 14)
-
-
10. A method of adjusting security for a mobile computing device, comprising:
-
determining the location of the mobile computing device; and
determining whether to require a password in order for a user to access data via the mobile computing device based upon the location of the mobile computing device. - View Dependent Claims (11, 12, 13)
-
-
15. A mobile computing device network user node, comprising:
-
a processor;
a location sensing system coupled to the processor; and
a memory coupled to the processor;
wherein the processor restricts access to data stored in the memory based upon location information provided to the processor by the location sensing system. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification