METHODS TO AUTHENTICATE ACCESS AND ALARM AS TO PROXIMITY TO LOCATION
First Claim
1. A method of authenticating access, the method comprising in any order at least the acts of:
- receiving from a person seeking access, identification indicia for the person seeking the access;
sending a first automated message through a mobile phone network to a mobile phone of a person having authority for the access, the first automated message containing at least one of;
an identification of the access requested and a request for an affirmative action to indicate authorization of the access; and
a password; and
at least one of;
receiving the password from the person seeking the access; and
receiving from the mobile phone of the person having authority for the access, a second message indicating that the person having authority for the access has taken the affirmative action to indicate authorization of the access.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods for authenticating access and proving positional awareness using mobile phones. Embodiments for authenticating access include receiving identification indicia from a person seeking access, sending a message to a person having authority for access, and receiving either a second message indicating that the person has taken an affirmative action to indicate authorization, or a password that was provided in the first message. Access may be computer access or physical access, as examples. Methods of providing positional awareness include obtaining or storing location coordinates, monitoring the location of a mobile phone, and providing an alarm, for example, through a second mobile phone. In a number of embodiments, location coordinates are automatically obtained from Internet websites. In some embodiments, parents can monitor the location of their children to make sure they do not get too close to a reported residence of a registered sex offender, for instance.
-
Citations
25 Claims
-
1. A method of authenticating access, the method comprising in any order at least the acts of:
-
receiving from a person seeking access, identification indicia for the person seeking the access; sending a first automated message through a mobile phone network to a mobile phone of a person having authority for the access, the first automated message containing at least one of; an identification of the access requested and a request for an affirmative action to indicate authorization of the access; and a password; and at least one of; receiving the password from the person seeking the access; and receiving from the mobile phone of the person having authority for the access, a second message indicating that the person having authority for the access has taken the affirmative action to indicate authorization of the access. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A method of providing positional awareness of a particular individual, the method including at least the acts of;
-
obtaining or storing at least one location coordinate defining at least one region of concern; monitoring the location of a first mobile phone possessed by the particular individual; and providing an alarm through a second mobile phone when the first mobile phone passes into the region of concern or within a predetermined distance of the region of concern. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25)
-
Specification