ACCESS AUTHORIZATION SERVERS, METHODS AND COMPUTER PROGRAM PRODUCTS EMPLOYING WIRELESS TERMINAL LOCATION
First Claim
1. An access authorization server, comprising:
- an access authorization processor configured to;
receive information concerning an access attempt at a subscribed location,obtain location information from a wireless network provider for a wireless terminal associated with the subscribed location,correlate a location of the wireless terminal with the subscribed location,generate authorization information for the access attempt in response to a result of the correlation of the location of the wireless terminal and the subscribed location, andtransmit the authorization information to a security processor at the subscribed location or to the wireless terminal.
1 Assignment
0 Petitions
Accused Products
Abstract
An access authorization server includes an access authorization processor configured to receive information concerning an access attempt at a subscribed location, to obtain location information from a wireless network provider for a wireless terminal associated with the subscribed location, to correlate a location of the wireless terminal with the subscribed location, to generate authorization information for the access attempt in response to a result of the correlation of the location of the wireless terminal and the subscribed location, and to transmit the authorization information to a security processor at the subscribed location or to the wireless terminal. Corresponding method and computer program embodiments are disclosed.
-
Citations
20 Claims
-
1. An access authorization server, comprising:
-
an access authorization processor configured to; receive information concerning an access attempt at a subscribed location, obtain location information from a wireless network provider for a wireless terminal associated with the subscribed location, correlate a location of the wireless terminal with the subscribed location, generate authorization information for the access attempt in response to a result of the correlation of the location of the wireless terminal and the subscribed location, and transmit the authorization information to a security processor at the subscribed location or to the wireless terminal. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. An access authorization method, comprising:
-
receiving information concerning an access attempt at a subscribed location; obtaining location information from a wireless network provider for a wireless terminal that is associated with the subscribed location; correlating a location of the wireless terminal with the subscribed location; generating authorization information for the access attempt in response to a result of the correlation of the location of the wireless terminal and the subscribed location; and transmitting the authorization information to a security processor at the subscribed location or to the wireless terminal. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A computer program product for access authorization, the computer program product comprising:
-
a computer readable storage medium having computer readable program code embodied in the medium, the computer readable program code comprising; computer readable program code configured to receive information concerning an access attempt at a subscribed location, computer readable program code configured to obtain location information from a wireless network provider for a wireless terminal that is associated with the subscribed location, computer readable program code configured to correlate a location of the wireless terminal with the subscribed location, and computer readable program code configured to generate authorization information for the access attempt in response to a result of the correlation of the location of the wireless terminal and the subscribed location.
-
Specification