Determining Authentication Challenge Timing and Type
First Claim
1. A method comprising:
- presenting a first authentication challenge at a wireless telecommunications terminal W at time t1; and
presenting a second authentication challenge at said wireless telecommunications terminal W at time t2;
wherein the magnitude of t2−
t1 is based on the geo-location of said wireless telecommunications terminal W at one or more instants in time interval [t1, t2].
24 Assignments
0 Petitions
Accused Products
Abstract
An apparatus and methods are disclosed for authenticating users of wireless telecommunications terminals. In particular, the present invention enables the timing and type of authentication challenges to vary based on one or more of: the user'"'"'s current geo-location, the current day and time, the presence or absence of other nearby users, and the identity of any nearby users. In accordance with the illustrative embodiment, the re-authentication time period (i.e., the length of time between authenticating and re authenticating a user) and the authentication challenge type (e.g., username/password, fingerprint recognition, etc.) can be determined based on these factors. The present invention is advantageous in that it enables the shortening of the re-authentication time and the selection of a more secure type of authentication challenge when it is more likely that a user'"'"'s wireless telecommunications terminal might be accidentally left behind or stolen.
46 Citations
20 Claims
-
1. A method comprising:
-
presenting a first authentication challenge at a wireless telecommunications terminal W at time t1; and presenting a second authentication challenge at said wireless telecommunications terminal W at time t2; wherein the magnitude of t2−
t1 is based on the geo-location of said wireless telecommunications terminal W at one or more instants in time interval [t1, t2]. - View Dependent Claims (2, 3, 4)
-
- 5. A method comprising generating an authentication challenge whose type is based on the geo-location of a wireless telecommunications terminal W.
-
9. A method comprising:
-
presenting a first authentication challenge at a wireless telecommunications terminal W at time t1; and presenting a second authentication challenge at said wireless telecommunications terminal W at time t2; wherein the magnitude of t2−
t1 is based on one or more of;(i) the day in which t1 falls, (ii) the time of day of t1, (iii) the day in which t2 falls, and (iv) the time of day of t2. - View Dependent Claims (10, 11)
-
- 12. A method comprising generating an authentication challenge whose type is based on the calendrical time at a wireless telecommunications terminal W.
-
15. A method comprising:
-
presenting a first authentication challenge at a wireless telecommunications terminal W at time t1; and presenting a second authentication challenge at said wireless telecommunications terminal W at time t2; wherein said wireless telecommunications terminal W is registered to a user U; and wherein the magnitude of t2−
t1 is based on whether there is a wireless telecommunications terminal Z that;(i) is in the vicinity of said telecommunications terminal W at one or more instants in time interval [t1, t2], and (ii) is registered to a user V who is different than said user U. - View Dependent Claims (16, 17)
-
-
18. A method comprising generating an authentication challenge for the current user of a wireless telecommunications terminal W, wherein said wireless telecommunications terminal W is registered to a user U, and wherein the type of said authentication challenge is also based on whether there is a wireless telecommunications terminal Z that:
-
(i) is in the vicinity of said telecommunications terminal W, and (ii) is registered to a user V who is different than said user U. - View Dependent Claims (19, 20)
-
Specification