Location Based Authentication
First Claim
1. A method of authenticating a mobile wireless user device, the method comprising:
- identifying other devices as being within the proximity of the user device using wireless communication between the user device and the other devices;
comparing the identities of said other devices with reference identities;
authenticating said user device when the identity comparison meets a threshold.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention relates to authenticating a mobile device using logical location information associated with the device which provides an indication of the proximity of the device to other devices. The present invention provides a mechanism for authenticating a mobile device based on location related information or a “logical location”, but without requiring an actual location. The mobile user device identifies or discovers other devices, using direct wireless communication, within its vicinity and forwards this information to the authenticating authority. If this information matches previous or otherwise predetermined information, then the device is authenticated.
-
Citations
28 Claims
-
1. A method of authenticating a mobile wireless user device, the method comprising:
-
identifying other devices as being within the proximity of the user device using wireless communication between the user device and the other devices; comparing the identities of said other devices with reference identities;
authenticating said user device when the identity comparison meets a threshold. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 22, 25, 26)
-
-
18. A method of authenticating a mobile wireless user device, the method comprising the user device performing the steps of:
-
receiving an authentication challenge from a server; identifying other wireless devices as being in its proximity using wireless communication with said other devices; and forwarding said identities to said server in response to said challenge. - View Dependent Claims (19, 28)
-
-
20. A method of authenticating a wireless user device, the method comprising a server performing the steps of:
-
forwarding an authentication challenge to said user device; receiving identities of other devices determined as being in the proximity of the user device in response to said challenge; comparing said identities with reference identities for said user device; and authenticating said user device when the comparison meets a threshold. - View Dependent Claims (21)
-
-
23. A system for authenticating a wireless user device, the system comprising:
-
means for identifying other devices as being in the proximity of the user device using wireless communication between the user device and the other devices; means for comparing said identities with reference identities; means for authenticating said user device when the comparison meets a threshold. - View Dependent Claims (24)
-
-
27. A server for authenticating a wireless user device, the server comprising:
-
means for forwarding an authentication challenge to said user device; means for receiving identities of other devices in the proximity of the user device in response to said challenge; means for comparing said identities with reference identities for said user device;
means for authenticating said user device when the comparison meets a threshold.
-
Specification