METHOD AND SYSTEM FOR LOCATION-AWARE AUTHORIZATION
First Claim
Patent Images
1. A method of controlling access to a module based on spatial location of the module, comprising:
- detecting spatial location of the module;
accessing a set of rules indicating locations where access to the module is not authorized; and
controlling access to the module based on the location by checking the detected location against the set of rules, and denying access to the module when the detected location is within locations where access to the module is not authorized.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system for controlling access to a module based on spatial location of the module is provided. One implementation involves detecting spatial location of the module, accessing a set of rules indicating locations where access to the module is not authorized, and controlling access to the module based on the detected location by checking the detected location against the set of rules, and denying access to the module when the detected location is within locations where access to the module is not authorized.
-
Citations
20 Claims
-
1. A method of controlling access to a module based on spatial location of the module, comprising:
-
detecting spatial location of the module; accessing a set of rules indicating locations where access to the module is not authorized; and controlling access to the module based on the location by checking the detected location against the set of rules, and denying access to the module when the detected location is within locations where access to the module is not authorized. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. An apparatus for controlling access to a module based on spatial location of the module, comprising:
-
a location detector configured for detecting spatial location of the module; and a controller configured for accessing a set of rules indicating locations where access to the module is not authorized, and controlling access to the module based on the detected location by checking the detected location against the set of rules, and denying access to the module when the detected location is within locations where access to the module is not authorized. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. An access control system, comprising:
-
a controlled module an authenticator configured for controlling access to the controller module based on spatial location of the module, the authenticator comprising; a location detector configured for detecting spatial location of the module; and a controller configured for accessing a set of rules indicating locations where access to the module is not authorized, and controlling access to the module based on the detected location by checking the detected location against the set of rules, and denying access to the module when the detected location is within locations where access to the module is not authorized. - View Dependent Claims (18, 19, 20)
-
Specification