Systems and Methods for Providing Location-Based Application Authentication Using a Location Token Service
First Claim
1. A method for authenticating a mobile device associated with a user to permit the mobile device to access an application, the method comprising:
- determining, at the mobile device, a location of the mobile device;
receiving, at the mobile device, via an input interface of the mobile device, a user identification (user ID) and a password;
retrieving, from a subscriber identity system of the mobile device, a universal unique identifier (UUID) and a telephone number (TN);
generating, at the mobile device, a first message including the location, the UUID, the TN of the mobile device, the user ID, and the password;
sending the first message to a location token service (LTS) server;
recording, at the LTS server, the location, the UUID, the TN, the user ID, and the password;
authenticating, at the LTS server, the user ID and the password;
creating, at the LTS server, a user session associated with the mobile device based upon the location, the UUID, the TN, the user ID, and the password;
subsequent to the user session being created, in response to an application being initiated on the mobile device, determining a current location of the mobile device and generating a second message including the current location, the UUID, the TN, the user ID, and the password;
sending the second message to the LTS server;
determining, at the LTS server, whether the current location is within a threshold distance of the location for a temporal threshold; and
if the LTS server determines that the current location is within the threshold distance of the location for the temporal threshold, the LTS server returning a token to the mobile device, the token being used by the mobile device to permit access to the application.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for implementing a location token service (LTS) to enhance the security of mobile device identity tokens by using the location of the mobile device to augment the tokens. The LTS enforces re-authentication (login) of the mobile device to one or more applications if the mobile device moves beyond a threshold distance from the location of the last use of the token within a time period defined in a temporal threshold. The LTS increases authentication strength and drastically reduces the potential for spoofing or otherwise permitting unauthorized access to one or more applications on the mobile device.
-
Citations
20 Claims
-
1. A method for authenticating a mobile device associated with a user to permit the mobile device to access an application, the method comprising:
-
determining, at the mobile device, a location of the mobile device; receiving, at the mobile device, via an input interface of the mobile device, a user identification (user ID) and a password; retrieving, from a subscriber identity system of the mobile device, a universal unique identifier (UUID) and a telephone number (TN); generating, at the mobile device, a first message including the location, the UUID, the TN of the mobile device, the user ID, and the password; sending the first message to a location token service (LTS) server; recording, at the LTS server, the location, the UUID, the TN, the user ID, and the password; authenticating, at the LTS server, the user ID and the password; creating, at the LTS server, a user session associated with the mobile device based upon the location, the UUID, the TN, the user ID, and the password; subsequent to the user session being created, in response to an application being initiated on the mobile device, determining a current location of the mobile device and generating a second message including the current location, the UUID, the TN, the user ID, and the password; sending the second message to the LTS server; determining, at the LTS server, whether the current location is within a threshold distance of the location for a temporal threshold; and if the LTS server determines that the current location is within the threshold distance of the location for the temporal threshold, the LTS server returning a token to the mobile device, the token being used by the mobile device to permit access to the application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for authenticating a mobile device associated with a user to permit the mobile device to access an application, the method comprising:
-
receiving, at a location token service (LTS) library (LTS LIB) of the mobile device, a request to initiate a location token service (LTS) in response to the application being intiated on the mobile device; the LTS LIB requesting a current location of the mobile device from a location services application (LSA) of the mobile device, the LSA using a location component of the mobile device to determine the current location of the mobile device; the LTS LIB receiving the current location from the location services application; the LTS LIB requesting a universal unique identifier (UUID) and a telephone number (TN) from a subscriber identity system of the mobile device; the LTS LIB receiving the UUID and the TN from the subscriber identity system; the LTS LIB generating a message comprising the current location, the UUID, and the TN; the LTS LIB communicating with an LTS server to transmit the message; the LTS LIB receiving user login information from the LTS server; and the LTS LIB providing the user login information to the application, permitting a user to access the application on the mobile device. - View Dependent Claims (11, 12, 13)
-
-
14. A method for selectively permitting user access to an application stored on a mobile device, the method comprising:
-
upon the application being initiated at the mobile device, the mobile device providing authentication information to a location token service (LTS) server to authenticate a user of the mobile device to access the application, the authentication information comprises a current location of the mobile device, a user identification, and a password; and the LTS server determining if the current location of the mobile device is within a threshold distance; if the LTS determines that the current location of the mobile device is within the threshold distance, the LTS server providing the mobile device with an LTS token used by the mobile device to permit the user to access the application; if the LTS determines that the current location of the mobile device is not within the threshold distance, the LTS server denying the user access to the application. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification