METHODS TO AUTHENTICATE ACCESS AND ALARM AS TO PROXIMITY TO LOCATION
First Claim
1. A method of providing positional awareness of a particular individual, the method including at least the acts of;
- obtaining or storing at least one location coordinate defining at least one region of concern;
monitoring the location of a first mobile phone possessed by the particular individual; and
providing an alarm through a second mobile phone when the first mobile phone passes into the region of concern or within a predetermined distance of the region of concern.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods for authenticating access and providing positional awareness using mobile phones. Embodiments for authenticating access include receiving identification indicia from a person seeking access, sending a message to a person having authority for access, and receiving either a second message indicating that the person has taken an affirmative action to indicate authorization, or a password that was provided in the first message. Access may be computer access or physical access, as examples. Methods of providing positional awareness include obtaining or storing location coordinates, monitoring the location of a mobile phone, and providing an alarm, for example, through a second mobile phone. In a number of embodiments, location coordinates are automatically obtained from Internet websites. In some embodiments, parents can monitor the location of their children to make sure they do not get too close to a reported residence of a registered sex offender, for instance.
17 Citations
9 Claims
-
1. A method of providing positional awareness of a particular individual, the method including at least the acts of;
-
obtaining or storing at least one location coordinate defining at least one region of concern; monitoring the location of a first mobile phone possessed by the particular individual; and providing an alarm through a second mobile phone when the first mobile phone passes into the region of concern or within a predetermined distance of the region of concern. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
Specification