Method and Apparatus for User Authentication and Security
First Claim
Patent Images
1. A computer implemented method comprising:
- logging a GPS location in a wireless device responsive to a vehicle entering a parked state;
after the wireless device has moved a predetermined distance from the logged GPS location, comparing device GPS coordinates to the logged GPS coordinates to determine if the device is in vehicle proximity; and
sending a signal to the vehicle to activate a user authentication process when the device is in vehicle proximity.
1 Assignment
0 Petitions
Accused Products
Abstract
A computer implemented method includes logging a GPS location in a wireless device responsive to a vehicle entering a parked state. The method also includes comparing device GPS coordinates to the logged GPS coordinates to determine if the device is in vehicle proximity, after the wireless device has moved a predetermined distance from the logged GPS location. The method additionally includes sending a signal to the vehicle to activate a user authentication process when the device is in vehicle proximity.
-
Citations
20 Claims
-
1. A computer implemented method comprising:
-
logging a GPS location in a wireless device responsive to a vehicle entering a parked state; after the wireless device has moved a predetermined distance from the logged GPS location, comparing device GPS coordinates to the logged GPS coordinates to determine if the device is in vehicle proximity; and sending a signal to the vehicle to activate a user authentication process when the device is in vehicle proximity. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer implemented method comprising:
-
engaging one or more vehicle sensors to detect the presence of one or more people in proximity to a vehicle; alerting an approaching vehicle owner of the presence of one or more detected people in proximity to the vehicle. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A computer implemented method comprising:
-
authenticating a user using a first authentication process outside a vehicle; authenticating the user using a second authentication process inside the vehicle; and if either of the authentication processes fails to authenticate the user, providing an override authentication process inside the vehicle;
whereinif both authentication processes authenticate the user or if the override authentication process authenticates the user, full vehicle functionality is provided, wherein if either authentication process fails to authenticate the user and if the override authentication process fails to authenticate the user, limited vehicle functionality is provided. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification