MOBILE DEVICE SECURITY
First Claim
1. A method comprising:
- receiving, at a user terminal, a request for access to a security mechanism;
responsive to the request, identifying a short-range radio connection of the user terminal at a time of receiving the request for access;
accessing a memory of the user terminal to determine whether the identified short-range radio connection corresponds to a user-identified secure radio connection;
upon determining that the short-range radio connection corresponds to the user-identified secure radio connection, granting a user of the user terminal access to the security mechanism without soliciting the user for a predetermined security input; and
upon determining that the short-range radio connection does not correspond to the user-identified secure radio connection, soliciting the user for the predetermined security input.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods for providing mobile device security are disclosed. In some implementations, a request for access to a security mechanism is received at a user terminal. A short-range radio connection of the user terminal at a time of receiving the request for access is identified responsive to the request. A memory of the user terminal is accessed to determine whether the identified short-range radio connection corresponds to a user-identified secure radio connection. Upon determining that the radio connection corresponds to the user-identified secure radio connection, the user is granted access to the security mechanism without soliciting the user of the user terminal for a predetermined security input. Upon determining that the radio connection does not correspond to the user-identified secure radio connection, the user is solicited for the predetermined security input.
13 Citations
20 Claims
-
1. A method comprising:
-
receiving, at a user terminal, a request for access to a security mechanism; responsive to the request, identifying a short-range radio connection of the user terminal at a time of receiving the request for access; accessing a memory of the user terminal to determine whether the identified short-range radio connection corresponds to a user-identified secure radio connection; upon determining that the short-range radio connection corresponds to the user-identified secure radio connection, granting a user of the user terminal access to the security mechanism without soliciting the user for a predetermined security input; and upon determining that the short-range radio connection does not correspond to the user-identified secure radio connection, soliciting the user for the predetermined security input. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method comprising:
-
receiving, at a mobile device, a radio signal including geographic location information; storing, at the mobile device, the geographic location information and a timestamp associated with a time of receipt of the radio signal; receiving, at the mobile device and from a security reader, a request for authentication information for granting access through a physical security checkpoint; responsive to the request for the authentication information, providing the security reader with the geographic location information and the timestamp associated with the time of receipt of the radio signal; and modifying access rights of a user of the mobile device at the physical security checkpoint upon determination that the geographic location information and the timestamp associated with the time of receipt of the radio signal satisfy a predetermined criterion. - View Dependent Claims (11, 12, 13)
-
-
14. A non-transitory machine-readable medium storing instructions for a machine to:
-
receive, at a user terminal, a request for access to a security mechanism; responsive to the request, identify a short-range radio connection of the user terminal at a time of receiving the request for access; access a memory of the user terminal to determine whether the identified short-range radio connection corresponds to a user-identified secure radio connection; upon determining that the short-range radio connection corresponds to the user-identified secure radio connection, grant a user of the user terminal access to the security mechanism without soliciting the user for a predetermined security input; and upon determining that the short-range radio connection does not correspond to the user-identified secure radio connection, solicit the user for the predetermined security input. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification