Methods and apparatus for verifying the identity of a user requesting access using location information
First Claim
1. A method for verifying the identity of a user, said method comprising the steps of:
- issuing a challenge to said user;
receiving a response to said challenge from said user;
identifying a first location of an authorized person associated with said response, wherein said first location is identified by utilizing a portable device assigned to said user;
identifying a second location where said response is received, wherein said second location is identified by utilizing location information associated with a requested resource at said second location; and
providing access to said user if said first and second locations substantially match.
3 Assignments
0 Petitions
Accused Products
Abstract
A global positioning system (GPS)-based access control method and apparatus are disclosed for limiting access to a device or secure facility by verifying the location of an authorized user. The GPS-based access control system confirms that the user requesting access to a device or secure location is physically present at the location of the device or secure location. Upon an access control request, the location of the user is obtained using an individual GPS system carried by each user on a portable device, such as a pocket token, computer-readable card, cellular telephone or watch. If the location of a person making an access control request does not coincide with the coordinates of the individual GPS that is being worn by the authorized user associated with the password, then the person requesting access is unauthorized.
-
Citations
58 Claims
-
1. A method for verifying the identity of a user, said method comprising the steps of:
-
issuing a challenge to said user; receiving a response to said challenge from said user; identifying a first location of an authorized person associated with said response, wherein said first location is identified by utilizing a portable device assigned to said user; identifying a second location where said response is received, wherein said second location is identified by utilizing location information associated with a requested resource at said second location; and providing access to said user if said first and second locations substantially match. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A method for verifying the identity of a user, said method comprising the steps of:
-
receiving a response to a challenge from said user; identifying a first location of an authorized person associated with said response, wherein said first location is identified by utilizing a portable device assigned to said authorized person; identifying a second location where said response is received, wherein said second location is identified by utilizing location information associated with a requested resource at said second location; and providing access to said user if said first and second locations substantially match. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
-
-
27. A system for verifying the identity of a user, comprising:
-
a memory that stores computer readable code; and a processor operatively coupled to said memory, said processor configured to; receive a response to a challenge from said user; identify a first location of an authorized person associated with said password, wherein said first location is identified by utilizing a portable device assigned to said authorized person; identify a second location of where said response is received, wherein said second location is identified by utilizing location information associated with a requested resource at said second location; and provide access to said user if said first and second locations substantially match. - View Dependent Claims (28, 29, 30, 31, 32, 33, 34, 35, 36, 37)
-
-
38. An article of manufacture for verifying the identity of a user, comprising:
-
a computer readable medium having computer readable code means embodied thereon, said computer readable program code means comprising; a step to receive a response to a challenge from said user; a step to identify a first location of an authorized person associated with said response, wherein said first location is identified by utilizing a portable device assigned to said authorized person; a step to identify a second location where said response is received, wherein said second location is identified by utilizing location information associated with a requested resource at said second location; and a step to provide access to said user if said first and second locations substantially match.
-
-
39. A method for identifying a user requesting access to a device, said method comprising the steps of:
-
receiving biometric information from said user; identifying each registered person within a predefined distance of said requested device, wherein said identification is performed by utilizing a portable device assigned to each registered person and wherein a location of said requested device is identified by utilizing location information associated with said requested device; and identifying said user from among said identified persons using said biometric information. - View Dependent Claims (40, 41)
-
-
42. A method for identifying a user requesting access, said method comprising the steps of:
-
receiving biometric information from said user; identifying a list of potential users based on said biometric information; and identifying said user by comparing a location of each identified potential users with a location where said biometric information was obtained, wherein said location of each identified potential user is obtained by utilizing a portable device assigned to each identified potential user and wherein said location where said biometric information was obtained is identified by utilizing location information associated with a requested resource at said location where said biometric information was obtained. - View Dependent Claims (43, 44)
-
-
45. A method for identifying of a user requesting access to a device, said method comprising the steps of:
-
receiving a communication from a transmitting device assigned to said user; identifying said user using a voice recognition system; and confirming said user requesting access to said device is physically present at the location of said requested device by determining a location of said transmitting device, wherein said location of said requested device is identified by utilizing location information associated with said requested device. - View Dependent Claims (46, 47, 48)
-
-
49. A system for identifying a user requesting access to a device, comprising:
-
a memory that stores computer readable code; and a processor operatively coupled to said memory, said processor configured to; receive biometric information from said user; identify each registered person within a predefined distance of said requested device, wherein said identification is performed by utilizing a portable device assigned to each registered person and wherein a location of said requested device is identified by utilizing location information associated with said requested device; and identify said user from among said identified persons using said biometric information. - View Dependent Claims (50, 51)
-
-
52. A system for identifying a user requesting access, comprising:
-
a memory that stores computer readable code; and a processor operatively coupled to said memory, said processor configured to; receive biometric information from said user; identify a list of potential users based on said biometric information; and identify said user by comparing a location of each identified potential users with a location where said biometric information was obtained, wherein said location of each identified potential user is obtained by utilizing a portable device assigned to each identified potential user and wherein said location where said biometric information was obtained is identified by utilizing location information associated with a requested resource at said location where said biometric information was obtained. - View Dependent Claims (53, 54)
-
-
55. A system for identifying of a user requesting access to a device, comprising:
-
a memory that stores computer readable code; and a processor operatively coupled to said memory, said processor configured to; receive a communication from a transmitting device assigned to said user; identify said user using a voice recognition system; and confirm said user requesting access to said device is physically present at the location of said requested device by determining a location of said transmitting device, wherein said location of said requested device is identified by Utilizing location information associated with said requested device. - View Dependent Claims (56, 57, 58)
-
Specification