Method and apparatus for authenticating a user at an access terminal
First Claim
Patent Images
1. A method for authenticating a user who is attempting access to a network resource or service on a computer or server through an access terminal, the method comprising:
- determining an ID of the user attempting access,determining a current physical location of the access terminal;
determining a current physical location of an identified mobile terminal, the mobile terminal being unassociated with the access terminal, the identity of the mobile terminal being associated with an authorized user who has the determined ID;
comparing the current physical location of the access terminal with the current physical location of the mobile terminal to verify the location of the authorized user as being within a range of the access terminal; and
denying or granting access to the network resource or service based on the results of the comparing step.
4 Assignments
0 Petitions
Accused Products
Abstract
Secure access to a network resource running on a computer or server, is provided by a method that compares the current physical location of a network access terminal through which a user is attempting to access the network resource, and the current physical location of a mobile terminal on the person of the user who is authorized to access the network resource. If the locations different, then access is denied.
-
Citations
24 Claims
-
1. A method for authenticating a user who is attempting access to a network resource or service on a computer or server through an access terminal, the method comprising:
-
determining an ID of the user attempting access, determining a current physical location of the access terminal; determining a current physical location of an identified mobile terminal, the mobile terminal being unassociated with the access terminal, the identity of the mobile terminal being associated with an authorized user who has the determined ID; comparing the current physical location of the access terminal with the current physical location of the mobile terminal to verify the location of the authorized user as being within a range of the access terminal; and denying or granting access to the network resource or service based on the results of the comparing step. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method at a mobile terminal comprising:
in response to a request, determining a current physical location of the mobile terminal and sending the determined current physical location to a specified location for comparison with a current physical location of an access terminal from which a user is attempting access to a network resource or service and for which the mobile terminal has been identified as being associated with an authorized user of the network resource or service, and to verify the location of the authorized user as being within a range of the access terminal based on the comparison access to the network resource or service is granted or denied, the mobile terminal and the access terminal not being associated. - View Dependent Claims (9, 10)
-
11. Apparatus for authenticating a user who is attempting access to a network resource or service on a computer or server through an access terminal, the apparatus comprising:
-
means for determining an ID of the user attempting access, means for determining a current physical location of the access terminal; means for determining a current physical location of an identified mobile terminal, the identity of the mobile terminal being associated with an authorized user who has the determined ID, the mobile terminal being unassociated with the access terminal; means for comparing the current physical location of the access terminal with the current physical location of the mobile terminal to verify the location of the authorized user as being within a range of the access terminal; and means for denying or granting access to the network resource or service based on the comparison. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
-
18. A computer readable medium tangibly embodying a program of instructions executable by a computer to perform a method for authenticating a user who is attempting access to a network resource or service on a computer or server through an access terminal, the method comprising:
-
determining an ID of the user attempting access, determining a current physical location of the access terminal; determining a current physical location of an identified mobile terminal, the identity of the mobile terminal being associated with an authorized user who has the determined ID, the mobile terminal being unassociated with the access terminal; comparing the current physical location of the access terminal with the current physical location of the mobile terminal to verify the location of the authorized user as being within a range of the access terminal; and denying or granting access to the network resource or service based on the results of the comparing step. - View Dependent Claims (19, 20, 21, 22, 23, 24)
-
Specification