Authentication based on future geo-location
First Claim
1. A method comprising:
- receiving one or more identifier/geo-location pairs that are defined by a user U, wherein each of the identifiers is meaningful to said user U but does not indicate the associated geo-location to other users, and wherein said user U is associated with a wireless telecommunications terminal;
receiving, after the receiving of said one or more identifier/geo-location pairs, a first signal that indicates that the current user of said wireless telecommunications terminal is to be authenticated;
selecting, in response to said first signal, an identifier/geo-location pair I/L from said one or more identifier/geo-location pairs;
presenting identifier I at said wireless telecommunications terminal at time t; and
when the geo-location of said wireless telecommunications terminal is substantially the same as L at a time that exceeds t by no more than a positive threshold, storing in a memory a value that indicates that the current user of said wireless telecommunications terminal is authenticated for access to a telecommunications network.
23 Assignments
0 Petitions
Accused Products
Abstract
An apparatus and methods are disclosed for authenticating users of wireless telecommunications terminals. A user is authenticated by instructing the user to travel to a geo-location, where the geo-location is referred to by an identifier that the user has previously associated with the geo-location. When the user chooses identifiers that are meaningful to the user, but that do not indicate the associated geo-locations to other people, the user can be securely authenticated via the following procedure: (i) select one of the identifiers that the user has defined, (ii) instruct the user to “go to <identifier>,” and (iii) declare the user authenticated if and only if the user visits the geo-location associated with <identifier> before a timeout expires.
-
Citations
19 Claims
-
1. A method comprising:
-
receiving one or more identifier/geo-location pairs that are defined by a user U, wherein each of the identifiers is meaningful to said user U but does not indicate the associated geo-location to other users, and wherein said user U is associated with a wireless telecommunications terminal; receiving, after the receiving of said one or more identifier/geo-location pairs, a first signal that indicates that the current user of said wireless telecommunications terminal is to be authenticated; selecting, in response to said first signal, an identifier/geo-location pair I/L from said one or more identifier/geo-location pairs; presenting identifier I at said wireless telecommunications terminal at time t; and when the geo-location of said wireless telecommunications terminal is substantially the same as L at a time that exceeds t by no more than a positive threshold, storing in a memory a value that indicates that the current user of said wireless telecommunications terminal is authenticated for access to a telecommunications network. - View Dependent Claims (2, 3, 4)
-
-
5. A method comprising:
-
receiving one or more identifier/geo-location pairs that are defined by a user U, wherein each of the identifiers is meaningful to said user U but does not indicate the associated geo-location to other users, and wherein said user U is associated with a wireless telecommunications terminal; receiving, after the receiving of said one or more identifier/geo-location pairs, a first signal that indicates that the current user of said wireless telecommunications terminal is to be authenticated; selecting, in response to said first signal, an identifier/geo-location pair I/L from said one or more identifier/geo-location pairs; presenting at said wireless telecommunications terminal at time t identifier I and a task that involves said wireless telecommunications terminal; and when and only when, the current user of said wireless telecommunications terminal performs said task at a geo-location that is substantially the same as L and at a time that exceeds t by no more than a positive threshold, storing in a memory a value that indicates that the current user of said wireless telecommunications is authenticated for access to a telecommunications network. - View Dependent Claims (6, 7, 8, 9)
-
-
10. A method comprising:
-
receiving one or more identifier/geo-location pairs that are defined by a user U, wherein each of the identifiers is meaningful to said user U but does not indicate the associated geo-location to other users, and wherein said user U is associated with a wireless telecommunications terminal; receiving, after the receiving of said one or more identifier/geo-location pairs, a first signal that indicates that the current user of said wireless telecommunications terminal is to be authenticated; generating, in response to said first signal, an authentication challenge based on one of the identifier/geo-location pairs I/L; presenting said authentication challenge at said wireless telecommunications terminal at time t; and when and only when, the geo-location of said wireless telecommunications terminal is substantially the same as said geo-location L at a time that exceeds t by no more than a positive threshold Δ
, storing in a memory a value that indicates that the current user of said wireless telecommunications terminal is authenticated for access to a telecommunications network. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A method comprising:
-
receiving one or more identifier/geo-location pairs that are defined by a user U, wherein each of the identifiers is meaningful to said user U but does not indicate the associated geo-location to other users, and wherein said user U is associated with a wireless telecommunications terminal; receiving, after the receiving of said one or more identifier/geo-location pairs, a first signal that indicates that the current user of said wireless telecommunications terminal is to be authenticated; generating, in response to said first signal, an authentication challenge that is based on one of the identifier/geo-location pairs I/L and comprises a task that involves said wireless telecommunications terminal; presenting said authentication challenge at said wireless telecommunications terminal at time t; and when, and only when, the current user of said wireless telecommunications terminal performs said task at a geo-location that is substantially the same as L and at a time that exceeds t by no more than a positive threshold Δ
, storing in a memory a value that indicates that the current user of said wireless telecommunication terminal is authenticated for access to a telecommunications network. - View Dependent Claims (16, 17, 18, 19)
-
Specification