Location based authentication
First Claim
1. A method of authenticating a mobile wireless user device, the method comprising:
- the user device identifying other devices detected as being within the proximity of the user device using at least one mode of wireless access technology communications between the user device and the other devices to generate a current location signature comprising a plurality of weighted device identifiers;
transmitting the current location signature to a server arranged to;
compare the weighted identifier of each of said other devices listed in the current location signature with earlier listed reference weighted device identifiers comprising an authenticated reference signature;
whereby said user device is authenticated when the identifier comparison of the device identifiers listed in the current location signature with earlier reference device identifiers listed in the authenticated reference signature meets a matching threshold comparison condition for authentication,wherein each said weighted device identifier comprises a device identifier which is weighted differently in dependence on each different wireless access technology communications mode used to identify at least one of the other devices in said location signature.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention relates to authenticating a mobile device using logical location information associated with the device which provides an indication of the proximity of the device to other devices. The present invention provides a mechanism for authenticating a mobile device based on location related information or a “logical location”, but without requiring an actual location. The mobile user device identifies or discovers other devices, using direct wireless communication, within its vicinity and forwards this information to the authenticating authority. If this information matches previous or otherwise predetermined information, then the device is authenticated.
-
Citations
30 Claims
-
1. A method of authenticating a mobile wireless user device, the method comprising:
-
the user device identifying other devices detected as being within the proximity of the user device using at least one mode of wireless access technology communications between the user device and the other devices to generate a current location signature comprising a plurality of weighted device identifiers; transmitting the current location signature to a server arranged to; compare the weighted identifier of each of said other devices listed in the current location signature with earlier listed reference weighted device identifiers comprising an authenticated reference signature; whereby said user device is authenticated when the identifier comparison of the device identifiers listed in the current location signature with earlier reference device identifiers listed in the authenticated reference signature meets a matching threshold comparison condition for authentication, wherein each said weighted device identifier comprises a device identifier which is weighted differently in dependence on each different wireless access technology communications mode used to identify at least one of the other devices in said location signature. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A method of authenticating a mobile wireless user device, the method comprising steps of:
-
identifying other devices detected as being within the proximity of the user device using at least one mode of wireless access technology communications between the user device and the other devices to generate a current location signature comprising respective weighted device identifiers for each identified other device; comparing the identifier of each of said other devices listed in the current location signature with earlier listed reference device identifiers comprising an authenticated reference signature; authenticating said user device when the identifier comparison of the listed device identifiers of the current location signature with the earlier listed reference device identifiers comprising the authenticated reference signature meets a threshold comparison condition for authentication, determining for at least one of the identified other devices a proximity range value indicating the proximity of the device to the user device; comparing said range value with a reference range value for at least one of said identified other devices and authenticating said user device if said proximity comparison indicates said proximity range value is an acceptable proximity range being a proximity range value less or equal to said reference proximity range value, wherein said device sends an updated proximity range value at subsequent points of time following said initial authentication, and if an updated proximity range values exceeds said acceptable proximity range, a server issues an authentication challenge, and wherein in response to an authentication challenge received from a server, repeating the above steps to authenticate the device, and wherein each said weighted device identifier comprises a device identifier which is weighted differently in dependence on each different wireless access technology communications mode used to identify at least one of the other devices in said location signature.
-
-
20. A method of authenticating a mobile wireless user device, the method comprising the user device performing:
-
receiving an authentication challenge from a server; identifying other wireless devices as being in its proximity using a mode of wireless access technology communication with said other devices; and forwarding a current location signature comprising said identifiers to said server in response to said challenge, whereby if said current location signature when compared with an authenticated reference signature meets a threshold condition for authentication, said user device is authenticated, wherein said current location signature comprises at least one weighted device identifier comprising a device identifier for at least one of said other devices which is weighted differently, based on different wireless access technology communications modes, than a device identifier used to identify another one of said other devices. - View Dependent Claims (21, 22)
-
-
23. A method of authenticating a wireless user device, the method comprising a server performing:
-
forwarding an authentication challenge to said user device; receiving a current location signature from said user device, the current location signature comprising a list of weighted identifiers for a plurality of other devices determined by said user device as being in the proximity of the user device in response to said challenge using a wireless access technology communications mode; comparing said identifiers in said current location signature with reference identifiers comprising an authenticated reference signature for said user device; and authenticating said user device when the comparison meets a threshold condition for authentication, and wherein each said weighted device identifier comprises a device identifier which is weighted differently in dependence on each different wireless access technology communications mode used to identify at least one of the other devices in said location signature. - View Dependent Claims (24)
-
-
25. A system for authenticating a wireless user device, the system comprising:
-
a processor; a module which, when executed, identifies other devices as being in the proximity of the user device using wireless communication between the user device and the other devices to generate a current location signature comprising a list of weighted identifiers for said other devices; a module which, when executed, compares a plurality of said weighted identifiers for said other devices in said current location signature with reference weighted identifiers, comprising an authenticated reference signature; and a module which, when executed, authenticates said user device when the comparison between said current location signature and said authenticated reference signature meets a threshold condition for authentication, wherein each said weighted device identifier comprises a device identifier which is weighted differently in dependence on each different wireless access technology communications mode used to identify at least one of the other devices in said location signature. - View Dependent Claims (26)
-
-
27. A wireless user device arranged to be authenticated according to a method comprising:
-
the user device identifying other devices detected as being within the proximity of the user device using at least one mode of wireless access technology communications between the user device and the other devices to generate a current location signature comprising a plurality of weighted device identifiers; transmitting the current location signature to a server arranged to; compare the weighted identifier of each of said other devices listed in the current location signature with earlier listed reference weighted device identifiers comprising an authenticated reference signature; whereby said user device is authenticated when the identifier comparison of the device identifiers listed in the current location signature with earlier reference device identifiers listed in the authenticated reference signature meets a matching threshold comparison condition for authentication, wherein each said weighted device identifier comprises a device identifier which is weighted differently in dependence on each different wireless access technology communications mode used to identify the other devices in said location signature the device having a processing system which, when executed; receives an authentication challenge from a server; identifies other wireless devices as being in the proximity of the device using the at least one mode of wireless access technology communications with the other devices; weights each said device identifier differently in dependence on the wireless access technology communications mode used to identify at least one of the other devices; generates a current location signature comprising a list of said weighted identifiers for said other wireless devices identified by the user device; and forwards said current location signature comprising said weighted identifiers to said server in response to said challenge. - View Dependent Claims (28)
-
-
29. A server for authenticating a wireless user device, the server comprising:
-
a processing system which, when executed; forwards an authentication challenge to said user device; receives a current location signature comprising a list of weighted identifiers for other devices in the proximity of the user device in response to said challenge; compares current location signature listed identifiers with reference identifiers comprising an authenticated reference signature for said user device; and authenticates said user device when the comparison meets a threshold for authentication, wherein each said device identifier is weighted in said location signature in dependence on which wireless access technology communications mode was used to identify at least one of the other devices in said location signature.
-
-
30. A method of authenticating a mobile wireless user device, the method comprising:
-
the user device identifying other trusted devices detected as being within the proximity of the user device using wireless communication between the user device and the other trusted devices to generate a current location signature; transmitting the current location signature to a server arranged to; compare the identifier of each of said other devices listed in the current location signature with earlier listed reference device identifier comprising an authenticated reference signature; whereby said user device is authenticated when the identifier comparison of the listed device identifiers of the current location signature with the earlier listed reference device identifiers comprising the authenticated reference signature meets a matching threshold comparison condition for authentication, wherein each said other trusted device identifier is weighted in dependence on the wireless communications access technology used to identify at least one of the other devices in said location signature and wherein different wireless communications access technologies have different matching thresholds allocated.
-
Specification