Mobile device security
First Claim
1. One or more non-transitory computer-readable storage media storing computer-executable instructions that, when executed by one or more processors, instruct a computing device to perform acts comprising:
- receiving biometric data from a user of a mobile device via a sensor associated with the mobile device;
analyzing the received biometric data received via the sensor associated with the mobile device; and
granting access to a functionality of the mobile device when the analyzing of the received biometric data determines a match between the received biometric data and biometric data stored in or accessible by the mobile device, the functionality comprising initiating a transaction with a merchant based at least in part on a comparison of a current position of the mobile device with a route associated with a geolocation signature of the mobile device.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques for providing friction-free transactions using geolocation and user identifiers are described herein. These techniques may ascertain a user'"'"'s location based on a location of a mobile device. A transaction between the user and a merchant may be completed with zero or minimal input from the user based on the geolocation of the mobile device and the user identifiers. In some implementations, a transaction initiated earlier is completed when the mobile device arrives at the merchant. Additionally, a parent-child or similar relationship may be established between multiple devices. Security on the mobile device based may be provided by biometric identification and calculation of variance from regular movement patterns. Advertisements may be sent to the mobile device based on bids from merchants near to the mobile device. Promotions may be sent to the mobile device when more than a threshold number of mobile devices are located at the same merchant.
287 Citations
15 Claims
-
1. One or more non-transitory computer-readable storage media storing computer-executable instructions that, when executed by one or more processors, instruct a computing device to perform acts comprising:
-
receiving biometric data from a user of a mobile device via a sensor associated with the mobile device; analyzing the received biometric data received via the sensor associated with the mobile device; and granting access to a functionality of the mobile device when the analyzing of the received biometric data determines a match between the received biometric data and biometric data stored in or accessible by the mobile device, the functionality comprising initiating a transaction with a merchant based at least in part on a comparison of a current position of the mobile device with a route associated with a geolocation signature of the mobile device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A mobile device comprising:
-
one or more processors; a clock in communication with the one or more processors configured to determine a date, a time, or both; a location sensor in communication with the one or more processors and configured to determine a geolocation of the mobile device; a wireless network interface in communication with the one or more processors; and a memory coupled to the one or more processors and comprising; a user identification correlated with user information, the user information available over a network accessed by the wireless network interface; and a security module configured to; create a geolocation signature of routes of the mobile device over time by storing a series of geolocations detected by the location sensor with a series of time points as calculated by the clock; compare a current position of the mobile device at a particular time with a route for the particular time associated with the geolocation signature to determine if the current position varies from the route for the particular time associated with the geolocation signature by more than a threshold amount; and initiate a security event in response to determining that the current position varies from the route for the particular time associated with the geolocation signature by more than the threshold amount. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
Specification