×

Electronic devices having adaptive security profiles and methods for selecting the same

  • US 8,683,556 B2
  • Filed: 05/04/2011
  • Issued: 03/25/2014
  • Est. Priority Date: 05/04/2011
  • Status: Active Grant
First Claim
Patent Images

1. A method, performed by an electronic device, for selectively adjusting a security profile of the electronic device, the method comprising:

  • acquiring, by the electronic device, a plurality of expected zones from a database that defines the plurality of expected zones in which the electronic device can be located, wherein the plurality of expected zones for the electronic device are maintained in the database, wherein at least one of the plurality of expected zones includes geographic and temporal boundaries, wherein the geographic and temporal boundaries are associated with the at least one of the plurality of expected zones, and wherein at least one temporal boundary includes a time based parameter, and wherein at least one of the plurality of expected zones includes a geographic area where the electronic device is expected to be located at a particular period of time;

    obtaining, by the electronic device, a current location of the electronic device;

    determining, by the electronic device, whether the current location is located in, or near, one of the plurality of expected zones; and

    selectively applying, by the electronic device, one of a plurality of different security profiles based on the determination of whether the current location is located in, or near, one of the plurality of expected zones, wherein the one of the plurality of different security profiles is associated with at least one of the plurality of expected zones, and wherein each of the plurality of different security profiles can vary access to at least one function or feature of the electronic device by varying authentication mechanisms necessary to avail the at least one function or feature, and wherein, after successful authentication, based on the one of the plurality of different security profiles, access to the at least one function or feature remains granted as long as the electronic device remains in the one of the plurality of expected zones.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×