Electronic devices having adaptive security profiles and methods for selecting the same
First Claim
Patent Images
1. A method, performed by an electronic device, for selectively adjusting a security profile of the electronic device, the method comprising:
- acquiring, by the electronic device, a plurality of expected zones from a database that defines the plurality of expected zones in which the electronic device can be located, wherein the plurality of expected zones for the electronic device are maintained in the database, wherein at least one of the plurality of expected zones includes geographic and temporal boundaries, wherein the geographic and temporal boundaries are associated with the at least one of the plurality of expected zones, and wherein at least one temporal boundary includes a time based parameter, and wherein at least one of the plurality of expected zones includes a geographic area where the electronic device is expected to be located at a particular period of time;
obtaining, by the electronic device, a current location of the electronic device;
determining, by the electronic device, whether the current location is located in, or near, one of the plurality of expected zones; and
selectively applying, by the electronic device, one of a plurality of different security profiles based on the determination of whether the current location is located in, or near, one of the plurality of expected zones, wherein the one of the plurality of different security profiles is associated with at least one of the plurality of expected zones, and wherein each of the plurality of different security profiles can vary access to at least one function or feature of the electronic device by varying authentication mechanisms necessary to avail the at least one function or feature, and wherein, after successful authentication, based on the one of the plurality of different security profiles, access to the at least one function or feature remains granted as long as the electronic device remains in the one of the plurality of expected zones.
1 Assignment
0 Petitions
Accused Products
Abstract
Adaptive security profiles are supported on an electronic device. One or more security profiles may be automatically or selectively applied to the device based on the device'"'"'s location and one or more geographic zone definitions. The security profiles may be used to determine the level of authentication or number of invalid authentication attempts for a particular feature or application or set of features or applications.
-
Citations
27 Claims
-
1. A method, performed by an electronic device, for selectively adjusting a security profile of the electronic device, the method comprising:
-
acquiring, by the electronic device, a plurality of expected zones from a database that defines the plurality of expected zones in which the electronic device can be located, wherein the plurality of expected zones for the electronic device are maintained in the database, wherein at least one of the plurality of expected zones includes geographic and temporal boundaries, wherein the geographic and temporal boundaries are associated with the at least one of the plurality of expected zones, and wherein at least one temporal boundary includes a time based parameter, and wherein at least one of the plurality of expected zones includes a geographic area where the electronic device is expected to be located at a particular period of time; obtaining, by the electronic device, a current location of the electronic device; determining, by the electronic device, whether the current location is located in, or near, one of the plurality of expected zones; and selectively applying, by the electronic device, one of a plurality of different security profiles based on the determination of whether the current location is located in, or near, one of the plurality of expected zones, wherein the one of the plurality of different security profiles is associated with at least one of the plurality of expected zones, and wherein each of the plurality of different security profiles can vary access to at least one function or feature of the electronic device by varying authentication mechanisms necessary to avail the at least one function or feature, and wherein, after successful authentication, based on the one of the plurality of different security profiles, access to the at least one function or feature remains granted as long as the electronic device remains in the one of the plurality of expected zones. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An electronic device for selectively adjusting security profiles, the electronic device comprising:
-
a location determining hardware component configured to determine the location of the electronic device; a data storage hardware component operative to store at least one expected zone and at least one security profile; and a processing system hardware component coupled to the data storage hardware component and the location determining hardware component, the processing system hardware component configured to; acquire a plurality of expected zones from a database that defines the plurality of expected zones in which the electronic device can be located, wherein the database maintains the plurality of expected zones for the electronic device, wherein at least one of the plurality of expected zones includes geographic and temporal boundaries, wherein the geographic and temporal boundaries are associated with the at least one of the plurality of expected zones, and wherein at least one temporal boundary includes a time based parameter, and wherein at least one of the plurality of expected zones includes a geographic area where the electronic device is expected to be located at a particular period of time; obtain a current location of the electronic device; determine whether the current location is located in, or near, one of the plurality of expected zones; and selectively apply one of a plurality of different security profiles based on the determination of whether the current location is located in, or near, one of the plurality of expected zones, wherein the one of the plurality of different security profiles is associated with at least one of the plurality of expected zones, and wherein each of the plurality of different security profiles can vary access to at least one function or feature of the electronic device by varying authentication mechanisms necessary to avail the at least one function or feature, and wherein, after successful authentication, based on the one of the plurality of different security profiles, access to the at least one function or feature remains granted as long as the electronic device remains in the one of the plurality of expected zones. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A non-transitory computer readable storage medium storing executable program instructions, which when executed by an electronic device cause the electronic device to perform a method for selectively adjusting a security profile of the electronic device, the method comprising:
-
acquiring, by the electronic device, a plurality of expected zones from a database that defines the plurality of expected zones in which the electronic device can be located, wherein the database maintains the plurality of expected zones for the electronic device, wherein at least one of the plurality of expected zones includes geographic and temporal boundaries, wherein the geographic and temporal boundaries are associated with the at least one of the plurality of expected zones, and wherein at least one temporal boundary includes a time based parameter, and wherein at least one of the plurality of expected zones includes a geographic area where the electronic device is expected to be located at a particular period of time; obtaining a current location of the electronic device; determining whether the current location is located in, or near, one of the plurality of expected zones; and selectively applying one of a plurality of different security profiles based on the determination of whether the current location is located in, or near, one of the plurality of expected zones, wherein the one of the plurality of different security profiles is associated with at least one of the plurality of expected zones, and wherein each of the plurality of different security profiles can vary access to at least one function or feature of the electronic device by varying authentication mechanisms necessary to avail the at least one function or feature, and wherein, after successful authentication, based on the one of the plurality of different security profiles, access to the at least one function or feature remains granted as long as the electronic device remains in the one of the plurality of expected zones. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27)
-
Specification