Mediating resource access based on a physical location of a mobile device
First Claim
1. A method comprising:
- executing, by a first computing device, an application on behalf of a second computing device;
receiving information indicating a location of the second computing device;
determining that the location of the second computing device is a safe location by at least comparing the location of the second computing device to at least one of one or more authorized locations in which access to one or more e-mails is authorized, wherein the one or more e-mails includes an indication of the one or more authorized locations; and
responsive to determining that the location of the second computing device is a safe location, providing, by the first computing device, the second computing device with access to the one or more e-mails in connection with execution of the application and transmitting application output data indicative of the one or more e-mails to the second computing device.
7 Assignments
0 Petitions
Accused Products
Abstract
One or more techniques are provided for causing a location of a screen image associated with a resource to be adjusted on a display device. The adjustment may be based at least in part on determining that a control element receives focus. The resource may be associated with an application, such as an email application that may be hosted remotely from a client device. Access to one or more resources may be controlled or mediated. Access rights may be based at least in part on a determination of a geographic location of a client device. When the client device is located in a safe area, the client device may be provided access to the resource. When the client device is not located in a safe area, the client device might not be provided access to the resource or might not be provided full access to the resource.
28 Citations
18 Claims
-
1. A method comprising:
-
executing, by a first computing device, an application on behalf of a second computing device; receiving information indicating a location of the second computing device; determining that the location of the second computing device is a safe location by at least comparing the location of the second computing device to at least one of one or more authorized locations in which access to one or more e-mails is authorized, wherein the one or more e-mails includes an indication of the one or more authorized locations; and responsive to determining that the location of the second computing device is a safe location, providing, by the first computing device, the second computing device with access to the one or more e-mails in connection with execution of the application and transmitting application output data indicative of the one or more e-mails to the second computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An apparatus, comprising:
-
a processor; and memory storing executable instructions that, when executed by the processor, cause the apparatus to; execute an application on behalf of a computing device, receive information indicating a location of the computing device, determine that the location of the computing device is a safe location by at least comparing the location of the computing device to at least one of one or more authorized locations in which access to one or more e-mails is authorized, wherein the one or more e-mails includes an indication of the one or more authorized locations, and responsive to determining that the location of the computing device is a safe location, provide the computing device with access to the one or more e-mails in connection with execution of the application and transmit application output data indicative of the one or more e-mails to the computing device. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A method comprising:
-
executing, by a first computing device, a first application on behalf of a second computing device; executing, by the first computing device, a second application on behalf of a third computing device; receiving information indicating a location of the second computing device; determining that the location of the second computing device is a safe location at least by comparing the location of the second computing device to at least one of one or more authorized locations in which access to a first set of e-mails is authorized, wherein the first set of e-mails includes an indication of the one or more authorized locations; responsive to determining that the location of the second computing device is a safe location, providing, based at least in part on a consumption of a first license, the second computing device with access to the first set of e-mails in connection with the first application and transmitting application output data indicative of the first set of e-mails to the second computing device; receiving information indicating a location of third computing device; determining that the location of the third computing device is a safe location; and responsive to determining that the location of the third computing device is a safe location, providing, based at least in part on a consumption of a second license, the third computing device with access to a second set of e-mails in connection with execution of the second application and transmitting application output data indicative of the second set of e-mails to the third computing device, wherein the first license is associated with a first usage-based charge different from a second usage-based charge associated with the second license.
-
Specification