Location as a second factor for authentication
First Claim
1. A method for authenticating a log-in request based on location, the method comprising:
- receiving, with one or more processors, a log-in request from a first user device;
determining, with the one or more processors, a first location and a time of the log-in request received from the first user device;
determining, with the one or more processors, a current location of a registered mobile user device;
computing, with the one or more processors, a distance between the first location of the log-in request and the current location of the registered mobile user device;
determining, with the one or more processors, whether the computed distance exceeds a threshold;
authenticating, with the one or more processors, the log-in request responsive to determining that the computed distance is within or less than the threshold; and
transmitting, with the one or more processors, a warning notification to the registered mobile user device, the warning notification including the first location and the time of the log-in request received from the first user device responsive to determining that the computed distance exceeds the threshold.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method for authenticating a log-in request based on location using an authentication application. The authentication application includes a processing unit, a location module, an authentication module, a user interface engine, and a notification module. The processing unit receives a log-in request from a third party application. The processing unit also receives a location of the log-in request and a location of a registered user device. The location module computes a distance between the location of the log-in request and the location of the registered user device. The authentication module determines whether the computed distance exceeds a threshold. The authentication module authenticates the log-in request responsive to determining that the computed distance is within or less than the threshold. The authentication module denies authentication to the log-in request responsive to determining that the computed distance exceeds the threshold.
61 Citations
27 Claims
-
1. A method for authenticating a log-in request based on location, the method comprising:
-
receiving, with one or more processors, a log-in request from a first user device; determining, with the one or more processors, a first location and a time of the log-in request received from the first user device; determining, with the one or more processors, a current location of a registered mobile user device; computing, with the one or more processors, a distance between the first location of the log-in request and the current location of the registered mobile user device; determining, with the one or more processors, whether the computed distance exceeds a threshold; authenticating, with the one or more processors, the log-in request responsive to determining that the computed distance is within or less than the threshold; and transmitting, with the one or more processors, a warning notification to the registered mobile user device, the warning notification including the first location and the time of the log-in request received from the first user device responsive to determining that the computed distance exceeds the threshold. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A system for authenticating a log-in request based on location, the system comprising:
-
one or more processors; a processing unit stored on a memory and executable by the one or more processors, the processing unit for receiving a log-in request from a first user device, determining a first location and a time of the log-in request received from the first user device and determining a current location of a registered mobile user device; a location module stored on the memory and executable by the one or more processors, the location module coupled to the processing unit for computing a distance between the first location of the log-in request and the current location of the registered mobile user device; and an authentication module stored on the memory and executable by the one or more processors, the authentication module coupled to the location module for determining whether the computed distance exceeds a threshold and authenticating the log-in request responsive to determining that the distance is within or less than the threshold; and a notification module stored on the memory and executable by the one or more processors, the notification module coupled to the authentication module for transmitting a warning notification to the registered mobile user device, the warning notification including the first location and the time of the log-in request received from the first user device responsive to determining that the computed distance exceeds the threshold. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A computer program product comprising a non-transitory computer useable medium including a computer readable program, wherein the computer readable program when executed on a computer causes the computer to:
-
receive a log-in request from a first user device; determine a first location and a time of the log-in request received from the first user device; determine a current location of a registered mobile user device; compute a distance between the first location of the log-in request and the current location of the registered mobile user device; determine whether the computed distance exceeds a threshold; and authenticate the log-in request responsive to determining that the computed distance is within or less than the threshold; and transmitting a warning notification to the registered mobile user device, the warning notification including the first location and the time of the log-in request received from the first user device responsive to determining that the computed distance exceeds the threshold. - View Dependent Claims (24)
-
-
25. A method for automatically logging-out a user based on location, the method comprising:
-
determining a first location where the user is logged-in to a third-party application, the first location being associated with a first device; determining a current location of a registered mobile user device; computing a distance between the first location where the user is logged-in to the third party application and the current location of the registered mobile user device; determining whether the computed distance exceeds a threshold; and logging-out the user from the third-party application responsive to determining that the computed distance exceeds the threshold.
-
-
26. A system for automatically logging-out a user based on location, the system comprising:
-
one or more processors; a processing unit stored on a memory and executable by the one or more processors, the processing unit for determining a first location where the user is logged-in to a third party application, the first location being associated with a first device and determining a current location of a registered mobile user device; a location module stored on the memory and executable by the one or more processors, the location module coupled to the processing unit for computing a distance between the first location where the user is logged-in to the third party application and the current location of the registered mobile user device; and an authentication module stored on the memory and executable by the one or more processors, the authentication module coupled to the location module for determining whether the computed distance exceeds a threshold and logging-out the user from the third party application responsive to determining that the computed distance exceeds the threshold.
-
-
27. A computer program product comprising a non-transitory computer useable medium including a computer readable program, wherein the computer readable program when executed on a computer causes the computer to:
-
determine a first location where a user is logged-in to a third party application, the first location being associated with a first device; determine a current location of a registered mobile user device; compute a distance between the first location where the user is logged-in to the third party application and the current location of the registered mobile user device; determine whether the computed distance exceeds a threshold; and log-out the user from the third-party application responsive to determining that the computed distance exceeds the threshold.
-
Specification