×

Authenticating a mobile device based on geolocation and user credential

  • US 8,839,453 B2
  • Filed: 04/12/2010
  • Issued: 09/16/2014
  • Est. Priority Date: 04/12/2010
  • Status: Active Grant
First Claim
Patent Images

1. A method of authenticating a user to operate a mobile device, comprising steps of:

  • (a) determining a geographic location of the mobile device;

    (b) comparing the determined geographic location to information defining a location of permitted operation of the mobile device which is bounded, stored in the mobile device, to determine whether or not the mobile device is at the location of permitted operation,wherein the information defining the location of permitted operation of the mobile device includes at least one time period of permitted operation associated with the location of permitted operation of the mobile device;

    (c) permitting user access to the mobile device, only upon determining;

    1) that the mobile device is within the location of permitted operation,2) a time during which the mobile device is in the location of permitted operation is within the associated time period of permitted operation, and3) that the mobile device is not at a location at which operation is not permitted regardless of the associated time period of permitted operation,wherein the step of permitting user access to the mobile device includes;

    generating a prompt to the user for entering credential information into the mobile device;

    receiving input of credential information into the mobile device from the user; and

    permitting user access to the mobile device only upon a match of the input credential information to credential information of a valid user, stored in the mobile device; and

    (d) blocking user access to the mobile device, upon determining that the mobile device is at a location at which operation is not permitted; and

    (e) blocking user access to the mobile device upon determining that the mobile device is at the location of permitted operation at a time that is not within the time period of permitted operation associated with the location of permitted operation of the mobile device, even if user access to the mobile device is located at the location of permitted operation at the time period wherein step (d) comprises generating a warning for the user that the mobile device is not at the location of permitted operation, and restricting generating the prompt to the user for entering credential information.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×