Location-based information security
First Claim
Patent Images
1. A computer-implemented method comprising:
- tracking locations of a portable electronic device during a time interval;
determining a location pattern based on the tracked locations;
estimating one or more secure locations based on the determined location pattern;
receiving a current location of the portable electronic device; and
when a user accesses financial information using the portable electronic device, determining a security level by;
when the current location comprises a location in the one or more secure locations, presenting a security challenge to the user and causing access to be granted to the financial information when the user correctly answers the security challenge, andotherwise, when the current location is different from the one or more secure locations, presenting the security challenge and one or more additional security challenges to the user and causing access to be granted to the financial information when the user correctly answers the security challenge and the one or more additional security challenges.
1 Assignment
0 Petitions
Accused Products
Abstract
To facilitate security, locations of a portable electronic device may be tracked during a time interval. These tracked locations are then used to determine a location pattern, and the location pattern is used to estimate one or more secure locations. Then, when a user accesses financial information using the portable electronic device, the security level is determined based on a current location and the one or more secure locations.
-
Citations
20 Claims
-
1. A computer-implemented method comprising:
-
tracking locations of a portable electronic device during a time interval; determining a location pattern based on the tracked locations; estimating one or more secure locations based on the determined location pattern; receiving a current location of the portable electronic device; and when a user accesses financial information using the portable electronic device, determining a security level by; when the current location comprises a location in the one or more secure locations, presenting a security challenge to the user and causing access to be granted to the financial information when the user correctly answers the security challenge, and otherwise, when the current location is different from the one or more secure locations, presenting the security challenge and one or more additional security challenges to the user and causing access to be granted to the financial information when the user correctly answers the security challenge and the one or more additional security challenges. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer-program product for use in conjunction with a computer system, the computer-program product comprising a non-transitory computer-readable storage medium and a computer-program mechanism embedded therein, the computer-program mechanism including:
-
instructions for tracking locations of a portable electronic device during a time interval; instructions for determining a location pattern based on the tracked locations; instructions for estimating one or more secure locations based on the determined location pattern; instructions for receiving a current location of the portable electronic device; and when a user accesses financial information using the portable electronic device, instructions for determining a security level by; when the current location comprises a location in the one or more secure locations, presenting a security challenge to the user and causing access to be granted to the financial information when the user correctly answers the security challenge, and otherwise, when the current location is different from the one or more secure locations, presenting the security challenge and one or more additional security challenges to the user and causing access to be granted to the financial information when the user correctly answers the security challenge and the one or more additional security challenges. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A computer system, comprising:
-
a processor; memory; and a program module, wherein the program module is stored in the memory and configurable to be executed by the processor, the program module including; instructions for tracking locations of a portable electronic device during a time interval; instructions for determining a location pattern based on the tracked locations; instructions for estimating one or more secure locations based on the determined location pattern; instructions for receiving a current location of the portable electronic device; and when a user accesses financial information using the portable electronic device, instructions for determining a security level by; when the current location comprises a location in the one or more secure locations, presenting a security challenge to the user and causing access to be granted to the financial information when the user correctly answers the security challenge, and otherwise, when the current location is different from the one or more secure locations, presenting the security challenge and one or more additional security challenges to the user and causing access to be granted to the financial information when the user correctly answers the security challenge and the one or more additional security challenges. - View Dependent Claims (20)
-
Specification