User associated geo-location based reauthorization to protect confidential information
First Claim
1. A computer implemented method for blocking unauthorized access to confidential information stored on a specific user'"'"'s mobile computing device, even to a party that has physical control of the mobile computing device and enters any user identifiers and passwords associated with accessing the confidential information, the method comprising:
- generating a trigger indicating to prevent access only to the confidential information in response to receiving user-entered input indicating to execute a confidential information protection process;
receiving, by the mobile computing device, the trigger indicating to prevent access to the confidential information on the mobile computing device;
responsive to receiving the trigger, preventing access to the confidential information on the mobile computing device by any party, until a successful reauthorization by the specific user from an authorized, geo-location associated with the specific user has occurred;
responsive to receiving a directive from a user indicating to initiate a reauthorization attempt, attempting to reauthorize to access the confidential information on the mobile computing device, the attempt to reauthorize only being successful responsive to a current geo-location of the mobile computing device at a time of the attempt to reauthorize being an authorized geo-location associated with the specific user; and
only in response to the attempt to reauthorize being successful, re-allowing access to the confidential information on the mobile computing device.
2 Assignments
0 Petitions
Accused Products
Abstract
In response to a trigger indicating to prevent access to confidential information on a specific user'"'"'s mobile device, access is prevented to all parties, until a successful reauthorization occurs. Preventing access can comprise storing encrypted confidential information and removing the decryption key. In order to subsequently access the confidential information, a reauthorization attempt is made. The current geo-location of the mobile device at the time of the attempt is compared to at least one authorized geo-location associated with the specific user. In response to a) the password and user identifier being correct and to b) the current geo-location of the mobile computing device being an authorized geo-location associated with the specific user, the attempt to reauthorize is successful, whereas otherwise the attempt is unsuccessful. Only in response to a successful attempt is access to the confidential information re-allowed.
29 Citations
20 Claims
-
1. A computer implemented method for blocking unauthorized access to confidential information stored on a specific user'"'"'s mobile computing device, even to a party that has physical control of the mobile computing device and enters any user identifiers and passwords associated with accessing the confidential information, the method comprising:
-
generating a trigger indicating to prevent access only to the confidential information in response to receiving user-entered input indicating to execute a confidential information protection process; receiving, by the mobile computing device, the trigger indicating to prevent access to the confidential information on the mobile computing device; responsive to receiving the trigger, preventing access to the confidential information on the mobile computing device by any party, until a successful reauthorization by the specific user from an authorized, geo-location associated with the specific user has occurred; responsive to receiving a directive from a user indicating to initiate a reauthorization attempt, attempting to reauthorize to access the confidential information on the mobile computing device, the attempt to reauthorize only being successful responsive to a current geo-location of the mobile computing device at a time of the attempt to reauthorize being an authorized geo-location associated with the specific user; and
only in response to the attempt to reauthorize being successful, re-allowing access to the confidential information on the mobile computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. At least one non-transitory computer readable-storage medium for blocking unauthorized access to confidential information stored on a specific user'"'"'s mobile computing device, even to a party that has physical control of the mobile computing device and enters any user identifiers and passwords associated with accessing the confidential information, the at least one non-transitory computer readable-storage medium storing computer executable instructions that, when loaded into computer memory and executed by at least one processor of a computing device, cause the computing device to perform the following steps:
-
generating a trigger indicating to prevent access only to the confidential information in response to receiving user-entered input indicating to execute a confidential information protection process; receiving, by the mobile computing device, the trigger indicating to prevent access to the confidential information on the mobile computing device; responsive to receiving the trigger, preventing access to the confidential information on the mobile computing device by any party, until a successful reauthorization by the specific user from an authorized, geo-location associated with the specific user has occurred; responsive to receiving a directive from a user indicating to initiate a reauthorization attempt, attempting to reauthorize to access the confidential information on the mobile computing device, the attempt to reauthorize only being successful responsive to a current geo-location of the mobile computing device at a time of the attempt to reauthorize being an authorized geo-location associated with the specific user; and only in response to the attempt to reauthorize being successful, re-allowing access to the confidential information on the mobile computing device.
-
-
20. A computer system for blocking unauthorized access to confidential information stored on a specific user'"'"'s mobile computing device, even to a party that has physical control of the mobile computing device and enters any user identifiers and passwords associated with accessing the confidential information, the computer system comprising:
-
system memory; a trigger generating module residing in the computer memory, the trigger generating module being programmed to generate a trigger indicating to prevent access only to the confidential information in response to receiving user-entered input indicating to execute a confidential information protection process; a trigger receiving module residing in the computer memory, the trigger receiving module being programmed to receive the trigger indicating to prevent access to the confidential information on the mobile computing device; an access preventing module residing in the computer memory, the access preventing module being programmed to prevent access to the confidential information on the mobile computing device by any party until a successful reauthorization by the specific user from an authorized, geo-location associated with the specific user has occurred; a reauthorization attempting module residing in the computer memory, the reauthorization attempting module being programmed, responsive to receiving a directive from a user indicating to initiate a reauthorization attempt, to attempt to reauthorize to access the confidential information on the mobile computing device, the attempt to reauthorize only being successful responsive to a current geo-location of the mobile computing device at a time of the attempt to reauthorize being an authorized geo-location associated with the specific user; and an access re-allowing module residing in the computer memory, the access re-allowing module being programmed to re-allow access to the confidential information on the mobile computing device, only in response to the attempt to reauthorize being successful.
-
Specification