Location-based security system for portable electronic device
First Claim
Patent Images
1. A method, comprising:
- receiving, via an input of a portable electronic device, a request to access the electronic device;
automatically determining, by a processor without a requirement for user entry of location information, a first familiar area for the electronic device by;
receiving, via an input of the portable electronic device, a plurality of successful user authentication entries, wherein each entry corresponds to a location,saving, in a computer-readable memory, data representative of each of the entries and each entry'"'"'s corresponding location,determining that the memory contains at least a threshold number of entries for a single location, andclassifying the single location as the first familiar area; and
implementing, on the electronic device, a first security rule requiring a first authentication process when the electronic device is physically located in the first familiar area, and a second security rule requiring a second authentication process when the electronic device is located outside of any familiar area.
2 Assignments
0 Petitions
Accused Products
Abstract
A location-dependent security method and system for a portable electronic device is disclosed. Without requiring that the user enter any location information, the system determines one or more familiar areas for the device based on locations where the device has received at least a threshold amount of successful user authentication entries. Thereafter, when a user attempts to access the device or an application of the device, the device will implement a first authentication process if the device is in one of the familiar areas, or a different authentication process if the device is not in one of the familiar areas.
22 Citations
20 Claims
-
1. A method, comprising:
-
receiving, via an input of a portable electronic device, a request to access the electronic device; automatically determining, by a processor without a requirement for user entry of location information, a first familiar area for the electronic device by; receiving, via an input of the portable electronic device, a plurality of successful user authentication entries, wherein each entry corresponds to a location, saving, in a computer-readable memory, data representative of each of the entries and each entry'"'"'s corresponding location, determining that the memory contains at least a threshold number of entries for a single location, and classifying the single location as the first familiar area; and implementing, on the electronic device, a first security rule requiring a first authentication process when the electronic device is physically located in the first familiar area, and a second security rule requiring a second authentication process when the electronic device is located outside of any familiar area. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system, comprising:
-
a processor, and a computer-readable memory having programming instructions that, when executed, instruct the processor to; receive a plurality of successful user authentication entries for a portable electronic device, wherein each entry corresponds to a location; save data representative of each of the entries and each successful user authentication entry'"'"'s corresponding location; determine that the memory contains at least a threshold number of successful user authentication entries for a single location; based on the determining that the memory contains at least the threshold number of entries for a single location, classify, without a requirement for user entry of location information, the single location as a first familiar area; receive a user request to access the electronic device; in response to the user request, determine a current location for the electronic device; implement a first authentication process if the current location corresponds to the first familiar area and a second authentication process if the current location does not correspond to any familiar area; and output a prompt to perform the implemented authentication process. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20)
-
Specification