Location-sensitive security levels and setting profiles based on detected location
First Claim
1. A method of managing security levels, the method comprising:
- implementing, at a mobile device, a baseline security level;
detecting, by the mobile device, a plurality of location aspects available at a location of the mobile device, wherein each of the location aspects indicate an attribute of the location;
determining, by the mobile device, a first location context of the mobile device based on the detected plurality of location aspects;
associating, by the mobile device, the first location context with a first location for modified security; and
implementing, by the mobile device, a first security level based on the first location context.
2 Assignments
0 Petitions
Accused Products
Abstract
The security level and/or other device behavior, configurations, or settings on a mobile device can be modified based on the location of the mobile device. The location of the mobile device can be determined by analyzing location aspects present at a location, where any parameters or attributes of a location that can assist in identifying a particular location may be used as location aspects. In a setup process, the mobile device identifies available aspects at a location and can use the available aspects to determine a location context associated with a location. In a use example, the device identifies available aspects at a location and determines whether the available aspects match a previously defined location context. If the available aspects match the previously defined location context, device behavior, configurations, or settings on a mobile device can be modified.
-
Citations
25 Claims
-
1. A method of managing security levels, the method comprising:
-
implementing, at a mobile device, a baseline security level; detecting, by the mobile device, a plurality of location aspects available at a location of the mobile device, wherein each of the location aspects indicate an attribute of the location; determining, by the mobile device, a first location context of the mobile device based on the detected plurality of location aspects; associating, by the mobile device, the first location context with a first location for modified security; and implementing, by the mobile device, a first security level based on the first location context. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A non-transitory computer readable storage medium having program code stored thereon, the program code including instructions that, when executed by a processor in a mobile device, cause the processor to execute operations comprising:
-
implementing a baseline security level; detecting a plurality of location aspects available at a location of the mobile device, wherein each of the location aspects indicate an attribute of the location; determining a first location context of the mobile device based on the detected plurality of location aspects; associating the first location context with a first location for modified security; and implementing a first security level based on the first location context. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A method of initializing location-based security levels, the method comprising:
-
receiving, at a mobile device, an instruction to set up a modified security level associated with a first location; analyzing a plurality of location aspects available at the first location, wherein each of the location aspects indicate an attribute of the location; selecting one or more available location aspects to associate with the first location; and assigning a first security level to the first location; and implementing, by the mobile device, the first security level based on detecting one or more location aspects associated with the first location. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A non-transitory computer readable storage medium having program code stored thereon, the program code including instructions that, when executed by a processor in a mobile device, cause the processor to execute operations comprising:
-
receiving an instruction to set up a modified security level associated with a first location; analyzing a plurality of location aspects available at the first location, wherein each of the location aspects indicate an attribute of the location; selecting one or more available location aspects to associate with the first location; and assigning a first security level to the first location; and implementing, by the mobile device, the first security level based on detecting one or more location aspects associated with the first location. - View Dependent Claims (17, 18, 19, 20)
-
-
21. A mobile device comprising:
-
one or more hardware modules for detecting location aspects; an interface configured to communicate with the one or more hardware modules; and control logic coupled to the interface, the control logic being configured to; implement a first security level; detect one or more location aspects available at a current location of the mobile device, wherein each of the location aspects indicate an attribute of the location; determine a location context of the mobile device based on the one or more location aspects detected; determine whether the location context is associated with a location for modified security; if the location context is associated with a location for modified security, implement a second security level at the location for modified security; and if the location context is not associated with a location for modified security, continue to implement the first security level. - View Dependent Claims (22, 23, 24, 25)
-
Specification