Authentication based on a current location of a communications device associated with an entity
First Claim
1. A computer-implemented method for use in authentication, the method comprising:
- storing a location history in connection with a communications device associated with an entity, wherein the location history comprises locations visited by the communications device and times associated with the visits to those locations;
receiving an authentication request to authenticate the identity of the entity requiring access to a computerized resource;
receiving a current location of the communications device associated with the entity and a current time;
based on the location history, the current location, and the current time, performing an analysis;
based on the analysis, determining a challenge to issue to the entity; and
based on the challenge, generating an authentication result, wherein the authentication result can be used for granting the entity access to the computerized resource.
9 Assignments
0 Petitions
Accused Products
Abstract
There is disclosed a method and system for use in authenticating an entity in connection with a computerized resource. An authentication request is received from entity for access to computerized resource. An input signal is received from a communications device associated with entity. The input signal comprises current location of communications device. The current location of communications device is derived from input signal. A location history in connection with communications device is captured. The location history comprises a record of discrete locations visited by communications device over a period of time. An analysis is performed between current location of the communications device and location history in connection with communications device. An authentication result is generated based on analysis between current location of communications device and location history in connection with communications device. The authentication result can be used for authenticating entity.
32 Citations
18 Claims
-
1. A computer-implemented method for use in authentication, the method comprising:
-
storing a location history in connection with a communications device associated with an entity, wherein the location history comprises locations visited by the communications device and times associated with the visits to those locations; receiving an authentication request to authenticate the identity of the entity requiring access to a computerized resource; receiving a current location of the communications device associated with the entity and a current time; based on the location history, the current location, and the current time, performing an analysis; based on the analysis, determining a challenge to issue to the entity; and based on the challenge, generating an authentication result, wherein the authentication result can be used for granting the entity access to the computerized resource. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system for use in authentication, the system comprising a processor and memory, wherein the system is configured to:
-
store a location history in connection with a communications device associated with an entity, wherein the location history comprises locations visited by the communications device and times associated with the visits to those locations; receive an authentication request to authenticate the identity of the entity requiring access to a computerized resource; receive a current location of the communications device associated with the entity, and a current time; based on the location history, the current location, and the current time, perform an analysis; based on the analysis, determine a challenge to issue to the entity; and based on the challenge, generate an authentication wherein the authentication result can be used for granting the entity access to the computerized resource. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
Specification