Determining authentication challenge timing and type
First Claim
1. A method comprising:
- determining a first location of a first wireless device at a point in time;
determining input capabilities of the first wireless device;
based on the first location of the first wireless device, determining a second location of a second wireless device relative to the first location of the first wireless device at the point in time; and
generating, via a processor, an authentication challenge, wherein a type of the authentication challenge is based on the second location of the second wireless device relative to the first location of the first wireless device, and based on the input capabilities of the first wireless device.
24 Assignments
0 Petitions
Accused Products
Abstract
An apparatus and methods are disclosed for authenticating users of wireless telecommunications terminals. In particular, the present invention enables the timing and type of authentication challenges to vary based on one or more of: the user'"'"'s current geo-location, the current day and time, the presence or absence of other nearby users, and the identity of any nearby users. In accordance with the illustrative embodiment, the re-authentication time period (i.e., the length of time between authenticating and re-authenticating a user) and the authentication challenge type (e.g., username/password, fingerprint recognition, etc.) can be determined based on these factors. The present invention is advantageous in that it enables the shortening of the re-authentication time and the selection of a more secure type of authentication challenge when it is more likely that a user'"'"'s wireless telecommunications terminal might be accidentally left behind or stolen.
-
Citations
14 Claims
-
1. A method comprising:
-
determining a first location of a first wireless device at a point in time; determining input capabilities of the first wireless device; based on the first location of the first wireless device, determining a second location of a second wireless device relative to the first location of the first wireless device at the point in time; and generating, via a processor, an authentication challenge, wherein a type of the authentication challenge is based on the second location of the second wireless device relative to the first location of the first wireless device, and based on the input capabilities of the first wireless device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system comprising:
-
a processor; and a computer-readable storage medium having stored therein instructions which, when executed by the processor, cause the processor to perform operations comprising; determining a first location of a first wireless device at a point in time; determining input capabilities of the first wireless device; based on the first location of the first wireless device, determining a second location of a second wireless device relative to the first location of the first wireless device at the point in time; and generating an authentication challenge, wherein a type of the authentication challenge is based on the second location of the second wireless device relative to the first location of the first wireless device, and based on the input capabilities of the first wireless device. - View Dependent Claims (10, 11)
-
-
12. A method comprising:
generating, via a processor, an authentication challenge for a current user of a first wireless device, wherein the first wireless device is registered to the current user, wherein the authentication challenge is generated based on determined input capabilities of the first wireless device, and wherein a type of the authentication challenge is based on whether there is a second wireless device that; (i) is in a vicinity of the first wireless device, and (ii) is registered to a different user than the current user in a user-terminal registration store. - View Dependent Claims (13, 14)
Specification