Authentication based on geo-location history
First Claim
1. A method comprising:
- determining a first geo-location history of a wireless device based on a signal received from the wireless device, the signal indicating a device identifier associated with the wireless device and a first geo-location associated with the device identifier, the first geo-location corresponding to a previous point in time;
sending an authentication challenge to the wireless device, the authentication challenge comprising a question about a second geo-location history of a user of the wireless device;
receiving a response to the authentication challenge, wherein the response is provided by the user and specifies a second geo-location; and
determining whether the user is successfully authenticated based on a comparison of the first geo-location history of the wireless device with the second geo-location history of the user, wherein determining whether the user is successfully authenticated is further based on a distance between the first geo-location and the second geo-location.
28 Assignments
0 Petitions
Accused Products
Abstract
Methods and apparatus are disclosed for authenticating a user based on the geo-location history of a geo-location-enabled wireless device (e.g., a GPS-enabled wireless telecommunications terminal, a smart card, an RFID tag, etc.). In a first illustrative embodiment, a user of a geo-location-enabled wireless telecommunications terminal (e.g., a GPS-enabled cell phone, a GPS-enabled notebook computer, etc.) who attempts to access a restricted resource is challenged with one or more questions that are generated from the terminal'"'"'s geo-location history. In a second illustrative embodiment, a user of a data-processing system who attempts to access a restricted resource is asked to provide a username Z. The user is then challenged with one or more questions that are generated from the geo-location history of a wireless device that is associated with username Z (e.g., a cell phone that belongs to the user whose username is Z, etc.).
-
Citations
15 Claims
-
1. A method comprising:
-
determining a first geo-location history of a wireless device based on a signal received from the wireless device, the signal indicating a device identifier associated with the wireless device and a first geo-location associated with the device identifier, the first geo-location corresponding to a previous point in time; sending an authentication challenge to the wireless device, the authentication challenge comprising a question about a second geo-location history of a user of the wireless device; receiving a response to the authentication challenge, wherein the response is provided by the user and specifies a second geo-location; and determining whether the user is successfully authenticated based on a comparison of the first geo-location history of the wireless device with the second geo-location history of the user, wherein determining whether the user is successfully authenticated is further based on a distance between the first geo-location and the second geo-location. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A non-transitory computer-readable storage device having stored therein instructions which, when executed by a processor, cause the processor to perform operations comprising:
-
determining a first geo-location history of a wireless device based on a signal received from the wireless device, the signal indicating a device identifier associated with the wireless device and a first geo-location associated with the wireless device, the first geo-location corresponding to a previous point in time; sending an authentication challenge to the wireless device, the authentication challenge comprising a question about a second geo-location history of a user of the wireless device; receiving a response to the authentication challenge, wherein the response is provided by the user and specifies a second geo-location; and determining whether the user is successfully authenticated based on a comparison of the first geo-location history of the wireless device with the second geo-location history of the user, wherein determining whether the user is successfully authenticated is further based on a distance between the first geo-location and the second geo-location. - View Dependent Claims (8, 9, 10)
-
-
11. A system comprising:
a computer that performs operations comprising; determining a first geo-location history of a wireless device based on a signal received from the wireless device, the signal indicating a device identifier associated with the wireless device and a first geo-location associated with the device identifier, the first geo-location corresponding to a previous point in time; transmitting to the wireless device an authentication challenge requesting information about a second geo-location history associated with a user of the wireless device; receiving an answer to the authentication challenge, wherein the answer specifies a second geo-location; sending the answer to a separate device as part of a request for authentication; and receiving a response to the request for authentication from the separate device, the response being based on a comparison of the first geo-location history of the wireless device with the second geo-location history of the user, and being based on a distance between the first geo-location and the second geo-location. - View Dependent Claims (12, 13, 14, 15)
Specification