Location as a second factor for authentication
First Claim
1. A method for authenticating a log-in request based on location, the method comprising:
- receiving, with one or more processors, a log-in request from a first user device;
determining, with the one or more processors, a first location of the log-in request received from the first user device;
determining, with the one or more processors, a current location of a registered mobile user device;
computing, with the one or more processors, a distance between the first location of the log-in request and the current location of the registered mobile user device;
determining, with the one or more processors, whether the computed distance exceeds a threshold; and
transmitting, with the one or more processors, a warning notification to the registered mobile user device, the warning notification including the first location of the log-in request received from the first user device responsive to determining that the computed distance exceeds the threshold;
authenticating the log-in request and permitting log-in responsive to determining that the computed distance is within the threshold;
after authenticating the log-in request and permitting log-in, determining a new current location of a registered mobile user device;
computing a second distance between a location where the user logged in and the new current location of the registered mobile user device;
determining that the second distance exceeds a threshold; and
logging-out the user responsive to determining that the second distance exceeds a threshold.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method for authenticating a log-in request based on location using an authentication application. The authentication application includes a processing unit, a location module, an authentication module, a user interface engine, and a notification module. The processing unit receives a log-in request from a third party application. The processing unit also receives a location of the log-in request and a location of a registered user device. The location module computes a distance between the location of the log-in request and the location of the registered user device. The authentication module determines whether the computed distance exceeds a threshold. The authentication module authenticates the log-in request responsive to determining that the computed distance is within or less than the threshold. The authentication module denies authentication to the log-in request responsive to determining that the computed distance exceeds the threshold.
-
Citations
20 Claims
-
1. A method for authenticating a log-in request based on location, the method comprising:
-
receiving, with one or more processors, a log-in request from a first user device; determining, with the one or more processors, a first location of the log-in request received from the first user device; determining, with the one or more processors, a current location of a registered mobile user device; computing, with the one or more processors, a distance between the first location of the log-in request and the current location of the registered mobile user device; determining, with the one or more processors, whether the computed distance exceeds a threshold; and transmitting, with the one or more processors, a warning notification to the registered mobile user device, the warning notification including the first location of the log-in request received from the first user device responsive to determining that the computed distance exceeds the threshold; authenticating the log-in request and permitting log-in responsive to determining that the computed distance is within the threshold; after authenticating the log-in request and permitting log-in, determining a new current location of a registered mobile user device; computing a second distance between a location where the user logged in and the new current location of the registered mobile user device; determining that the second distance exceeds a threshold; and logging-out the user responsive to determining that the second distance exceeds a threshold. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for authenticating a log-in request based on location, the system comprising:
-
one or more processing devices; a memory coupled to the processing devices; a processing unit stored on the memory and executable by the one or more processing devices, the processing unit for receiving a log-in request from a first user device, determining a first location of the log-in request received from the first user device and determining a current location of a registered mobile user device and determining a new current location of a registered mobile user device; a location module stored on the memory and executable by the one or more processing devices, the location module coupled to the processing unit for computing a distance between the first location of the log-in request and the current location of the registered mobile user device, and computing a second distance between a location where the user logged in and the new current location of the registered mobile user device; and an authentication module stored on the memory and executable by the one or more processing devices, the authentication module coupled to the location module for determining whether the computed distance exceeds a threshold, the authentication module authenticating the log-in request and permitting log-in responsive to determining that the computed distance is within the threshold, determining that the second distance exceeds a threshold; and
logging-out the user responsive to determining that the second distance exceeds a threshold; anda notification module stored on the memory and executable by the one or more processing devices, the notification module coupled to the authentication module for transmitting a warning notification to the registered mobile user device, the warning notification including the first location of the log-in request received from the first user device responsive to determining that the computed distance exceeds the threshold. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A computer program product comprising a non-transitory computer useable medium including a computer readable program, wherein the computer readable program when executed on a computer causes the computer to:
-
receive a log-in request from a first user device; determine a first location of the log-in request received from the first user device; determine a current location of a registered mobile user device; compute a distance between the first location of the log-in request and the current location of the registered mobile user device; determine whether the computed distance exceeds a threshold; and transmitting a warning notification to the registered mobile user device, the warning notification including the first location of the log-in request received from the first user device responsive to determining that the computed distance exceeds the threshold; authenticate the log-in request and permitting log-in responsive to determining that the computed distance is within the threshold; after authentication of the log-in request and log-in, determine a new current location of a registered mobile user device; compute a second distance between a location where the user logged in and the new current location of the registered mobile user device; determine that the second distance exceeds a threshold; and log-out the user responsive to determining that the second distance exceeds a threshold. - View Dependent Claims (17, 18, 19, 20)
-
Specification