Mobile device security
First Claim
1. A non-transitory computer-implemented method comprising:
- under control of one or more computer systems configured with executable instructions, determining multiple different geolocations of a mobile device over time;
storing individual ones of the geolocations in association with a time at which the individual ones of the geolocations were detected to create a geolocation signature for the mobile device;
comparing a current geolocation of the mobile device at a particular time with a geolocation for the particular time stored in the geolocation signature to determine if the current geolocation varies from the geolocation for the particular time stored in the geolocation signature by more than a threshold amount; and
initiating a security event in response to the current geolocation varying from the geolocation for the particular time stored in the geolocation signature by more than the threshold amount.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques for providing friction-free transactions using geolocation and user identifiers are described herein. These techniques may ascertain a user'"'"'s location based on a location of a mobile device. A transaction between the user and a merchant may be completed with zero or minimal input from the user based on the geolocation of the mobile device and the user identifiers. In some implementations, a transaction initiated earlier is completed when the mobile device arrives at the merchant. Additionally, a parent-child or similar relationship may be established between multiple devices. Security on the mobile device based may be provided by biometric identification and calculation of variance from regular movement patterns. Advertisements may be sent to the mobile device based on bids from merchants near to the mobile device. Promotions may be sent to the mobile device when more than a threshold number of mobile devices are located at the same merchant.
285 Citations
20 Claims
-
1. A non-transitory computer-implemented method comprising:
-
under control of one or more computer systems configured with executable instructions, determining multiple different geolocations of a mobile device over time; storing individual ones of the geolocations in association with a time at which the individual ones of the geolocations were detected to create a geolocation signature for the mobile device; comparing a current geolocation of the mobile device at a particular time with a geolocation for the particular time stored in the geolocation signature to determine if the current geolocation varies from the geolocation for the particular time stored in the geolocation signature by more than a threshold amount; and initiating a security event in response to the current geolocation varying from the geolocation for the particular time stored in the geolocation signature by more than the threshold amount. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A mobile device comprising:
-
one or more processors; a wireless network interface operatively associated with the one or more processors; a memory operatively associated with the one or more processors and comprising; a security module configured to; create a geolocation signature of the mobile device over time by storing a series of geolocations with a series of time points; compare a current geolocation of the mobile device at a particular time with a geolocation for the particular time stored in the geolocation signature to determine if the current geolocation varies from the geolocation for the particular time stored in the geolocation signature by more than a threshold amount; and initiate a security event in response to the current geolocation varying from the geolocation for the particular time stored in the geolocation signature by more than the threshold amount. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. One or more non-transitory computer-readable storage media storing computer-executable instructions that, when executed by one or more processors, instruct a mobile device to perform acts comprising:
-
storing a series of geolocations in association with a series of time points to create a geolocation signature for the mobile device; comparing a current geolocation of the mobile device at a particular time with a geolocation for the particular time stored in the geolocation signature to determine if the current geolocation varies from the geolocation for the particular time stored in the geolocation signature by more than a threshold amount; and initiating a security event in response to the current geolocation varying from the geolocation for the particular time stored in the geolocation signature by more than the threshold amount. - View Dependent Claims (17, 18, 19, 20)
-
Specification