Mobile device security
First Claim
1. A method comprising:
- receiving, at a mobile device, a radio signal including geographic location information;
storing, at the mobile device, the geographic location information and a timestamp associated with a time of receipt of the radio signal;
receiving, at the mobile device and from a security reader, a request for authentication information for granting access through a physical security checkpoint, wherein a geographic location of the physical security checkpoint is different from a geographic location indicated by the geographic location information;
responsive to the request for the authentication information, providing the security reader with the geographic location information and the timestamp associated with the time of receipt of the radio signal;
modifying access rights of a user of the mobile device at the physical security checkpoint upon determination that the geographic location information and the timestamp associated with the time of receipt of the radio signal satisfy a predetermined criterion;
determining a current time prior to providing the security reader with the geographic location information and the timestamp; and
determining a time difference between the current time and a time of the timestamp, wherein;
the geographic location information is provided to the security reader in response to the time difference being below a threshold time difference, andthe threshold time difference is determined based on a distance or a travel time between the geographic location indicated by the geographic location information and the geographic location of the physical security checkpoint.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods for providing mobile device security are disclosed. In some implementations, a request for access to a security mechanism is received at a user terminal. A short-range radio connection of the user terminal at a time of receiving the request for access is identified responsive to the request. A memory of the user terminal is accessed to determine whether the identified short-range radio connection corresponds to a user-identified secure radio connection. Upon determining that the radio connection corresponds to the user-identified secure radio connection, the user is granted access to the security mechanism without soliciting the user of the user terminal for a predetermined security input. Upon determining that the radio connection does not correspond to the user-identified secure radio connection, the user is solicited for the predetermined security input.
9 Citations
11 Claims
-
1. A method comprising:
-
receiving, at a mobile device, a radio signal including geographic location information; storing, at the mobile device, the geographic location information and a timestamp associated with a time of receipt of the radio signal; receiving, at the mobile device and from a security reader, a request for authentication information for granting access through a physical security checkpoint, wherein a geographic location of the physical security checkpoint is different from a geographic location indicated by the geographic location information; responsive to the request for the authentication information, providing the security reader with the geographic location information and the timestamp associated with the time of receipt of the radio signal; modifying access rights of a user of the mobile device at the physical security checkpoint upon determination that the geographic location information and the timestamp associated with the time of receipt of the radio signal satisfy a predetermined criterion; determining a current time prior to providing the security reader with the geographic location information and the timestamp; and determining a time difference between the current time and a time of the timestamp, wherein; the geographic location information is provided to the security reader in response to the time difference being below a threshold time difference, and the threshold time difference is determined based on a distance or a travel time between the geographic location indicated by the geographic location information and the geographic location of the physical security checkpoint. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method comprising:
-
receiving, at a mobile device, a radio signal including geographic location information; storing, at the mobile device, the geographic location information and a timestamp associated with a time of receipt of the radio signal; receiving, at the mobile device and from a security reader, a request for authentication information for granting access through a physical security checkpoint, wherein a geographic location of the physical security checkpoint is different from a geographic location indicated by the geographic location information; responsive to the request for the authentication information, providing the security reader with the geographic location information and the timestamp associated with the time of receipt of the radio signal; and modifying access rights of a user of the mobile device at the physical security checkpoint upon determination that the geographic location information and the timestamp associated with the time of receipt of the radio signal satisfy a predetermined criterion, wherein; the security reader is provided with the timestamp for verifying, at the security reader, that a time difference between a current time and a time of the timestamp is below a threshold time difference, and the threshold time difference is determined based on a distance or a travel time between the geographic location indicated by the geographic location information and the geographic location of the physical security checkpoint. - View Dependent Claims (7, 8, 9, 10, 11)
-
Specification