Mobile device security
First Claim
1. A computer-implemented method for initiating a security event in response to a current geolocation varying from a geolocation signature by more than a threshold amount, the computer-implemented method comprising:
- determining, by one or more computing systems, at a plurality of different times and different locations, a geolocation of a mobile device and a timestamp associated with the geolocation to create geolocation data;
creating, by at least one of the one or more computing systems, the geolocation signature for the mobile device based at least in part on the geolocation data;
comparing, by at least one of the one or more computing systems, a current geolocation with the geolocation signature to determine if the current geolocation varies from the geolocation signature by more than a threshold amount; and
initiating, by at least one of the one or more computing systems, a security event in response to the current geolocation varying from the geolocation signature by more than the threshold amount.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques for providing friction-free transactions using geolocation and user identifiers are described herein. These techniques may ascertain a user'"'"'s location based on a location of a mobile device. A transaction between the user and a merchant may be completed with zero or minimal input from the user based on the geolocation of the mobile device and the user identifiers. In some implementations, a transaction initiated earlier is completed when the mobile device arrives at the merchant. Additionally, a parent-child or similar relationship may be established between multiple devices. Security on the mobile device based may be provided by biometric identification and calculation of variance from regular movement patterns. Advertisements may be sent to the mobile device based on bids from merchants near to the mobile device. Promotions may be sent to the mobile device when more than a threshold number of mobile devices are located at the same merchant.
296 Citations
20 Claims
-
1. A computer-implemented method for initiating a security event in response to a current geolocation varying from a geolocation signature by more than a threshold amount, the computer-implemented method comprising:
-
determining, by one or more computing systems, at a plurality of different times and different locations, a geolocation of a mobile device and a timestamp associated with the geolocation to create geolocation data; creating, by at least one of the one or more computing systems, the geolocation signature for the mobile device based at least in part on the geolocation data; comparing, by at least one of the one or more computing systems, a current geolocation with the geolocation signature to determine if the current geolocation varies from the geolocation signature by more than a threshold amount; and initiating, by at least one of the one or more computing systems, a security event in response to the current geolocation varying from the geolocation signature by more than the threshold amount. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer-implemented method comprising:
-
comparing, by at least one of one or more computing systems, a first current geolocation of a first device at a particular time with a second current geolocation of a second device at the particular time; determining, by at least one of the one or more computing systems, that the first current geolocation of the first device exceeds a threshold distance from the second current geolocation of the second device at the particular time; and initiating, by at least one of the one or more computing systems in response to the determining, a security event. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A system for initiating a security event in response to a first current geolocation of a first device exceeding a threshold distance from a second current geolocation of a second device, the system comprising:
-
one or more processors; and memory storing computer readable instructions, that, when executed by the one or more processors cause the one or more processors to; compare a first current geolocation of a first device with a second current geolocation of a second device; determine that the first current geolocation of the first device exceeds a threshold distance of the second current geolocation of the second device; and initiate, in response to the determining, a security event. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification