Social and proximity based access control for mobile applications
First Claim
Patent Images
1. A method for proximity-based access control, comprising:
- determining whether a distance from a first mobile device to each of one or more safe mobile devices falls below a threshold distance, wherein determining whether the distance between each of the safe mobile devices and the first mobile device falls below the threshold distance comprises receiving an identifier and a signal strength magnitude from each of the safe mobile devices;
determining whether a number of safe mobile devices within the threshold distance exceeds a safe gathering threshold with a processor;
activating a safe gathering policy in accordance with the safe gathering threshold that decreases a security level in the first mobile device; and
periodically verifying that the number of safe mobile devices exceeds the safe gathering threshold and, if not, deactivating the safe gathering policy.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems for proximity-based access control include determining whether a distance from a first mobile device to each of one or more safe mobile devices falls below a threshold distance; determining whether a number of safe mobile devices within the threshold distance exceeds a safe gathering threshold with a processor; and activating a safe gathering policy in accordance with the safe gathering threshold that decreases a security level in the first mobile device.
-
Citations
12 Claims
-
1. A method for proximity-based access control, comprising:
-
determining whether a distance from a first mobile device to each of one or more safe mobile devices falls below a threshold distance, wherein determining whether the distance between each of the safe mobile devices and the first mobile device falls below the threshold distance comprises receiving an identifier and a signal strength magnitude from each of the safe mobile devices; determining whether a number of safe mobile devices within the threshold distance exceeds a safe gathering threshold with a processor; activating a safe gathering policy in accordance with the safe gathering threshold that decreases a security level in the first mobile device; and periodically verifying that the number of safe mobile devices exceeds the safe gathering threshold and, if not, deactivating the safe gathering policy. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method for proximity-based access control, comprising:
-
determining whether a distance from a first mobile device to each of one or more safe mobile devices falls below a threshold distance, wherein the determining whether the distance between each of the one or more safe mobile devices and the first mobile device falls below the threshold distance comprises receiving an identifier and a signal strength magnitude from each of the one or more safe mobile devices; determining whether a number of safe mobile devices within the threshold distance exceeds a safe gathering threshold with a processor; activating a safe gathering policy in accordance with the safe gathering threshold that decreases a security level in the first mobile device that implements one or more authentication schemes that are less strict than a default authentication scheme; and periodically verifying that the number of safe mobile devices exceeds the safe gathering threshold and, if not, deactivating the safe gathering policy.
-
-
12. A method for proximity-based access control, comprising:
-
determining whether a distance from a first mobile device to each of one or more safe mobile devices falls below a threshold distance, wherein determining whether the distance between a safe mobile device and the first mobile device falls below a threshold comprises receiving an identifier and a signal strength magnitude from one or more of the safe mobile devices; determining whether a number of safe mobile devices within the threshold distance exceeds a safe gathering threshold with a processor; activating a safe gathering policy in accordance with the safe gathering threshold that decreases a security level in the first mobile device; and periodically verifying that the number of safe mobile devices exceeds the safe gathering threshold and, if not, deactivating the safe gathering policy.
-
Specification