Providing a service based on time and location based passwords
First Claim
1. A method comprising:
- receiving, by a first device, a first password from a second device,the first password being generated based on applying an algorithm to first location information identifying a geographic location of the second device;
receiving, by the first device, second location information identifying the geographic location of the second device;
generating, by the first device, a second password based on applying the algorithm to the second location information identifying the geographic location of the second device;
determining, by the first device, a verification level based on a quantity of characters in the first password that match characters in the second password; and
providing, by the first device, a service to the second device based on the verification level,providing the service including at least one of;
authorizing the second device to access content, orproviding an indication that identifies that the second device is currently located at the geographic location.
1 Assignment
0 Petitions
Accused Products
Abstract
A first device may receive a first password from a second device. The first password may be generated based on first time information and first location information identifying a geographic location of the second device. The first device may, determine a second password based on second time information and second location information identifying the geographic location of the second device. The first device may determine that the second device is located at the geographic location at a particular time when characters in the first password match characters in the second password, and may provide a service based on determining that the second device is located at the geographic location at the particular time.
16 Citations
20 Claims
-
1. A method comprising:
-
receiving, by a first device, a first password from a second device, the first password being generated based on applying an algorithm to first location information identifying a geographic location of the second device; receiving, by the first device, second location information identifying the geographic location of the second device; generating, by the first device, a second password based on applying the algorithm to the second location information identifying the geographic location of the second device; determining, by the first device, a verification level based on a quantity of characters in the first password that match characters in the second password; and providing, by the first device, a service to the second device based on the verification level, providing the service including at least one of; authorizing the second device to access content, or providing an indication that identifies that the second device is currently located at the geographic location. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system comprising:
a first device to; receive, from a second device, a first password, the first password being generated based on applying an algorithm to first geographic location information of the second device and first time information; receive second geographic location information of the second device and second time information; generate a second password based on applying the algorithm to the second geographic location information and the second time information; determine a verification level based on a number of characters in the first password that match characters in the second password; and provide a service to the second device based on the verification level, the first device, when providing the service, is to at least one of; authorize the second device to access content, or provide an indication that identifies that the second device is currently located at a geographic location. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
15. A non-transitory computer-readable medium storing instructions, the instructions comprising:
one or more instructions that, when executed by one or more processors associated with a first device, cause the one or more processors to; receive, from a second device, a first password, the first password being generated based on applying an algorithm to first location information identifying a geographic location of the second device; receive second location information identifying the geographic location of the second device and first time information; generate a second password based on applying the algorithm to the second location information; determine a verification level based on a number of characters in the first password that match characters in the second password; determine whether the second device is located at the geographic location at a particular time based on the first time information; and selectively provide a service to the second device based on the verification level and the first time information, the one or more instructions, when executed by the one or more processors to selectively provide the service, cause the one or more processors to at least one of; selectively authorize the second device to access content, or selectively provide an indication that identifies that the second device is currently located at the geographic location. - View Dependent Claims (16, 17, 18, 19, 20)
Specification