System and method for dynamic geo-fencing
First Claim
Patent Images
1. A method comprising:
- establishing a geo-fencing environment for an information handling system, wherein the information handling system comprises a mobile device;
monitoring, by the information handling system, a stream of context information;
determining, by the information handling system, whether the geo-fencing environment should be dynamically modified responsive to new context information in the stream, wherein the new context information comprises security-capability information identifying a security tier of a user of the information handling system;
the information handling system dynamically modifying the geo-fencing environment responsive to the determining so indicating;
wherein the establishing comprises utilizing a profile, the profile comprising one or more definitional rules and one or more action rules;
wherein the dynamically modifying comprises;
creating a new geo-fence definition and identifying an associated rule set for the new geo-fence definition, wherein each new geo-fence definition comprises a rule set that is distinct from the rule set prior to the modifying the geo-fencing environment; and
taking the one or more actions, wherein the taking the one or more actions comprises;
locking the information handling system from access; and
reporting a possible theft of the information handling system to a service provider.
14 Assignments
0 Petitions
Accused Products
Abstract
In one embodiment, a method includes establishing a geo-fencing environment for the information handling system. The method further includes monitoring a stream of context information. In addition, the method includes determining whether the geo-fencing environment should be dynamically modified responsive to new context information in the stream. Furthermore, the method includes dynamically modifying the geo-fencing environment responsive to the determining so indicating.
-
Citations
14 Claims
-
1. A method comprising:
-
establishing a geo-fencing environment for an information handling system, wherein the information handling system comprises a mobile device; monitoring, by the information handling system, a stream of context information; determining, by the information handling system, whether the geo-fencing environment should be dynamically modified responsive to new context information in the stream, wherein the new context information comprises security-capability information identifying a security tier of a user of the information handling system; the information handling system dynamically modifying the geo-fencing environment responsive to the determining so indicating; wherein the establishing comprises utilizing a profile, the profile comprising one or more definitional rules and one or more action rules; wherein the dynamically modifying comprises; creating a new geo-fence definition and identifying an associated rule set for the new geo-fence definition, wherein each new geo-fence definition comprises a rule set that is distinct from the rule set prior to the modifying the geo-fencing environment; and taking the one or more actions, wherein the taking the one or more actions comprises; locking the information handling system from access; and reporting a possible theft of the information handling system to a service provider. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An information handling system comprising:
a processing unit, wherein the processing unit is operable to perform a method comprising; establishing a geo-fencing environment for the information handling system, wherein the information handling system comprises a mobile device; monitoring a stream of context information for the information handling system; determining whether the geo-fencing environment should be dynamically modified responsive to new context information in the stream, wherein the new context information comprises security-capability information identifying a security tier of a user of the information handling system; dynamically modifying the geo-fencing environment responsive to the determining so indicating; and wherein the establishing comprises utilizing a profile, the profile comprising one or more definitional rules and one or more action rules; wherein the dynamically modifying comprises; creating a new geo-fence definition and identifying an associated rule set for the new geo-fence definition, wherein each new geo-fence definition comprises a rule set that is distinct from the rule set prior to the modifying the geo-fencing environment; and taking the one or more actions, wherein the taking the one or more actions comprises; locking the information handling system from access; and reporting a possible theft of the information handling system to a service provider. - View Dependent Claims (9, 10, 11, 12, 13)
-
14. A non-transitory computer-program product comprising a computer-usable medium having computer-readable program code embodied therein, the computer-readable program code adapted to be executed to implement a method comprising:
-
establishing a geo-fencing environment for an information handling system, wherein the information handling system comprises a mobile device; monitoring a stream of context information; determining, by the information handling system, whether the geo-fencing environment should be dynamically modified responsive to new context information in the stream, wherein the new context information comprises security-capability information identifying a security tier of a user of the information handling system; the information handling system dynamically modifying the geo-fencing environment responsive to the determining so indicating; wherein the establishing comprises utilizing a profile, the profile comprising one or more definitional rules and one or more action rules; wherein the dynamically modifying comprises; creating a new geo-fence definition and identifying an associated rule set for the new geo-fence definition, wherein each new geo-fence definition comprises a rule set that is distinct from the rule set prior to the modifying the geo-fencing environment; and taking the one or more actions, wherein the taking the one or more actions comprises; locking the information handling system from access; and reporting a possible theft of the information handling system to a service provider.
-
Specification