Systems and methods for authenticating a user of a computer application, network, or device using a wireless device
First Claim
Patent Images
1. A method comprising:
- a) obtaining a location of a wireless device, the wireless device being in communication with a mobile access point via a short range wireless connection;
b) determining, using a computerized authentication system, whether the wireless device is authorized based on a previously registered association between a wireless device identifier associated with the wireless device and an application identifier associated with an application;
c) approving a user to use the application using the computerized authentication system based on a predetermined location criterion related to one or more of the obtained wireless device location or a location of the mobile access point, when the wireless device is authorized; and
d) producing an indication on one or more of the mobile access point or the wireless device that the user has been authenticated when the user was approved using the computerized authentication system,wherein the predetermined location criterion includes determining that the wireless device is within a predetermined distance of the mobile access point.
0 Assignments
0 Petitions
Accused Products
Abstract
A method and system for authenticating a user includes providing an invocation element capable of being activated by a single user action, receiving an indication that the invocation element has been activated, obtaining a location of a wireless device associated with the user, determining whether the wireless device is associated with an authorized user, approving the user to use the application based on a predetermined location criterion, and producing an indication that the user has been authenticated.
-
Citations
20 Claims
-
1. A method comprising:
-
a) obtaining a location of a wireless device, the wireless device being in communication with a mobile access point via a short range wireless connection; b) determining, using a computerized authentication system, whether the wireless device is authorized based on a previously registered association between a wireless device identifier associated with the wireless device and an application identifier associated with an application; c) approving a user to use the application using the computerized authentication system based on a predetermined location criterion related to one or more of the obtained wireless device location or a location of the mobile access point, when the wireless device is authorized; and d) producing an indication on one or more of the mobile access point or the wireless device that the user has been authenticated when the user was approved using the computerized authentication system, wherein the predetermined location criterion includes determining that the wireless device is within a predetermined distance of the mobile access point. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computerized authentication system comprising a processor, and a non-transitory computer readable medium coupled to the processor, the non-transitory computer readable medium comprising code, executable by the processor, to implement a method comprising:
-
a) obtaining a location of a wireless device, the wireless device being in communication with a mobile access point via a short range wireless connection; b) determining whether the wireless device is authorized based on a previously registered association between a wireless device identifier associated with the wireless device and an application identifier associated with an application using the computerized authentication system; c) approving a user to use the application using the computerized authentication system based on a predetermined location criterion related to one or more of the obtained wireless device location or a location of the mobile access point, when the wireless device is authorized; and d) producing an indication on one or more of the mobile access point or the wireless device that the user has been authenticated when the user was approved using the computerized authentication system, wherein the predetermined location criterion includes determining that the wireless device is within a predetermined distance of the mobile access point. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification