Location-based security rules
First Claim
1. A computer-implemented method, for providing secure access control in connection with a requested resource, based on a characteristic of a request to access the resource, location information for a mobile communication device associated with the request, and a quality of the location information, comprising:
- receiving, at a tangible, non-transitory computing component, the request to access the resource from a user associated with the mobile communication device;
determining, at the tangible, non-transitory computing component, that a security trigger has occurred;
in response to determining that the security trigger has occurred, the tangible, non-transitory computing component requesting the location information for the mobile communication device associated with the request;
receiving, at the tangible, non-transitory computing component, the location information for the mobile communication device associated with the request;
determining a quality of a location source providing the location information;
in response to (a) receiving the request, (b) determining that the security trigger has occurred, and (c) receiving the location information, the tangible, non-transitory computing component determining a pre-established access rule, the determining the pre-established access rule including identifying the pre-established access rule based on each of (i) a characteristic of the request to access the resource, (ii) the location information for the mobile communication device associated with the request, and (iii) the quality of the location source providing the location information; and
executing a pre-determined security action associated with the pre-established rule determined by the tangible, non-transitory computing component.
6 Assignments
0 Petitions
Accused Products
Abstract
Location based security rules are provided for preventing unauthorized access to a device, application, system, content, and/or network, etc. The location-based security rules enable a user, computing device, system, etc. to access the requested item or information when the user provides proper identification information. The proper identification information is based in part on the location of the user and/or the user'"'"'s access request.
403 Citations
18 Claims
-
1. A computer-implemented method, for providing secure access control in connection with a requested resource, based on a characteristic of a request to access the resource, location information for a mobile communication device associated with the request, and a quality of the location information, comprising:
-
receiving, at a tangible, non-transitory computing component, the request to access the resource from a user associated with the mobile communication device; determining, at the tangible, non-transitory computing component, that a security trigger has occurred; in response to determining that the security trigger has occurred, the tangible, non-transitory computing component requesting the location information for the mobile communication device associated with the request; receiving, at the tangible, non-transitory computing component, the location information for the mobile communication device associated with the request; determining a quality of a location source providing the location information; in response to (a) receiving the request, (b) determining that the security trigger has occurred, and (c) receiving the location information, the tangible, non-transitory computing component determining a pre-established access rule, the determining the pre-established access rule including identifying the pre-established access rule based on each of (i) a characteristic of the request to access the resource, (ii) the location information for the mobile communication device associated with the request, and (iii) the quality of the location source providing the location information; and executing a pre-determined security action associated with the pre-established rule determined by the tangible, non-transitory computing component. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A tangible, non-transitory computer-readable storage medium, for providing secure access control in connection with a requested resource, based on a characteristic of a request to access the resource, location information for a mobile communication device associated with the request, and a quality of the location information, comprising instructions that, when executed by a processor, cause the processor to perform acts including:
-
receiving the request to access the resource from a user associated with the mobile communication device; determining that a security trigger has occurred; in response to determining that the security trigger has occurred, requesting the location information for the mobile communication device associated with the request; receiving the location information for the mobile communication device associated with the request; determining a quality of a location source providing the location information; in response to (a) receiving the request, (b) determining that the security trigger has occurred, and (c) receiving the location information, determining a pre-established access rule, the determining the pre-established access rule including identifying the pre-established access rule based on each of (i) a characteristic of the request to access the resource, (ii) the location information for the mobile communication device associated with the request, and (iii) the quality of the location source providing the location information; and executing a pre-determined security action associated with the pre-established rule. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
Specification