Location-based system permissions and adjustments at an electronic device
First Claim
1. A method of managing permission and authorization for actions and information access on a portable electronic device, comprising:
- detecting an attempt to access the portable electronic device;
determining a security level associated with the detected access attempt based at least in part on a given location characteristic of the portable electronic device;
selecting one of a plurality of usage profiles of the portable electronic device based on the determined security level;
determining that one or more usage characteristics associated with the detected attempt do not conform with the selected usage profile of the portable electronic device, the selected usage profile including one or more pre-defined usages of the portable electronic device, each pre-defined usage associated with a location characteristic of the portable electronic device;
responsive to the determination that the one or more usage characteristics do not conform with the selected usage profile, performing an authentication procedure to authorize the detected attempt, wherein a type of authentication required by the authentication procedure is variable based on the determined security level;
responsive to authorizing the detected attempt, updating the selected usage profile to include the one or more usage characteristics among the pre-defined usages for the selected usage profile; and
permitting access to the portable electronic device.
1 Assignment
0 Petitions
Accused Products
Abstract
Securing access to a portable electronic device (PED), securing e-commerce transactions at an electronic device (ED) and dynamically adjusting system settings at a PED are disclosed. In an example, usage or mobility characteristics of the PED or ED (e.g., a location of the ED or PED, etc.) are compared with current parameters of the PED or ED. A determination as to whether to permit an operation (e.g., access, e-commerce transaction, etc.) at the ED or PED can be based at least in part upon a degree to which the current parameters conform with the usage or mobility characteristics. In another example, at least a current location of a PED can be used to determine which system settings to load at the PED.
83 Citations
28 Claims
-
1. A method of managing permission and authorization for actions and information access on a portable electronic device, comprising:
-
detecting an attempt to access the portable electronic device; determining a security level associated with the detected access attempt based at least in part on a given location characteristic of the portable electronic device; selecting one of a plurality of usage profiles of the portable electronic device based on the determined security level; determining that one or more usage characteristics associated with the detected attempt do not conform with the selected usage profile of the portable electronic device, the selected usage profile including one or more pre-defined usages of the portable electronic device, each pre-defined usage associated with a location characteristic of the portable electronic device; responsive to the determination that the one or more usage characteristics do not conform with the selected usage profile, performing an authentication procedure to authorize the detected attempt, wherein a type of authentication required by the authentication procedure is variable based on the determined security level; responsive to authorizing the detected attempt, updating the selected usage profile to include the one or more usage characteristics among the pre-defined usages for the selected usage profile; and permitting access to the portable electronic device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A portable electronic device, comprising:
-
a processor configured to detect an attempt to access the portable electronic device; the processor configured to determine a security level associated with the detected access attempt based at least in part on a given location characteristic of the portable electronic device; logic for selecting one of a plurality of usage profiles of the portable electronic device based on the determined security level; the processor configured to determine that usage characteristics associated with the detected attempt do not conform with the selected usage profile, the selected usage profile including one or more pre-defined usages of the portable electronic device, each pre-defined usage associated with a location characteristic of the portable electronic device; logic for performing, responsive to the determination that the usage characteristics do not conform with the selected usage profile, an authentication procedure to authorize the detected attempt, wherein a type of authentication required by the authentication procedure is variable based on the determined security level; logic for updating, responsive to authorizing the detected attempt, the selected usage profile to include the one or more usage characteristics among the pre-defined usages for the selected usage profile; and logic for permitting access to the portable electronic device. - View Dependent Claims (21, 22)
-
-
23. A portable electronic device, comprising:
-
a processor configured to detect an attempt to access the portable electronic device; the processor configured to determine a security level associated with the detected access attempt based at least in part on a given location characteristic of the portable electronic device; the processor configured to select one of a plurality of usage profiles of the portable electronic device based on the determined security level; the processor configured to determine that usage characteristics associated with the detected attempt do not conform with the selected usage profile, the selected usage profile including one or more pre-defined usages of the portable electronic device, each pre-defined usage associated with a location characteristic of the portable electronic device; the processor configured to perform, responsive to the determination that the usage characteristics do not conform with the selected usage profile, an authentication procedure to authorize the detected attempt, wherein a type of authentication required by the authentication procedure is variable based on the determined security level; the processor configured to update, responsive to authorizing the detected attempt, the selected usage profile to include the one or more usage characteristics among the pre-defined usages for the selected usage profile; and the processor configured to permit access to the portable electronic device. - View Dependent Claims (24, 25)
-
-
26. A non-transitory computer-readable medium comprising instructions, which, when executed by a portable electronic device, cause the portable electronic device to perform operations, the instructions comprising:
-
program code to detect an attempt to access the portable electronic device; program code to determine a security level associated with the detected access attempt based at least in part on a given location characteristic of the portable electronic device; program code to select one of a plurality of usage profiles of the portable electronic device based on the determined security level; program code to determine that one or more usage characteristics associated with the detected attempt do not conform with the selected usage profile of the portable electronic device, the selected usage profile including one or more pre-defined usages of the portable electronic device, each pre-defined usage associated with a location characteristic of the portable electronic device; program code to perform, responsive to the determination that the one or more usage characteristics do not conform with the selected usage profile, an authentication procedure to authorize the detected attempt, wherein a type of authentication required by the authentication procedure is variable based on the determined security level; program code to update, responsive to authorizing the detected attempt, the selected usage profile to include the one or more usage characteristics among the pre-defined usages for the selected usage profile; and program code to permit access to the portable electronic device. - View Dependent Claims (27, 28)
-
Specification