Location based security rules are provided for preventing unauthorized access to a device, application, system, content, and/or network, etc. The location-based security rules enable a user, computing device, system, etc. to access the requested item or information when the user provides proper iden
Location based security rules are provided for preventing unauthorized access to a device, application, system, content, and/or network, etc. The location-based security rules enable a user, computing device, system, etc. to access the requested item or information when the user provides proper identification information. The proper identification information is based in part on the location of the user and/or the user's access request.
대표청구항▼
What is claimed is: 1. A computer-readable medium containing computer readable instruction when executed by a computing device perform a method of securely accessing information, the method comprising: receiving an access request for information from a location; receiving location information assoc
What is claimed is: 1. A computer-readable medium containing computer readable instruction when executed by a computing device perform a method of securely accessing information, the method comprising: receiving an access request for information from a location; receiving location information associated with the location; comparing the location information to a database of predefined locations; requiring a location-based input based on a security rule associated with a comparison of the location information to the predefined locations of the database; and providing access to the information if the location-based input satisfies an acceptable response, wherein the acceptable response provides at least one proper identifier that is dependant upon the location and the security rule. 2. The computer-readable medium of claim 1, the method further comprising administering a first location-based input by a local user and a second location-based input by a remote administrator. 3. The computer-readable medium of claim 1, the method further comprising enabling a plurality of location-based security rules, each location-based security rule corresponding to a device, network, system, application, transaction, and content associated with the access request. 4. The computer-readable medium of claim 1, the method further comprising requiring a biometric identifier when the comparison yields that the location requires a high level of security. 5. The computer-readable medium of claim 1, the method further comprising requiring a corporate identification (ID) and password when the comparison yields the location of an office location. 6. The computer-readable medium of claim 1, the method further comprising authenticating the location information. 7. The computer-readable medium of claim 1, the method further comprising informing an administrator when the location-based input is incorrect. 8. The computer-readable medium of claim 1, the method further comprising utilizing one of at least an iris scanning application, face recognition application, voice recognition application, hand/finger recognition application, fingerprint recognition application, RFID tag application, and/or smartcard application to verify the access request when the comparison yields a location that requires a high level of security. 9. The computer-readable medium of claim 1, the method further comprising requiring a user ID when the comparison yields the location of a home location. 10. A computer-readable medium having computer executable instructions when executed by a computer perform a method of secure access to information, the method comprising: identifying a location associated with an access request; and providing a number of location-based security rules requiring user specific identifiers based on the location of the access request, the security rules, and content of the access request, wherein each location-based security rule is associated with at least one of an access request and location of the access request. 11. The computer-readable medium of claim 10, the method further comprising requiring a biometric identifier when the location of the access request requires a high level of security. 12. The computer-readable medium of claim 10, the method further comprising requiring a corporate ID and password when the location of the access request corresponds to a corporate office. 13. The computer-readable medium of claim 10, the method further comprising utilizing one of at least an iris scanning application, face recognition application, voice recognition application, hand/finger recognition application, fingerprint recognition application, RFID tag application, and/or smartcard application to verify the access request when the location of the access request requires a high level of security. 14. The computer-readable medium of claim 10, the method further comprising requiring a user ID when the location of the access request corresponds to a home location. 15. The computer-readable medium of claim 10, the method further comprising authenticating the location of the access request. 16. The computer-readable medium of claim 10, wherein each location-based security rule corresponds to a device, network, system, application, transaction, or content associated with the access request. 17. The computer-readable medium of claim 10, the method further comprising informing an administrator when at least one of the location-based security rules is violated. 18. A system including a processor for executing computer executable instructions for performing a method of enabling access to information, the system comprising: means for examining an access request for the information, means for identifying a location associated with the access request, means for providing a level of security including requiring user specific identifiers based in part on the location, wherein the level of security is based at least in part on the location associated with the access request; and means for providing access to the information configured to provide access if the identifier is proper, wherein the identifier is dependant upon the location and a security rule. 19. The system of claim 18, further comprising means for enabling one or more location-based security rules, each location-based security rule corresponding to a device, network, system, application, transaction, or content associated with the access request. 20. The system of claim 18, further comprising utilizing one of at least an iris scanning application, face recognition application, voice recognition application, hand/finger recognition application, fingerprint recognition application, RFID tag application, and/or smartcard application when the access request requires a high level of security.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (122)
Worthy David G. ; Dubrall Danny Lee, Active system and method for remotely identifying RF broadcast stations.
Serbetcioglu Bekir (Huntington CT) Bagoren Ilhan (Beacon Falls CT) Duman Osman (Norwood MA) Ozulkulu Esref (Monroe CT), Caller name and identification communication system with caller screening option.
Bergh Christopher P. ; Metral Max E. ; Ritter David Henry ; Sheena Jonathan Ari ; Sullivan James J., Distributed system for facilitating exchange of user information and opinion using automated collaborative filtering.
Morscheck William F. ; Miller Kenneth W. ; Ryan Thomas J. ; Ohlemacher David M. ; Russell C. Thomas ; Burgbacher Mark A. ; Schweikert Christopher L., Forms order entry system.
Brett B. Stewart ; James W. Thompson, Geographic-based communication service system with more precise determination of a user's known geographic location.
Comer Edward I. (Marietta GA), Interactive roamer contact system for cellular mobile radiotelephone network for automatically initiating a communicatio.
Fuller Robert M. (Redmond WA) Epler Frederick A. (Issaquah WA) Manowski Maxwell E. (Enumclaw WA), Method and apparatus for processing telephone calls and delivering information about the calls to a pager.
Lee, Jeffrey S.; Gubka, Steven S.; Hede, William S.; Weisshaar, Bernhard P.; Wharton, Kenneth E., Method and apparatus for saving enhanced information contained in content sent to a wireless communication device.
Sandhu, Kulbir S.; Fan, Roderic C.; Mleczko, David; Nguyen, Kenny; Fan, Carey, Method and system for a plurality of mobile units to locate one another.
Chang Donald C. D. ; Yung Kar W. ; Nunan William J. ; Cheng David C. ; Shuman Bruce E., Method and system for determining a position of a communication satellite utilizing two-way ranging.
Cromer, Daryl C.; Rhoades, David B.; Locker, Howard J.; Ward, James P.; Kern, Eric R.; Ellison, Brandon J.; Dayan, Richard A., Method and system for providing protection against theft and loss of a portable computer system.
Emery Mark J. ; Tucker Brenda N. ; Schwartz Laurie D., Method of personal communications service using wireline/wireless integration detecting a predetermined event during process of a call.
Duvall, William; DeMille, Rod, Methods of and system for portable cellular phone voice communication and positional location data communication using the cellular phone network control channel.
Zhang, Zeeman; Knoerle, Joseph, Network and method for providing an automatic recall telecommunications service with automatic speech recognition capability.
Steiner Glenn C. (Los Altos CA) Banta Lloyd H. (Palo Alto CA) Trask Matthew M. (San Jose CA), Personal digital location assistant including a memory cartridge, a GPS smart antenna and a personal computing device.
Thebaut Suzanne ; Scott Walter ; Rustici Eric ; Kaikini Prasan ; Lewis Lundy ; Malik Rajiv ; Sycamore Steve ; Dev Roger ; Ibe Oliver ; Aggarwal Ajay ; Wohlers Todd, Policy management and conflict resolution in computer networks.
Spielman, Brenda Gates; Dodrill, Lewis Dean; Joshi, Satish; Parasu, Nagendran; Lockwood, Robert James, Scalable IP-based notification architecture for unified messaging.
Hudson Jerome D. ; Champagne Jean-Paul,FRX ; Galindo Mary A. ; Hickerson Cynthia M. K. ; Hickman Donna R. ; Lockhart Robert P. ; Saddler Nancy B. ; Stange Patricia A., System and method for accessing enterprise-wide resources by presenting to the resource a temporary credential.
Yost, George; Harper, Clinton E.; Kim, Shawn, System and method for profiling the location of mobile radio traffic in a wireless communications network.
Gabber Eran ; Gibbons Phillip P. ; Matias Yossi ; Mayer Alain J., System and method for providing anonymous personalized browsing by a proxy system in a network.
Schuster, Guido M.; Grabiec, Jacek A.; Sidhu, Ikhlaq S.; Mahler, Jerry J., System and method for providing user-configured telephone service in a data network telephony system.
Roberts Richard N. ; Bartels Todd August ; McCarthy Terrence J. ; Heinmiller Wayne Robert ; Brand Rodney T ; Moore Leslie Bernard ; Donoso Carlos H ; Ford Kara Elisia, System and method for routing a call to a called party's landline or wireless communication unit.
Bandera Daniel Quinto ; Bregman Mark F. ; Gopal Ajei S. ; Singhal Sandeep, Systems, methods and computer program products for providing time and location specific advertising via the internet.
Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
Tajima Mie,JPX ; Sugita Takehiro,JPX ; Nakata Junichi,JPX, Telecommunication system, radio base station thereof, and portable telecommunication terminal thereof.
Connolly David A. (Arlington Heights IL) Holt Lewis (Barrington IL) Westerhold Morris W. (Naperville IL) Zellner Samuel N. (Hoffman Estates IL) Ciannella ; Jr. Frank A. (South Holland IL) Czaplewski , Wireless digital personal communications system having voice/data/image two-way calling and intercell hand off provided.
Rachabathuni, Sailesh; Griffiths, Jonathan; Rankin, Paul John, Wireless system, a method of selecting an application while receiving application specific messages and user location method using user location awareness.
Evans, Ethan Zane; Markley, David Allen; Ryder, Paul Allan; Roque, Miguel Azancot; Adkins, III, James Newton; Paleja, Ameesh; Lavin, Christopher Lawrence; Chein, Jason Shih Shen; Frazzini, Michael Anthony; Rubenson, Aaron Curtis, Developing versions of applications based on application fingerprinting.
Moton, Jr., Robert T.; Enzmann, Mark J.; Zellner, Samuel N, System and method for remote control of appliances utilizing mobile location-based applications.
Moton, Jr., Robert T.; Enzmann, Mark J.; Zellner, Samuel N., System and method for remote control of appliances utilizing mobile location-based applications.
Moton, Jr., Robert T.; Enzmann, Mark J.; Zellner, Samuel N., System and method for remote control of appliances utilizing mobile location-based applications.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.