Location based security rules are provided for preventing unauthorized access to a device, application, system, content, and/or network, etc. The location-based security rules enable a user, computing device, system, etc. to access the requested item or information when the user provides proper iden
Location based security rules are provided for preventing unauthorized access to a device, application, system, content, and/or network, etc. The location-based security rules enable a user, computing device, system, etc. to access the requested item or information when the user provides proper identification information. The proper identification information is based in part on the location of the user and/or the user's access request.
대표청구항▼
1. A computer-implemented method, for providing secure access control in connection with a requested resource, based on a characteristic of a request to access the resource, location information for a mobile communication device associated with the request, and a quality of the location information,
1. A computer-implemented method, for providing secure access control in connection with a requested resource, based on a characteristic of a request to access the resource, location information for a mobile communication device associated with the request, and a quality of the location information, comprising: receiving, at a tangible, non-transitory computing component, the request to access the resource from a user associated with the mobile communication device;determining, at the tangible, non-transitory computing component, that a security trigger has occurred;in response to determining that the security trigger has occurred, the tangible, non-transitory computing component requesting the location information for the mobile communication device associated with the request;receiving, at the tangible, non-transitory computing component, the location information for the mobile communication device associated with the request;determining a quality of a location source providing the location information;in response to (a) receiving the request, (b) determining that the security trigger has occurred, and (c) receiving the location information, the tangible, non-transitory computing component determining a pre-established access rule, the determining the pre-established access rule including identifying the pre-established access rule based on each of (i) a characteristic of the request to access the resource, (ii) the location information for the mobile communication device associated with the request, and (iii) the quality of the location source providing the location information; andexecuting a pre-determined security action associated with the pre-established rule determined by the tangible, non-transitory computing component. 2. The computer-implemented method of claim 1, the resource comprising at least one of an additional device, an application, a system, content, and a network. 3. The computer-implemented method of claim 1, the pre-established access rule being defined by the user. 4. The computer-implemented method of claim 1, further comprising: determining that the location information indicates a location of the mobile communication device, associated with the request, corresponding to a restricted location;wherein, in response to determining that the location associated with the request corresponds to the restricted location, the executing the pre-determined security action associated with the pre-established rule determined by the tangible, non-transitory computing component includes denying the request. 5. The computer-implemented method of claim 1, the executing comprising using at least one of a biometric identification application, a radio-frequency identification tag application, and a smartcard application to verify the request in response to a determination that the location information indicates that a location of the mobile communication device that requires a high level of security. 6. The computer-implemented method of claim 1, the quality of the location source relating to a certain accuracy of the location information. 7. The computer-implemented method of claim 1, the quality of the location source relating to an authentication process performed in connection with the location information received. 8. The computer-implemented method of claim 1, the pre-determined security action executed (A) allowing access by the user to certain functionality associated with the resource requested while (B) disallowing access by the user to other functionality associated with the resource requested. 9. The computer-implemented method of claim 1, the determining the pre-established access rule further including, in identifying the pre-established rule based on the characteristic of the request to access the resource, identifying the pre-established rule based on content of data sought by the request. 10. The computer-implemented method of claim 1, further comprising: determining that the location information indicates a location of the mobile communication device, associated with the request, corresponding to a restricted location;wherein, in response to determining that the location associated with the request corresponds to the restricted location, the executing the pre-determined security action associated with the pre-established rule determined by the tangible, non-transitory computing component includes undertaking an evasive action including at least one of: erasing a memory location;encrypting data contained within the mobile communication device;encrypting data contained within a system associated with the resource;severing power associated with the mobile communication device;severing power associated with the system associated with the resource;severing a functionality of the mobile communication device; andsevering a functionality of the system associated with the resource. 11. A tangible, non-transitory computer-readable storage medium, for providing secure access control in connection with a requested resource, based on a characteristic of a request to access the resource, location information for a mobile communication device associated with the request, and a quality of the location information, comprising instructions that, when executed by a processor, cause the processor to perform acts including: receiving the request to access the resource from a user associated with the mobile communication device;determining that a security trigger has occurred;in response to determining that the security trigger has occurred, requesting the location information for the mobile communication device associated with the request;receiving the location information for the mobile communication device associated with the request;determining a quality of a location source providing the location information;in response to (a) receiving the request, (b) determining that the security trigger has occurred, and (c) receiving the location information, determining a pre-established access rule, the determining the pre-established access rule including identifying the pre-established access rule based on each of (i) a characteristic of the request to access the resource, (ii) the location information for the mobile communication device associated with the request, and (iii) the quality of the location source providing the location information; andexecuting a pre-determined security action associated with the pre-established rule. 12. The tangible, non-transitory computer-readable storage medium of claim 11, the instructions being configured to further cause the processor to: determine that the location information indicates a location of the mobile communication device, associated with the request, corresponding to a restricted location;wherein, in response to determining that the location associated with the request corresponds to the restricted location, the executing the pre-determined security action associated with the pre-established rule includes denying the request. 13. The tangible, non-transitory computer-readable storage medium of claim 11, the instructions being configured to further cause the processor to, in executing the pre-determined security action, use at least one of a biometric identification application, a radio-frequency identification tag application, and a smartcard application to verify the access request when the comparison yields a location that requires a high level of security. 14. The tangible, non-transitory computer-readable storage medium of claim 11, the quality of the location source relating to a certain accuracy of the location information. 15. The tangible, non-transitory computer-readable storage medium of claim 11, the quality of the location source relating to an authentication process performed in connection with the location information received. 16. The tangible, non-transitory computer-readable storage medium of claim 11, the pre-determined security action executed (A) allowing access by the user to certain functionality associated with the resource requested while (B) disallowing access by the user to other functionality associated with the resource requested. 17. The tangible, non-transitory computer-readable storage medium of claim 11, the instructions being configured to further cause the processor to, in identifying the pre-established rule based on the characteristic of the request to access the resource, identify the pre-established rule based on content of data sought by the request. 18. The tangible, non-transitory computer-readable storage medium of claim 11, the instructions being configured to further cause the processor to: determine that the location information indicates a location of the mobile communication device, associated with the request, corresponding to a restricted location;wherein, in response to determining that the location associated with the request corresponds to the restricted location, and in the executing the pre-determined security action associated with the pre-established rule, undertake an evasive action includes at least one of: erasing a memory location;encrypting data contained within the mobile communication device;encrypting data contained within a system associated with the resource;severing power associated with the mobile communication device;severing power associated with the system associated with the resource;severing a functionality of the mobile communication device; andsevering a functionality of the system associated with the resource.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (250)
Worthy David G. ; Dubrall Danny Lee, Active system and method for remotely identifying RF broadcast stations.
Bahl, Paramvir; Venkatachary, Srinivasan; Balachandran, Anand, Authentication methods and systems for accessing networks, authentication methods and systems for accessing the internet.
Bhatia,Ranjit; Kavi,Shashi; Hussain,Tahir; Betrabet,Arvind, Business to business engine and system for facilitating information interexchange using realtime data.
Serbetcioglu Bekir (Huntington CT) Bagoren Ilhan (Beacon Falls CT) Duman Osman (Norwood MA) Ozulkulu Esref (Monroe CT), Caller name and identification communication system with caller screening option.
Nakano Toshifumi,JPX ; Takahashi Shinya,JPX ; Suzuki Tatsuya,JPX, Camera having a sheath which is incorporated into the camera body without being distorted.
Robinson Mark T. (Carlsbad CA) Gardner Steven H. (San Diego CA) Wong Matt (San Diego CA) Kasmir Seton P. (San Diego CA) Balachandran Kumar (San Diego CA) Graham Sue (Encinitas CA) Schjelderup Gail (P, Cellular digtial packet data mobile data base station.
Thro, Stuart Wells; Labun, Nicholas M.; Pan, Shaowei; Sawinski, John P; Dorenbosch, Jheroen, Communication services through multiple service providers.
Bergh Christopher P. ; Metral Max E. ; Ritter David Henry ; Sheena Jonathan Ari ; Sullivan James J., Distributed system for facilitating exchange of user information and opinion using automated collaborative filtering.
Henrick, Robert F., Establishing communications between a calling server and a called server according to services subscribed by their respective calling and called parties.
Morscheck William F. ; Miller Kenneth W. ; Ryan Thomas J. ; Ohlemacher David M. ; Russell C. Thomas ; Burgbacher Mark A. ; Schweikert Christopher L., Forms order entry system.
Brett B. Stewart ; James W. Thompson, Geographic-based communication service system with more precise determination of a user's known geographic location.
Comer Edward I. (Marietta GA), Interactive roamer contact system for cellular mobile radiotelephone network for automatically initiating a communicatio.
Nelson,Michael Jay; Bruening,Gregory Wilfred; Schmidt,Peter Roy; Sherry,Robert Allen; Meer,Stephen Marc, Method and apparatus for increasing the reliability of an emergency call communication network.
Fuller Robert M. (Redmond WA) Epler Frederick A. (Issaquah WA) Manowski Maxwell E. (Enumclaw WA), Method and apparatus for processing telephone calls and delivering information about the calls to a pager.
Lee, Jeffrey S.; Gubka, Steven S.; Hede, William S.; Weisshaar, Bernhard P.; Wharton, Kenneth E., Method and apparatus for saving enhanced information contained in content sent to a wireless communication device.
Stephenson David Arthur,GBX ; Bonner David,GBX ; Schiefer Jan,GBX ; Bennett Steven Nicholas,GBX, Method and apparatus for tracking identity-code changes in a communications system.
Sandhu, Kulbir S.; Fan, Roderic C.; Mleczko, David; Nguyen, Kenny; Fan, Carey, Method and system for a plurality of mobile units to locate one another.
Chang Donald C. D. ; Yung Kar W. ; Nunan William J. ; Cheng David C. ; Shuman Bruce E., Method and system for determining a position of a communication satellite utilizing two-way ranging.
Enzmann, Mark J.; Moton, Jr., Robert T.; Zellner, Samuel N., Method and system for providing additional information to a subscriber based on a universal resource locator.
Cromer, Daryl C.; Rhoades, David B.; Locker, Howard J.; Ward, James P.; Kern, Eric R.; Ellison, Brandon J.; Dayan, Richard A., Method and system for providing protection against theft and loss of a portable computer system.
Bamburak, Michael D.; Daly, John J.; Lawrence, Christopher Gregory; Prise, Michael Edward; Raffel, Michael Allen, Method for selecting a preferable wireless communication service provider in a multi-service provider environment.
Emery Mark J. ; Tucker Brenda N. ; Schwartz Laurie D., Method of personal communications service using wireline/wireless integration detecting a predetermined event during process of a call.
Duvall, William; DeMille, Rod, Methods of and system for portable cellular phone voice communication and positional location data communication using the cellular phone network control channel.
Reynolds, Philip; Jacob, Anila; Haysom, Timothy; Stubbs, Martin, Mobile communications system having a cellular communications network comprising a public network portion and a private network portion using a common radio interface protocol.
Zhang, Zeeman; Knoerle, Joseph, Network and method for providing an automatic recall telecommunications service with automatic speech recognition capability.
Madour, Lila; Segura, Louis; Shafik, Karim, Packet core function and method of selecting a packet data service node/foreign agent in a packet data network.
Steiner Glenn C. (Los Altos CA) Banta Lloyd H. (Palo Alto CA) Trask Matthew M. (San Jose CA), Personal digital location assistant including a memory cartridge, a GPS smart antenna and a personal computing device.
Thebaut Suzanne ; Scott Walter ; Rustici Eric ; Kaikini Prasan ; Lewis Lundy ; Malik Rajiv ; Sycamore Steve ; Dev Roger ; Ibe Oliver ; Aggarwal Ajay ; Wohlers Todd, Policy management and conflict resolution in computer networks.
Bates, Cary Lee; Ryan, Jeffrey Michael; Santosuosso, John Matthew, Portable phone that changes function according to its self-detected geographical position.
Spielman, Brenda Gates; Dodrill, Lewis Dean; Joshi, Satish; Parasu, Nagendran; Lockwood, Robert James, Scalable IP-based notification architecture for unified messaging.
Hudson Jerome D. ; Champagne Jean-Paul,FRX ; Galindo Mary A. ; Hickerson Cynthia M. K. ; Hickman Donna R. ; Lockhart Robert P. ; Saddler Nancy B. ; Stange Patricia A., System and method for accessing enterprise-wide resources by presenting to the resource a temporary credential.
Meadows, Vernon; Harper, Michael S., System and method for monitoring the location of individuals via the world wide web using a wireless communications network.
Yost, George; Harper, Clinton E.; Kim, Shawn, System and method for profiling the location of mobile radio traffic in a wireless communications network.
Gabber Eran ; Gibbons Phillip P. ; Matias Yossi ; Mayer Alain J., System and method for providing anonymous personalized browsing by a proxy system in a network.
Schuster, Guido M.; Grabiec, Jacek A.; Sidhu, Ikhlaq S.; Mahler, Jerry J., System and method for providing user-configured telephone service in a data network telephony system.
Roberts Richard N. ; Bartels Todd August ; McCarthy Terrence J. ; Heinmiller Wayne Robert ; Brand Rodney T ; Moore Leslie Bernard ; Donoso Carlos H ; Ford Kara Elisia, System and method for routing a call to a called party's landline or wireless communication unit.
Wilson,Brian; Bhuyan,Krishna; Feinstein,Jacob; Gnuschke,Jerald, System for providing location-based services in a wireless network, such as locating individuals and coordinating meetings.
Wilson,Brian; Bhuyan,Krishna; Feinstein,Jacob, System for providing location-based services in a wireless network, such as modifying locating privileges among individuals and managing lists of individuals associated with such privileges.
Bhatia,Ranjit; Kavi,Shashi; Hussain,Tahir; Betrabet,Arvind, System, method and apparatus for polling telecommunications nodes for real-time information.
Bandera Daniel Quinto ; Bregman Mark F. ; Gopal Ajei S. ; Singhal Sandeep, Systems, methods and computer program products for providing time and location specific advertising via the internet.
Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
Tajima Mie,JPX ; Sugita Takehiro,JPX ; Nakata Junichi,JPX, Telecommunication system, radio base station thereof, and portable telecommunication terminal thereof.
Mao, Xiaohong; van Elburg, Hans Erik; Harpanhalli, Kiran; Hussain, Tahir, Traffic congestion management when providing realtime information to service providers.
Elliott, Isaac K.; Higgins, Steven P.; Dugan, Andrew John; Peterson, Jon; Hernandez, Robert L.; Steele, Rick D.; Baker, Bruce W.; Terpstra, Rich; Mitchell, Jonathan S.; Wang, Jin-Gen; Stearns, Harold, Voice over data telecommunications network architecture.
Connolly David A. (Arlington Heights IL) Holt Lewis (Barrington IL) Westerhold Morris W. (Naperville IL) Zellner Samuel N. (Hoffman Estates IL) Ciannella ; Jr. Frank A. (South Holland IL) Czaplewski , Wireless digital personal communications system having voice/data/image two-way calling and intercell hand off provided.
Rachabathuni, Sailesh; Griffiths, Jonathan; Rankin, Paul John, Wireless system, a method of selecting an application while receiving application specific messages and user location method using user location awareness.
Grigg, David M.; Johansen, Joseph Neil; Toth, Michael E.; Carpenter, Daniel Lynn; Qaim-Maqami, Hood; Hanson, Carrie Anne; Votaw, Elizabeth S., Authentication level of function bucket based on circumstances.
Votaw, Elizabeth S.; Jones-McFadden, Alicia C.; Grigg, David M.; Bertanzetti, Peter John; Toth, Michael E.; Hanson, Carrie Anne, Determining user authentication based on user/device interaction.
Grigg, David M.; Bertanzetti, Peter John; Burrell, Charles Jason; Hanson, Carrie Anne; Johansen, Joseph Neil; Toth, Michael E., Determining user authentication requirements along a continuum based on a current state of the user and/or the attributes related to the function requiring authentication.
Grigg, David M.; Bertanzetti, Peter John; Burrell, Charles Jason; Hanson, Carrie Anne; Johansen, Joseph Neil; Toth, Michael E., Determining user authentication requirements based on the current location of the user being within a predetermined area requiring altered authentication requirements.
Grigg, David M.; Bertanzetti, Peter John; Burrell, Charles Jason; Hanson, Carrie Anne; Johansen, Joseph Neil; Toth, Michael E., Determining user authentication requirements based on the current location of the user being within a predetermined area requiring altered authentication requirements.
Grigg, David M.; Bertanzetti, Peter John; Burrell, Charles Jason; Hanson, Carrie Anne; Johansen, Joseph Neil; Toth, Michael E., Determining user authentication requirements based on the current location of the user being within a predetermined area requiring altered authentication requirements.
Grigg, David M.; Bertanzetti, Peter John; Burrell, Charles Jason; Hanson, Carrie Anne; Johansen, Joseph Neil; Toth, Michael E., Determining user authentication requirements based on the current location of the user in comparison to the users's normal boundary of location.
Grigg, David M.; Bertanzetti, Peter John; Burrell, Charles Jason; Hanson, Carrie Anne; Johansen, Joseph Neil; Toth, Michael E., Determining user authentication requirements based on the current location of the user in comparison to the users's normal boundary of location.
Votaw, Elizabeth S.; Burrell, Charles Jason; Hanson, Carrie Anne; Jones, Alicia C.; Lynch, Michael Patrick; Qaim-Maqami, Hood, Remote revocation of application access based on non-co-location of a transaction vehicle and a mobile device.
Votaw, Elizabeth S.; Burrell, Charles Jason; Hanson, Carrie Anne; Jones, Alicia C.; Lynch, Michael Patrick; Qaim-Maqami, Hood, Remote revocation of application access based on non-co-location of a transaction vehicle and a mobile device.
Votaw, Elizabeth S.; Burrell, Charles Jason; Hanson, Carrie Anne; Jones, Alicia C.; Lynch, Michael Patrick; Qaim-Maqami, Hood, Remote revocation of application access based on non-co-location of a transaction vehicle and a mobile device.
Grigg, David M.; Johansen, Joseph Neil; Hanson, Carrie Anne; Burrell, Charles Jason; Votaw, Elizabeth S., Self-selected user access based on specific authentication types.
Grigg, David M.; Johansen, Joseph Neil; Hanson, Carrie Anne; Burrell, Charles Jason; Votaw, Elizabeth S., Self-selected user access based on specific authentication types.
Grigg, David M.; Johansen, Joseph Neil; Hanson, Carrie Anne; Burrell, Charles Jason; Votaw, Elizabeth S., Self-selected user access based on specific authentication types.
Grigg, David M.; Qaim-Maqami, Hood; Jones, Alicia C.; Votaw, Elizabeth S.; Johansen, Joseph Neil; Burrell, Charles Jason; Hanson, Carrie Anne; Lynch, Michael Patrick, Shutting down access to all user accounts.
Grigg, David M.; Qaim-Maqami, Hood; Jones, Alicia C.; Votaw, Elizabeth S.; Johansen, Joseph Neil; Burrell, Charles Jason; Hanson, Carrie Anne; Lynch, Michael Patrick, Shutting down access to all user accounts.
Grigg, David M.; Qaim-Maqami, Hood; Jones, Alicia C.; Votaw, Elizabeth S.; Johansen, Joseph Neil; Burrell, Charles Jason; Hanson, Carrie Anne; Lynch, Michael Patrick, Shutting down access to all user accounts.
Grigg, David M.; Johansen, Joseph Neil; Toth, Michael E.; Carpenter, Daniel Lynn; Qaim-Maqami, Hood; Hanson, Carrie Anne; Votaw, Elizabeth S., Sorting mobile banking functions into authentication buckets.
Grigg, David M.; Johansen, Joseph Neil; Toth, Michael E.; Carpenter, Daniel Lynn; Qaim-Maqami, Hood; Hanson, Carrie Anne; Votaw, Elizabeth S., Sorting mobile banking functions into authentication buckets.
Grigg, David M.; Johansen, Joseph Neil; Toth, Michael E.; Carpenter, Daniel Lynn; Qaim-Maqami, Hood; Hanson, Carrie Anne; Votaw, Elizabeth S., Sorting mobile banking functions into authentication buckets.
Grigg, David M.; Bertanzetti, Peter John; Toth, Michael E.; Hanson, Carrie Anne; Votaw, Elizabeth S., User authentication based on historical transaction data.
Grigg, David M.; Bertanzetti, Peter John; Toth, Michael E.; Hanson, Carrie Anne; Votaw, Elizabeth S., User authentication based on historical transaction data.
Grigg, David M.; Bertanzetti, Peter John; Toth, Michael E.; Hanson, Carrie Anne; Votaw, Elizabeth S., User authentication based on historical transaction data.
Grigg, David M.; Bertanzetti, Peter John; Burrell, Charles Jason; Hanson, Carrie Anne; Johansen, Joseph Neil; Toth, Michael E.; Votaw, Elizabeth S., User authentication based on other applications.
Grigg, David M.; Bertanzetti, Peter John; Burrell, Charles Jason; Hanson, Carrie Anne; Johansen, Joseph Neil; Toth, Michael E.; Votaw, Elizabeth S., User authentication based on other applications.
Grigg, David M.; Bertanzetti, Peter John; Burrell, Charles Jason; Hanson, Carrie Anne; Johansen, Joseph Neil; Toth, Michael E.; Votaw, Elizabeth S., User authentication based on other applications.
Schatzberg, Uri; Amizur, Yuval; Banin, Leor; Sirotkin, Alexander Sasha, Wireless time of flight security, user authentication, and variable QoS position accuracy protocol.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.