Browse Prior Art Database

LOCATION-BASED SECURITY CONFIGURATION

IP.com Disclosure Number: IPCOM000126828D
Publication Date: 2005-Aug-15
Document File: 1 page(s) / 8K

Publishing Venue

The IP.com Prior Art Database

Abstract

Additional security restrictions may be imposed upon users of handheld communication devices as their geographical location changes, e.g., cellular phones must be turned off before entering secure government locations. Similarly, users may wish to impose their own additional security restrictions based upon location, e.g., enable password protection when off corporate premises.

This text was extracted from a Microsoft Word document.
This is the abbreviated version, containing approximately 81% of the total text.

LOCATION-BASED SECURITY CONFIGURATION

Disclosed Anonymously

Additional security restrictions may be imposed upon users of handheld communication devices as their geographical location changes, e.g., cellular phones must be turned off before entering secure government locations.  Similarly, users may wish to impose their own additional security restrictions based upon location, e.g., enable password protection when off corporate premises.

Location-based Security Configurations would allow users of handheld communication devices to pre-configure security settings and associate them with particular locations, so that manual configuration would not be needed when the user arrived at a specified location. 

The device would store a list of locations that would be populated from two information sources.  The first source is the user, who can manually add and/or delete entries, and the second source would be the location lust stored for appointments in the device’s calendar.

To configure security settings for a particular location, the user would choose an entry from the location list, configure the security settings as desired, and then save the information.  The user would be able to enable and disable the Location-based Security Configuration.

When enabled, the device would periodically determine its geographical location via the Global Positioning System (GPS) or the calendar application, and would enforce the security settings associated with its current location.  The d...