Browse Prior Art Database

Method to provide location and/or device ID based document / data access by a mobile application Disclosure Number: IPCOM000232219D
Publication Date: 2013-Oct-27
Document File: 3 page(s) / 61K

Publishing Venue

The Prior Art Database


Disclosed are a system and method to increase the security of sensitive documents or data by using criteria based on the user’s location when using a mobile device to access the information, as well as the device identification. The system enables mobile applications to use location as an added security parameter when accessing sensitive information.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 51% of the total text.

Page 01 of 3

Method to provide location and / mobile application

Location and/or device based security is particularly important to mobile applications that access sensitive data. Currently, no software library or exiting commercial or open source product provides location and/or device identifier (ID) based document data access.

The novel contribution described herein is a system and method to limit document or data access to a set of predefined locations and/or device identifiers (IDs) when data is

accessed through an application on a device that provides location information and/or a device ID (e.g., smart phone, tablet, mobile computer). The goal is to provide access to sensitive data to the right person (via username, password) in an authorized space (location) with an authorized device (device ID). This system and method provide additional dimensions to secure document access, beyond the username and password.

Applications that desire to limit document/data access based on location and/or device ID can implement this solution when the operating platform supports and provides location and/or device ID information.

Location is defined as any three-dimensional space represented by an array of coordinates (i.e., longitude, latitude, altitude). An example is the criminal investigation

division inside a police building, which is on 3rd floor in the east wing. (Figure 1) Examples of documents or data that should be accessible only in this location are arrest and warrant documents.

Figure 1: Example of a three-dimensional location

Another example is to control application access to a geographical location (e.g., Texas criminal records within Texas).

Any document can be tied to any number of locations where access control is desired.

The Device ID generally refers to the Radio Frequency Identification (RFID) built into most smart phone and tablet models. It is therefore possible to limit document/data

/or device ID based document

or device ID based document /// data access by a

data access by a


Page 02 of 3

access to an authorized device.

The primary benefit is the ability to enable mobile applications to use location as an added security parameter when accessing sensitive information. This creates an additional layer of protection when a device has been lost or stolen. For example, when

a device is stolen and taken outside a building, even if the mobile application is still r...