U.S. patent application number 11/634371 was filed with the patent office on 2007-07-05 for location based security modification system and method.
This patent application is currently assigned to Palm, Inc.. Invention is credited to Raymond Combs, David Kammer.
Application Number | 20070157319 11/634371 |
Document ID | / |
Family ID | 21981353 |
Filed Date | 2007-07-05 |
United States Patent
Application |
20070157319 |
Kind Code |
A1 |
Kammer; David ; et
al. |
July 5, 2007 |
Location based security modification system and method
Abstract
A method or system for providing a level of data security
dependent on the location of the user of a wireless device is
disclosed. One exemplary embodiment relates to a method of
adjusting security for a network user node in communication with a
network based upon the location of the node. The method is
performed by determining the location of a network user node,
selecting a single level of security from a group of more than two
security levels based on the determined location, and modifying the
security protection for the network user node based upon the
selected level of security.
Inventors: |
Kammer; David; (Seattle,
WA) ; Combs; Raymond; (San Jose, CA) |
Correspondence
Address: |
FOLEY & LARDNER LLP
777 EAST WISCONSIN AVENUE
MILWAUKEE
WI
53202-5306
US
|
Assignee: |
Palm, Inc.
|
Family ID: |
21981353 |
Appl. No.: |
11/634371 |
Filed: |
December 5, 2006 |
Related U.S. Patent Documents
|
|
|
|
|
|
Application
Number |
Filing Date |
Patent Number |
|
|
10053013 |
Jan 18, 2002 |
|
|
|
11634371 |
Dec 5, 2006 |
|
|
|
Current U.S.
Class: |
726/27 |
Current CPC
Class: |
G06F 2221/2113 20130101;
H04L 63/105 20130101; G06F 2221/2111 20130101; G06F 21/6218
20130101; H04L 63/107 20130101 |
Class at
Publication: |
726/027 |
International
Class: |
H04L 9/32 20060101
H04L009/32 |
Claims
1. A method of adjusting security for a mobile computing device,
comprising: determining the location of the mobile computing
device; and configuring a security level for the mobile computing
device at the mobile computing device, the security level being
associated with the location.
2. The method of claim 1, further comprising restricting access to
data stored on the mobile computing device based on the security
level provided.
3. The method of claim 1, further comprising restricting access to
functionality of the mobile computing device based on the security
level provided.
4. The method of claim 1, wherein the mobile computing device
comprises a handheld device.
5. The method of claim 1, wherein configuring the security level
comprises requiring a password to access the data stored on the
mobile computing device.
6. The method of claim 5, wherein the password is required after a
predetermined period of time of non-use of the network user
node.
7. The method of claim 6, wherein the predetermined period of time
is dependent upon the location of the network user node.
8. The method of claim 7, wherein the predetermined period of time
is received from a user of the network user node.
9. The method of claim 1, wherein configuring the security level
comprises requiring a password to enable functionality of the
mobile computing device.
10. A method of adjusting security for a mobile computing device,
comprising: determining the location of the mobile computing
device; and determining whether to require a password in order for
a user to access data via the mobile computing device based upon
the location of the mobile computing device.
11. The method of claim 10, wherein determining whether to require
the password in order for a user to access the data is further
based upon the mobile computing device being idle for a period of
time; and wherein the period of time is a function of the location
of the mobile computing device.
12. The method of claim 11, wherein the period of time is defined
by a user of the mobile computing device.
13. The method of claim 11, wherein the data is stored on the
mobile computing device.
14. The method of claim 9, wherein the mobile computing device is a
handheld computing device.
15. A mobile computing device network user node, comprising: a
processor; a location sensing system coupled to the processor; and
a memory coupled to the processor; wherein the processor restricts
access to data stored in the memory based upon location information
provided to the processor by the location sensing system.
16. The mobile computing device of claim 15, further comprising: a
table of at least three security settings; wherein the processor
restricts access to the of data stored in the memory by selecting
and applying one of the security settings based upon the location
information.
17. The mobile computing device of claim 16, wherein the security
settings are configurable by a user of the mobile computing device
at the mobile computing device.
18. The mobile computing device of claim 16, wherein at least one
security setting includes a password requirement to access the data
stored in the memory.
19. The mobile computing device of claim 16, wherein at least one
security setting includes restrictions on access to less than all
of the data stored in the memory.
20. The mobile computing device of claim 15, wherein the mobile
computing device is a handheld computing device.
Description
CROSS-REFERENCE TO RELATED APPLICATIONS
[0001] This application is a continuation of application Ser. No.
10/053,013, filed Jan. 18, 2002, entitled "LOCATION BASED SECURITY
MODIFICATION SYSTEM AND METHOD," which is incorporated herein by
reference in its entirety.
BACKGROUND
[0002] The disclosure relates generally to the field of wireless
communication. More particularly, the disclosure relates to a
method or system for providing a level of data security dependent
on the location of the user of a wireless device.
[0003] Wireless networks, in general, have grown in both capability
and use. More and more people rely on wireless devices in their
professional and personal lives. Professionals often rely on
wireless devices to have instant access to information while they
are away from the office. Professionals use wireless devices to
access email, calendars, contact lists, a company intranet,
web-enabled applications, business and local news, and other
information. Individuals often use wireless devices to stay in
touch with friends and family and to access information which may
aid them in their daily activities.
[0004] As people use wireless networks more, they are also more
frequently storing and accessing sensitive data on portable devices
and/or over wireless networks. This information can include
personal information, financial information, or company
confidential information. The information can either be stored on
the remote portable device or it can be stored on a server and
accessed using the remote portable device over a wireless network.
Both the device and the transmission can be susceptible to
interference, interception, or tampering.
[0005] A wide number of various techniques have evolved to try and
protect the data that is stored on handheld devices and transmitted
over wireless networks. Examples of the techniques include:
authentication, authorization, encryption, and data integrity
verification. Authentication refers to verification of the identity
of a person or process from which a message, data request, or
access request originates. Authorization refers to the process of
determining what functionality or access to information is
available to that particular person or process. Encryption refers
to encoding information in such a manner such that the information
is not decipherable by someone intercepting the information. Data
integrity attempts to ensure that the data has not been modified or
damaged during a transmission.
[0006] Unfortunately, providing security has costs associated with
it. Generally in a network, data is sent in discrete units called
"packets". Packets of data are generally required to be of fixed
size by most current network protocols. If the data is being
transmitted from a remote location, security information may be
required on every packet sent and received from a handheld device.
This allows less space for data in each individual packet. Thus,
filling packets with security information has the effect of
reducing the effective transmission rate. This reduction is
especially noticeable on a wireless network where the transmission
rates are already vastly slower compared to a wired network.
[0007] Even if data is not being sent over a remote network,
providing security has costs. Authentication and authorization can
require the user to enter a password every time the data needs to
be accessed. The data will remain unlocked for a period of time,
but security can require that the data be locked again after a
period of time or on the happening of an event such as shutting off
the handheld device. Encryption requires that the data be organized
such that it is not normally readable. Unfortunately, this process
takes time, and prior to accessing the information, the data must
be decrypted. And then again, after the access is complete, the
data must be re-encrypted.
[0008] Albeit security is important to protect information,
especially sensitive information such as credit card numbers,
financial information, or corporate proprietary information,
however, the absolute highest level of security is not necessary at
all times. For example, when in a shopping mall, it may be useful
to be able to access personalized shopping information with only
minimal security. Also, while the user is at the office, there may
be no reason to provide heavy security for company proprietary
information.
[0009] Accordingly, there is a need for a method or system for
providing different levels of security for different subsets of
data based on the location of a portable network node or portable
electronic device. There is also an increased need to protect the
data transmissions and the devices from any or all of interference,
interception, and or tampering.
[0010] It would be desirable to provide a system and/or method that
provides one or more of these or other advantageous features. Other
features and advantages will be made apparent from the present
specification. The teachings disclosed extend to those embodiments
which fall within the scope of the appended claims, regardless of
whether they accomplish one or more of the aforementioned
needs.
SUMMARY OF THE INVENTION
[0011] One exemplary embodiment relates to a method of adjusting
security for a network user node in communication with a network
based upon the location of the node. The method is performed by
determining the location of a network user node, selecting a single
level of security from a group of more than two security levels
based on the determined location, and modifying the security
protection for the network user node based upon the selected level
of security.
[0012] Another exemplary embodiment relates to a computer system
for modifying security settings for a network user node based on
the location of the node. The computer system includes a location
sensing device having a communicative coupling with the system for
determining the location of a network user node, a storage device
for storing a table of security modifications to be performed
according to one of a plurality of locations for the network user
node, the security modifications including more than two levels, a
processor coupled to a storage device for processing information,
storing the information on a storage device, and generating a
security modification instruction, and a communication device
capable of transmitting a data signal to the network user node
containing instructions to modify the security protection for the
node.
[0013] Another exemplary embodiment relates to a method of
adjusting security for a network user node having a processor, a
memory coupled to the processor, a wireless transceiver, and a
location determining device in communication with a network based
upon the location of the node. The method includes receiving
location information using a network user node, and using the
network user node to modify security protection for data to a
single level from a group of more than two levels based upon the
location information.
[0014] Another exemplary embodiment relates to a system implemented
on a network user node for modifying security settings based on the
location of the node. The system includes a system for determining
the location of the network user node coupled to the network user
node, a processor for processing information, storing information
on a storage device, and accessing a table of security modification
instructions, the table including more than two unique security
modifications, and a storage device coupled to the network user
node for storing a table of security modifications to be performed
based on a plurality of locations for the network user node.
Alternative exemplary embodiments relate to other features and
combination of features as may be generally recited in the
claims.
BRIEF DESCRIPTION OF THE DRAWINGS
[0015] The invention is illustrated by way of example and not
limitation using the figures of the accompanying drawings, in which
the references indicate similar elements and in which:
[0016] FIG. 1A is a general block diagram of a network user node in
communication with a wireless network in accordance with an
exemplary embodiment;
[0017] FIG. 1B is a general block diagram of a network user node
with an associated location sensor system in accordance with an
exemplary embodiment;
[0018] FIG. 1C is a general block diagram of a network user node in
communication over a wireless network using wireless access
points;
[0019] FIG. 2 is a flow diagram illustrating a process of using the
location of a network user node to set security levels;
[0020] FIG. 3A is an exemplary embodiment of a table showing
security level settings indexed by location;
[0021] FIG. 3B is an exemplary embodiment of a record stored in the
table shown in FIG. 3A.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
[0022] A system and method for using location information to change
security settings for a mobile network node is described. In the
following description, for purposes of explanation, numerous
specific details are set forth to provide a through understanding
of exemplary embodiments of the invention. It will be evident,
however, to one skilled in the art that the invention may be
practiced without these specific details. In other instances,
structures and devices are shown in block diagram form to
facilitate description of the exemplary embodiments.
[0023] FIG. 1A is a general block diagram 100 of a network user
node 110 (or multiple network user nodes 110) in communication over
a wireless network 120 with a remote computing system 130 in
accordance with an exemplary embodiment. In an exemplary
embodiment, remote computing system 130 is associated with a
location sensing system 140.
[0024] Network user node 110 can be a handheld computer, a handheld
personal digital assistant, a laptop computer, a wireless cellular
digital phone, a pager, or any other such device. Network user node
110 can be communicatively coupled to a wired or wireless network
120.
[0025] In an exemplary embodiment wireless network 120 is the
Internet. In alternative embodiments, wireless network 120 is any
type of network such as, a virtual private network, an intranet, an
Ethernet, or a netware network. Further, wireless network 120 can
include a configuration, such as, a wireless network, a wide area
network (WAN) or a local area network (LAN).
[0026] Remote computing system 130 can be any computing system
including a central processing unit (CPU), a storage device, and a
communication system. Remote computing system 130 can be
communicatively coupled to location sensing system 140. The
communication between remote computing system 130 and location
sensing system 140 can be achieved over a standard wired network, a
wireless network, or any other communication system.
[0027] Location sensing system 140 can include a global positioning
satellite system (GPS), an access node triangulation system, an
access point sensing system, or any other system capable of
detecting the location of network user node 110. Location sensing
system 140 includes a communication system to transmit the location
information to remote computing system 130.
[0028] FIG. 1B is a general block diagram 101 of network user node
110 with associated location sensor system 140 in accordance with
an exemplary embodiment. Diagram 101 illustrates an alternative
embodiment, wherein network user node 110 is directly associated
with location sensing system 140. In an exemplary embodiment
location sensing system 140 is a GPS system. Location sensing
system 140 can be any system capable of determining location and
sending a data signal containing that information to network user
node 110.
[0029] FIG. 1C is a general block diagram 102 of a network user
node 110 in communication over wireless network 120 with wireless
access point 150 and wireless access point 155. Wireless access
points 150 and 155 may be but are not limited to IEEE 802.11
wireless access points, Bluetooth wireless access points, etc.
Network user node 110 is in communication with wireless access
points 150 and 155 over communications network 110. Network user
node 110 can obtain location information based upon the location of
the wireless access point that is being accessed over wireless
network 110. In an exemplary embodiment, network user node 110 can
receive timing information sent from wireless access point 150 to
calculate the distance between the network user node 110 and
wireless access point 150. Network user node 110 can perform the
same process with wireless access point 155. Based upon stored
location information and the distance from the two wireless access
points, the location of network user node 110 can be determined.
Alternatively location could be determined by determining the
distance and direction of a signal received from just one of
wireless access points 150 and 155. In a further alternative, a
gross approximation of network user node 110 may be determined by
using the known location of the access point 150 with which user
node 110 can communicate.
[0030] Examples have been illustrated above for some exemplary
embodiments for determining the location of network user node 110.
These embodiments are shown for illustrative purposes only. Any
method wherein the location of network user node 110 is determined
with greater or lessor specificity is contemplated.
[0031] FIG. 2 illustrates a flow diagram 200 illustrating an
exemplary embodiment of a method of using location information to
update security settings on network user node 110.
[0032] In a step 210, the location of network user node 110 is
obtained from location sensing system 140 or using wireless access
points or an alternative location detection system. The network
user node's location can be obtained using global positioning
satellite (GPS) signals, information regarding the location of the
current access point for the network user node, a signal
triangulation method, or any other method capable of detecting the
location of a network user node with greater or lesser
specificity.
[0033] In a step 220 the location information is verified. If the
location either could not be determined or is found to be an
unacceptable value, network user node 110 could be configured to
display a notice to this effect and apply default security settings
for network user node 110 in a step 222. Following the application
of the default security levels, step 210 is once again performed
and an attempt to determine the location of network user node 110
is once again made. Alternatively, step 210 can be performed after
an interval of time has passed or upon the occurrence of some event
such as powering on network user node 110 or attempting to access
new functionality or data.
[0034] If the location value is properly determined and is an
acceptable value in step 220, a step 224 is performed wherein the
location is referenced in a table 300 of security settings indexed
by location, described below in reference to FIG. 3A. Table 300 can
be stored on a storage apparatus in association either with remote
computer system 130 in communication with network user node 110
over wireless network 120 or on a storage apparatus associated with
network user node 110. Table 300 can be implemented using a
processor and a storage means to create and store a series of
records or a linked list. Alternatively table 300 can be
implemented using a database or any other suitable method wherein
information can be stored, indexed, and easily retrieved.
[0035] A determination is made in a step 230 to determine if the
current location of network user node 110 is stored in table 300 of
security settings indexed according to location. If the location is
not found, an optional step 240 can be performed.
[0036] In step 240, a new record 350 described below in reference
to FIG. 3B, can be created for storage in table 300. In step 240
the user is queried to determine if they want to create new record
350 containing security settings for the location determined in
step 210. In one exemplary embodiment the user can be queried using
a display associated with network user node 110. In an alternative
embodiment the user can be queried using a series of communications
sent from remote computing system 130 over wireless network 120 to
network user node 110. The query would give the user location
information and the user would have the option of setting at least
one security level setting for that location from a set of more
than two different security levels (i.e. the level of security is
chosen from more than just security on or security off). The
security level setting could include restrictions or complete
blocks on access to either network user node 110 as a whole,
information stored on the network user node 110, or any subset of
information stored on the network user node 110. The security
setting could also include restrictions or blocks on access to
information available on a remote system accessible using network
user node 110 over wireless network 120.
[0037] If the user does wish to create new record 350, a step 242
is performed wherein the information is gathered through the user
interface of the network user node 110 and used to populate a new
record 350 with an index based on the location information
determined in step 210. In an exemplary embodiment, the user could
have the option of expanding or shrinking the location setting to
define the complete space wherein the new security settings should
apply. Following the entry of the record information, a step 244 is
performed wherein new record 350 is stored in table 300.
[0038] If the user does not wish to create new record 350 in step
240, the system will apply default security levels in a step 222.
Following application of the default security levels the system and
method will return to step 210 to once again determine the location
of network user node 110. Alternatively, step 210 can be performed
after an interval of time has passed or upon the occurrence of some
event such as powering on network user node 110 or attempting to
access new functionality or data.
[0039] If location was determined in step 220 and found in the
table in step 230, an optional step 250 may be performed wherein
instructions to update the security settings for network user node
110 are transmitted from remote computing system 130 over wireless
network 120 to network user node 110. In alternative embodiments,
illustrated above in reference to FIGS. 1B and 1C, this step is not
required.
[0040] After the proper security instructions are obtained, a step
260 is performed wherein the security settings for network user
node 110 are modified according to the information stored in the
record. Following the update of the security settings, a step 210
is once again performed to determine the location of network user
node 110. Step 210 can be performed immediately to create a
continuous looping and updating of the security levels for network
user node 110 based upon location, or alternatively the security
settings can be updated after certain intervals of time, or the
security settings can be updated upon the occurrence of some event
such as a powering on of network user node 110 or attempting to
access new data or functionality.
[0041] FIG. 3A shows an exemplary embodiment of a table 300 for
storing information regarding security settings for network user
node 110 indexed according to location. This table can be stored on
remote computing system 130. Alternative, table 300 can be stored
on a storage apparatus associated with network user node 0.
[0042] Each entry in table 300 is represented by a record,
described in detail below with reference to FIG. 3B. Table 300
represents a complete listing of all records that are stored on the
storage system.
[0043] In addition to user defined records based upon location,
table 300 stores a record 310 for default security settings. Record
310 is referenced in step 222, described above in reference to FIG.
2, to apply security settings when either the location is unknown
or the location is known but not represent by a record in table
300. In an alternative embodiment, one record can be used when
location is undetermined, while another can be used when location
is not represented by a record stored in table 300.
[0044] FIG. 3B represents new record 350 for storing security level
information to be associated with a location. Record 350 may
contain several entry fields for storing information relevant to
security level settings for any one particular location. In an
exemplary embodiment record 350 contains entry fields for the name
of the location, the coordinates of the location, the security
settings for the network user node at that location, the default
security settings for that location, the security settings for a
subset of information at that setting and any other security
information that the user may wish to associate with a given
location. The location information stored in new record 350 can be
a single point or a range wherein the security settings will
apply.
[0045] While the detailed drawings, specific examples and
particular formulations given describe exemplary embodiments, they
serve the purpose of illustration only. The hardware and software
configurations shown and described may differ depending on the
chosen performance characteristics and physical characteristics of
the computing devices. For example, the type of computing device,
data structures, or devices used may differ. The systems and
methods shown and described are not limited to the precise details
and conditions disclosed. Furthermore, other substitutions,
modifications, changes, and omissions may be made in the design,
operating conditions, and arrangement of the exemplary embodiments
and the steps of the exemplary embodiments without departing from
the scope of the invention as expressed in the appended claims.
* * * * *