Location-based system permissions and adjustments at an electronic device

作者: Arnold Jason Gum

DOI:

关键词:

摘要: Securing access to a portable electronic device (PED), securing e-commerce transactions at an (ED) and dynamically adjusting system settings PED are disclosed. In example, usage or mobility characteristics of the ED (e.g., location PED, etc.) compared with current parameters ED. A determination as whether permit operation access, transaction, can be based least in part upon degree which conform characteristics. another used determine load PED.

参考文章(93)
Richard Dayan, Jeffery Jennings, Simon Chu, David Rhoades, Location sensitive software execution ,(2003)
James Ashfield, David Shroyer, Douglas Brown, Location-based authentication of online transactions using mobile device ,(2008)
Stephanie Riche, Mihaela Gittler, Gavin Brebner, Marco Mont, Keith Harrison, Apparatus for setting access requirements ,(2002)
Kayo Mizutani, Michisaburou Kihara, Satoko Ono, Masahiro Saito, Shigeaki Oura, Security management apparatus, security management method, and security management program ,(2002)
Brandon J. Ellison, Eric R. Kern, Richard A. Dayan, James P. Ward, Howard J. Locker, Daryl C. Cromer, David B. Rhoades, Method and system for providing protection against theft and loss of a portable computer system ,(1999)
Jeffrey Dean Lindsay, Security Systems for Protecting an Asset ,(2007)