Feeds

Future Apple gumble could lock fanbois out of their own devices

Travelling outside your own hood? Just in case ... *clang*

Next gen security for virtualised datacentres

Apple has filed a patent for a new location-sensitive security system which could leave fanbois' fumbling to get into their iDevices if they travel to unusual locations.

The patent application describes "location-sensitive security levels and setting profiles based on detected location". It's basically describes a system which changes the security level of a mobile device based on its location.

The system would sense a device's proximity to other devices, networks or locations, before deciding the level of security that is required.

Using a bit of creative license, this would mean that fanbois need to bash a password into their phone whilst traversing the gritty urban jungle of, say, East London. Whereas if they were in the rather duller streets of Bath, where muggers are outnumbered by aristocratic pensioners, no password would be needed.

Alternatively, Apple suggested that when hanging out in "the cafeteria", a much longer password might be required - which says a lot about what might really be going on inside Cupertino.

In its patent application, the fruity firm wrote: "To provide a reliably pleasant and secure experience for a user operating a mobile device, it can be desirable to modify security settings or other device behavior based on a detected location. Mobile device users often frequent the same locations. Mobile devices can be configured to detect the current location. Based on the detected current location, the mobile device can modify settings and configurations. Security settings are one example of device behavior that can be modified in accordance with embodiments of the present invention."

Other settings could potentially be changed, so that perhaps "at home, a user might want the lock-screen image to be a personal photo, but while at work, the user might want a professional photo" - presumably a fully clothed one. ®

The essential guide to IT transformation

More from The Register

next story
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
prev story

Whitepapers

Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up distributed data
Eliminating the redundant use of bandwidth and storage capacity and application consolidation in the modern data center.
The essential guide to IT transformation
ServiceNow discusses three IT transformations that can help CIOs automate IT services to transform IT and the enterprise
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.