Authentication and authorization in a wearable ensemble
First Claim
Patent Images
1. A first wireless computing device, comprising:
- interface circuitry to access a second wireless computing device from the first wireless computing device;
storage device to store instructions; and
processing circuitry configured to execute the stored instructions to determine a value corresponding to a distance from the first computing device to the second computing device, and authenticate the second computing device when the distance is within a threshold distance,wherein to determine the value corresponding to the distance from the first computing device to the second wireless computing device, the processing circuitry is to;
transmit, at a transmit time, first data from the first wireless computing device to the second wireless computing device;
receive, at a receipt time, second data from the second wireless computing device at the first wireless computing device;
measure a round-trip time based on the transmit time of the first data and the receipt time of the second data; and
calculate the value corresponding to the distance from the first wireless computing device to the second wireless computing device based on the round-trip time.
0 Assignments
0 Petitions
Accused Products
Abstract
Various systems and methods for authentication and authorization in a wearable ensemble are described herein. A system for authenticating a wearable device includes an access module to access a second wearable device from a first wearable device, the first and second wearable devices being worn by a wearer and the first wearable device being a trusted device to the wearer, a measurement module to measure a distance from the first wearable device to the second wearable device, and an authentication module to authenticate the second wearable device when the distance is within a threshold range of an initialized distance.
14 Citations
21 Claims
-
1. A first wireless computing device, comprising:
-
interface circuitry to access a second wireless computing device from the first wireless computing device; storage device to store instructions; and processing circuitry configured to execute the stored instructions to determine a value corresponding to a distance from the first computing device to the second computing device, and authenticate the second computing device when the distance is within a threshold distance, wherein to determine the value corresponding to the distance from the first computing device to the second wireless computing device, the processing circuitry is to; transmit, at a transmit time, first data from the first wireless computing device to the second wireless computing device; receive, at a receipt time, second data from the second wireless computing device at the first wireless computing device; measure a round-trip time based on the transmit time of the first data and the receipt time of the second data; and calculate the value corresponding to the distance from the first wireless computing device to the second wireless computing device based on the round-trip time. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for authenticating a wireless computing device, the method comprising:
-
accessing a second wireless computing device from a first wireless computing device; determining a value corresponding to a distance from the first wireless computing device to the second wireless computing device, wherein determining the value comprises; transmitting, at a transmit time, first data from the first wireless computing device to the second wireless computing device; receiving, at a receipt time, second data from the second wireless computing device at the first wireless computing device; measuring a round-trip time based on the transmit time of the first data and the receipt time of the second data; and calculating the value corresponding to the distance from the first wireless computing device to the second wireless computing device based on the round-trip time; and authenticating the second wireless computing device when the distance is within a threshold distance. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A non-transitory computer-readable storage medium that stores instructions for execution by one or more processors of a first wireless computing device, the instructions to configure the one or more processors to cause the first wireless computing device to:
-
access a second wireless computing device from the first wireless computing device; determine a value corresponding to a distance from the first wireless computing device to the second wireless computing device, wherein to determine the value, the instructions further cause the first wireless computing device to; transmit, at a transmit time, first data from the first wireless computing device to the second wireless computing device; receive, at a receipt time, second data from the second wireless computing device at the first wireless computing device; measure a round-trip time based on the transmit time of the first data and the receipt time of the second data; and calculate the value corresponding to the distance from the first wireless computing device to the second wireless computing device based on the round-trip time; and authenticate the second wireless computing device when the distance is within a threshold distance. - View Dependent Claims (17, 18, 19, 20, 21)
-
Specification