Activation of security mechanisms through accelerometer-based dead reckoning
First Claim
Patent Images
1. A computer-implemented method, comprising:
- obtaining a predetermined route associated with a computing device, the predetermined route comprising a path from one geographic location to another;
obtaining a first set of accelerometer data from an accelerometer of the computing device, the first set of accelerometer data reflecting proper acceleration of the computing device in three directions in a local coordinate system of the computing device at a first time;
determining, based at least in part on the first set of accelerometer data, a first movement of the device using dead reckoning;
obtaining a second set of accelerometer data from the accelerometer of the computing device, the second set of accelerometer data reflecting proper acceleration of the computing device at a second time, and the second time occurring after the first time;
determining, based at least in part on the second set of accelerometer data, a second movement of the computing device using dead reckoning, the second movement being greater than the first movement; and
based at least in part on a difference between the first movement and the second movement indicating a deviation by the computing device from the predetermined route;
selecting a security state from a plurality of security states; and
changing a current security state of the computing device to the security state selected.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for activating security mechanisms based at least in part on accelerometer-based dead reckoning wherein accelerometer data, reflecting acceleration in a local coordinate system of a device, is obtained from an accelerometer of a device. Movement of the device is determined based at least in part on the accelerometer data, and, based at least in part on whether the movement of the device exceeds a threshold value, a determination is made whether to change a current security state of the device. If it is determined to change the current security state of the device, the current security state of the device is changed to a new security state.
56 Citations
20 Claims
-
1. A computer-implemented method, comprising:
-
obtaining a predetermined route associated with a computing device, the predetermined route comprising a path from one geographic location to another; obtaining a first set of accelerometer data from an accelerometer of the computing device, the first set of accelerometer data reflecting proper acceleration of the computing device in three directions in a local coordinate system of the computing device at a first time; determining, based at least in part on the first set of accelerometer data, a first movement of the device using dead reckoning; obtaining a second set of accelerometer data from the accelerometer of the computing device, the second set of accelerometer data reflecting proper acceleration of the computing device at a second time, and the second time occurring after the first time; determining, based at least in part on the second set of accelerometer data, a second movement of the computing device using dead reckoning, the second movement being greater than the first movement; and based at least in part on a difference between the first movement and the second movement indicating a deviation by the computing device from the predetermined route; selecting a security state from a plurality of security states; and changing a current security state of the computing device to the security state selected. - View Dependent Claims (2, 3)
-
-
4. A system, comprising:
-
one or more processors; and memory including instructions that, as a result of execution by the one or more processors, cause the system to; obtain a predetermined route of a device; obtain a first set of movement data from a movement-based sensor of the device, the first set of movement data indicating at least proper acceleration of the device in an at least three-dimensional local coordinate system of the device at a first time; obtain a second set of movement data from the movement-based sensor of the device, the second set of movement data indicating at least proper acceleration of the device at a second time; determine, based at least in part on a difference between the first set of movement data and the second set of movement data, a movement of the device from a first location to a second location using dead reckoning; determine, based at least in part on whether the movement indicates a deviation from the predetermined route, to change a current security state of the device; and change the current security state of the device to a new security state. - View Dependent Claims (5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A non-transitory computer-readable storage medium having stored thereon executable instructions that, as a result of execution by one or more processors of a computer system, cause the computer system to at least:
-
obtain a predetermined route of a device; obtain first accelerometer data from an accelerometer of the device, the first accelerometer data indicating proper acceleration of the device in an at least three dimensional local coordinate system of the device for a first time; obtain second accelerometer data from the accelerometer of the device, the second accelerometer data indicating proper acceleration of the device for a second time; determine, based at least in part on a difference between the first accelerometer data and the second accelerometer data, a movement of the device using dead reckoning; and based at least in part on the movement of the device deviating from the predetermined route; determine to change a current security state of the device to a first security state; and change the current security state of the device to the first security state. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification