Method and system for mobile device localization-based access
First Claim
1. A method of facilitating a request for access, the method executed in a processor of a server computing device and comprising:
- receiving, at a memory of the server computing device, the request for access, the request for access performed using a security device at an access point device communicatively coupled to the server computing device, wherein the access point device induces a characteristic magnetic signature unique to a location of the access point device, the characteristic magnetic signature including a magnetic spatial derivative signature calculated based on a plurality of magnetic field measurements corresponding to a sequence of positions along a trajectory of a mobile computing device proximate the access point device, and wherein magnetic spatial derivative signature captures the relative changes in magnetic field as the mobile device traverses a route proximate access point device;
localizing the mobile computing device having a preestablished association with the security device, based on the characteristic magnetic signature; and
enabling the request for access when a position of the mobile computing device as determined from the localizing is within a predetermined threshold distance from the location of the access point device.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system for facilitating an access request. The method may be executed in the processor of a server computing device and comprises receiving, at a memory of the server computing device, the request for access, the request for access performed using a security device at an access point device communicatively coupled to the server computing device, localizing a mobile computing device having a preestablished association with the security device, and enabling the request for access when a position of the mobile computing device as determined from the localizing is within a predetermined threshold distance from a location of the access point device.
14 Citations
16 Claims
-
1. A method of facilitating a request for access, the method executed in a processor of a server computing device and comprising:
-
receiving, at a memory of the server computing device, the request for access, the request for access performed using a security device at an access point device communicatively coupled to the server computing device, wherein the access point device induces a characteristic magnetic signature unique to a location of the access point device, the characteristic magnetic signature including a magnetic spatial derivative signature calculated based on a plurality of magnetic field measurements corresponding to a sequence of positions along a trajectory of a mobile computing device proximate the access point device, and wherein magnetic spatial derivative signature captures the relative changes in magnetic field as the mobile device traverses a route proximate access point device; localizing the mobile computing device having a preestablished association with the security device, based on the characteristic magnetic signature; and enabling the request for access when a position of the mobile computing device as determined from the localizing is within a predetermined threshold distance from the location of the access point device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A server computing system for facilitating a request for access, the system comprising:
-
a processor; and a memory including instructions executable in the processor to; receive, at a memory of the server computing device, the request for access, the request for access performed using a security device at an access point device communicatively coupled to the server computing device, wherein the access point device induces a characteristic magnetic signature unique to a location of the access point device, the characteristic magnetic signature including a magnetic spatial derivative signature calculated based on a plurality of magnetic field measurements corresponding to a sequence of positions along a trajectory of a mobile computing device proximate the access point device, and wherein magnetic spatial derivative signature captures the relative changes in magnetic field as the mobile device traverses a route proximate access point device; localize the mobile computing device having a preestablished association with the security device, based on the characteristic magnetic signature; and enable the request for access when a position of the mobile computing device as determined from the localizing is within a predetermined threshold distance from the location of the access point device. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A non-transitory computer-readable medium storing instructions, the instructions being executable in one or more processors to perform operations comprising:
-
receiving, at a memory of a server computing device, a request for access performed using a security device at an access point device communicatively coupled to the server computing device, wherein the access point device induces a characteristic magnetic signature unique to a location of the access point device, the characteristic magnetic signature including a magnetic spatial derivative signature calculated based on a plurality of magnetic field measurements corresponding to a sequence of positions along a trajectory of a mobile computing device proximate the access point device, and wherein magnetic spatial derivative signature captures the relative changes in magnetic field as the mobile device traverses a route proximate access point device; localizing the mobile computing device having a preestablished association with the security device, based on the characteristic magnetic signature; and enabling the request for access when a position of the mobile computing device as determined from the localizing is within a predetermined threshold distance from the location of the access point device.
-
Specification