Security object with encrypted, spread spectrum data communications
First Claim
1. A method of controlling access to a resource, the method comprising:
- creating a security object in dependence upon user-selected security control data types, the security object comprising security control data and at least one security method;
receiving a request for access to the resource;
receiving, over a randomly selected sequence of radio frequencies, security request data in at least one packet; and
providing access to the resource in dependence upon the security control data and the security request data.
1 Assignment
0 Petitions
Accused Products
Abstract
Controlling access to a resource, including creating a security object in dependence upon user-selected security control data types, the security object comprising security control data and at least one security method; receiving a request for access to the resource; receiving, over a randomly selected sequence of radio frequencies, security request data in at least one packet; and providing access to the resource in dependence upon the security control data and the security request data. Embodiments include encrypting the security request data; receiving a packet through a radio transceiver set to a frequency, wherein a radio frequency identification field in the packet identifies a next frequency; and setting the transceiver to receive on the next frequency. In many embodiments, a resource comprises information, and providing access to the resource includes transmitting information from the resource over a randomly selected sequence of radio frequencies.
-
Citations
24 Claims
-
1. A method of controlling access to a resource, the method comprising:
-
creating a security object in dependence upon user-selected security control data types, the security object comprising security control data and at least one security method;
receiving a request for access to the resource;
receiving, over a randomly selected sequence of radio frequencies, security request data in at least one packet; and
providing access to the resource in dependence upon the security control data and the security request data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for controlling access to a resource, the system comprising:
-
means for creating a security object in dependence upon user-selected security control data types, the security object comprising security control data and at least one security method;
means for receiving a request for access to the resource;
means for receiving, over a randomly selected sequence of radio frequencies, security request data in at least one packet; and
means for providing access to the resource in dependence upon the security control data and the security request data. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer program product for controlling access to a resource, the computer program product comprising:
-
a recording medium;
means, recorded on the recording medium, for creating a security object in dependence upon user-selected security control data types, the security object comprising security control data and at least one security method;
means, recorded on the recording medium, for receiving a request for access to the resource;
means, recorded on the recording medium, for receiving, over a randomly selected sequence of radio frequencies, security request data in at least one packet; and
means, recorded on the recording medium, for providing access to the resource in dependence upon the security control data and the security request data. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
Specification