Authentication
First Claim
1. A method comprising, in connection with authenticating a client of a network, acquiring information that characterizes the client in a manner that enables a determination about authenticating the client of the network, the information being acquired other than in the form of a digital message that is passed on behalf of the client to the network, and making an authentication decision based on the information.
0 Assignments
0 Petitions
Accused Products
Abstract
In connection with authenticating a client of a network, information is acquired that characterizes the client in a manner that enables a determination about authenticating the client of the network, the information being acquired other than in the form of a digital message that is passed on behalf of the client to the network; an authentication decision is made based on the information. Information is encrypted in a manner that is based on a physical property of an intended recipient of the information, and delivering the encrypted information to the recipient. A source of a beacon is physically associated with a person, times of receipt of the beacon at multiple stations are measured, and the location of the person is determined based on the times of receipt. A set of stations is established that are configured to acquire information that characterizes each of multiple clients in a manner that enables a determination about authenticating each of the clients with respect to a corresponding network, the information being acquired other than in the form of digital messages that are passed on behalf of the clients to the corresponding networks. The information is provided to operators of the networks to enable them to make authentication decisions based on the information.
81 Citations
34 Claims
-
1. A method comprising,
in connection with authenticating a client of a network, acquiring information that characterizes the client in a manner that enables a determination about authenticating the client of the network, the information being acquired other than in the form of a digital message that is passed on behalf of the client to the network, and making an authentication decision based on the information.
-
21. A method comprising
encrypting information in a manner that is based on a physical property of an intended recipient of the information, and delivering the encrypted information to the recipient.
- 24. (canceled)
-
29. A method comprising
physically associating a source of a beacon with an object, periodically measuring times of receipt of the beacon at multiple stations, determining locations of the object based on the times of receipt, and generating a map of the locations.
- 30. (canceled)
-
34. A method of encrypting and decrypting a message comprising
expressing the message as a message signal comprised of a sum based on eigenfunctions, decomposing the sum into partial sums such that each of the partial sums conveys no meaning relative to the message, partial sums from the sum separating the expressions of the signal into partial summations, forming electromagnetic signals based on the respective partial sums, sending the electromagnetic signals from respective sources at times selected to assure the simultaneous arrival of the signals at an intended location, such that the electromagnetic signals superpose themselves to form the message signal.
Specification