Automated Peer Authentication
First Claim
Patent Images
1. An apparatus comprising:
- a receiver for receiving a signal that indicates that a user is to be authenticated; and
a processor for selecting a peer to authenticate said user;
wherein the selection of said peer is based one or more properties of one or more entities; and
wherein at least one of said properties is expected to change during any time interval of N minutes;
and wherein N is a positive number.
25 Assignments
0 Petitions
Accused Products
Abstract
An apparatus and methods are disclosed for performing peer authentication without the assistance of a human “guard.” In accordance with the illustrative embodiments, a peer is selected from a non-empty set of candidates at authentication time based on one or more of the following dynamic properties: the current geo-location of the user to be authenticated; the current geo-locations of the candidates; the current time; the contents of one or more directories (e.g., a telephone directory, an organizational chart or directory, etc.), the contents of one or more call logs; and the candidates'"'"' schedules.
-
Citations
23 Claims
-
1. An apparatus comprising:
-
a receiver for receiving a signal that indicates that a user is to be authenticated; and a processor for selecting a peer to authenticate said user; wherein the selection of said peer is based one or more properties of one or more entities; and wherein at least one of said properties is expected to change during any time interval of N minutes; and wherein N is a positive number. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
- 10. A method comprising selecting a peer to authenticate a user, wherein the selection of said peer is based on one or more properties of one or more entities, and wherein at least one of said properties is expected to change during any time interval of N minutes, and wherein N is a positive number.
-
20. A method comprising:
-
transmitting to a peer a signal that indicates that a user is to be authenticated by said peer; receiving from said peer, in response to said signal, a non-Boolean value; and determining whether to authenticate said user based on said non-Boolean values. - View Dependent Claims (21, 22, 23)
-
Specification