USING TRAJECTORY FOR AUTHENTICATION
First Claim
Patent Images
1. A method, comprising:
- determining a trajectory of a device within a physical environment; and
authenticating the device based on the determined trajectory.
1 Assignment
0 Petitions
Accused Products
Abstract
An authentication system authenticates a device based on a detected trajectory of that device within a physical environment. The device includes a wireless transmitter that communicates with sensors distributed throughout the environment. As the device moves throughout the environment, the sensors send location information to an authentication system. The authentication system tracks the trajectory or dynamic location of the device and authenticates the device based on whether the observed trajectory of the device conforms with a predicted trajectory or behavior.
64 Citations
20 Claims
-
1. A method, comprising:
-
determining a trajectory of a device within a physical environment; and authenticating the device based on the determined trajectory. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system comprising:
-
a transmitter to move throughout a physical environment; a plurality of sensors distributed throughout the physical environment to detect the transmitter as it moves therethrough; and an authentication system to receive information from the sensors corresponding to the detected movement of the transmitter, the authentication system to authenticate the transmitter based on the detected movement. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A computer-readable medium having instructions stored thereon which, when executed by a processor-based device, cause the processor-based device to:
-
determine a trajectory of a device within a physical environment; and authenticate the device based on the determined trajectory. - View Dependent Claims (17, 18, 19, 20)
-
Specification