Devices, Systems and Methods for Security Using Magnetic Field Based Identification
First Claim
1. A method comprising:
- receiving, by an authentication server comprising a processor, a first electromagnetic signature of a communication device;
receiving, by the authentication server, a second electromagnetic signature of the communication device created when the communication device is gestured; and
attempting, by the authentication server based on the first electromagnetic signature and the second electromagnetic signature, to authenticate the communication device.
1 Assignment
0 Petitions
Accused Products
Abstract
Devices, systems and methods are disclosed for determining an electromagnetic signature for authenticating a device, a user, and/or a location. In exemplary embodiments, a magnetometer captures an electromagnetic signature which is then compared with one or more authorized electromagnetic signatures. If the electromagnetic signature matches an authorized electromagnetic signature, then access is granted. The magnetometer is integrated into a communication device having a processor and a logic. The magnetometer captures an electromagnetic signature of a surrounding environment and detects motion of the communication device through the captured electromagnetic signature. The logic on the communication device locks or unlocks features of the device based upon the captured electromagnetic signature. In further embodiments of the subject disclosure, the magnetometer is in communication with a server which authenticates a user or communication device to provide access to a remote location.
-
Citations
20 Claims
-
1. A method comprising:
-
receiving, by an authentication server comprising a processor, a first electromagnetic signature of a communication device; receiving, by the authentication server, a second electromagnetic signature of the communication device created when the communication device is gestured; and attempting, by the authentication server based on the first electromagnetic signature and the second electromagnetic signature, to authenticate the communication device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An authentication server comprising:
-
a processor; and a memory storing instructions that, when executed by the processor, cause the processor to perform operation comprising receiving a first electromagnetic signature of a communication device, receiving a second electromagnetic signature of the communication device created when the communication device is gestured, and attempting, based on the first electromagnetic signature and the second electromagnetic signature, to authenticate the communication device. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A memory storing instructions that, when executed by a processor, causes the processor to perform operations comprising:
-
receiving a first electromagnetic signature of a communication device; receiving a second electromagnetic signature of the communication device created when the communication device is gestured; and attempting, based on the first electromagnetic signature and the second electromagnetic signature, to authenticate the communication device. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification