Modifying Security State With Secured Range Detection
First Claim
1. A method for a first device to modify a security state at a second device, the method comprising:
- performing a plurality of ranging operations to compute a plurality of sample distance measurements between the first and second devices;
determining whether the plurality of sample distance measurements meets a set of criteria; and
when the calculated composite distance measurement meets the set of criteria, exchanging a security token with the second device to modify the security state at the second device.
4 Assignments
0 Petitions
Accused Products
Abstract
Some embodiments of the invention provide a method for a trusted (or originator) device to modify the security state of a target device (e.g., unlocking the device) based on a securing ranging operation (e.g., determining a distance, proximity, etc.). The method of some embodiments exchanges messages as a part of a ranging operation in order to determine whether the trusted and target devices are within a specified range of each other before allowing the trusted device to modify the security state of the target device. In some embodiments, the messages are derived by both devices based on a shared secret and are used to verify the source of ranging signals used for the ranging operation. In some embodiments, the method is performed using multiple different frequency bands.
10 Citations
32 Claims
-
1. A method for a first device to modify a security state at a second device, the method comprising:
-
performing a plurality of ranging operations to compute a plurality of sample distance measurements between the first and second devices; determining whether the plurality of sample distance measurements meets a set of criteria; and when the calculated composite distance measurement meets the set of criteria, exchanging a security token with the second device to modify the security state at the second device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. For a proxy device, a method for establishing a communication connection between a target device and a trusted device, the method comprising:
-
announcing an availability of the trusted device; in response to the announced availability, receiving a first request from the target device; and upon receiving the first request from the target device, sending a second request to the trusted device, wherein the trusted device establishes the communication connection based on the second request. - View Dependent Claims (19, 20, 21, 22, 23)
-
-
24. A non-transitory machine readable medium storing a program which when executed by a set of processing units of a target device establishes a communication connection between the target device and a trusted device, the program comprising sets of instructions for:
-
scanning for availability of a trusted device; based on the scan, identifying a particular trusted device; sending a request for the particular trusted device to a proxy device that sends a request to the particular trusted device; and establishing a communication connection with the particular trusted device. - View Dependent Claims (25, 26, 27, 28, 29, 30, 31, 32)
-
Specification