Intelligent agent authentication via position locator system
First Claim
Patent Images
1. A system for authenticating an intelligent agent, said system comprising:
- an intelligent agent, wherein the intelligent agent comprises a computer implemented program packet;
an identifier which ascertains the location and identity of an entry intelligent agent attempting to gain access to the location, the identity being ascertained via an identification tag associated with the intelligent agent;
a general register of identification tags corresponding to a plurality of intelligent agents and of possible locations at which the registered intelligent agents may gain access; and
a threshold manager which permits access, to a given location, of an entry intelligent agent that corresponds to at least one intelligent agent in said general register.
2 Assignments
0 Petitions
Accused Products
Abstract
The authentication of intelligent agents (IA'"'"'s) using a position locator system (PLS). Particularly contemplated is the comparison of the physical position of an intelligent agent requiring access to that of an intelligent agent whose identity is claimed by the former intelligent agent.
56 Citations
21 Claims
-
1. A system for authenticating an intelligent agent, said system comprising:
-
an intelligent agent, wherein the intelligent agent comprises a computer implemented program packet; an identifier which ascertains the location and identity of an entry intelligent agent attempting to gain access to the location, the identity being ascertained via an identification tag associated with the intelligent agent; a general register of identification tags corresponding to a plurality of intelligent agents and of possible locations at which the registered intelligent agents may gain access; and a threshold manager which permits access, to a given location, of an entry intelligent agent that corresponds to at least one intelligent agent in said general register. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method of authenticating an intelligent agent, said method comprising the steps of:
-
ascertaining the location and identity of an entry intelligent agent attempting to gain access to the location, the identity being ascertained via an identification tag associated with the intelligent agent, wherein the intelligent agent comprises a computer implemented program packet; providing a general register of identification tags corresponding to a plurality of intelligent agents and of possible locations at which the registered intelligent agents may gain access; and permitting access, to a given location, of an entry intelligent agent that corresponds to at least one intelligent agent in said general register. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A program storage device readable by machine, tangibly embodying a program of instructions executable by the machine to perform method steps for authenticating an intelligent agent, said method comprising the steps of:
-
ascertaining the location and identity of an entry intelligent agent attempting to gain access to the location, the identity being ascertained via an identification tag associated with the intelligent agent, wherein the intelligent agent comprises a computer implemented program packet; providing a general register of identification tags corresponding to a plurality of intelligent agents and of possible locations at which the registered intelligent agents may gain access; and permitting access, to a given location, of an entry intelligent agent that corresponds to at least one intelligent agent in said general register.
-
Specification