Providing enhanced security for wireless telecommunications devices
First Claim
1. A method for use in providing enhanced security for wireless telecommunications devices, the method comprising:
- providing a first sensor, included in a wireless telecommunications device, for helping derive a first set of physical context data associated with the wireless telecommunications device;
providing a second sensor, included in a separate secure authentication device, for helping derive a second set of physical context data associated with the wireless telecommunications device;
securely transmitting the first set of physical context data to the authentication device;
at the authentication device, using the first and second set of physical context data to help determine whether the wireless telecommunications device has been moved in a gesture that is consistent with a use of the wireless telecommunications device for a specific purpose; and
permitting further communication between the wireless telecommunications device and the authentication device based on a determination that the gesture that is consistent with a use of the wireless telecommunications device for a specific purpose, wherein the communication includes exchanging commercial transaction information.
9 Assignments
0 Petitions
Accused Products
Abstract
A method and system for use in providing enhanced security for wireless telecommunications devices is disclosed. In at least one embodiment, the method and system comprises providing a first sensor, included in a wireless telecommunications device, for helping derive a first set of physical context data associated with the wireless telecommunications device; providing a second sensor, included in an authentication device, for helping derive a second set of physical context data associated with the wireless telecommunications device; and using the first and second set of physical context data to help determine whether the wireless telecommunications device has been moved in a gesture that is consistent with a use of the wireless telecommunications device for a specific purpose.
-
Citations
20 Claims
-
1. A method for use in providing enhanced security for wireless telecommunications devices, the method comprising:
-
providing a first sensor, included in a wireless telecommunications device, for helping derive a first set of physical context data associated with the wireless telecommunications device; providing a second sensor, included in a separate secure authentication device, for helping derive a second set of physical context data associated with the wireless telecommunications device; securely transmitting the first set of physical context data to the authentication device; at the authentication device, using the first and second set of physical context data to help determine whether the wireless telecommunications device has been moved in a gesture that is consistent with a use of the wireless telecommunications device for a specific purpose; and permitting further communication between the wireless telecommunications device and the authentication device based on a determination that the gesture that is consistent with a use of the wireless telecommunications device for a specific purpose, wherein the communication includes exchanging commercial transaction information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system for use in providing enhanced security for wireless telecommunications devices, the system comprising:
-
first logic configured to provide a first sensor, included in a wireless telecommunications device, for helping derive a first set of physical context data associated with the wireless telecommunications device and securely communicate the first set of physical context data to the authentication device; second logic configured to provide a second sensor, included in a separate secure authentication device, for helping derive a second set of physical context data associated with the wireless telecommunications device; third logic configured to use the first and second set of physical context data to help determine whether the wireless telecommunications device has been moved in a gesture that is consistent with a use of the wireless telecommunications device for a specific purpose; and fourth logic configured to permit further communication between the wireless telecommunications device and the authentication device based on a determination that the gesture that is consistent with a use of the wireless telecommunications device for a specific purpose, wherein the communication includes exchanging commercial transaction information. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification