Physical location verification
First Claim
1. A method of operating a first device to authenticate a portable wireless device, the method comprising:
- with the first device, selecting a pattern of physical movements from among a set of patterns or randomly generating the pattern of physical movements and prescribing the selected pattern to the portable wireless device by communicating wirelessly, via an antenna of the first device, with the portable wireless device to provide to the portable wireless device pattern information indicating the pattern of physical movements;
analyzing signal information obtained from the antenna to determine, by the first device, whether the portable wireless device has been physically moved with movements that match the pattern of physical movements prescribed by the selected pattern; and
wherein when it has been determined that the portable wireless device has been physically moved according to the pattern of physical movements then the portable wireless device is determined to have been authenticated, and wherein when it has been determined that the portable wireless device has not been moved according to the pattern of physical movements then the wireless device is determined to have not been authenticated, and wherein pattern information provided to the first device comprises information configured to be used by the first device to display or play a description of the pattern of physical movements.
2 Assignments
0 Petitions
Accused Products
Abstract
A process for secure, safe, and easy provisioning of a wireless device with credentials to connect to a wireless network. A connecting wireless device and an established wireless device both utilize low power transmission at close proximity to exchange wireless connection setting information and/or a password. The connecting wireless device is moved into proximity with the established wireless device and a low power setting is discovered at which the wireless devices may communicate with a sufficiently low error rate. The proximity of the connecting wireless device to the established wireless device is verified and the connecting wireless device is then passed the secret information by the established network device.
39 Citations
19 Claims
-
1. A method of operating a first device to authenticate a portable wireless device, the method comprising:
-
with the first device, selecting a pattern of physical movements from among a set of patterns or randomly generating the pattern of physical movements and prescribing the selected pattern to the portable wireless device by communicating wirelessly, via an antenna of the first device, with the portable wireless device to provide to the portable wireless device pattern information indicating the pattern of physical movements; analyzing signal information obtained from the antenna to determine, by the first device, whether the portable wireless device has been physically moved with movements that match the pattern of physical movements prescribed by the selected pattern; and wherein when it has been determined that the portable wireless device has been physically moved according to the pattern of physical movements then the portable wireless device is determined to have been authenticated, and wherein when it has been determined that the portable wireless device has not been moved according to the pattern of physical movements then the wireless device is determined to have not been authenticated, and wherein pattern information provided to the first device comprises information configured to be used by the first device to display or play a description of the pattern of physical movements. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method, performed by a first device comprising a first antenna, the method authenticating a second device comprising a second antenna, the method comprising:
-
providing, from the first device to the second device, text or media indicating a pattern of physical movements, the physical movements including at least one movement away from first device; receiving wireless communications from the antenna of the second device; analyzing the received wireless communications to determine whether the wireless communications indicate that the second device has moved relative to the first device according to the pattern of physical movements; and indicating that the second device is authenticated when the received wireless communications have been determined to indicate that the pattern of physical movements occurred. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A method of authentication comprising:
-
receiving, at a portable device from an authenticating device, via a wireless receiver of the portable device, information indicating a pattern of motions prescribed by the authenticating device; outputting, by a portable device, information indicating the pattern of motions, the pattern of motions comprising a motion toward the authenticating device and a motion away from the authenticating device; and transmitting, by a wireless transmitter of the portable device, signals while the portable device is being physically moved by a user of the portable device according to the pattern of motions such that the portable device moves away from the authenticating device and toward the authenticating device. - View Dependent Claims (14, 15, 16, 17, 18)
-
-
19. A method of authenticating a wireless device for wireless access to a wireless access device, the method performed by the wireless access device, the method comprising:
-
receiving a request from the wireless device for network access via the wireless access device; responsive to the request, randomly selecting or generating a physical movement pattern comprised of indicia of a prescribed sequence of physical movements; informing the wireless device of the movement pattern, and, according to the informing, the wireless device providing output perceivable by a user thereof to inform the user of the movement pattern; after the informing, monitoring emissions from the wireless device, identifying ranges between the first and second wireless devices from the emissions using a range measurement process, and according to the identifying determining whether the wireless device has moved the prescribed sequence of physical movements; and determining whether to grant the request for wireless access according to the determining of whether the wireless device has moved the prescribed sequence of physical movements.
-
Specification