User access verification
First Claim
Patent Images
1. A method of providing access verification for an electronic system, the method comprising:
- activating a security control device by a host device, wherein the security control device is communicatively coupled to the host device, and wherein the host device comprises an electronic device having at least communications, power, input/output, and processing capability, wherein the host device and the security control device are physically integrated with one another on an integrated circuit;
receiving, by the security control device, two or more verification signals, wherein the two or more verification signals originate from outside the system and are locally-based, and wherein the two or more verification signals include a global positioning satellite signal, an internet protocol signal originating from a server, switch, or gateway, a wireless router signal, and a radio frequency signal, wherein the plurality of verification signals are present simultaneously;
comparing, by the security control device, the two or more verification signals to a table of stored criteria values to determine whether the two or more verification signals are valid signals or invalid signals, wherein the table of stored criteria values include a database of preselected signals based on location;
choosing, by the security control device, a positive response or negative response based on the comparison, wherein the positive response results from two or more valid signals received by the security control device, and enables the host device to continue operating, and wherein the negative response results from two or more invalid signals received by the security control device, and disables the host device by restricting one or more functions of the host device including communications, power, input/output, and processing capability; and
sending an access determination signal to the system based on the positive response or negative response.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments are directed to a method of providing access verification for a system that includes activating a security control device, which is in communications with a host device. The method also includes having the security control device receiving a verification signal coming from outside the system while being locally-based, and comparing the verification signal to a table of stored criteria values. The device then chooses a response based on that comparison and sends an access determination signal based on the response.
-
Citations
10 Claims
-
1. A method of providing access verification for an electronic system, the method comprising:
-
activating a security control device by a host device, wherein the security control device is communicatively coupled to the host device, and wherein the host device comprises an electronic device having at least communications, power, input/output, and processing capability, wherein the host device and the security control device are physically integrated with one another on an integrated circuit; receiving, by the security control device, two or more verification signals, wherein the two or more verification signals originate from outside the system and are locally-based, and wherein the two or more verification signals include a global positioning satellite signal, an internet protocol signal originating from a server, switch, or gateway, a wireless router signal, and a radio frequency signal, wherein the plurality of verification signals are present simultaneously; comparing, by the security control device, the two or more verification signals to a table of stored criteria values to determine whether the two or more verification signals are valid signals or invalid signals, wherein the table of stored criteria values include a database of preselected signals based on location; choosing, by the security control device, a positive response or negative response based on the comparison, wherein the positive response results from two or more valid signals received by the security control device, and enables the host device to continue operating, and wherein the negative response results from two or more invalid signals received by the security control device, and disables the host device by restricting one or more functions of the host device including communications, power, input/output, and processing capability; and sending an access determination signal to the system based on the positive response or negative response. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A device to provide access verification for a system, the device comprising:
-
a security control device activated by a host device and, communicatively coupled to the host device, wherein the host device comprises an electronic device having at least communications, power, input/output, and processing capability, wherein the host device and the security control device are physically integrated with one another on an integrated circuit; two or more verification signals originating from outside the system and are locally-based, wherein the two or more verification signals include a global positioning satellite signal, an internet protocol signal originating from a server, switch, or gateway, a wireless router signal, and a radio frequency signal, wherein the plurality of verification signals are present simultaneously; a table of stored criteria values located within the security control device, wherein the stored criteria values are used to determine whether the two or more verification signals are valid signals or invalid signals, and wherein the stored criteria values include a database of preselected signals based on location; a processor, located within the security control device, wherein the processor compares the two or more verification signals to the table of stored criteria values and chooses a positive response or a negative response based on the comparison, wherein the positive response results from two or more valid signals being present, and enables the host device to continue operating, and wherein the negative response results from two or more invalid signals being present, and disables the host device by restricting one or more functions of the host device including communications, power, input/output, and processing capability; and an access determination signal based on the response.
-
Specification