US 9,813,238 B2
Mobile security using context patterns
Soma Biswas, Lausanne (CH)
Assigned to EMPIRE TECHNOLOGY DEVELOPMENT LLC, Wilmington, DE (US)
Filed by EMPIRE TECHNOLOGY DEVELOPMENT LLC, Wilmington, DE (US)
Filed on Sep. 26, 2014, as Appl. No. 14/498,312.
Prior Publication US 2016/0094344 A1, Mar. 31, 2016
Int. Cl. H04W 12/06 (2009.01); H04L 9/08 (2006.01); H04L 9/30 (2006.01); G06F 21/31 (2013.01); G06F 21/60 (2013.01)
CPC H04L 9/0866 (2013.01) [G06F 21/316 (2013.01); G06F 21/606 (2013.01); H04L 9/3073 (2013.01); H04W 12/06 (2013.01); G06F 2221/2111 (2013.01)] 30 Claims
OG exemplary drawing
 
1. A method comprising:
capturing a context pattern of a user device, wherein the context pattern is based, at least in part, on data from one or more sensors of the user device, wherein the data is acquired at multiple different times and includes locations of the user device at the multiple different times;
generating at least one public-private key pair, wherein a public key or a private key of the at least one public-private key pair is based, at least in part, on the context pattern; and
authenticating the user device using the at least one public-private key pair.