Mobile security using context patterns
Abstract:
Examples of methods, systems, products, devices, and/or apparatus generally related to mobile security are described. An example method may include capturing a context pattern of a user device. The context pattern may be based, at least in part, on data from one or more sensors of the user device. The data may be acquired at multiple different times. The example method may further include generating at least one public-private key pair based, at least in part, on the context pattern.
Public/Granted literature
Information query
Patent Agency Ranking
0/0