Free
Message: On the way back to 3 cents?
The current security method that share a key , are vulnerable  to security breaches, because a third party observer can " STEAL " the key when it is shared( monitors the communications). The claimed subject matter uses a Novel and non obvious way of utilizing sensors to collect security data in such manner that " The sensor information is not connected between the two devices" Therefore improving security technology.

 

The claim are using collection of sensor data in a specific way to improve security technology.
Share
New Message
Please login to post a reply