The current security method that share a key , are vulnerable to security breaches, because a third party observer can " STEAL " the key when it is shared( monitors the communications). The claimed subject matter uses a Novel and non obvious way of utilizing sensors to collect security data in such manner that " The sensor information is not connected between the two devices" Therefore improving security technology.
The claim are using collection of sensor data in a specific way to improve security technology.