Secure Current Movement Indicator Based Authentication
An indicator and indication technology, applied in the direction of security devices, digital data authentication, network topology, etc., can solve the problem that the use of GPS sensors is too expensive
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0026] Various embodiments will be described in detail with reference to the accompanying drawings. Wherever possible, the same reference numbers will be used throughout the drawings to refer to the same or like parts. References made to particular examples and implementations are for illustrative purposes, and are not intended to limit the scope of the invention or the claims.
[0027] The word "exemplary" is used herein to mean "serving as an example, instance, or illustration." Any implementation described herein as "exemplary" should not necessarily be construed as preferred or advantageous over other implementations.
[0028] The term "mobile computing device" or "mobile device" or "computing device" is used herein to refer to any or all of the following: cellular telephone, smart phone (e.g., iPhone), web tablet, tablet , Internet-enabled cellular phones, WiFi-enabled electronic devices, personal data assistants (PDAs), laptop computers, personal computers, and similar...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


