Source verification device
First Claim
1. A computer-implemented method, comprising:
- receiving, by a computing device, a report from a first source;
determining, by the computing device, the first source is listed in a source repository based on receiving the report, the source repository being an untrusted source repository;
selecting, by the computing device, a second source at a location remote from the first source based on the first source being listed in the source repository, the selecting the second source being based on proximity of the second source to the first source;
confirming, by the computing device, the report from the first source based on information received from the second source;
repeating, by the computing device, the selecting and the confirming until a value of information in the report from the second source exceeds an information trust level value for the report, the information trust level value for the report being based on a type of report and profile information for the type of report;
determining the location of the first source based on the first source being listed in the untrusted source repository; and
selecting an area around the first source and selecting the second source from a plurality of second sources within the area around the first source, the selected second source being one of the plurality of second sources that is farthest away from the first source.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for source verification are disclosed. A method includes: receiving, by a computing device, a report from a first source; determining, by the computing device, the first source is listed in a source repository based on receiving the report; selecting, by the computing device, a second source at a location remote from the first source based on the source being listed in the source repository; confirming, by the computing device, the report from the first source based on information received from the second source; repeating, by the computing device, the selecting and the confirming until a value of information in the report from the second source exceeds an information trust level value for the report.
20 Citations
14 Claims
-
1. A computer-implemented method, comprising:
-
receiving, by a computing device, a report from a first source; determining, by the computing device, the first source is listed in a source repository based on receiving the report, the source repository being an untrusted source repository; selecting, by the computing device, a second source at a location remote from the first source based on the first source being listed in the source repository, the selecting the second source being based on proximity of the second source to the first source; confirming, by the computing device, the report from the first source based on information received from the second source; repeating, by the computing device, the selecting and the confirming until a value of information in the report from the second source exceeds an information trust level value for the report, the information trust level value for the report being based on a type of report and profile information for the type of report; determining the location of the first source based on the first source being listed in the untrusted source repository; and selecting an area around the first source and selecting the second source from a plurality of second sources within the area around the first source, the selected second source being one of the plurality of second sources that is farthest away from the first source. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer program product comprising a computer readable storage medium having program instructions embodied therewith, the program instructions executable by a computer device to cause the computer device to:
-
receive a report from a first user device of a first source and determine the first source is listed in a source repository based on receiving the report, the source repository being an untrusted source repository; assign an information trust level value to the report from the first source based on receiving the report, the information trust level value for the report being based on a type of report and profile information for the type of report; select a second user device of a second source at a location remote from the user device of the first source based on assigning the information trust level value to the report from the first source, the selecting the second user device of the second source being based on proximity of the second source to the first source; assign an information value to information from the second source based on receiving information from the second source; confirm the report with the second user device of the second source based on determining the information value exceeds the information trust level value; determine the location of the first source based on the first source being listed in the untrusted source repository; and select an area around the first source and select the second source from a plurality of second sources within the area around the first source, the selected second source being one of the plurality of second sources that is farthest away from the first source. - View Dependent Claims (8, 9, 10)
-
-
11. A system comprising:
-
a CPU, a computer readable memory and a computer readable storage medium associated with a computing device; program instructions to receive a report from an unknown source at a location and determine the unknown source is listed in a source repository based on receiving the report, the source repository being an untrusted source repository; program instructions to determine other unknown sources near the location; program instructions to select a second unknown source from the other unknown sources, the selecting the second unknown source being based on proximity of the second unknown source to the first unknown source; program instructions to determine whether information from the second unknown source exceeds an information trust level value, the information trust level value being based on a type of the report and profile information for the type of the report; program instructions to repeat the selecting until information from a number of unknown sources exceeds the information trust level value; program instructions to determine the location of the unknown source based on the unknown source being listed in the untrusted source repository; and program instructions to select an area around the unknown source and select the second unknown source from the other unknown sources within the area around the unknown source, the selected second source being one of the other unknown sources that is farthest away from the unknown source, wherein the program instructions are stored on the computer readable storage medium for execution by the CPU via the computer readable memory. - View Dependent Claims (12, 13, 14)
-
Specification