Location source authentication
First Claim
1. A method for validating the source of the location used by a computational device, the method comprising the steps of:
- a) receiving a request to authenticate and validate the source of the location data, the request being received from a computational device;
b) collecting additional location data from the computational device and the location provider;
c) collecting reference location data from trusted and previously authenticated location sources;
d) collecting signal strengths and time sensitive data from computational device, location source and the reference stations;
e) estimating the location of the location source for computational device by cross referring with trusted resources and programmatic calculations;
f) authorizing the source of the location to the computational device to get any location based service; and
g) preventing the unauthorized location based services to location compromised computational devices.
0 Assignments
0 Petitions
Accused Products
Abstract
A method and system to validate the source of the location data, such that access to location based service is protected based on a location. When the source of the location data is verified, an authentication, and/or a temporary key pair are generated for the computational device to successfully get the location based service. Moreover, the Location Based Service is assured of providing service to the computational device only at the authorized location. A method and system for managing access to the location based service is also disclosed. A request is received to authenticate the source of the location either by the computational device or by the location based service provider. Access to the location based service is granted when the location is an authorized location. Once access is granted, the temporary key pair is used for successful transactions. Moreover, the validity of the location source is constantly validated by expiring the temporary key pair with time duration.
65 Citations
18 Claims
-
1. A method for validating the source of the location used by a computational device, the method comprising the steps of:
-
a) receiving a request to authenticate and validate the source of the location data, the request being received from a computational device; b) collecting additional location data from the computational device and the location provider; c) collecting reference location data from trusted and previously authenticated location sources; d) collecting signal strengths and time sensitive data from computational device, location source and the reference stations; e) estimating the location of the location source for computational device by cross referring with trusted resources and programmatic calculations; f) authorizing the source of the location to the computational device to get any location based service; and g) preventing the unauthorized location based services to location compromised computational devices. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A geo verification system for validating and authenticating the source of the location data for a first computational device, the system comprising:
-
a) a request receiving module, the request receiving module receiving a request from a computational device to validate the source of the location data; b) a data retrieving module, the data-retrieving module retrieving the payload of the request; c) an encryption-decryption module, the encryption-decryption module decrypting and encrypting the payload of the request and response respectively; d) a control module, the control module enabling reference data collection, location validation, and key pair generation; e) a query module, the query module communicates with computational device and reference stations to collect data; f) a key-pair generating module, the key-pair generating module randomly creates key pairs for authenticated location sources and the location based service for a particular instance of the location based service; and g) means for preventing location based service from an unauthorized location by a computational device. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer program product for use with a computer stored program, the computer program product comprising a computer readable medium having a computer readable program code embodied therein for validating source of the location from a computational device or from a location based service provider, the computer readable program code including instructions for:
-
a) receiving a request to validate the source of the location from a computational device or from a location based service provider; b) retrieving data from the request by decrypting and sending data encrypting; c) collecting location data from source of the location; d) collecting location data from the trusted reference stations; and e) validating the source of the location and preventing access from unauthorized locations to location based service. - View Dependent Claims (18)
-
Specification