Location information verification
First Claim
1. An apparatus, comprising:
- a memory configured to store location information comprising first part and a second part; and
a processor configured to obtain from the second part an authenticator and to test the authenticator based on a cryptographic method known by a provider of the location information and by the apparatus.
2 Assignments
0 Petitions
Accused Products
Abstract
Location information is provided with an authenticator in order to enable future providing of an authentication to a service or application making use of the location information. The authenticator is based on a cryptographic method known by a provider and recipient of and also optionally based on position data provided by the location information. The authenticator is carried as a watermark in the location information so that the location information can be used by prior existing systems and enables the authentication of the location information in compatible authentication enabled systems. On receiving the location information, an authentication enabled recipient obtains the authenticator from the location information and checks using the authenticator whether use of the location information may be allowed.
16 Citations
26 Claims
-
1. An apparatus, comprising:
-
a memory configured to store location information comprising first part and a second part; and a processor configured to obtain from the second part an authenticator and to test the authenticator based on a cryptographic method known by a provider of the location information and by the apparatus. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method comprising:
-
storing location information comprising first part and a second part; obtaining from the second part an authenticator; and testing the authenticator based on a cryptographic method known by a provider of the location information and by the apparatus. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. An apparatus comprising:
-
a memory configured to store location information comprising a first part and a second part, the location information being intended to a recipient; and a processor configured to include in the second part an authenticator based on a cryptographic method known by the apparatus and by intended recipient of the location information. - View Dependent Claims (14, 15, 16, 17, 18, 21, 22, 23, 24)
-
-
19. A method comprising:
-
storing location information comprising a first part and a second part, the location information being intended to a recipient; and including in the second part an authenticator derivable based on a cryptographic method known by the apparatus and by intended recipient of the location information. - View Dependent Claims (20)
-
-
25. A computer program comprising computer executable program code for causing an apparatus when executing the program code to perform:
-
storing location information comprising a first part and a second part, the location information being intended to a recipient; and including in the second part by an authenticator based on a cryptographic method known by the apparatus and by the intended recipient of the location information.
-
-
26. A computer program comprising computer executable program code for causing an apparatus when executing the program code to perform:
-
storing location information comprising first part and a second part;
obtaining from the second part an authenticator; andtesting the authenticator based on a cryptographic method known by a provider of the location information and by the apparatus.
-
Specification