SYSTEM AND METHOD FOR VALIDATING A LOCATION OF AN UNTRUSTED DEVICE
First Claim
Patent Images
1. A method, comprising:
- identifying a validation requirement for an untrusted device in a region of interest in response to a participation request;
instructing the untrusted device to identify at least one wireless access point in the region of interest;
receiving, from the untrusted device, a list identifying the at least one wireless access point in the region of interest with a corresponding at least one identifier; and
validating the at least one wireless access point in response to the at least one identifier.
3 Assignments
0 Petitions
Accused Products
Abstract
In a system of mobile agents operating in a region of interest, it may be necessary to validate the position of an untrusted device prior to allowing the untrusted device to perform agent functions within the region of interest. Trusted mobile agents within the region of interest may activate wireless access points with randomly generated identifiers. The untrusted device may be instructed to provide a list of identifiers of visible wireless access points to confirm that the untrusted device is within the ROI.
45 Citations
42 Claims
-
1. A method, comprising:
-
identifying a validation requirement for an untrusted device in a region of interest in response to a participation request; instructing the untrusted device to identify at least one wireless access point in the region of interest; receiving, from the untrusted device, a list identifying the at least one wireless access point in the region of interest with a corresponding at least one identifier; and validating the at least one wireless access point in response to the at least one identifier. - View Dependent Claims (2, 3, 4, 6, 7, 8, 9, 10)
-
-
5. (canceled)
-
11. A trusted device, comprising:
-
a memory device configured to store instructions defining an agent application; a processing device configured to execute the instructions stored in the memory device to; identify a validation requirement in response to receiving a request to participate with the trusted device in a region of interest from an untrusted device; request the untrusted device identify at least one wireless access point in a region including the untrusted device; receive, from the untrusted device, at least one wireless access point identifier configured to identify the at least one wireless access point in the region including the untrusted device in response to the request to identify; identify at least one wireless access point in the region of interest; and validate the untrusted device in response to the at least one wireless access point identifier corresponding to the at least one wireless access point in the region of interest. - View Dependent Claims (12, 14, 16, 19)
-
-
13. (canceled)
-
15. (canceled)
-
17-18. -18. (canceled)
-
20. (canceled)
-
21. A computer-readable storage device comprising computer-executable instructions stored thereon that configure a processing device to perform operations comprising:
-
identifying a validation requirement for an untrusted device in response to receiving a participation request from the untrusted device; instructing the untrusted device to identify at least one wireless access point visible to the untrusted device; receiving, from the untrusted device, a list identifying the at least one wireless access point with a corresponding at least one identifier; and validating the untrusted device in response to the at least one identifier corresponding to a wireless access point in a region of interest. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. A method, comprising:
-
transmitting a participation request from an untrusted device to a trusted device operating in a first region; identifying a wireless access point located in a second region within communicable range of the untrusted device in response to the participation request; transmitting an identifier corresponding to the wireless access point from the untrusted device to the trusted device; and receiving validation from the trusted device in response to the identifier corresponding to at least one of a plurality of wireless access points operating in the first region. - View Dependent Claims (31, 32, 33)
-
-
34. An untrusted device, comprising:
-
a memory device configured to store instructions defining an agent application; a processing device configured to execute the instructions stored in the memory device to; transmit a participation request from an untrusted device to a trusted device operating in a first region; identify a wireless access point located in a second region within communicable range of the untrusted device in response to the participation request; transmit an identifier corresponding to the wireless access point from the untrusted device to the trusted device; and receive validation from the trusted device in response to the identifier corresponding to at least one of a plurality of wireless access points operating in the first region. - View Dependent Claims (35, 36, 37)
-
-
38. A computer-readable storage device comprising computer-executable instructions stored thereon that configure a processing device to perform operations comprising:
-
transmitting a participation request from an untrusted device to a trusted device operating in a first region; identifying a wireless access point located in a second region within communicable range of the untrusted device in response to the participation request; transmitting an identifier corresponding to the wireless access point from the untrusted device to the trusted device; and receiving validation from the trusted device in response to the identifier corresponding to at least one of a plurality of wireless access points operating in the first region. - View Dependent Claims (39, 40, 41, 42)
-
Specification