LOCATION PROOFS
First Claim
1. A method, comprising:
- receiving a request for content from a computing device, the request comprising an encrypted location proof, the location proof comprising first data that identifies the computing device and second data that identifies a wireless access point that issued the encrypted location proof to the computing device;
decrypting the encrypted location proof to obtain the first data and the second data; and
outputting the content based upon the first data and the second data.
1 Assignment
0 Petitions
Accused Products
Abstract
A wireless computing device includes an antenna that is configured to transmit and receive wireless signals. The wireless computing device comprises a transmitter component that causes a first wireless signal to be transmitted to a wireless access point via the antenna, wherein the first wireless signal comprises a request for a location proof, wherein the request for the location proof comprises data that identifies the wireless computing device, and wherein the location proof comprises data that is indicative of a geographic location of the wireless access point. The system also includes a receiver component that receives, via the antenna, a second wireless signal from the wireless access point, wherein the second wireless signal is received by the receiver component subsequent to the transmitter component causing the first wireless signal to be transmitted to the wireless access point.
-
Citations
20 Claims
-
1. A method, comprising:
-
receiving a request for content from a computing device, the request comprising an encrypted location proof, the location proof comprising first data that identifies the computing device and second data that identifies a wireless access point that issued the encrypted location proof to the computing device; decrypting the encrypted location proof to obtain the first data and the second data; and outputting the content based upon the first data and the second data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A wireless access point, comprising:
-
a request receiver component that receives a request from a computing device for a location proof, the request comprising first data that identifies the computing device; a location proof generator component that, responsive to the request receiver component receiving the request, generates a location proof for the computing device, the location proof comprising the first data and second data that identifies the wireless access point, the location proof generator component further encrypting the location proof to generate an encrypted location proof; and a location proof transmitter component that causes the wireless access point to transmit the encrypted location proof to the computing device. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A computer-readable data storage device comprising instructions that, when executed by a processor, cause the processor to perform acts comprising:
-
receiving, from a mobile computing device, a request for content, the request for content comprising an encrypted location proof, the location proof comprising first data that identifies the mobile computing device that issued the request and second data that identifies a wireless access point that generated the location proof; authenticating the location proof based upon the first data and the second data; responsive to authenticating the location proof, transmitting the content requested by the mobile computing device to the mobile computing device. - View Dependent Claims (19, 20)
-
Specification