Method and System For Object Access and Usage Control Using Location and Access Boundary Shape Information
First Claim
1. A method for controlling access to an object by a querying device having at least one processor coupled to a memory, the at least one processor performing:
- receiving location coordinates information of the querying device;
requesting an access to the object in accordance to the received location coordinates information;
granting or denying access to the object based on a determination of whether the received location coordinates information lies within at least one spatial access boundary, wherein;
the at least one spatial access boundary is defined by an arbitrary physical object shape with at least two dimensional (2D) physical measurements, wherein the at least 2D physical measurements are in direct reference to designated location coordinates information, wherein the received location coordinates information and the designated location coordinates information each comprises longitude, latitude and elevation values; and
restricting access according to frequency of access to the object.
2 Assignments
0 Petitions
Accused Products
Abstract
A method and a system for shape based encrypted object usage control using a querying device includes receiving location coordinates information and requesting an access to the encrypted object based on the received location coordinates information. The granting or denying access to the object is based on a determination of whether the received location coordinates information lies within at least one spatial access boundary. The at least one spatial access boundary is defined by an arbitrary physical object shape with at least two dimensional (2D) physical measurements in direct reference to designated location coordinates information. The received location coordinates information and the designated location coordinates information each includes longitude, latitude and optionally elevation values which provide the ability to identifying a specific location in a 3D space.
90 Citations
24 Claims
-
1. A method for controlling access to an object by a querying device having at least one processor coupled to a memory, the at least one processor performing:
-
receiving location coordinates information of the querying device; requesting an access to the object in accordance to the received location coordinates information; granting or denying access to the object based on a determination of whether the received location coordinates information lies within at least one spatial access boundary, wherein; the at least one spatial access boundary is defined by an arbitrary physical object shape with at least two dimensional (2D) physical measurements, wherein the at least 2D physical measurements are in direct reference to designated location coordinates information, wherein the received location coordinates information and the designated location coordinates information each comprises longitude, latitude and elevation values; and restricting access according to frequency of access to the object. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A device for controlling access to an object, the device comprises:
-
a querying circuit having at least one processor coupled to a first memory, wherein the at least one processor is configured to; receive location coordinates information; receive a request for access to an object based on the received location coordinates information; grant or deny access to the object based on a determination of whether the received location coordinates information lies within at least one spatial access boundary, wherein; the at least one spatial access boundary is defined by an arbitrary physical object shape with at least two dimensional (2D) physical measurements in direct reference to designated location coordinates information, and wherein the received location coordinates information and the designated location coordinates information each comprises longitude, latitude and elevation values; and restrict access according to frequency of access to the object. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A method for generating an encryption key for an object by at least one processor coupled to a first memory, the at least one processor performing:
-
receiving designated global positioning system (GPS) location coordinates; receiving at least one spatial access boundary information, wherein; the at least one spatial access boundary information is defined by an arbitrary physical object shape with at least two dimensional (2D) physical measurements in direct reference to the designated GPS location coordinates, and wherein the designated GPS location coordinates comprises longitude, latitude and elevation values; receiving a time coordinate comprising frequency of access to the object; generating the encryption key utilizing at least the designated GPS location coordinates, the time coordinate and the at least one spatial access boundary information; storing the encryption key in a secured memory; and associating the encryption key to an object, wherein the object is stored in a second memory. - View Dependent Claims (22, 23, 24)
-
Specification