Geospatial Cryptography
First Claim
1. A method for authenticating access between a fixed device and any number of mobile devices within a geospatial boundary for secure communication comprising:
- keeping track of the physical position of the mobile devices using geospatial positioning techniques;
enabling the fixed device to determine whether any nearby mobile devices have entered a geospatial boundary surrounding the fixed device;
wherein the fixed device determines if any of the mobile devices are peers eligible for authentication; and
upon authenticating mobile devices within the geospatial boundary, the fixed and mobile devices perform operations.
3 Assignments
0 Petitions
Accused Products
Abstract
The invention includes methods for cryptographically authenticating access between devices when the devices are within a geospatial boundary comprising the first step of keeping track of the physical position of the devices using both low and, or high fidelity geospatial positioning techniques. Next, a first device determines whether any nearby mobile devices have entered the geospatial boundary. Next, the first device determines if any of the mobile devices are peers eligible for cryptographic authentication. After the first device authenticates that the other device within the geospatial boundary is a trusted peer, the devices may perform various data and, or dynamic policy operations.
-
Citations
24 Claims
-
1. A method for authenticating access between a fixed device and any number of mobile devices within a geospatial boundary for secure communication comprising:
-
keeping track of the physical position of the mobile devices using geospatial positioning techniques; enabling the fixed device to determine whether any nearby mobile devices have entered a geospatial boundary surrounding the fixed device; wherein the fixed device determines if any of the mobile devices are peers eligible for authentication; and upon authenticating mobile devices within the geospatial boundary, the fixed and mobile devices perform operations. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for authenticating access between any number of mobile devices within a fixed geospatial boundary for secure communications comprising:
-
keeping track of the physical position of each of the mobile devices using geospatial positioning techniques; enabling a first mobile device to determine whether it is within a fixed geospatial boundary; enabling said first mobile device to determine if there are any other mobile devices that are peers eligible for cryptographic authentication within the fixed geospatial boundary; upon the first mobile device authenticating another mobile device within the geospatial boundary, the mobile devices perform operations. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A method for authenticating access between any number of mobile devices within a relative geospatial boundary of a first mobile device comprising:
-
keeping track of the physical position of the mobile devices using geospatial positioning techniques; enabling the first mobile device to determine if any other mobile devices are within a geospatial boundary relative to the first mobile device; enabling the first mobile device to determine if any of the other mobile devices within its relative geospatial boundary are peers eligible for authentication; and upon the first mobile device authenticating another mobile device within its relative geospatial boundary, the mobile devices perform operations. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
Specification