SYSTEM AND METHOD FOR LOCATION ASSURANCE USING PASSIVE COMPUTATIONAL TAGS
First Claim
1. A computer-implemented method for location assurance comprising:
- receiving, by an application executing on a mobile computing device, an electronic token from a server, wherein the electronic token comprises a timestamp signed using a cryptographic signing algorithm;
providing, by the application, the electronic token to a passive computational tag, wherein the electronic token is countersigned by the passive computational tag;
receiving, by the application, the electronic token that was countersigned by the passive computational tag; and
providing, by the application, the electronic token that was countersigned to the server.
7 Assignments
0 Petitions
Accused Products
Abstract
In implementations, a computer-implemented method for location assurance is disclosed. The method can include receiving, by an application executing on a mobile computing device, an electronic token from a server, wherein the electronic token comprises a timestamp signed using a cryptographic signing algorithm; providing, by the application, the electronic token to a passive computational tag, wherein the electronic token is countersigned by the passive computational tag; receiving, by the application, the electronic token that was countersigned by the passive computational tag; and providing, by the application, the electronic token that was countersigned to the server.
-
Citations
19 Claims
-
1. A computer-implemented method for location assurance comprising:
-
receiving, by an application executing on a mobile computing device, an electronic token from a server, wherein the electronic token comprises a timestamp signed using a cryptographic signing algorithm; providing, by the application, the electronic token to a passive computational tag, wherein the electronic token is countersigned by the passive computational tag; receiving, by the application, the electronic token that was countersigned by the passive computational tag; and providing, by the application, the electronic token that was countersigned to the server. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A device comprising:
-
one or mare processors; and a non-transitory computer readable medium comprising instructions that cause the one or more processors to perform a method comprising; receiving an electronic token from a server, wherein the electronic token comprises a timestamp signed using a cryptographic signing algorithm; providing the electronic token to a passive computational tag, wherein the electronic token is countersigned by the passive computational tag; receiving the electronic token that was countersigned by the passive computational tag; and providing the electronic token that was countersigned to the server. - View Dependent Claims (15, 16, 17)
-
-
18. A computer-implemented method for location assurance comprising:
-
receiving, by a processor of a server, a request for an electronic token from a computing device; generating the electronic token based on the request that was received, wherein the electronic token comprises information related to an identification of the server and information related to a time that the request was received; signing the electronic token using a cryptographic signing algorithm; providing the electronic token that was signed to the computing device; receiving the electronic token that was countersigned by a passive computational tag; and determining a time interval between when the request that was received and when the electronic token that was countersigned was received to determine a location duration of the computing device with respect to the passive computational tag. - View Dependent Claims (19)
-
Specification