LOCATION SPOOFING FOR PRIVACY AND SECURITY
First Claim
Patent Images
1. A method comprising:
- accessing rules associated with control of location information transmitted from a device by an application running on the device;
applying the rules to the application to determine if spoofed location information is to be generated; and
if the spoofed location information is needed, then generating the spoofed location information using an exclusion area based on actual location of the device and the exclusion area, wherein the exclusion area defines a geographical area that is to be excluded from the spoofed location information generated.
1 Assignment
0 Petitions
Accused Products
Abstract
A sentry system is provided for use within a mobile device to limit access to device location using onboard systems. Access limitation can include access to only spoofed data in accordance to the rules or user instructions. Spoofed data may include refinements to render a location estimate and associated collateral information to be more plausible.
-
Citations
20 Claims
-
1. A method comprising:
-
accessing rules associated with control of location information transmitted from a device by an application running on the device; applying the rules to the application to determine if spoofed location information is to be generated; and if the spoofed location information is needed, then generating the spoofed location information using an exclusion area based on actual location of the device and the exclusion area, wherein the exclusion area defines a geographical area that is to be excluded from the spoofed location information generated. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A device comprising at least one processor and at least one memory operably connected to the at least one processor, wherein the at least one memory includes instructions that, when executed by the processor, cause the device to:
-
determine if an application running on the device is requesting location information; based on at least one rule, determine if spoofed location information is needed for the application; and if the spoofed location information is needed, generate the spoofed location information using based on actual location of the device and an exclusion area, wherein the exclusion area defines a geographical area that is to be excluded from the spoofed location information generated. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A system for generating spoofed information, the system comprising:
-
a device for generating a plurality of sequential spoofed location information; a module in communication with the device, the module provides collateral information to the device, wherein the device generates each of the plurality of sequential spoofed location information using the collateral information such that a next spoofed location information in the plurality of sequential spoofed location information is plausible relative to a previous spoofed location information in the plurality of sequential spoofed location information. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification