SECURE ACCESS USING LOCATION-BASED ENCRYPTED AUTHORIZATION
First Claim
1. A method for authorizing access to a resource, the method comprising:
- a first computer, sending to a second computer, a request to access a resource, wherein the request includes location information of the first computer;
the first computer receiving a reply from the second computer, the reply including unencrypted location information of the first computer and the resource that is encrypted, such that a decryption key of the first computer decrypts the encrypted resource, and wherein the reply is encrypted such that a decryption key of a third computer decrypts the reply;
the first computer sending the reply to the third computer, wherein the third computer includes location information of the third computer and is configured to decrypt the reply, revealing the location information of the first computer and the encrypted resource; and
the first computer receiving the encrypted resource from the third computer, in response to the third computer determining a distance between the first computer and the third computer fulfills a proximity condition.
1 Assignment
0 Petitions
Accused Products
Abstract
A computer sends a request to an authorization source to access a resource and includes its own location information. The computer receives a reply that includes the unencrypted location information of the computer and the resource encrypted such that a decryption key of the computer decrypts the encrypted resource. The entire reply is encrypted such that a decryption key of a third-party computer can decrypt the reply. The computer sends the encrypted reply to the third-party computer, and the reply is decrypted and returned to the computer if a distance between the computer and the third-party computer fulfills a proximity condition, as determined by the location of the computers.
7 Citations
18 Claims
-
1. A method for authorizing access to a resource, the method comprising:
-
a first computer, sending to a second computer, a request to access a resource, wherein the request includes location information of the first computer; the first computer receiving a reply from the second computer, the reply including unencrypted location information of the first computer and the resource that is encrypted, such that a decryption key of the first computer decrypts the encrypted resource, and wherein the reply is encrypted such that a decryption key of a third computer decrypts the reply; the first computer sending the reply to the third computer, wherein the third computer includes location information of the third computer and is configured to decrypt the reply, revealing the location information of the first computer and the encrypted resource; and the first computer receiving the encrypted resource from the third computer, in response to the third computer determining a distance between the first computer and the third computer fulfills a proximity condition. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer program product for authorizing access to a resource, the computer program product comprising:
a computer-readable non-transitory storage medium having program instructions embodied therewith, wherein the program instructions are executable by a computer processor, the program instructions comprising; program instructions to send a request to access a resource to a second computer, wherein the request includes location information of a first computer; program instructions to receive a reply from the second computer, the reply including unencrypted location information of the first computer and the resource that is encrypted such that a decryption key of the first computer decrypts the encrypted resource, and wherein the reply is encrypted such that a decryption key of a third computer decrypts the reply; program instructions to send the reply to the third computer, wherein the third computer includes location information of the third computer and is configured to decrypt the reply, revealing the location information of the first computer and the encrypted resource; and program instructions to receive the encrypted resource from the third computer, in response to the third computer determining a distance between the first computer and the third computer fulfills a proximity condition. - View Dependent Claims (8, 9, 10, 11, 12)
-
13. A computer system for authorizing access to a resource, the computer system comprising:
-
one or more computer processors; one or more computer-readable non-transitory storage media; program instructions stored on the computer-readable non-transitory storage media for execution by at least one of the one or more processors, the program instructions comprising; program instructions to send a request to access a resource to a second computer, wherein the request includes location information of a first computer; program instructions to receive a reply from the second computer, the reply including unencrypted location information of the first computer and the resource that is encrypted such that a decryption key of the first computer decrypts the encrypted resource, and wherein the reply is encrypted such that a decryption key of a third computer decrypts the reply; program instructions to send the reply to the third computer, wherein the third computer includes location information of the third computer and is configured to decrypt the reply, revealing the location information of the first computer and the encrypted resource; and program instructions to receive the encrypted resource from the third computer, in response to the third computer determining a distance between the first computer and the third computer fulfills a proximity condition. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification