METHODS AND SYSTEMS FOR MESSAGING WITH PHYSICAL PRESENCE AND TEMPORAL VERIFICATIONS
First Claim
1. A method for verifying proximity to a computational tag, the method comprising:
- receiving a first token from a server;
transmitting the first token to the computational tag, wherein;
the computational tag verifies the first token;
the computational tag generates a second token based on the first token; and
the second token comprises a signature of the computational tag;
receiving the second token from the computational tag; and
transmitting the second token to the server, wherein the server allows access to a messaging service based on a verification of the second token.
7 Assignments
0 Petitions
Accused Products
Abstract
A system and method for verifying proximity to a computational tag by receiving a first token from a server and transmitting the first token to the computational tag. The computational tag can verify the first token and generate a second token based on the first token where the second token includes a signature of the computational tag. The computational tag can transmit the second token to the mobile device and the mobile device can transmit the second token to the server. The server can verify the second token and allow access to a messaging service based on the verification of the second token.
-
Citations
20 Claims
-
1. A method for verifying proximity to a computational tag, the method comprising:
-
receiving a first token from a server; transmitting the first token to the computational tag, wherein; the computational tag verifies the first token; the computational tag generates a second token based on the first token; and the second token comprises a signature of the computational tag; receiving the second token from the computational tag; and transmitting the second token to the server, wherein the server allows access to a messaging service based on a verification of the second token. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for verifying proximity to a computational tag, the method comprising:
-
transferring a first token to a mobile device, wherein; the mobile device transmits the first token to the computational tag; the mobile device receives a second token from the computational that is based on the first token and comprises a signature of the computational tag; receiving the second token from the mobile device; verifying the second token; and allowing the mobile device access to a messaging service based on verifying the second token. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A system for verifying proximity to a computational tag, the system comprising:
-
a processing system comprising one or more processors; and a memory system comprising one or more computer-readable media, wherein the one or more computer-readable media contain instructions that, when executed by the processing system, cause the processing system to perform operations comprising; receiving a first token from a server; transmitting the first token to the computational tag, wherein; the computational tag verifies the first token; the computational tag generates a second token based on the first token; and the second token comprises a signature of the computational tag; receiving the second token from the computational tag; and transmitting the second token to the server, wherein the server allows access to a messaging service based on a verification of the second token. - View Dependent Claims (18, 19, 20)
-
Specification