System and method for using location identity to control access to digital information
First Claim
1. A system for controlling access to digital information, comprising:
- a first information processing device adapted to process digital information for access only at a specific geographic location, the first information processing device including a processor having suitable memory adapted to store software instructions operable to cause said processor to perform the functions of;
retrieving a location value that identifies a specific geographic location at which access to digital information is authorized;
generating an area parameter defining a shape of the specific geographic location without identifying the specific geographic location;
combining the location value and the area parameter to provide a first location identity key;
encrypting the digital information using the first location identity key;
sending the area parameter and the encrypted digital information; and
a second information processing device adapted to access the encrypted digital information, the second information processing device including a processor having suitable memory adapted to store software instructions operable to cause said processor to perform the functions of;
receiving the area parameter and the encrypted digital information;
determining a current location of the second information processing device;
combining the current location and the area parameter to generate a second location identity key; and
decrypting the digital information using the second location identity key.
2 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus for controlling access to digital information utilizes a location identity attribute that defines a specific geographic location. The location identity attribute is associated with the digital information such that the digital information can be accessed only at the specific geographic location. The location identity attribute further includes a location value and a proximity value. The location value corresponds to a location of an intended recipient appliance of the digital information, and may be further defined in terms of latitude, longitude and altitude dimensions. The location identity attribute is enforced by allowing access to the digital information only at the specific geographic location. As a first part of this enforcement process, the location of an appliance through which access to the digital information is sought is identified. The appliance location is then compared to the specific geographic location defined by the location identity attribute, and access to the digital information is allowed only if the appliance location falls within the specific geographic location. There are many ways to identify the location of the appliance, including: (1) resolving the appliance location from a street address for the appliance; (2) retrieving the appliance location from a file stored within the appliance; (3) recovering the appliance location from a GPS receiver embedded in the appliance; and (4) recovering the appliance location by triangulating RF signals received by the appliance.
215 Citations
37 Claims
-
1. A system for controlling access to digital information, comprising:
-
a first information processing device adapted to process digital information for access only at a specific geographic location, the first information processing device including a processor having suitable memory adapted to store software instructions operable to cause said processor to perform the functions of; retrieving a location value that identifies a specific geographic location at which access to digital information is authorized; generating an area parameter defining a shape of the specific geographic location without identifying the specific geographic location; combining the location value and the area parameter to provide a first location identity key; encrypting the digital information using the first location identity key; sending the area parameter and the encrypted digital information; and a second information processing device adapted to access the encrypted digital information, the second information processing device including a processor having suitable memory adapted to store software instructions operable to cause said processor to perform the functions of; receiving the area parameter and the encrypted digital information; determining a current location of the second information processing device; combining the current location and the area parameter to generate a second location identity key; and decrypting the digital information using the second location identity key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. An information processing device, comprising:
a processor having suitable memory adapted to store software instructions operable to cause the processor to perform the functions of; retrieving a location value that identifies a specific geographic location at which access to digital information is authorized; generating an area parameter defining a shape of the specific geographic location without identifying the specific geographic location; combining the location value and the area parameter to provide a first location identity key; encrypting the digital information using the first location identity key; and sending the area parameter and the encrypted digital information to a recipient device, wherein the encrypted digital information can only be decrypted by the recipient device located at the specific geographic location and having access to the area parameter. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27)
-
28. An information processing device, comprising:
a processor having suitable memory adapted to store software instructions operable to cause the processor to perform the functions of; receiving digital information that has been encrypted using a location identity key comprising a location value defining a specific geographic location combined with an area parameter defining a shape of the specific geographic location without identifying the specific geographic location; receiving the area parameter; determining a current location of the information processing device; combining the current location and the area parameter to generate a second location identity key; and decrypting the digital information using the second location identity key, wherein the digital information can only be decrypted if the information processing device is located at the specific geographic location. - View Dependent Claims (29, 30, 31, 32, 33, 34, 35, 36, 37)
Specification