Reliable reporting of location data
First Claim
1. A machine comprising:
- a first virtual machine configured to host at least an application domain, wherein the application domain includes a telephony application configured to request a location provider for a current location of the machine and send the current location along with outbound phone calls placed by the telephony application, wherein the machine is configured for mobile usage;
a second virtual machine configured to host at least the location provider configured to determine the current location of the mobile machine;
a domain mediator configured to mediate access to the location provider over an inter-domain communication channel coupling the application domain and the location provider, including securely providing location data from the location provider to the application domain; and
a trusted platform module configured to communicatively couple selected ones of;
the application domain and the location provider, wherein the trusted platform module is further configured to cryptographically secure location data transmitted between said coupled ones of the application domain and location provider.
1 Assignment
0 Petitions
Accused Products
Abstract
A machine, such as a mobile device having telephony features, such as a voice over Internet Protocol (VoIP) telephony application, is configured with a secure environment in which a location provider within (more reliable) or external to (less reliable) the machine may determine location data for the machine and securely provide it to a telephony application program for incorporation into a call setup for calling a callee. The secure environment may be created through use of one or more of Intel'"'"'s LaGrande Technology™ (LT), Vanderpool Technology (VT), or a Trusted Platform Module (TPM). The LT and VT allow defining secure independent components within the machine, such as by instantiating them as Virtual Machines, and the TPM allows components to cryptographically sign data, such as to facilitate ensuring the location data is not tampered with. A recipient of a telephone call setup including cryptographically secured location data may validate the location data and accept the call. Other embodiments may be described.
6 Citations
22 Claims
-
1. A machine comprising:
-
a first virtual machine configured to host at least an application domain, wherein the application domain includes a telephony application configured to request a location provider for a current location of the machine and send the current location along with outbound phone calls placed by the telephony application, wherein the machine is configured for mobile usage; a second virtual machine configured to host at least the location provider configured to determine the current location of the mobile machine; a domain mediator configured to mediate access to the location provider over an inter-domain communication channel coupling the application domain and the location provider, including securely providing location data from the location provider to the application domain; and a trusted platform module configured to communicatively couple selected ones of;
the application domain and the location provider, wherein the trusted platform module is further configured to cryptographically secure location data transmitted between said coupled ones of the application domain and location provider. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for using a mobile machine having a first virtual machine hosting an application domain including a telephony application, a second virtual machine hosting a location provider to determine a current location of the mobile machine, and a domain mediator to mediate access to the location provider, comprising:
-
receiving a request to initiate a call, by the telephony application, and responsive thereto, requesting by the telephony application from the domain mediator the current location of the mobile machine provided by the location provider; applying, by the location provider, a first cryptographic security to the location data to facilitate identifying tampering with the location data; and modifying, by the domain mediator, the location data with the first cryptographic security in accordance with platform administrator policy and applying a second cryptographic security to facilitate determining tampering with the modified location data; receiving from the domain mediator, by the telephony application, signed location data identifying the current location of the mobile machine, the location data being signed by selected ones of the location provider and the domain mediator; validating the location data has not been tampered with, by the telephony application, based at least in part on said signing by the selected ones of the location provider and domain mediator; and initiating the call, by the telephony application, and providing at least a portion of the current location of the mobile machine along with the call. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. An article of manufacture comprising a non-transitory tangible machine-readable medium having one or more associated instructions store thereon configured to program a mobile machine and enable the mobile machine, in response to execution of the instructions by the mobile machine, to perform operations including:
-
receiving a request to initiate a call, by a telephony application located in a first virtual machine of the mobile machine, and responsive thereto, requesting by the telephony application, from a domain mediator of the mobile machine, the current location of the mobile machine, provided by a location provider of a second virtual machine, the domain mediator mediating access to the location provider; receiving, by the telephony application, from the domain mediator a doubly signed location data identifying the current location of the mobile machine, the location data being first signed by the location provider and second signed by the domain mediator; applying, by the location provider, a first cryptographic security to the location data to facilitate identifying tampering with the location data; and modifying, by the domain mediator, the location data with the first cryptographic security in accordance with platform administrator policy and applying a second cryptographic security to facilitate determining tampering with the modified location data; validating the location data has not been tampered with, by the telephony application, based at least in part on selected ones of the first signature and the second signature; and initiating the call, by the telephony application, including providing at least a portion of the current location of the mobile machine along with a call. - View Dependent Claims (18, 19, 20, 21, 22)
-
Specification