Trusted hybrid location system
First Claim
1. A method for determining a trusted location for a network device or application, the method comprising the steps of:
- receiving location information from a first trusted source and a second trusted source, wherein each of the first and second trusted sources includes a unique and unalterable ID code;
authenticating the unique and unalterable ID codes for the first and second trusted sources;
upon authenticating the unique and unalterable ID code for the first trusted source, determining a first location estimate for the network device or application based on the location information received from the first trusted source;
upon authenticating the unique and unalterable ID code for the second trusted source, determining a second location estimate for the network device or application based on the location information received from the second trusted source; and
determining the trusted location of the network device or application by using the second location estimate to verify the first location estimate.
3 Assignments
0 Petitions
Accused Products
Abstract
A system and method are disclosed for determining and sharing of trusted location data. The system includes a network device or application and at least two independent trusted sources of location data/location assistance data, where the at least two independent trusted sources have unique and unalterable ID codes. The network device or application receive and authenticate the location information/location assistance data from the at least two independent trusted sources, and the network device or application calculates a trusted location estimate by comparing the location data of the at least two independent trusted sources. The network device or application is a self-aware device. The trusted location data may be virally shared with other self-aware network devices in the network.
-
Citations
21 Claims
-
1. A method for determining a trusted location for a network device or application, the method comprising the steps of:
-
receiving location information from a first trusted source and a second trusted source, wherein each of the first and second trusted sources includes a unique and unalterable ID code; authenticating the unique and unalterable ID codes for the first and second trusted sources; upon authenticating the unique and unalterable ID code for the first trusted source, determining a first location estimate for the network device or application based on the location information received from the first trusted source; upon authenticating the unique and unalterable ID code for the second trusted source, determining a second location estimate for the network device or application based on the location information received from the second trusted source; and determining the trusted location of the network device or application by using the second location estimate to verify the first location estimate. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method for determining a trusted status for a device or application, the method comprising the steps of:
-
receiving status information from a first trusted source and a second trusted source, wherein each of the first and second trusted sources have includes a unique and unalterable ID code; authenticating the unique and unalterable ID codes for the first and second trusted sources; upon authenticating the unique and unalterable ID code for the first trusted source, determining a first status estimate for the network device or application based on the status information received from the first trusted source; and upon authenticating the unique and unalterable ID code for the second trusted source, determining a second status estimate for the network device or application based on the status information received from the second trusted source; and determining the trusted status of the device or application by using the second status estimate to verify the first status estimate. - View Dependent Claims (12)
-
-
13. A system for determining a trusted location comprising:
-
first trusted source of location data or location assistance data; a second trusted source of location data or location assistance data, wherein each of the first and second trusted sources have includes a unique and unalterable ID code; and a network device, wherein the network device is configured to; receive location information from each of the first and second trusted sources; authenticate the unique and unalterable ID codes for the first and second trusted sources; upon authenticating the unique and unalterable ID code for the first trusted source, determine a first location estimate for the network device based on the location information received from the first trusted source; upon authenticating the unique and unalterable ID code for the second trusted source determine a second location estimate for the network device or application based on the location information received from the second trusted source; and determine the trusted location of the network device or application by using the second location estimate to verify the first location estimate. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21)
-
Specification