System and method for validating a location of an untrusted device
First Claim
Patent Images
1. A method, comprising:
- identifying a validation requirement for an untrusted device in a region of interest in response to a participation request;
causing activation of at least one wireless access point in response to identifying the validation requirement;
requesting the untrusted device identify the at least one wireless access point in the region of interest;
receiving, from the untrusted device, a list identifying the at least one wireless access point in the region of interest with a corresponding at least one identifier;
validating the at least one wireless access point in response to the at least one identifier; and
deactivating the at least one wireless access point in response to receiving the at least one identifier from the untrusted device.
3 Assignments
0 Petitions
Accused Products
Abstract
In a system of mobile agents operating in a region of interest, it may be necessary to validate the position of an untrusted device prior to allowing the untrusted device to perform agent functions within the region of interest. Trusted mobile agents within the region of interest may activate wireless access points with randomly generated identifiers. The untrusted device may be instructed to provide a list of identifiers of visible wireless access points to confirm that the untrusted device is within the ROI.
46 Citations
30 Claims
-
1. A method, comprising:
-
identifying a validation requirement for an untrusted device in a region of interest in response to a participation request; causing activation of at least one wireless access point in response to identifying the validation requirement; requesting the untrusted device identify the at least one wireless access point in the region of interest; receiving, from the untrusted device, a list identifying the at least one wireless access point in the region of interest with a corresponding at least one identifier; validating the at least one wireless access point in response to the at least one identifier; and deactivating the at least one wireless access point in response to receiving the at least one identifier from the untrusted device. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method, comprising:
-
identifying a validation requirement for an untrusted device in a region of interest; locating a trusted agent within the region of interest in response to identifying the validation requirement; causing activation of a wireless access point associated with the trusted agent in the region of interest; requesting the untrusted device identify the at least one wireless access point in the region of interest; receiving, from the untrusted device, a list identifying the at least one wireless access point in the region of interest with a corresponding at least one identifier; and validating the at least one wireless access point in response to the at least one identifier.
-
-
8. A trusted device, comprising:
-
a memory device configured to store instructions defining an agent application; a processing device configured to execute the instructions stored in the memory device to; identify a validation requirement in response to receiving a request to participate with the trusted device in a region of interest from an untrusted device; identify a location of the untrusted device in response to receiving the request to participate from the untrusted device; send an activation command to at least one trusted device within the region of interest causing activation of a corresponding at least one wireless access point in response to the location of the untrusted device being substantially within the region of interest; request the untrusted device identify the at least one wireless access point; receive, from the untrusted device, at least one wireless access point identifier configured to identify the at least one wireless access point in response to the request to identify; determine the at least one wireless access point identifier as corresponding to the at least one wireless access point in the region of interest; and validate the untrusted device in response to the at least one wireless access point identifier corresponding to the at least one wireless access point in the region of interest. - View Dependent Claims (9)
-
-
10. A non-transitory computer-readable storage device comprising computer-executable instructions stored thereon that configure a processing device to perform operations comprising:
-
identifying a validation requirement for an untrusted device in response to receiving a participation request from the untrusted device; instructing the untrusted device to identify at least one wireless access point visible to the untrusted device; receiving, from the untrusted device, a list identifying the at least one wireless access point with a corresponding at least one identifier; validating the untrusted device in response to the at least one identifier corresponding to a wireless access point in a region of interest; and deactivating the at least one wireless access point in response to receiving the at least one identifier from the untrusted device. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. A non-transitory computer-readable storage device comprising computer-executable instructions stored thereon that configure a processing device to perform operations comprising:
-
identifying a validation requirement for an untrusted device in response to receiving a participation request from the untrusted device; locating each trusted agent within a region of interest in response to identifying the validation requirement; activating any wireless access point associated with any trusted agent in the region of interest; instructing the untrusted device to identify at least one wireless access point visible to the untrusted device; receiving, from the untrusted device, a list identifying the at least one wireless access point with a corresponding at least one identifier; and validating the untrusted device in response to the at least one identifier corresponding to a wireless access point in the region of interest.
-
-
18. A method, comprising:
-
transmitting a participation request from an untrusted device to a trusted device operating in a first region, wherein the participation request causes deactivation of a plurality of trusted wireless access points corresponding to the trusted device or at least one other trusted device located in the first region; identifying a wireless access point located in a second region within communicable range of the untrusted device; transmitting an identifier corresponding to the wireless access point located in the second region within communicable range of the untrusted device from the untrusted device to the trusted device; and receiving validation from the trusted device in response to the identifier corresponding to at least one of the plurality of trusted wireless access points corresponding to the trusted device or at least one other trusted device operating in the first region; wherein the trusted device is configured to deactivate the at least one of the plurality of trusted wireless access points in response to receiving the identifier. - View Dependent Claims (19, 20, 21)
-
-
22. An untrusted device, comprising:
-
a memory device configured to store instructions defining an agent application; a processing device configured to execute the instructions stored in the memory device to; transmit a participation request from an untrusted device to a trusted device operating in a first region; identify a wireless access point located in a second region within communicable range of the untrusted device in response to the participation request; transmit an identifier corresponding to the wireless access point from the untrusted device to the trusted device; and receive validation from the trusted device in response to the identifier corresponding to at least one of a plurality of wireless access points corresponding to the trusted device or at least another trusted device operating in the first region; wherein the trusted device causes activation of the plurality of access points in response to receiving the participation request; and wherein the trusted device is configured to cause deactivation of the plurality of wireless access points in response to receiving the identifier. - View Dependent Claims (23, 24, 25)
-
-
26. A non-transitory computer-readable storage device comprising computer-executable instructions stored thereon that configure a processing device to perform operations comprising:
-
transmitting a participation request from an untrusted device to a trusted device operating in a first region; identifying a wireless access point located within communicable range of the untrusted device in response to transmitting the participation request; transmitting an identifier corresponding to the wireless access point from the untrusted device to the trusted device; and receiving validation from the trusted device in response to the identifier corresponding to at least one of a plurality of wireless access points operating in the first region; wherein the trusted device causes activation of at least one of the plurality of wireless access points in response to receiving the participation request; and wherein the trusted device is configured to cause deactivation of the at least one of the plurality of wireless access points in response to receiving the identifier. - View Dependent Claims (27, 28, 29, 30)
-
Specification