Method for securely communicating information about the location of a compromised computing device
First Claim
Patent Images
1. A method of securely communicating location information from a computing device, comprising:
- receiving a location request from a requesting entity if it is determined that the computing device has been attacked;
acquiring location information at the computing device;
forming a response based on mathematically transforming a combination of a non-deterministic value and at least a portion of the location information and at least a portion of a hardware key; and
providing the response to the requesting entity.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for securely reporting location information after an attack on a computing device is presented. Such information may be reported to a requesting entity in a manner almost transparent to an attacker. Several exemplary embodiments of systems wherein the method may be used are presented.
83 Citations
22 Claims
-
1. A method of securely communicating location information from a computing device, comprising:
-
receiving a location request from a requesting entity if it is determined that the computing device has been attacked; acquiring location information at the computing device; forming a response based on mathematically transforming a combination of a non-deterministic value and at least a portion of the location information and at least a portion of a hardware key; and
providing the response to the requesting entity. - View Dependent Claims (2, 3, 4)
-
-
5. A method of securely receiving information about a location of a computing device at a requesting entity, comprising:
-
forming a location request at the requesting entity if it is determined that the computing device has been attacked;
providing the location request to the computing device;receiving a response from the computing device based on a mathematical transformation of a combination of a non-deterministic value and at least a portion of the location of the computing device and at least a portion of a hardware key; and
determining the location of the computing device from the response. - View Dependent Claims (6, 7)
-
-
8. A computing device, comprising:
- logic configured to receive a location request from a requesting entity, the location
request based on a determination that the computing device has been attacked;
logic configured to acquire location information of the computing device;logic configured to form a response based on a mathematical transformation of a combination of a non-deterministic value and at least a portion of the location information and at least a portion of a hardware key; and
logic configured to provide the response to the requesting entity. - View Dependent Claims (9, 10)
- logic configured to receive a location request from a requesting entity, the location
-
11. A requesting device, comprising:
- logic configured to form a location request, the location request based on a determination that a computing device has been attacked;
logic configured to provide the location request to a the computing device; logic configured to receive a response from the computing device based on a mathematical transformation of a combination of a non-deterministic value and at least a portion of the location of the computing device and at least a portion of a hardware key; and logic configured to determine the location of the computing device from the response. - View Dependent Claims (12)
- logic configured to form a location request, the location request based on a determination that a computing device has been attacked;
-
13. A computing device, comprising:
- means for receiving a location request from a requesting entity,
the location request based on a mathematical transformation of a combination of a non-deterministic value and at least a portion of a determination that the computing device has been attacked; means for acquiring location information at the computing device;
means for forming a response based on the location information and at least a portion of a hardware key; and
means for providing the response to the requesting entity. - View Dependent Claims (14, 15)
- means for receiving a location request from a requesting entity,
-
16. A requesting device, comprising:
-
means for forming a location request at the requesting device, the location request based on a determination that the computing device has been attacked; means for providing the location request to the computing device; means for receiving a response from the computing device based on a mathematical transformation of a combination of a non-deterministic value and at least a portion of the location of the computing device and at least a portion of a hardware key; and means for determining the location of the computing device from the response. - View Dependent Claims (17)
-
-
18. A non-transitory computer-readable storage medium comprising code, which, when executed by a processor, causes the processor to perform operations for securely communicating location information from a computing device, the non-transitory computer-readable storage medium comprising:
-
code for receiving a location request from a requesting entity, the location request based on a determination that the computing device has been attacked; code for acquiring location information at the computing device;
code for forming a response based on a mathematical transformation of a combination of a non-deterministic value and at least a portion of the location information and at least a portion of a hardware key; andcode for providing the response to the requesting entity. - View Dependent Claims (19, 20)
-
-
21. A non-transitory computer-readable storage medium comprising code, which, when executed by a processor, causes the processor to perform operations for securely receiving information about a location of a computing device at a requesting entity, the non-transitory computer-readable storage medium comprising:
-
code for forming a location request at the requesting entity, the location request based on a determination that the computing device has been attacked; code for providing the location request to the computing device;
code for receiving a response from the computing device based on a mathematical transformation of a combination of a non-deterministic value and at least a portion of the location of the computing device and at least a portion of a hardware key; andcode for determining the location of the computing device from the response. - View Dependent Claims (22)
-
Specification