Methods and systems for messaging with physical presence and temporal verifications
First Claim
Patent Images
1. A method for verifying proximity to a computational tag, the method comprising:
- transmitting, by a mobile device to a server, a request to access a messaging service that requires proximity verification;
receiving, at the mobile device, a first token from the server in response to the request;
transmitting, via the mobile device, the first token to the computational tag, whereby the computational tag is powered by the mobile device and wherein;
the computational tag verifies the first token using power from the mobile device;
the computational tag generates a second token based on the first token using power from the mobile device; and
the second token comprises a signature of the computational tag and a timestamp;
receiving, at the mobile device, the second token from the computational tag; and
transmitting, via the mobile device, the second token to the server, wherein the server verifies proximity to the computational tag based on a verification of the second token and allows access to the messaging service based on the verification of the second token.
6 Assignments
0 Petitions
Accused Products
Abstract
A system and method for verifying proximity to a computational tag by receiving a first token from a server and transmitting the first token to the computational tag. The computational tag can verify the first token and generate a second token based on the first token where the second token includes a signature of the computational tag. The computational tag can transmit the second token to the mobile device and the mobile device can transmit the second token to the server. The server can verify the second token and allow access to a messaging service based on the verification of the second token.
13 Citations
20 Claims
-
1. A method for verifying proximity to a computational tag, the method comprising:
-
transmitting, by a mobile device to a server, a request to access a messaging service that requires proximity verification; receiving, at the mobile device, a first token from the server in response to the request; transmitting, via the mobile device, the first token to the computational tag, whereby the computational tag is powered by the mobile device and wherein; the computational tag verifies the first token using power from the mobile device; the computational tag generates a second token based on the first token using power from the mobile device; and the second token comprises a signature of the computational tag and a timestamp; receiving, at the mobile device, the second token from the computational tag; and transmitting, via the mobile device, the second token to the server, wherein the server verifies proximity to the computational tag based on a verification of the second token and allows access to the messaging service based on the verification of the second token. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for verifying proximity to a computational tag, the method comprising:
-
receiving, at a server, a request from a mobile device to access a messaging service that requires proximity verification; transferring, by the server, a first token to the mobile device in response to the request, wherein; the mobile device transmits the first token to the computational tag, whereby the computational tag is powered by the mobile device; the mobile device receives a second token from the computational tag that is based on the first token and comprises a signature of the computational tag and a timestamp; and the computational tag generates the second token using power from the mobile device; receiving, at the server, the second token from the mobile device; verifying, at the server, the second token and verifying proximity to the computational tag based on verifying the second token; and allowing the mobile device access to the messaging service based on verifying the second token. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A system for verifying proximity to a computational tag, the system comprising:
-
a processing system comprising one or more microprocessors; and a memory system comprising one or more computer-readable media, wherein the one or more computer-readable media contain instructions that, when executed by the processing system, cause the processing system to perform operations comprising; transmitting, by a mobile device to a server, a request to access a messaging service that requires proximity verification; receiving, at the mobile device, a first token from the server in response to the request; transmitting, via the mobile device, the first token to the computational tag, whereby the computational tag is powered by the mobile device and wherein; the computational tag verifies the first token using power from the mobile device; the computational tag generates a second token based on the first token using power from the mobile device; and the second token comprises a signature of the computational tag and a timestamp; receiving, at the mobile device, the second token from the computational tag; and transmitting the second token to the server, wherein the server verifies proximity to the computational tag based on a verification of the second token and allows access to the messaging service based on the verification of the second token. - View Dependent Claims (18, 19, 20)
-
Specification