Location proofs
First Claim
1. A method, comprising;
- receiving a request for content from a computing device, the request comprising an encrypted location proof, the location proof comprising first data that identifies the computing device, second data that identifies a wireless access point that issued the encrypted location proof to the computing device, and data that is indicative of a geographic location of the wireless access point;
decrypting the encrypted location proof to obtain the first data and the second data; and
outputting the content based upon the first data, the second data, and the data that is indicative of the geographic location of the wireless access point.
1 Assignment
0 Petitions
Accused Products
Abstract
A wireless computing device includes an antenna that is configured to transmit and receive wireless signals. The wireless computing device comprises a transmitter component that causes a first wireless signal to be transmitted to a wireless access point via the antenna, wherein the first wireless signal comprises a request for a location proof, wherein the request for the location proof comprises data that identifies the wireless computing device, and wherein the location proof comprises data that is indicative of a geographic location of the wireless access point. The system also includes a receiver component that receives, via the antenna, a second wireless signal from the wireless access point, wherein the second wireless signal is received by the receiver component subsequent to the transmitter component causing the first wireless signal to be transmitted to the wireless access point.
32 Citations
20 Claims
-
1. A method, comprising;
-
receiving a request for content from a computing device, the request comprising an encrypted location proof, the location proof comprising first data that identifies the computing device, second data that identifies a wireless access point that issued the encrypted location proof to the computing device, and data that is indicative of a geographic location of the wireless access point; decrypting the encrypted location proof to obtain the first data and the second data; and outputting the content based upon the first data, the second data, and the data that is indicative of the geographic location of the wireless access point. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A wireless access point comprising:
-
a processor; and memory storing instructions that, when executed by the processor, cause the processor to perform acts comprising; receiving a request from a computing device for a location proof, the request comprising first data that identifies the computing device; responsive to receiving the request, generating a location proof for the computing device, the location proof comprising the first data, second data that identifies the wireless access point, and data that is indicative of a geographic location of the wireless access point; encrypting the location proof to generate an encrypted location proof; and transmitting the encrypted location proof to the computing device. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A computer-readable data storage device comprising instructions that, when executed by a processor, cause the processor to perform acts comprising:
-
receiving, from a mobile computing device, a request for content, the request for content comprising an encrypted location proof, the location proof comprising first data that identifies the mobile computing device that issued the request, second data that identifies a wireless access point that generated the location proof, and data that is indicative of a geographic location of the wireless access point; authenticating the location proof based upon the first data, the second data, and the data that is indicative of the geographic location of the wireless access point; responsive to authenticating the location proof, transmitting the content requested by the mobile computing device to the mobile computing device. - View Dependent Claims (19, 20)
-
Specification