System and method for location assurance using passive computational tags
First Claim
1. A computer-implemented method for location assurance comprising:
- receiving, by an application executing on a mobile computing device, an electronic token from a token server over a network, wherein the electronic token comprises a timestamp signed using a cryptographic digital signature algorithm by the token server, wherein the mobile computing device comprises a hardware processor;
providing, by the application, the electronic token to a passive computational tag based on an instruction from the hardware processor, wherein the electronic token is countersigned by the passive computational tag using the cryptographic digital signature algorithm;
receiving, by the application, the electronic token that was countersigned by the passive computational tag;
providing, by the application, the electronic token that was countersigned by the passive computational tag to the token server over the network;
creating, by the token server, an electronic log of activities associated with a physical proximity of the mobile computing device and the passive computational tag based on the electronic token that was countersigned;
providing, by the token server, access rights to a user of the mobile computing device associated with the passive computation tag based on the electronic token that was countersigned,determining, by the token server, a continuous presence between the mobile computing device and a docketing station associated with the passive computational tag; and
receiving a stream of tokens from the token server based on the continuous presence that was determined,wherein the electronic token provides a verifiable location assurance based on the electronic log that the mobile computing device and the passive computation tag were in communication range based on the timestamp and that the electronic token was countersigned by the passive computational tag.
6 Assignments
0 Petitions
Accused Products
Abstract
In implementations, a computer-implemented method for location assurance is disclosed. The method can include receiving, by an application executing on a mobile computing device, an electronic token from a server, wherein the electronic token comprises a timestamp signed using a cryptographic signing algorithm; providing, by the application, the electronic token to a passive computational tag, wherein the electronic token is countersigned by the passive computational tag; receiving, by the application, the electronic token that was countersigned by the passive computational tag; and providing, by the application, the electronic token that was countersigned to the server.
31 Citations
16 Claims
-
1. A computer-implemented method for location assurance comprising:
-
receiving, by an application executing on a mobile computing device, an electronic token from a token server over a network, wherein the electronic token comprises a timestamp signed using a cryptographic digital signature algorithm by the token server, wherein the mobile computing device comprises a hardware processor; providing, by the application, the electronic token to a passive computational tag based on an instruction from the hardware processor, wherein the electronic token is countersigned by the passive computational tag using the cryptographic digital signature algorithm; receiving, by the application, the electronic token that was countersigned by the passive computational tag; providing, by the application, the electronic token that was countersigned by the passive computational tag to the token server over the network; creating, by the token server, an electronic log of activities associated with a physical proximity of the mobile computing device and the passive computational tag based on the electronic token that was countersigned; providing, by the token server, access rights to a user of the mobile computing device associated with the passive computation tag based on the electronic token that was countersigned, determining, by the token server, a continuous presence between the mobile computing device and a docketing station associated with the passive computational tag; and receiving a stream of tokens from the token server based on the continuous presence that was determined, wherein the electronic token provides a verifiable location assurance based on the electronic log that the mobile computing device and the passive computation tag were in communication range based on the timestamp and that the electronic token was countersigned by the passive computational tag. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A device comprising:
-
one or more hardware processors; and a non-transitory computer readable medium comprising instructions that cause the one or more hardware processors to perform a method comprising; receiving, by an application executing on a mobile computing device, an electronic token from a token server, wherein the electronic token comprises a timestamp signed using a cryptographic digital signature algorithm; providing, by the application, the electronic token to a passive computational tag, wherein the electronic token is countersigned by the passive computational tag; receiving, by the application, the electronic token that was countersigned by the passive computational tag; providing, by the application, the electronic token that was countersigned to the token server over a network, creating, by the token server, an electronic log of activities associated with a physical proximity of the mobile computing device and the passive computational tag based on the electronic token that was countersigned; providing, by the token server, access rights to a user of the mobile computing device associated with the passive computation tag based on the electronic token that was countersigned, determining, by the token server, a continuous presence between the mobile computing device and a docketing station associated with the passive computational tag; and receiving a stream of tokens from the token server based on the continuous presence that was determined; wherein the electronic token provides a verifiable location assurance based on the electronic log that the mobile computing device and the passive computation tag were in communication range based on the timestamp and that the electronic token was countersigned by the passive computational tag. - View Dependent Claims (14, 15)
-
-
16. A computer-implemented method for location assurance comprising:
-
receiving, by a hardware processor of a token server over a network, a request for an electronic token from a computing device; generating, by the hardware processor, the electronic token based on the request that was received, wherein the electronic token comprises information related to an identification of the token server and information related to a time that the request was received; signing, by the hardware processor of the token server, the electronic token using a cryptographic digital signature algorithm; providing, by the hardware processor of the token server over the network, the electronic token that was signed to the computing device; receiving, by the hardware processor of the token server over a network, the electronic token that was countersigned by a passive computational tag; determining, by the hardware processor of the token server, a time interval between when the request for the electronic token was received and when the electronic token that was countersigned was received to determine a location duration of the computing device with respect to the passive computational tag; creating, by the hardware processor of the token server, an electronic log of activities associated with a physical proximity of the mobile computing device and the passive computational tag based on the electronic token that was countersigned; providing, by the hardware processor of the token server, access rights to a user of the mobile computing device associated with the passive computation tag based on the electronic token that was countersigned; determining, by the hardware processor of the token server, a continuous presence between the mobile computing device and a docketing station associated with the passive computational tag; and receiving a stream of tokens from the hardware processor of the token server based on the continuous presence that was determined; wherein the electronic token provides a verifiable location assurance based on the electronic log that the mobile computing device and the passive computation tag were in communication range based on a time when the electronic token that was countersigned by the passive computational tag.
-
Specification