×

System and method for location assurance using passive computational tags

  • US 9,515,836 B2
  • Filed: 03/28/2013
  • Issued: 12/06/2016
  • Est. Priority Date: 03/28/2013
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for location assurance comprising:

  • receiving, by an application executing on a mobile computing device, an electronic token from a token server over a network, wherein the electronic token comprises a timestamp signed using a cryptographic digital signature algorithm by the token server, wherein the mobile computing device comprises a hardware processor;

    providing, by the application, the electronic token to a passive computational tag based on an instruction from the hardware processor, wherein the electronic token is countersigned by the passive computational tag using the cryptographic digital signature algorithm;

    receiving, by the application, the electronic token that was countersigned by the passive computational tag;

    providing, by the application, the electronic token that was countersigned by the passive computational tag to the token server over the network;

    creating, by the token server, an electronic log of activities associated with a physical proximity of the mobile computing device and the passive computational tag based on the electronic token that was countersigned;

    providing, by the token server, access rights to a user of the mobile computing device associated with the passive computation tag based on the electronic token that was countersigned,determining, by the token server, a continuous presence between the mobile computing device and a docketing station associated with the passive computational tag; and

    receiving a stream of tokens from the token server based on the continuous presence that was determined,wherein the electronic token provides a verifiable location assurance based on the electronic log that the mobile computing device and the passive computation tag were in communication range based on the timestamp and that the electronic token was countersigned by the passive computational tag.

View all claims
  • 6 Assignments
Timeline View
Assignment View
    ×
    ×