Geospatial cryptagraphy
First Claim
1. A system for authenticating access between a fixed device and a mobile device comprising:
- a control agent that is not enabled to decrypt or read an encrypted signal and is only enabled to send the encrypted signal to the mobile device;
the fixed device surrounded by a geospatial boundary, and the fixed device enabled to determine when the mobile device has entered the geospatial boundary;
the mobile device enabled to ascertain a geospatial position of the mobile device, and to send an encrypted signal that includes the geospatial position of the mobile device to the control agent;
wherein the control agent is enabled to determine that the mobile device is within the geospatial boundary, and to send an updated contact list to the fixed device;
wherein the fixed device is enabled to receive the updated contact list, use the updated contact list to determine that the mobile device is a peer, and transmit an encrypted signal to the fixed device via the control agent;
the mobile device enabled to decrypt the encrypted signal and access the high fidelity position of the fixed device, use the high fidelity position of the fixed device to determine that the mobile device is still within the geospatial boundary, and update the contact list to establish authenticated access with the fixed device.
1 Assignment
0 Petitions
Accused Products
Abstract
The invention includes methods for authenticating access between devices when the devices are within a geospatial boundary comprising the first step of keeping track of the physical position of the devices using both low and, or high fidelity geospatial positioning techniques. Next, a first device determines whether any nearby mobile devices have entered the geospatial boundary. Next, the first device determines if any of the mobile devices are peers eligible for cryptographic authentication. After the first device authenticates that the other device within the geospatial boundary is a trusted peer, the devices may perform various data and, or dynamic policy operations.
-
Citations
19 Claims
-
1. A system for authenticating access between a fixed device and a mobile device comprising:
-
a control agent that is not enabled to decrypt or read an encrypted signal and is only enabled to send the encrypted signal to the mobile device; the fixed device surrounded by a geospatial boundary, and the fixed device enabled to determine when the mobile device has entered the geospatial boundary; the mobile device enabled to ascertain a geospatial position of the mobile device, and to send an encrypted signal that includes the geospatial position of the mobile device to the control agent; wherein the control agent is enabled to determine that the mobile device is within the geospatial boundary, and to send an updated contact list to the fixed device; wherein the fixed device is enabled to receive the updated contact list, use the updated contact list to determine that the mobile device is a peer, and transmit an encrypted signal to the fixed device via the control agent; the mobile device enabled to decrypt the encrypted signal and access the high fidelity position of the fixed device, use the high fidelity position of the fixed device to determine that the mobile device is still within the geospatial boundary, and update the contact list to establish authenticated access with the fixed device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for authenticating access between a first mobile device and a second mobile device comprising:
-
a geospatial boundary that moves relative to and surrounds the first mobile device; a control agent; the second mobile device enabled to ascertain a geospatial position of the second mobile device and use the geospatial position of the second mobile device to determine when the second mobile device is within the geospatial boundary, and to send a signal that includes the geospatial position of the second mobile device to the control agent; wherein the control agent is enabled to determine that the second mobile device is within the geospatial boundary, to determine that the first mobile device and the second mobile device are peers, to update a first contact list including identifying information of the first mobile device and a second contact list including identifying information of the second mobile device, and to send the second contact list to the first mobile device and the first contact list to the second mobile device; wherein the first mobile device is enabled to determine that the second mobile device is a trusted peer by recognizing that the control agent has already determined that the second mobile device is a trusted peer; and the first mobile device and the second mobile device each enabled to update its respective contact list to finalize authenticated access with each other. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
Specification