Methods, servers and systems for verifying reported locations of computing devices
First Claim
Patent Images
1. A method for authenticating location information provided in messages, comprising:
- comparing location information incorporated in a message, from a sending computing device at an actual location to a receiving computing device, with low-level information regarding the actual location of the sending computing device maintained in a server, wherein the low-level information is inaccessible to a user; and
authenticating the location information based on the comparison.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, servers and systems are disclosed for authenticating location information in a message from a sending computing device to a receiving computing device. Location information of a sending computing device at an actual location may be incorporated in the message. Location information in a message may be compared with information regarding the actual location of the sending computing device maintained by a server. The location information in the message may be authenticated based on the comparison.
-
Citations
18 Claims
-
1. A method for authenticating location information provided in messages, comprising:
-
comparing location information incorporated in a message, from a sending computing device at an actual location to a receiving computing device, with low-level information regarding the actual location of the sending computing device maintained in a server, wherein the low-level information is inaccessible to a user; and authenticating the location information based on the comparison. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A proxy server for authenticating location information provided in a message sent from a sending computing device to a receiving computing device, the proxy server configured with server executable instructions to perform operations comprising:
-
receiving the message from the sending computing device including information regarding the sending computing device'"'"'s location; sending a request to a server for the location information regarding an actual location of the sending computing device maintained in the server; receiving a response from the server that includes the location information regarding the actual location of the sending computing device maintained in the server; comparing the information regarding the sending computing device'"'"'s location included in the message received from the sending computing device to the location information regarding the actual location of the sending computing device received from the server; and sending the message received from the sending computing device to the receiving computing device including authenticated location information. - View Dependent Claims (10, 11, 12)
-
-
13. A computing device, comprising a processor configured with processor executable instructions to perform operations comprising:
-
receiving a message from a sending computing device including information regarding the sending computing device'"'"'s location; obtaining an authentication of the information regarding the sending computing device'"'"'s location based on location information regarding an actual location of the sending computing device maintained in a server; sending to the server a request for the location information regarding the actual location of the sending computing device maintained in the server; receiving from the server the location information regarding the actual location of the sending computing device maintained in the server; comparing the information regarding the sending computing device'"'"'s location included in the message to the location information regarding the actual location of the sending computing device received from the server; and authenticating in the computing device the information regarding the sending computing device'"'"'s location included in the message based on the comparison. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification