Secure beacon-based location systems and methods
First Claim
1. A method for secure, beacon-based emergency location, which comprises:
- detecting, with an app instance executing on a user device associated with an individual, a signal from a beacon disposed in a geographical location physically proximate to the user device;
transmitting in response to the detecting, with the app instance executing on the user device, app instance verification information to the beacon;
receiving, with the app instance executing on the user device, beacon verification information from the beacon, the beacon verification information being based at least partially on the app instance verification information;
transmitting, with the app instance executing on the user device, the beacon verification information to an emergency information server;
authenticating, with the emergency information server, the beacon verification information to verify that the user device is physically proximate to the beacon; and
if the beacon verification information is authentic, determining, with the emergency information server, the geographical location of the user device based on the geographical location of the beacon.
4 Assignments
0 Petitions
Accused Products
Abstract
A method for secure, beacon-based emergency location is disclosed. The method includes detecting, with an app instance executing on a user device, a signal from a beacon disposed in a geographical location physically proximate to the user device, and transmitting in response to the detecting app instance verification information to the beacon. Further, the method includes receiving, with the app instance executing on the user device, beacon verification information from the beacon, the beacon verification information being based at least partially on the app instance verification information, and transmitting the beacon verification information to an emergency information server. The method also includes authenticating, with the emergency information server, the beacon verification information to verify that the user device is physically proximate to the beacon and, if the beacon verification information is authentic, determining the geographical location of the user device based on the geographical location of the beacon.
129 Citations
31 Claims
-
1. A method for secure, beacon-based emergency location, which comprises:
-
detecting, with an app instance executing on a user device associated with an individual, a signal from a beacon disposed in a geographical location physically proximate to the user device; transmitting in response to the detecting, with the app instance executing on the user device, app instance verification information to the beacon; receiving, with the app instance executing on the user device, beacon verification information from the beacon, the beacon verification information being based at least partially on the app instance verification information; transmitting, with the app instance executing on the user device, the beacon verification information to an emergency information server; authenticating, with the emergency information server, the beacon verification information to verify that the user device is physically proximate to the beacon; and if the beacon verification information is authentic, determining, with the emergency information server, the geographical location of the user device based on the geographical location of the beacon. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for secure detection of beacon tampering, which comprises:
-
determining, with a sensor in a beacon disposed in a geographical location, a tamper status of the beacon, the tamper status indicating whether the beacon has been physically tampered with; detecting, with an app instance executing on a user device disposed in a geographical location physically proximate to the beacon, a signal from the beacon; receiving, with the app instance executing on the user device, the tamper status from the beacon; transmitting, with the app instance executing on the user device, the tamper status from the user device to an emergency information server; and authenticating, with the emergency information server, the tamper status to verify that tamper status was generated by the beacon. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A system for secure, beacon-based emergency location, comprising:
-
a beacon physically disposed in a geographical location, the beacon configured to; broadcast a signal; determine, with a sensor in the beacon, a tamper status of the beacon, the tamper status indicating whether the beacon has been physically tampered with; an app instance executing on a user device physically proximate to the beacon, the application instance configured to; detect the signal from the beacon; and receive the tamper status from the beacon; and an emergency information server communicatively coupled to the user device, the emergency information server being configured to; receive, from the app instance executing on the user device, the tamper status; and authenticate the tamper status to verify that tamper status was generated by the beacon. - View Dependent Claims (19, 20, 21, 22)
-
-
23. A computer-implemented method for secure, beacon-based emergency location, which comprises:
-
receiving, with an emergency information server, emergency location information describing a geographical location of an emergency; receiving, with the emergency information server, first device location information from a user device associated with an individual; determining, with the emergency information server, whether the user device is located within a geo-fence based on the first device location information, the geo-fence encompassing a geographical area including the geographical location of the emergency; if the user device is determined to be in the geo-fence, transmitting, with the emergency information server, a request for second device location information to the user device, the second device location information being different than the first device location information; receiving, with the emergency information server and in response to the request for the second device location information, a beacon identifier from the user device, the beacon identifier being associated with a beacon disposed within a subsection of a structure; and determining, with the emergency information server, in which subsection of the structure the user device is located based on the beacon identifier and a known location of the beacon. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31)
-
Specification