Geospatial cryptagraphy
    1.
    发明授权

    公开(公告)号:US09654449B2

    公开(公告)日:2017-05-16

    申请号:US14731409

    申请日:2015-06-05

    摘要: The invention includes methods for authenticating access between devices when the devices are within a geospatial boundary comprising the first step of keeping track of the physical position of the devices using both low and, or high fidelity geospatial positioning techniques. Next, a first device determines whether any nearby mobile devices have entered the geospatial boundary. Next, the first device determines if any of the mobile devices are peers eligible for cryptographic authentication. After the first device authenticates that the other device within the geospatial boundary is a trusted peer, the devices may perform various data and, or dynamic policy operations.

    Geospatial Cryptagraphy
    2.
    发明申请
    Geospatial Cryptagraphy 有权
    地理空间加密

    公开(公告)号:US20160021069A1

    公开(公告)日:2016-01-21

    申请号:US14731409

    申请日:2015-06-05

    IPC分类号: H04L29/06

    摘要: The invention includes methods for authenticating access between devices when the devices are within a geospatial boundary comprising the first step of keeping track of the physical position of the devices using both low and, or high fidelity geospatial positioning techniques. Next, a first device determines whether any nearby mobile devices have entered the geospatial boundary. Next, the first device determines if any of the mobile devices are peers eligible for cryptographic authentication. After the first device authenticates that the other device within the geospatial boundary is a trusted peer, the devices may perform various data and, or dynamic policy operations.

    摘要翻译: 本发明包括当设备在地理空间边界内时认证设备之间的访问的方法,包括使用低和或高保真地理空间定位技术来跟踪设备的物理位置的第一步骤。 接下来,第一设备确定任何附近的移动设备是否已经进入地理空间边界。 接下来,第一设备确定任何移动设备是否具有符合加密认证的对等体。 在第一个设备认证地理空间边界中的其他设备是可信对等体之后,设备可以执行各种数据和动态策略操作。