CN102609662B - 防篡改的位置服务 - Google Patents

防篡改的位置服务 Download PDF

Info

Publication number
CN102609662B
CN102609662B CN201110431392.3A CN201110431392A CN102609662B CN 102609662 B CN102609662 B CN 102609662B CN 201110431392 A CN201110431392 A CN 201110431392A CN 102609662 B CN102609662 B CN 102609662B
Authority
CN
China
Prior art keywords
location
information
resource
access control
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201110431392.3A
Other languages
English (en)
Chinese (zh)
Other versions
CN102609662A (zh
Inventor
P·巴勒姆
J·N·菲格罗亚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Microsoft Technology Licensing LLC
Original Assignee
Microsoft Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft Corp filed Critical Microsoft Corp
Publication of CN102609662A publication Critical patent/CN102609662A/zh
Application granted granted Critical
Publication of CN102609662B publication Critical patent/CN102609662B/zh
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/101Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities
    • G06F21/1013Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities to locations
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/107Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Computing Systems (AREA)
  • Automation & Control Theory (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Storage Device Security (AREA)
  • Position Fixing By Use Of Radio Waves (AREA)
  • Telephonic Communication Services (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Mobile Radio Communication Systems (AREA)
CN201110431392.3A 2010-12-20 2011-12-20 防篡改的位置服务 Active CN102609662B (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US12/972,534 2010-12-20
US12/972,534 US8560839B2 (en) 2010-12-20 2010-12-20 Tamper proof location services

Publications (2)

Publication Number Publication Date
CN102609662A CN102609662A (zh) 2012-07-25
CN102609662B true CN102609662B (zh) 2015-08-05

Family

ID=46236020

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110431392.3A Active CN102609662B (zh) 2010-12-20 2011-12-20 防篡改的位置服务

Country Status (8)

Country Link
US (1) US8560839B2 (enExample)
EP (1) EP2656270B1 (enExample)
JP (1) JP2014503909A (enExample)
KR (1) KR101889577B1 (enExample)
CN (1) CN102609662B (enExample)
AR (1) AR084211A1 (enExample)
TW (1) TWI549019B (enExample)
WO (1) WO2012087853A2 (enExample)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11749045B2 (en) 2021-03-01 2023-09-05 Honeywell International Inc. Building access using a mobile device
US11887424B2 (en) 2019-06-12 2024-01-30 Honeywell International Inc. Access control system using mobile device

Families Citing this family (48)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012122994A1 (en) * 2011-03-11 2012-09-20 Kreft Heinz Off-line transfer of electronic tokens between peer-devices
US8738943B2 (en) * 2011-03-21 2014-05-27 International Business Machines Corporation Controlling and minimizing electrical power consumed by electrical components connected to a networked computing environment
US9365188B1 (en) * 2011-04-22 2016-06-14 Angel A. Penilla Methods and systems for using cloud services to assign e-keys to access vehicles
US9038158B1 (en) * 2011-07-07 2015-05-19 Symantec Corporation Systems and methods for enforcing geolocation-based policies
DE202011105214U1 (de) 2011-09-01 2012-07-12 Sichtwerk Gmbh Digitales Gipfelbuch
FR2987152B1 (fr) * 2012-02-22 2017-11-17 Oberthur Technologies Procede et dispositif de securite pour effectuer une transaction
US20140013451A1 (en) * 2012-07-06 2014-01-09 Sap Ag Data obfuscation for open data (odata) communications
US11188652B2 (en) 2012-10-02 2021-11-30 Mordecai Barkan Access management and credential protection
EP2904743B1 (en) 2012-10-02 2017-09-06 Mordecai Barkan Secure computer architectures, systems, and applications
US9672360B2 (en) 2012-10-02 2017-06-06 Mordecai Barkan Secure computer architectures, systems, and applications
US9342695B2 (en) 2012-10-02 2016-05-17 Mordecai Barkan Secured automated or semi-automated systems
US9246892B2 (en) 2013-04-03 2016-01-26 Salesforce.Com, Inc. System, method and computer program product for managing access to systems, products, and data based on information associated with a physical location of a user
GB2534693B (en) * 2013-11-08 2017-02-08 Exacttrak Ltd Data accessibility control
CN104780530A (zh) * 2014-01-15 2015-07-15 中兴通讯股份有限公司 一种保护用户数据的方法和终端
JP6289606B2 (ja) * 2014-02-26 2018-03-07 三菱電機株式会社 証明書管理装置、及び証明書管理方法
US9577823B2 (en) 2014-03-21 2017-02-21 Venafi, Inc. Rule-based validity of cryptographic key material
US9686244B2 (en) 2014-03-21 2017-06-20 Venafi, Inc. Rule-based validity of cryptographic key material
US9647998B2 (en) 2014-03-21 2017-05-09 Venafi, Inc. Geo-fencing cryptographic key material
US9680827B2 (en) 2014-03-21 2017-06-13 Venafi, Inc. Geo-fencing cryptographic key material
US9531533B2 (en) 2014-03-21 2016-12-27 Venafi, Inc. Rule-based validity of cryptographic key material
US9654922B2 (en) 2014-03-21 2017-05-16 Venafi, Inc. Geo-fencing cryptographic key material
US9633184B2 (en) * 2014-05-30 2017-04-25 Google Inc. Dynamic authorization
US9767304B2 (en) * 2014-09-25 2017-09-19 Microsoft Technology Licensing, Llc Representation of operating system context in a trusted platform module
US9735968B2 (en) 2014-10-20 2017-08-15 Microsoft Technology Licensing, Llc Trust service for a client device
CN107111714A (zh) * 2014-10-30 2017-08-29 新科恩斯卡莱有限责任公司 用于资源的地理位置验证的方法和系统
US9779271B2 (en) * 2015-06-08 2017-10-03 Juniper Networks, Inc. Apparatus, system, and method for detecting theft of network devices
WO2016209134A1 (en) * 2015-06-26 2016-12-29 Telefonaktiebolaget Lm Ericsson (Publ) Data processing based on location preference
JP6419660B2 (ja) 2015-07-29 2018-11-07 株式会社日立製作所 秘密情報設定方法、秘密情報設定システム、および秘密情報設定装置
JP6601085B2 (ja) * 2015-09-15 2019-11-06 株式会社リコー データ管理システム、データ管理方法
US10616238B2 (en) * 2015-12-28 2020-04-07 Dropbox, Inc. Sharing files based on recipient-location criteria
US10601787B2 (en) * 2016-06-06 2020-03-24 Cisco Technology, Inc. Root of trust of geolocation
US10057276B2 (en) 2016-09-19 2018-08-21 International Business Machines Corporation Global attestation procedure
US10389731B2 (en) * 2016-11-22 2019-08-20 Microsoft Technology Licensing, Llc Multi-factor authentication using positioning data
US10297147B2 (en) 2016-12-06 2019-05-21 Flir Commercial Systems, Inc. Methods and apparatus for monitoring traffic data
CN106791178A (zh) * 2017-01-17 2017-05-31 宇龙计算机通信科技(深圳)有限公司 一种位置信息传输方法及移动终端
CN108668216B (zh) * 2017-03-27 2020-07-31 中国移动通信有限公司研究院 一种终端位置定位的防伪方法、防伪终端及系统
US10733298B2 (en) * 2017-07-31 2020-08-04 Dell Products, L.P. System management audit log snapshot
CN108052803B (zh) * 2018-01-02 2021-11-16 联想(北京)有限公司 一种访问控制方法、装置及电子设备
CN112369058B (zh) * 2018-11-09 2024-03-15 开利公司 对货箱控制器的地理安全访问
US11144654B2 (en) * 2019-03-08 2021-10-12 Seagate Technology Llc Environment-aware storage drive with expandable security policies
US11336684B2 (en) * 2019-06-07 2022-05-17 Lookout, Inc. Mobile device security using a secure execution context
US20210344664A1 (en) * 2020-04-29 2021-11-04 Motorola Mobility Llc Methods, Systems, and Electronic Devices for Selective Locational Preclusion of Access to Content
US11316684B2 (en) * 2020-05-19 2022-04-26 International Business Machines Corporation Restricting security key transfer from a key management server in an enterprise
US11588632B2 (en) * 2020-09-22 2023-02-21 International Business Machines Corporation Private key creation using location data
JP7699921B2 (ja) * 2020-12-03 2025-06-30 キヤノン株式会社 デバイス管理装置、デバイス管理装置の制御方法、及びプログラム
CN112738100B (zh) * 2020-12-29 2023-09-01 北京天融信网络安全技术有限公司 数据访问的鉴权方法、装置、鉴权设备和鉴权系统
US11899796B2 (en) 2021-10-19 2024-02-13 Dell Products L.P. Initialization geo-locking system
WO2025034610A2 (en) * 2023-08-04 2025-02-13 Istari Digital, Inc. Securing an interconnected digital engineering and certification ecosystem

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1489736A (zh) * 2000-11-28 2004-04-14 �����ĵ� 用于维护和分发无线应用的方法和系统
US7624424B2 (en) * 2004-05-21 2009-11-24 Nec Corporation Access control system, access control method, and access control program

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6985588B1 (en) * 2000-10-30 2006-01-10 Geocodex Llc System and method for using location identity to control access to digital information
US7120254B2 (en) 2000-10-30 2006-10-10 Geocodex Llc Cryptographic system and method for geolocking and securing digital information
JP2003099400A (ja) * 2001-09-26 2003-04-04 Fujitsu Ltd セキュリティ管理装置及びセキュリティ管理方法並びにセキュリティ管理用プログラム
CA2789166A1 (en) 2002-03-01 2003-09-12 Enterasys Networks, Inc. Location aware data network
US7308703B2 (en) 2002-12-18 2007-12-11 Novell, Inc. Protection of data accessible by a mobile device
US7526800B2 (en) * 2003-02-28 2009-04-28 Novell, Inc. Administration of protection of data accessible by a mobile device
JP2005174124A (ja) * 2003-12-12 2005-06-30 Canon Inc ネットワークシステム
US7853786B1 (en) 2003-12-17 2010-12-14 Sprint Communications Company L.P. Rules engine architecture and implementation
US20060143179A1 (en) * 2004-12-29 2006-06-29 Motorola, Inc. Apparatus and method for managing security policy information using a device management tree
US20060236369A1 (en) 2005-03-24 2006-10-19 Covington Michael J Method, apparatus and system for enforcing access control policies using contextual attributes
WO2007110094A1 (en) * 2006-03-27 2007-10-04 Telecom Italia S.P.A. System for enforcing security policies on mobile communications devices
JP4810294B2 (ja) * 2006-05-01 2011-11-09 Necカシオモバイルコミュニケーションズ株式会社 携帯端末装置及びプログラム
JP5340173B2 (ja) 2007-01-26 2013-11-13 インターデイジタル テクノロジー コーポレーション ロケーション情報およびロケーション情報を用いるアクセス制御を保証する方法および機器
US20080289007A1 (en) * 2007-05-17 2008-11-20 Ajay Malik System and Method for Granting Privileges Based on Location
US9137739B2 (en) * 2009-01-28 2015-09-15 Headwater Partners I Llc Network based service policy implementation with network neutrality and user privacy
US8961619B2 (en) * 2009-01-06 2015-02-24 Qualcomm Incorporated Location-based system permissions and adjustments at an electronic device
US8095656B2 (en) * 2009-11-16 2012-01-10 International Business Machines Corportion Geo-positionally based data access security

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1489736A (zh) * 2000-11-28 2004-04-14 �����ĵ� 用于维护和分发无线应用的方法和系统
US7624424B2 (en) * 2004-05-21 2009-11-24 Nec Corporation Access control system, access control method, and access control program

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11887424B2 (en) 2019-06-12 2024-01-30 Honeywell International Inc. Access control system using mobile device
US11749045B2 (en) 2021-03-01 2023-09-05 Honeywell International Inc. Building access using a mobile device
US12027007B2 (en) 2021-03-01 2024-07-02 Honeywell International Inc. Building access using a mobile device
US12367726B2 (en) 2021-03-01 2025-07-22 Honeywell International Inc. Building access using a mobile device

Also Published As

Publication number Publication date
JP2014503909A (ja) 2014-02-13
US20120159156A1 (en) 2012-06-21
EP2656270A4 (en) 2014-08-06
TWI549019B (zh) 2016-09-11
AR084211A1 (es) 2013-05-02
CN102609662A (zh) 2012-07-25
KR101889577B1 (ko) 2018-08-17
TW201232324A (en) 2012-08-01
KR20130129224A (ko) 2013-11-27
EP2656270B1 (en) 2020-04-22
EP2656270A2 (en) 2013-10-30
WO2012087853A3 (en) 2012-11-01
WO2012087853A2 (en) 2012-06-28
US8560839B2 (en) 2013-10-15

Similar Documents

Publication Publication Date Title
CN102609662B (zh) 防篡改的位置服务
Jabbar et al. Blockchain for the Internet of Vehicles: How to use blockchain to secure vehicle-to-everything (V2X) communication and payment?
US11625460B1 (en) Security platform
US11240222B2 (en) Registry apparatus, agent device, application providing apparatus and corresponding methods
JP4833620B2 (ja) 位置情報に基づくライセンス付与
US10225688B2 (en) Geospatial asset tracking systems, methods and apparatus for acquiring, manipulating and presenting telematic metadata
US9860235B2 (en) Method of establishing a trusted identity for an agent device
EP3777082B1 (en) Trusted platform module-based prepaid access token for commercial iot online services
CN106534148B (zh) 应用的访问管控方法及装置
US8707444B2 (en) Systems and methods for implementing application control security
US20120117209A1 (en) Location control service
US20190349347A1 (en) Registry apparatus, agent device, application providing apparatus and corresponding methods
CN101398875A (zh) 软件发行商信任扩展应用程序
EP3410325A1 (en) Ic chip, information processing apparatus, system, method, and program
CN106897586B (zh) 一种应用程序编程接口api权限管理方法与装置
JP6015351B2 (ja) 携帯端末装置、携帯端末プログラム、及び文書管理システム
CN111460400A (zh) 一种数据处理方法、装置及计算机可读存储介质
Isik et al. E-scooter sharing platforms: Understanding their architecture and cybersecurity threats
US20080140381A1 (en) Program Providing Device, Storage Medium, and Vehicle-Mounted Information System
US12227198B2 (en) Enhanced pairing to facilitate seamless bluetooth / WiFi connectivity
JP2015225385A (ja) 情報処理システム、情報処理方法及びプログラム
CN112583913A (zh) 基于区块链的车辆租赁处理方法及装置
CN119150320B (zh) 一种数据安全控制方法、装置、设备、介质及程序产品
CN115240299B (zh) 资源的使用方法和系统
KR20190071494A (ko) 열람이력 추적의 위치기반 문서보안 방법 및 문서보안 장치

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
ASS Succession or assignment of patent right

Owner name: MICROSOFT TECHNOLOGY LICENSING LLC

Free format text: FORMER OWNER: MICROSOFT CORP.

Effective date: 20150724

C41 Transfer of patent application or patent right or utility model
TR01 Transfer of patent right

Effective date of registration: 20150724

Address after: Washington State

Patentee after: Micro soft technique license Co., Ltd

Address before: Washington State

Patentee before: Microsoft Corp.