CN107111714A - 用于资源的地理位置验证的方法和系统 - Google Patents
用于资源的地理位置验证的方法和系统 Download PDFInfo
- Publication number
- CN107111714A CN107111714A CN201580058741.8A CN201580058741A CN107111714A CN 107111714 A CN107111714 A CN 107111714A CN 201580058741 A CN201580058741 A CN 201580058741A CN 107111714 A CN107111714 A CN 107111714A
- Authority
- CN
- China
- Prior art keywords
- computer
- operating system
- geographic location
- geographic
- data portion
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/107—Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/52—Network services specially adapted for the location of the user terminal
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US201462073008P | 2014-10-30 | 2014-10-30 | |
| US62/073,008 | 2014-10-30 | ||
| PCT/US2015/058102 WO2016069915A1 (en) | 2014-10-30 | 2015-10-29 | Method and system for geolocation verification of resources |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN107111714A true CN107111714A (zh) | 2017-08-29 |
Family
ID=54602010
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201580058741.8A Pending CN107111714A (zh) | 2014-10-30 | 2015-10-29 | 用于资源的地理位置验证的方法和系统 |
Country Status (6)
| Country | Link |
|---|---|
| US (1) | US10063565B2 (enExample) |
| EP (1) | EP3213246B1 (enExample) |
| JP (1) | JP6463837B2 (enExample) |
| CN (1) | CN107111714A (enExample) |
| HK (1) | HK1243206A1 (enExample) |
| WO (1) | WO2016069915A1 (enExample) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN109271796A (zh) * | 2018-09-04 | 2019-01-25 | 北京洛必达科技有限公司 | 一种区块链金融大数据处理系统及方法 |
Families Citing this family (14)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US11687947B2 (en) | 2014-10-31 | 2023-06-27 | Aeris Communications, Inc. | Automatic connected vehicle enrollment |
| US10373403B2 (en) | 2014-10-31 | 2019-08-06 | Aeris Communications, Inc. | Automatic connected vehicle subsequent owner enrollment process |
| US10586207B2 (en) * | 2014-10-31 | 2020-03-10 | Aeris Communications, Inc. | Automatic connected vehicle demonstration process |
| EP3440839A4 (en) * | 2016-04-06 | 2019-08-28 | Charles R. Tudor | VIDEO BROADCAST VIA SELECTED VIDEO HOSTS |
| CA3035097C (en) | 2016-09-02 | 2024-05-21 | FutureVault Inc. | Automated document filing and processing methods and systems |
| EP3507721B1 (en) | 2016-09-02 | 2022-11-23 | FutureVault Inc. | Real-time document filtering systems and methods |
| EP3507723A4 (en) | 2016-09-02 | 2020-04-01 | FutureVault Inc. | SYSTEMS AND METHODS FOR SHARING DOCUMENTS |
| US20180083939A1 (en) * | 2016-09-19 | 2018-03-22 | International Business Machines Corporation | Geolocation dependent variable authentication |
| CN110463155B (zh) * | 2017-02-08 | 2021-03-12 | 诺基亚通信公司 | 用于通信的方法和装置以及数据中心系统 |
| US10542119B2 (en) * | 2017-12-07 | 2020-01-21 | Citrix Systems, Inc. | Multi-geographical processing of user requests |
| US20210345101A1 (en) * | 2020-04-29 | 2021-11-04 | International Business Machines Corporation | LiFi Location Services as a Prerequisite to System Activation |
| US12131044B2 (en) * | 2020-09-04 | 2024-10-29 | Pure Storage, Inc. | Intelligent application placement in a hybrid infrastructure |
| US12353907B1 (en) | 2020-09-04 | 2025-07-08 | Pure Storage, Inc. | Application migration using data movement capabilities of a storage system |
| US12375929B2 (en) * | 2023-01-05 | 2025-07-29 | Bank Of America Corporation | Geolocation authenticator |
Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20060132307A1 (en) * | 2004-12-08 | 2006-06-22 | Velhal Ravindra V | Computing platform security apparatus, systems, and methods |
| CN1954543A (zh) * | 2004-04-14 | 2007-04-25 | 数码河股份有限公司 | 基于地理位置的许可系统 |
| US20110258247A1 (en) * | 2007-01-16 | 2011-10-20 | William Doyle Gordon | Security module having a secondary agent in coordination with a host agent |
| CN102609662A (zh) * | 2010-12-20 | 2012-07-25 | 微软公司 | 防篡改的位置服务 |
| US20120311575A1 (en) * | 2011-06-02 | 2012-12-06 | Fujitsu Limited | System and method for enforcing policies for virtual machines |
Family Cites Families (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| GB0318386D0 (en) * | 2003-08-06 | 2003-09-10 | Koninkl Philips Electronics Nv | A method of procesing a sampled spread spectrum signal stream |
| US20140032733A1 (en) * | 2011-10-11 | 2014-01-30 | Citrix Systems, Inc. | Policy-Based Application Management |
| JP5857862B2 (ja) * | 2012-04-17 | 2016-02-10 | コニカミノルタ株式会社 | 情報処理装置およびプログラム |
| JP2015537264A (ja) * | 2012-08-27 | 2015-12-24 | エンパイア テクノロジー ディベロップメント エルエルシー | デジタルに仲介された通信の地理的発信元を示すこと |
| US9214021B2 (en) * | 2012-10-09 | 2015-12-15 | The Boeing Company | Distributed position identification |
| US9742559B2 (en) * | 2013-01-22 | 2017-08-22 | Qualcomm Incorporated | Inter-module authentication for securing application execution integrity within a computing device |
-
2015
- 2015-10-29 EP EP15797503.8A patent/EP3213246B1/en active Active
- 2015-10-29 JP JP2017523391A patent/JP6463837B2/ja active Active
- 2015-10-29 HK HK18102712.3A patent/HK1243206A1/zh unknown
- 2015-10-29 US US14/926,453 patent/US10063565B2/en active Active
- 2015-10-29 CN CN201580058741.8A patent/CN107111714A/zh active Pending
- 2015-10-29 WO PCT/US2015/058102 patent/WO2016069915A1/en not_active Ceased
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1954543A (zh) * | 2004-04-14 | 2007-04-25 | 数码河股份有限公司 | 基于地理位置的许可系统 |
| US20060132307A1 (en) * | 2004-12-08 | 2006-06-22 | Velhal Ravindra V | Computing platform security apparatus, systems, and methods |
| US20110258247A1 (en) * | 2007-01-16 | 2011-10-20 | William Doyle Gordon | Security module having a secondary agent in coordination with a host agent |
| CN102609662A (zh) * | 2010-12-20 | 2012-07-25 | 微软公司 | 防篡改的位置服务 |
| US20120311575A1 (en) * | 2011-06-02 | 2012-12-06 | Fujitsu Limited | System and method for enforcing policies for virtual machines |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN109271796A (zh) * | 2018-09-04 | 2019-01-25 | 北京洛必达科技有限公司 | 一种区块链金融大数据处理系统及方法 |
| CN109271796B (zh) * | 2018-09-04 | 2019-07-26 | 小鹰信息科技(深圳)有限公司 | 一种区块链金融大数据处理系统及方法 |
Also Published As
| Publication number | Publication date |
|---|---|
| US20160127384A1 (en) | 2016-05-05 |
| EP3213246A1 (en) | 2017-09-06 |
| JP2017533521A (ja) | 2017-11-09 |
| WO2016069915A1 (en) | 2016-05-06 |
| HK1243206A1 (zh) | 2018-07-06 |
| JP6463837B2 (ja) | 2019-02-06 |
| US10063565B2 (en) | 2018-08-28 |
| EP3213246B1 (en) | 2020-05-06 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US10063565B2 (en) | Method and system for geolocation verification of resources | |
| US10462128B2 (en) | Verification of both identification and presence of objects over a network | |
| US8505107B2 (en) | Cloud server and access management method | |
| US9960921B2 (en) | Systems and methods for securely provisioning the geographic location of physical infrastructure elements in cloud computing environments | |
| US12001306B2 (en) | Cross-jurisdictional microservice-based cloud platform deployment | |
| CN111428208B (zh) | 一种应用软件授权方法、装置及存储介质 | |
| US20190109702A1 (en) | Secure verification of conditions of a contract using a set of verification tools | |
| US9830099B1 (en) | Secure erase of storage devices | |
| US10102364B2 (en) | Verification of both identification and presence over a network | |
| JP2017533521A5 (enExample) | ||
| US10484366B2 (en) | Verification of both identification and presence over a network | |
| US9785791B2 (en) | Using a location authorization extension to provide access authorization for a module to access a computing system | |
| US20210374696A1 (en) | Public-Private Pegged Blockchains for Regulatory-Zone Restricted Whitebox Programmable Cellular Devices | |
| JP2025528778A (ja) | 位置座標の周期的サンプリングに基づくユーザ認証 | |
| US20120185206A1 (en) | Method for setting the geolocation of a non-gps enabled device | |
| US9949073B2 (en) | Wireless service provider management of geo-fenced spaces | |
| US20230039068A1 (en) | Media transit management in cyberspace | |
| US11562094B2 (en) | Geography aware file dissemination | |
| US11641360B2 (en) | Role-based access control with complete sets of granular roles | |
| US20150278539A1 (en) | Location-based data security system | |
| US20220394092A1 (en) | Proximity Routing Policy Enforcement for Trans-Border Internet of Things Data Governance Compliance | |
| US11941798B2 (en) | Food-product tracking by photogrammetry | |
| JP2015528139A5 (enExample) | ||
| US20230080084A1 (en) | Access verification on portable mass storage devices | |
| US20240388569A1 (en) | Secrets management topology migrator |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| REG | Reference to a national code |
Ref country code: HK Ref legal event code: DE Ref document number: 1243206 Country of ref document: HK |
|
| WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20170829 |
|
| WD01 | Invention patent application deemed withdrawn after publication | ||
| REG | Reference to a national code |
Ref country code: HK Ref legal event code: WD Ref document number: 1243206 Country of ref document: HK |