HK1243206A1 - 用於资源的地理位置验证的方法和系统 - Google Patents
用於资源的地理位置验证的方法和系统 Download PDFInfo
- Publication number
- HK1243206A1 HK1243206A1 HK18102712.3A HK18102712A HK1243206A1 HK 1243206 A1 HK1243206 A1 HK 1243206A1 HK 18102712 A HK18102712 A HK 18102712A HK 1243206 A1 HK1243206 A1 HK 1243206A1
- Authority
- HK
- Hong Kong
- Prior art keywords
- computer
- operating system
- data portion
- geo
- geolocation
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/107—Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/52—Network services specially adapted for the location of the user terminal
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US201462073008P | 2014-10-30 | 2014-10-30 | |
| US62/073,008 | 2014-10-30 | ||
| PCT/US2015/058102 WO2016069915A1 (en) | 2014-10-30 | 2015-10-29 | Method and system for geolocation verification of resources |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| HK1243206A1 true HK1243206A1 (zh) | 2018-07-06 |
Family
ID=54602010
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| HK18102712.3A HK1243206A1 (zh) | 2014-10-30 | 2015-10-29 | 用於资源的地理位置验证的方法和系统 |
Country Status (6)
| Country | Link |
|---|---|
| US (1) | US10063565B2 (enExample) |
| EP (1) | EP3213246B1 (enExample) |
| JP (1) | JP6463837B2 (enExample) |
| CN (1) | CN107111714A (enExample) |
| HK (1) | HK1243206A1 (enExample) |
| WO (1) | WO2016069915A1 (enExample) |
Families Citing this family (15)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US11687947B2 (en) | 2014-10-31 | 2023-06-27 | Aeris Communications, Inc. | Automatic connected vehicle enrollment |
| US10373403B2 (en) | 2014-10-31 | 2019-08-06 | Aeris Communications, Inc. | Automatic connected vehicle subsequent owner enrollment process |
| US10586207B2 (en) * | 2014-10-31 | 2020-03-10 | Aeris Communications, Inc. | Automatic connected vehicle demonstration process |
| EP3440839A4 (en) * | 2016-04-06 | 2019-08-28 | Charles R. Tudor | VIDEO BROADCAST VIA SELECTED VIDEO HOSTS |
| SG11201901778YA (en) | 2016-09-02 | 2019-03-28 | Futurevault Inc | Automated document filing and processing methods and systems |
| WO2018039772A1 (en) | 2016-09-02 | 2018-03-08 | FutureVault Inc. | Real-time document filtering systems and methods |
| EP3507723A4 (en) | 2016-09-02 | 2020-04-01 | FutureVault Inc. | SYSTEMS AND METHODS FOR SHARING DOCUMENTS |
| US20180083939A1 (en) * | 2016-09-19 | 2018-03-22 | International Business Machines Corporation | Geolocation dependent variable authentication |
| EP3580889B1 (en) * | 2017-02-08 | 2020-12-16 | Nokia Solutions and Networks Oy | Enhancing integrity of data center specific information |
| US10542119B2 (en) * | 2017-12-07 | 2020-01-21 | Citrix Systems, Inc. | Multi-geographical processing of user requests |
| CN109934007A (zh) * | 2018-09-04 | 2019-06-25 | 北京洛必达科技有限公司 | 一种区块链金融大数据处理系统及方法 |
| US20210345101A1 (en) * | 2020-04-29 | 2021-11-04 | International Business Machines Corporation | LiFi Location Services as a Prerequisite to System Activation |
| US12353907B1 (en) | 2020-09-04 | 2025-07-08 | Pure Storage, Inc. | Application migration using data movement capabilities of a storage system |
| US12131044B2 (en) * | 2020-09-04 | 2024-10-29 | Pure Storage, Inc. | Intelligent application placement in a hybrid infrastructure |
| US12375929B2 (en) * | 2023-01-05 | 2025-07-29 | Bank Of America Corporation | Geolocation authenticator |
Family Cites Families (11)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| GB0318386D0 (en) * | 2003-08-06 | 2003-09-10 | Koninkl Philips Electronics Nv | A method of procesing a sampled spread spectrum signal stream |
| CN1954543A (zh) * | 2004-04-14 | 2007-04-25 | 数码河股份有限公司 | 基于地理位置的许可系统 |
| US7352283B2 (en) * | 2004-12-08 | 2008-04-01 | Intel Corporation | Computing platform security apparatus, systems, and methods |
| MX327792B (enExample) * | 2007-01-16 | 2015-02-11 | ||
| US8560839B2 (en) * | 2010-12-20 | 2013-10-15 | Microsoft Corporation | Tamper proof location services |
| US20120311575A1 (en) * | 2011-06-02 | 2012-12-06 | Fujitsu Limited | System and method for enforcing policies for virtual machines |
| US20140032733A1 (en) * | 2011-10-11 | 2014-01-30 | Citrix Systems, Inc. | Policy-Based Application Management |
| JP5857862B2 (ja) * | 2012-04-17 | 2016-02-10 | コニカミノルタ株式会社 | 情報処理装置およびプログラム |
| EP2888634A4 (en) * | 2012-08-27 | 2016-04-06 | Empire Technology Dev Llc | DISPLAY OF THE GEOGRAPHICAL ORIGIN OF A DIGITALLY COMMUNICATED COMMUNICATION |
| US9214021B2 (en) * | 2012-10-09 | 2015-12-15 | The Boeing Company | Distributed position identification |
| US9742559B2 (en) * | 2013-01-22 | 2017-08-22 | Qualcomm Incorporated | Inter-module authentication for securing application execution integrity within a computing device |
-
2015
- 2015-10-29 CN CN201580058741.8A patent/CN107111714A/zh active Pending
- 2015-10-29 US US14/926,453 patent/US10063565B2/en active Active
- 2015-10-29 EP EP15797503.8A patent/EP3213246B1/en active Active
- 2015-10-29 JP JP2017523391A patent/JP6463837B2/ja active Active
- 2015-10-29 HK HK18102712.3A patent/HK1243206A1/zh unknown
- 2015-10-29 WO PCT/US2015/058102 patent/WO2016069915A1/en not_active Ceased
Also Published As
| Publication number | Publication date |
|---|---|
| CN107111714A (zh) | 2017-08-29 |
| JP2017533521A (ja) | 2017-11-09 |
| JP6463837B2 (ja) | 2019-02-06 |
| EP3213246B1 (en) | 2020-05-06 |
| US20160127384A1 (en) | 2016-05-05 |
| US10063565B2 (en) | 2018-08-28 |
| WO2016069915A1 (en) | 2016-05-06 |
| EP3213246A1 (en) | 2017-09-06 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US10063565B2 (en) | Method and system for geolocation verification of resources | |
| US8505107B2 (en) | Cloud server and access management method | |
| US10462128B2 (en) | Verification of both identification and presence of objects over a network | |
| US8453142B2 (en) | Virtual machine control | |
| CN111428208B (zh) | 一种应用软件授权方法、装置及存储介质 | |
| US9054917B2 (en) | Secure migration of virtual machines | |
| US10511610B2 (en) | Location based trusted computing nodes in a cloud computing architecture | |
| US10102364B2 (en) | Verification of both identification and presence over a network | |
| JP2017533521A5 (enExample) | ||
| WO2021053422A1 (en) | Correspondence of external operations to containers and mutation events | |
| US10484366B2 (en) | Verification of both identification and presence over a network | |
| US9785791B2 (en) | Using a location authorization extension to provide access authorization for a module to access a computing system | |
| Paladi et al. | Trusted geolocation-aware data placement in infrastructure clouds | |
| US12183186B1 (en) | Geofencing with satellite systems | |
| US11486709B2 (en) | Ground distance determination using zone-based location data | |
| US10867047B2 (en) | Booting user devices to custom operating system (OS) images | |
| US20120185206A1 (en) | Method for setting the geolocation of a non-gps enabled device | |
| US11562094B2 (en) | Geography aware file dissemination | |
| US20150278539A1 (en) | Location-based data security system | |
| US11941798B2 (en) | Food-product tracking by photogrammetry | |
| Bu-Pasha et al. | Data protection and space: What challenges will the General Data Protection Regulation face when dealing with space-based data? | |
| CN114186113A (zh) | 基于地理位置的信息推荐方法、装置和电子设备 | |
| HK1238814B (en) | Location based trusted computing nodes in a cloud computing architecture | |
| HK1238814A1 (en) | Location based trusted computing nodes in a cloud computing architecture | |
| HK1238814A (en) | Location based trusted computing nodes in a cloud computing architecture |