KR101889577B1 - 부정조작 불가능한 위치 제공 서비스 - Google Patents

부정조작 불가능한 위치 제공 서비스 Download PDF

Info

Publication number
KR101889577B1
KR101889577B1 KR1020137015803A KR20137015803A KR101889577B1 KR 101889577 B1 KR101889577 B1 KR 101889577B1 KR 1020137015803 A KR1020137015803 A KR 1020137015803A KR 20137015803 A KR20137015803 A KR 20137015803A KR 101889577 B1 KR101889577 B1 KR 101889577B1
Authority
KR
South Korea
Prior art keywords
location
information
component
access
resource
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
KR1020137015803A
Other languages
English (en)
Korean (ko)
Other versions
KR20130129224A (ko
Inventor
폴 바함
조셉 엔 피구에로아
Original Assignee
마이크로소프트 테크놀로지 라이센싱, 엘엘씨
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 마이크로소프트 테크놀로지 라이센싱, 엘엘씨 filed Critical 마이크로소프트 테크놀로지 라이센싱, 엘엘씨
Publication of KR20130129224A publication Critical patent/KR20130129224A/ko
Application granted granted Critical
Publication of KR101889577B1 publication Critical patent/KR101889577B1/ko
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/101Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities
    • G06F21/1013Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities to locations
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/107Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Computing Systems (AREA)
  • Automation & Control Theory (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Storage Device Security (AREA)
  • Position Fixing By Use Of Radio Waves (AREA)
  • Telephonic Communication Services (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Mobile Radio Communication Systems (AREA)
KR1020137015803A 2010-12-20 2011-12-19 부정조작 불가능한 위치 제공 서비스 Active KR101889577B1 (ko)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US12/972,534 2010-12-20
US12/972,534 US8560839B2 (en) 2010-12-20 2010-12-20 Tamper proof location services
PCT/US2011/065707 WO2012087853A2 (en) 2010-12-20 2011-12-19 Tamper proof location services

Publications (2)

Publication Number Publication Date
KR20130129224A KR20130129224A (ko) 2013-11-27
KR101889577B1 true KR101889577B1 (ko) 2018-08-17

Family

ID=46236020

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020137015803A Active KR101889577B1 (ko) 2010-12-20 2011-12-19 부정조작 불가능한 위치 제공 서비스

Country Status (8)

Country Link
US (1) US8560839B2 (enExample)
EP (1) EP2656270B1 (enExample)
JP (1) JP2014503909A (enExample)
KR (1) KR101889577B1 (enExample)
CN (1) CN102609662B (enExample)
AR (1) AR084211A1 (enExample)
TW (1) TWI549019B (enExample)
WO (1) WO2012087853A2 (enExample)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11749045B2 (en) 2021-03-01 2023-09-05 Honeywell International Inc. Building access using a mobile device
US11887424B2 (en) 2019-06-12 2024-01-30 Honeywell International Inc. Access control system using mobile device

Families Citing this family (48)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012122994A1 (en) * 2011-03-11 2012-09-20 Kreft Heinz Off-line transfer of electronic tokens between peer-devices
US8738943B2 (en) * 2011-03-21 2014-05-27 International Business Machines Corporation Controlling and minimizing electrical power consumed by electrical components connected to a networked computing environment
US9365188B1 (en) * 2011-04-22 2016-06-14 Angel A. Penilla Methods and systems for using cloud services to assign e-keys to access vehicles
US9038158B1 (en) * 2011-07-07 2015-05-19 Symantec Corporation Systems and methods for enforcing geolocation-based policies
DE202011105214U1 (de) 2011-09-01 2012-07-12 Sichtwerk Gmbh Digitales Gipfelbuch
FR2987152B1 (fr) * 2012-02-22 2017-11-17 Oberthur Technologies Procede et dispositif de securite pour effectuer une transaction
US20140013451A1 (en) * 2012-07-06 2014-01-09 Sap Ag Data obfuscation for open data (odata) communications
US11188652B2 (en) 2012-10-02 2021-11-30 Mordecai Barkan Access management and credential protection
EP2904743B1 (en) 2012-10-02 2017-09-06 Mordecai Barkan Secure computer architectures, systems, and applications
US9672360B2 (en) 2012-10-02 2017-06-06 Mordecai Barkan Secure computer architectures, systems, and applications
US9342695B2 (en) 2012-10-02 2016-05-17 Mordecai Barkan Secured automated or semi-automated systems
US9246892B2 (en) 2013-04-03 2016-01-26 Salesforce.Com, Inc. System, method and computer program product for managing access to systems, products, and data based on information associated with a physical location of a user
GB2534693B (en) * 2013-11-08 2017-02-08 Exacttrak Ltd Data accessibility control
CN104780530A (zh) * 2014-01-15 2015-07-15 中兴通讯股份有限公司 一种保护用户数据的方法和终端
JP6289606B2 (ja) * 2014-02-26 2018-03-07 三菱電機株式会社 証明書管理装置、及び証明書管理方法
US9577823B2 (en) 2014-03-21 2017-02-21 Venafi, Inc. Rule-based validity of cryptographic key material
US9686244B2 (en) 2014-03-21 2017-06-20 Venafi, Inc. Rule-based validity of cryptographic key material
US9647998B2 (en) 2014-03-21 2017-05-09 Venafi, Inc. Geo-fencing cryptographic key material
US9680827B2 (en) 2014-03-21 2017-06-13 Venafi, Inc. Geo-fencing cryptographic key material
US9531533B2 (en) 2014-03-21 2016-12-27 Venafi, Inc. Rule-based validity of cryptographic key material
US9654922B2 (en) 2014-03-21 2017-05-16 Venafi, Inc. Geo-fencing cryptographic key material
US9633184B2 (en) * 2014-05-30 2017-04-25 Google Inc. Dynamic authorization
US9767304B2 (en) * 2014-09-25 2017-09-19 Microsoft Technology Licensing, Llc Representation of operating system context in a trusted platform module
US9735968B2 (en) 2014-10-20 2017-08-15 Microsoft Technology Licensing, Llc Trust service for a client device
CN107111714A (zh) * 2014-10-30 2017-08-29 新科恩斯卡莱有限责任公司 用于资源的地理位置验证的方法和系统
US9779271B2 (en) * 2015-06-08 2017-10-03 Juniper Networks, Inc. Apparatus, system, and method for detecting theft of network devices
WO2016209134A1 (en) * 2015-06-26 2016-12-29 Telefonaktiebolaget Lm Ericsson (Publ) Data processing based on location preference
JP6419660B2 (ja) 2015-07-29 2018-11-07 株式会社日立製作所 秘密情報設定方法、秘密情報設定システム、および秘密情報設定装置
JP6601085B2 (ja) * 2015-09-15 2019-11-06 株式会社リコー データ管理システム、データ管理方法
US10616238B2 (en) * 2015-12-28 2020-04-07 Dropbox, Inc. Sharing files based on recipient-location criteria
US10601787B2 (en) * 2016-06-06 2020-03-24 Cisco Technology, Inc. Root of trust of geolocation
US10057276B2 (en) 2016-09-19 2018-08-21 International Business Machines Corporation Global attestation procedure
US10389731B2 (en) * 2016-11-22 2019-08-20 Microsoft Technology Licensing, Llc Multi-factor authentication using positioning data
US10297147B2 (en) 2016-12-06 2019-05-21 Flir Commercial Systems, Inc. Methods and apparatus for monitoring traffic data
CN106791178A (zh) * 2017-01-17 2017-05-31 宇龙计算机通信科技(深圳)有限公司 一种位置信息传输方法及移动终端
CN108668216B (zh) * 2017-03-27 2020-07-31 中国移动通信有限公司研究院 一种终端位置定位的防伪方法、防伪终端及系统
US10733298B2 (en) * 2017-07-31 2020-08-04 Dell Products, L.P. System management audit log snapshot
CN108052803B (zh) * 2018-01-02 2021-11-16 联想(北京)有限公司 一种访问控制方法、装置及电子设备
CN112369058B (zh) * 2018-11-09 2024-03-15 开利公司 对货箱控制器的地理安全访问
US11144654B2 (en) * 2019-03-08 2021-10-12 Seagate Technology Llc Environment-aware storage drive with expandable security policies
US11336684B2 (en) * 2019-06-07 2022-05-17 Lookout, Inc. Mobile device security using a secure execution context
US20210344664A1 (en) * 2020-04-29 2021-11-04 Motorola Mobility Llc Methods, Systems, and Electronic Devices for Selective Locational Preclusion of Access to Content
US11316684B2 (en) * 2020-05-19 2022-04-26 International Business Machines Corporation Restricting security key transfer from a key management server in an enterprise
US11588632B2 (en) * 2020-09-22 2023-02-21 International Business Machines Corporation Private key creation using location data
JP7699921B2 (ja) * 2020-12-03 2025-06-30 キヤノン株式会社 デバイス管理装置、デバイス管理装置の制御方法、及びプログラム
CN112738100B (zh) * 2020-12-29 2023-09-01 北京天融信网络安全技术有限公司 数据访问的鉴权方法、装置、鉴权设备和鉴权系统
US11899796B2 (en) 2021-10-19 2024-02-13 Dell Products L.P. Initialization geo-locking system
WO2025034610A2 (en) * 2023-08-04 2025-02-13 Istari Digital, Inc. Securing an interconnected digital engineering and certification ecosystem

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030217137A1 (en) * 2002-03-01 2003-11-20 Roese John J. Verified device locations in a data network
US20080046965A1 (en) * 2003-02-28 2008-02-21 Michael Wright Administration of protection of data accessible by a mobile device

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6985588B1 (en) * 2000-10-30 2006-01-10 Geocodex Llc System and method for using location identity to control access to digital information
US7120254B2 (en) 2000-10-30 2006-10-10 Geocodex Llc Cryptographic system and method for geolocking and securing digital information
EP1340167A2 (en) * 2000-11-28 2003-09-03 4thPass Inc. Method and system for maintaining and distributing wireless applications
JP2003099400A (ja) * 2001-09-26 2003-04-04 Fujitsu Ltd セキュリティ管理装置及びセキュリティ管理方法並びにセキュリティ管理用プログラム
US7308703B2 (en) 2002-12-18 2007-12-11 Novell, Inc. Protection of data accessible by a mobile device
JP2005174124A (ja) * 2003-12-12 2005-06-30 Canon Inc ネットワークシステム
US7853786B1 (en) 2003-12-17 2010-12-14 Sprint Communications Company L.P. Rules engine architecture and implementation
JP4706262B2 (ja) 2004-05-21 2011-06-22 日本電気株式会社 アクセス制御システム、アクセス制御方法およびアクセス制御用プログラム
US20060143179A1 (en) * 2004-12-29 2006-06-29 Motorola, Inc. Apparatus and method for managing security policy information using a device management tree
US20060236369A1 (en) 2005-03-24 2006-10-19 Covington Michael J Method, apparatus and system for enforcing access control policies using contextual attributes
WO2007110094A1 (en) * 2006-03-27 2007-10-04 Telecom Italia S.P.A. System for enforcing security policies on mobile communications devices
JP4810294B2 (ja) * 2006-05-01 2011-11-09 Necカシオモバイルコミュニケーションズ株式会社 携帯端末装置及びプログラム
JP5340173B2 (ja) 2007-01-26 2013-11-13 インターデイジタル テクノロジー コーポレーション ロケーション情報およびロケーション情報を用いるアクセス制御を保証する方法および機器
US20080289007A1 (en) * 2007-05-17 2008-11-20 Ajay Malik System and Method for Granting Privileges Based on Location
US9137739B2 (en) * 2009-01-28 2015-09-15 Headwater Partners I Llc Network based service policy implementation with network neutrality and user privacy
US8961619B2 (en) * 2009-01-06 2015-02-24 Qualcomm Incorporated Location-based system permissions and adjustments at an electronic device
US8095656B2 (en) * 2009-11-16 2012-01-10 International Business Machines Corportion Geo-positionally based data access security

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030217137A1 (en) * 2002-03-01 2003-11-20 Roese John J. Verified device locations in a data network
US20080046965A1 (en) * 2003-02-28 2008-02-21 Michael Wright Administration of protection of data accessible by a mobile device

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11887424B2 (en) 2019-06-12 2024-01-30 Honeywell International Inc. Access control system using mobile device
US11749045B2 (en) 2021-03-01 2023-09-05 Honeywell International Inc. Building access using a mobile device
US12027007B2 (en) 2021-03-01 2024-07-02 Honeywell International Inc. Building access using a mobile device
US12367726B2 (en) 2021-03-01 2025-07-22 Honeywell International Inc. Building access using a mobile device

Also Published As

Publication number Publication date
CN102609662B (zh) 2015-08-05
JP2014503909A (ja) 2014-02-13
US20120159156A1 (en) 2012-06-21
EP2656270A4 (en) 2014-08-06
TWI549019B (zh) 2016-09-11
AR084211A1 (es) 2013-05-02
CN102609662A (zh) 2012-07-25
TW201232324A (en) 2012-08-01
KR20130129224A (ko) 2013-11-27
EP2656270B1 (en) 2020-04-22
EP2656270A2 (en) 2013-10-30
WO2012087853A3 (en) 2012-11-01
WO2012087853A2 (en) 2012-06-28
US8560839B2 (en) 2013-10-15

Similar Documents

Publication Publication Date Title
KR101889577B1 (ko) 부정조작 불가능한 위치 제공 서비스
US10826881B2 (en) Location-enforced data management in complex multi-region computing
CN106534148B (zh) 应用的访问管控方法及装置
KR102504519B1 (ko) 네트워킹된 장치들을 갖는 컴퓨터 구동 시스템의 반가상 보안 위협 보호
RU2675902C2 (ru) Способ авторизации операции, предназначенной для выполнения на заданном вычислительном устройстве
KR102276873B1 (ko) 모바일 통신 디바이스 및 그 작동 방법
US10157286B2 (en) Platform for adopting settings to secure a protected file
US9053329B2 (en) Systems and methods for validated secure data access
US7698744B2 (en) Secure system for allowing the execution of authorized computer program code
US20150350165A1 (en) System and method for dynamically allocating resources
CN106330984B (zh) 访问控制策略的动态更新方法及装置
US11616647B2 (en) API and encryption key secrets management system and method
CN104318176B (zh) 用于终端的数据管理方法、数据管理装置和终端
CN104683336A (zh) 一种基于安全域的安卓隐私数据保护方法及系统
Chen et al. Guidelines on hardware-rooted security in mobile devices (Draft)
US11934544B2 (en) Securing data via encrypted geo-located provenance metadata
US9769181B2 (en) Mobile device storage volume encryption with geography correlated key management and mount operations
Zhang et al. A small leak will sink many ships: Vulnerabilities related to mini-programs permissions
WO2019235450A1 (ja) 情報処理装置、情報処理方法、情報処理プログラム、及び情報処理システム
CN117614724A (zh) 一种基于体系细粒度处理的工业互联网访问控制方法
US20230325519A1 (en) Securing computer source code
Majchrzycka et al. Process of mobile application development from the security perspective
Ulltveit-Moe et al. Mobile security with location-aware role-based access control
CN115098227A (zh) 一种安防设备动态信息更新的方法及装置
Poleg Automatic Trust Based Segregation for Mobile Devices

Legal Events

Date Code Title Description
PA0105 International application

Patent event date: 20130619

Patent event code: PA01051R01D

Comment text: International Patent Application

PG1501 Laying open of application
N231 Notification of change of applicant
PN2301 Change of applicant

Patent event date: 20150715

Comment text: Notification of Change of Applicant

Patent event code: PN23011R01D

A201 Request for examination
PA0201 Request for examination

Patent event code: PA02012R01D

Patent event date: 20161114

Comment text: Request for Examination of Application

E902 Notification of reason for refusal
PE0902 Notice of grounds for rejection

Comment text: Notification of reason for refusal

Patent event date: 20171204

Patent event code: PE09021S01D

PE0701 Decision of registration

Patent event code: PE07011S01D

Comment text: Decision to Grant Registration

Patent event date: 20180511

PR0701 Registration of establishment

Comment text: Registration of Establishment

Patent event date: 20180810

Patent event code: PR07011E01D

PR1002 Payment of registration fee

Payment date: 20180810

End annual number: 3

Start annual number: 1

PG1601 Publication of registration
PR1001 Payment of annual fee

Payment date: 20210715

Start annual number: 4

End annual number: 4

PR1001 Payment of annual fee

Payment date: 20220718

Start annual number: 5

End annual number: 5

PR1001 Payment of annual fee

Payment date: 20230802

Start annual number: 6

End annual number: 6