US20160142918A1 - Usage of beacon for location based security - Google Patents
Usage of beacon for location based security Download PDFInfo
- Publication number
- US20160142918A1 US20160142918A1 US15/006,431 US201615006431A US2016142918A1 US 20160142918 A1 US20160142918 A1 US 20160142918A1 US 201615006431 A US201615006431 A US 201615006431A US 2016142918 A1 US2016142918 A1 US 2016142918A1
- Authority
- US
- United States
- Prior art keywords
- data sequence
- server
- communication area
- transmitted
- transmitted data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01S—RADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
- G01S5/00—Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01S—RADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
- G01S5/00—Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations
- G01S5/02—Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations using radio waves
- G01S5/0205—Details
- G01S5/0244—Accuracy or reliability of position solution or of measurements contributing thereto
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01S—RADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
- G01S5/00—Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations
- G01S5/02—Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations using radio waves
- G01S5/0284—Relative positioning
- G01S5/0289—Relative positioning of multiple transceivers, e.g. in ad hoc networks
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01S—RADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
- G01S5/00—Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations
- G01S5/02—Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations using radio waves
- G01S5/06—Position of source determined by co-ordinating a plurality of position lines defined by path-difference measurements
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01S—RADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
- G01S5/00—Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations
- G01S5/16—Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations using electromagnetic waves other than radio waves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/107—Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/021—Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W64/00—Locating users or terminals or network equipment for network management purposes, e.g. mobility management
Definitions
- the present invention is directed to a system and method for providing location based security between a mobile device and other devices on a secure network.
- multiple receivers are positioned such that they define an authorized communication area (e.g. a perimeter).
- these receivers utilize locally available time varying signals to determine if the mobile device is located within the authorized area. If the mobile device is determined to be located within the authorized area, the mobile device is enabled (e.g. given an encryption key) to communicate over the secure network with the other devices.
- GPS global positioning systems
- a system for location based security which includes a plurality of receivers. Each of the receivers determines times of arrival of received time varying signals.
- the system also includes a server in communication with the receivers and a mobile device.
- the server receives the times of arrival from the receivers, and times of arrival of the time varying signals determined by the mobile device.
- the server determines or validates a location of the mobile device based on the times of arrival.
- the server may then authorize the mobile device to perform secure communication over the secure communication network when the location of the mobile device is determined to be in an authorized communication area defined based on the times of arrival received from the receivers.
- FIG. 1 shows the location based security system when the mobile device located inside of the authorized area and when the mobile device is located outside of the authorized area, according to an embodiment of the present invention.
- FIG. 2 shows the location based security system where receivers with known positions are used to define the authorized area, according to an embodiment of the present invention.
- FIG. 3 shows the location based security system where transceivers with unknown positions are used to define the authorized area, according to an embodiment of the present invention.
- FIG. 4 shows the location based security system where the time varying signal is a radio frequency (RF) signal that is restricted within an authorized room, according to an embodiment of the present invention.
- RF radio frequency
- FIG. 5 shows the location based security system where the time varying signal is an infrared signal that is restricted within an authorized room, according to an embodiment of the present invention.
- FIG. 1 shows an example of a location based security system that includes a server 102 and a mobile device 100 .
- mobile device 100 may be able to communicate with a server and other devices on a network using encryption and decryption keys. These encryption and decryption keys may be supplied to the mobile device 100 via server 102 .
- the security of the system relies on location. That is, the location of the mobile device 100 determines when mobile device 100 can communicate with server 102 .
- mobile device 100 (when located in area 104 ) may be able to perform bi-directional communication with server 102 via communication lines 106 and 108 . Various data such as document 114 may then be transferred between the two devices.
- communication of device 100 may be enabled (e.g. mobile device is given an encryption/decryption key) once server 102 determines that device 100 is actually located in area 104 .
- server 102 determines that mobile device 100 is not in secure communication area 104 , the bi-directional communication over lines 110 and 112 are restricted between mobile device 100 and server 102 (i.e., the server will not provide mobile device 100 with the proper encryption/decryption keys to perform communication over the network since it is not located in authorized communication area 104 ).
- the system shown in FIG. 1 provides a solution enabling geo-fences (e.g. a secure perimeter) to be used in the context of delivering the secure encryption/decryption keys for use of real time decryption.
- This enables secure communication to occur within the predefined perimeter of area 104 . Outside of area 104 the secure communication is restricted.
- secure communication area 104 may be an outdoor area or may be an indoor room which is deemed secure for mobile devices.
- One way of ensuring that mobile device 100 is located in secure communication area 104 is to rely on time varying information that is received locally by mobile device 100 .
- By restricting the time varying signals to within a specific local region it becomes even more difficult for a third party to capture and reproduce information (i.e. spoof the time varying signal).
- the current system combines both time varying signals and space restrictions to achieve these results.
- receivers 202 , 204 and 206 are placed at known positions.
- the receivers may be placed such that their positions directly define a secure communication area (e.g. a triangular shaped area in between the receivers).
- a secure communication area e.g. a triangular shaped area in between the receivers.
- the shape (e.g. perimeter) and the location of the of the secure communication area may be defined based on acceptable times of arrival of the RF signals received by the mobile device with respect to times of arrival of the RF signals received by the known receivers.
- This perimeter may be restricted to an area in between the receivers, or in an area just outside of the receivers.
- the example in FIG. 2 shows that the secure communication area has a somewhat kidney shaped perimeter that is partially in between and partially outside of a triangular region defined by the receivers.
- receivers 202 , 204 and 206 are able to securely communicate via a secure communication channel 218 back to server 102 .
- Receivers 202 , 204 and 206 are also able to receive radio frequency signals from mobile device 100 as well as from transmitters 208 , 210 , 212 , 214 and 216 .
- transmitters 208 , 210 , 212 , 214 and 216 (which may be located at unknown positions) transmit RF signals to receivers 202 , 204 , 206 as well as to mobile device 10 Q.
- These RF signals may have time varying characteristics.
- the time varying signals may be the measure of times of arrival of global system for mobile communications (GSM) extended training sequences (ETS).
- GSM global system for mobile communications
- ETS extended training sequences
- WCDMA wideband code division multiple access
- the mobile device 100 requesting secure information also measures time of arrivals of the transmitted signals.
- each receiver at a known position communicates its respective time of arrival measurements on a regular basis (e.g., every few seconds) to sever 102 .
- Mobile device 100 requesting a secure access can also deliver its own similar measurements to server 102 . In general, these measurements may be delivered to server 102 via the secure communication channel 218 . Server 102 may then combine these measurements from the three receivers and the mobile device to determine the validity of mobile device's position based on the predefined secure communication area defined by the positions of receivers 202 - 206 .
- the system first defines a secure communication area by positioning receivers 202 - 206 at specific locations. Then, in order for mobile device 100 to communicate over the secure network, mobile device 100 along with receivers 202 - 206 measure the times of arrival of the time varying signals transmitted from transmitters 208 - 216 . These times of arrival are then transmitted from mobile device 100 and receivers 202 - 206 to centralized server 102 which determines if the mobile device is actually within the secure communication area. If server 102 determines that mobile device 100 is within the secure communication area, then server 102 may transfer cryptographic keys to mobile device 100 allowing mobile device 100 to securely communicate over the network to other devices (not shown). If server 102 determines that mobile device 100 is not located in the secure communication area, then the cryptographic keys will not be transferred to mobile device 100 thereby preventing mobile device 100 from communicating over the network.
- each receiver is able to measure times of arrival of RF signals transmitted by N common RF base-stations.
- the RF signals may be the ETS if the network is a GSM network. In general, however, the RF signals can be from any network where the data being transmitted is a non-predictable sequence.
- Each receiver is able to time stamp the data as it is being received which are then utilized by the server to determine the positions of the receivers relative to each other.
- the range equations for these systems are thus:
- x k the two-dimensional location of the k th receiver
- b s the location of the s th base-station
- ⁇ s the equivalent distance of the time offset of the s th base-station
- ⁇ k the equivalent distance of the time offset of the k th receiver.
- the centralized server in FIG. 2 can use the measurements from each of the three receivers and the fourth receiver (e.g. the mobile device) to determine the authorized area and if the mobile device is located in the authorized area.
- a single time transfer receiver may be used to transfer time via the measured relative timings of the base-stations to any of the receivers even though the network is unsynchronized.
- the transferred time could simply be the local clock of a selected one of the receivers which is utilized to establish a relative time with respect to the other receivers.
- the system may include transceivers (e.g. WiFi or WiMax access points).
- transceivers 302 , 304 , 306 and 308 may be located at known or unknown positions creating a perimeter for the secure communication area (i.e., the secure communication area is located within the perimeter of the forward transceivers). Similar to the system in FIG. 2 , these transceivers transmit time varying signals such as a detectable signal at a periodic interval which changes in an unpredictable manner. Each of the four transceivers also acts as a receiver measuring the time of arrival of the time varying signals from all of the other transceivers.
- each transceiver transmits a signal to the other three transceivers and also acquires measurements from the other three transceivers (i.e., each transceiver measures a set of three measurements). Similar to the system described in FIG. 2 , upon receiving a time varying signal, the transceiver determines the time of arrival of the signal. Mobile device 100 will also receive these signals from all four transceivers and determine times of arrival.
- server 102 is able to estimate the distance between the respective transceivers. Once the relative distance between the four transceivers is determined, the distance between the receivers and mobile device 100 may also be computed. This process ultimately determines if mobile device 100 is located within the perimeter of the secure communication area or not. As described above with respect to FIG. 2 , server 102 either transfers cryptographic keys to mobile device 100 or does not transfer these keys to mobile device 100 depending on whether mobile device 100 is located in the secure communication area.
- Each transceiver broadcasts an agreed timing signal at a particular time according to its internal clock.
- the rate of broadcast is low enough that there is no ambiguity in the receiver as to which signal has been received (e.g. on a millisecond boundary for transceivers that are less than a few Km apart).
- the other three transceivers and the mobile device also record the times of arrival of the signal. For any pair of transceivers, the arrival time may be represented by equation (4).
- ⁇ i,j is the time of arrival measured at transceiver R i of the signal from transceiver R j .
- the propagation delay from R i to R j may be determined as shown in equation (5).
- R 1 lies at the origin of a 2-dimensional coordinate grid
- R 2 is on the positive x-axis
- R 3 is in the half plane y ⁇ 0.
- the values of d 1,2 , d 1,3 and d 2,3 fix the relative positions of the transceivers uniquely.
- the values of d 1,4 , d 2,4 and d 3,4 now uniquely determine the position of R 4 on the local grid.
- ⁇ i may be set to 0.
- the four measurements made by the mobile device can be used in the same way as GPS measurements to give a position estimate for the mobile device, and the mobile device clock offset by using standard trilateration methods.
- beacons e.g. time varying signals
- transceivers 302 - 304 do not need to be surveyed (i.e., their absolute position does not need to be determined at setup time).
- their absolute position does not need to be determined at setup time.
- just the positions of transceivers relative to each other are needed in order to determine if the mobile devices are within the secure communication area (absolute positions are not necessary).
- FIGS. 2 and 3 show two embodiments where a secure communication area is defined.
- the time varying signals transmitted from the transmitters within the secure communication area may be intercepted by other devices outside of the communication area.
- it would be beneficial to restrict the transmitted time varying signals to occurring only within the secure communication area i.e., devices that are located outside of the secure communication area cannot receive the time varying signals. Examples of such a restriction is at least shown in FIGS. 4 and 5 .
- a secure communication area may be defined as room 404 within a building.
- a beacon 402 e.g. short-range transmitter
- the physical characteristics of the RF waves transmitted by beacon 402 may be transmitted at high frequencies which have little or no penetration through the nearby walls of the room.
- the beacon may transmit infrared or ultrasonic signals which cannot penetrate the walls of the room.
- power reduction of the transmitted signal may also be utilized to restrict the transmission to only receivers within room 404 .
- mobile device 100 would actually have to be in room 404 in order to receive the time varying signals from the transceiver. This will prevent a mobile device 100 located outside of the room from even receiving any of the signals.
- the data of a transmitted random or pseudorandom sequence may be utilized by the system. Specifically, the data of the sequence may be received by the mobile device and/or other authorized receivers located in the authorized area, and then relayed back to the server for verification purposes.
- the server may compare the data captured by the receivers with the data captured by the mobile device to determine if a match occurs (i.e. determine if the authorized receivers and mobile device captured the same data sequence). The server may then compute the accuracy of the match or the number of matches to determine if the mobile device is located in the authorized area.
- server 102 could send the data sequence to beacon 402 over a secure connection.
- Beacon 402 could then locally transmit the sequence in room 404 using short-range transmission restricted by walls 406 .
- Mobile device 100 receives the sequence and then relay the sequence back to server 102 .
- server 102 can then compare the relayed sequence with the sequence transmitted by the beacon to determine if a match occurs. If a match occurs, then the cryptographic keys are delivered to mobile device 100 .
- server 102 could also send the random or pseudorandom data sequence directly to mobile device 100 via an RF broadcast.
- Mobile device 100 receives the sequence and then relays the sequence back to server 102 via a short-range receiver (not shown) located in the room that can only receive signals that are transmitted from within the room (e.g. infrared signals).
- a short-range receiver not shown located in the room that can only receive signals that are transmitted from within the room (e.g. infrared signals).
- the short-range receiver e.g. infrared
- the beacon itself could generate the random or pseudorandom data sequence independent of the server.
- room 404 includes a short-range receiver (not shown).
- the beacon generates and transmits the sequence within the room. The sequence is received by both the mobile device 100 and the receiver (not shown) which are both located in the room. Both the mobile device and the receiver then relay their respectively received sequences back to server 102 , where a comparison will be performed by the server. If a match occurs, then the cryptographic keys are delivered to mobile device 100 .
- FIG. 5 A specific example of the short-range receiver described in the second example, is shown in FIG. 5 , where the room (i.e. authorized area) may be equipped with an infrared sensor (e.g. camera) ( 502 ).
- the random or pseudorandom sequence as described above may be generated and transmitted by an infrared beacon (not shown) located within the room.
- device 100 located in the room transmits the data sequence as an infrared modulated signal 504 to infrared receiver 502 .
- Infrared receiver 502 may then relay both the data sequence received from the mobile device and the data sequence received from the infrared beacon back to server 102 for confirmation.
- transmission from the infrared receiver 502 to the server may be performed using standard RF communication or wired network transmissions. It is also noted that the infrared beacon may not be needed in this embodiment if the server generates the data sequence and transmits the generated sequence using RF signals.
- the time varying data sequence in the embodiments of FIGS. 4 and 5 transmitted by the short-range beacon may be captured at regular intervals at a rate that may be a function of a rate in which the beacons are changing the sequence.
- the mobile device in the authorized area may also capture the short-range beacon in a similar manner.
- the transceivers and receivers in FIGS. 2 and 3 are set at fixed positions which result in a static secure communication area. It is also contemplated, however, that the transceivers for example in FIG. 3 may not be stationary.
- the transceivers 100 may be included on a vehicle such as an automobile or an airplane such that a secure communication area is defined within the interior of the vehicle.
- the absolute position of the transceivers and their defined secure communication area is actually varying as the vehicle travels.
- the server will still be able to compute the relative positions of the transceivers and the mobile device 100 .
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Radar, Positioning & Navigation (AREA)
- Remote Sensing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Electromagnetism (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
A system for location based security which includes a plurality of receivers. Each of the receivers determines limes of arrival of received time varying signals. The system also includes a server in communication with the receivers and a mobile device. The server receives the times of arrival from the receivers, and times of arrival of the time varying signals determined by the mobile device. The server determines a location of the mobile device based on the times of arrival. The server may then authorize the mobile device to perform secure communication over the secure communication network when the location of the mobile device is determined to be in an authorized communication area defined based on the Limes of arrival received from the receivers.
Description
- The present invention is directed to a system and method for providing location based security between a mobile device and other devices on a secure network. In one example, multiple receivers are positioned such that they define an authorized communication area (e.g. a perimeter). In general, these receivers utilize locally available time varying signals to determine if the mobile device is located within the authorized area. If the mobile device is determined to be located within the authorized area, the mobile device is enabled (e.g. given an encryption key) to communicate over the secure network with the other devices.
- It some scenarios, is desirable to restrict communication of devices to within a certain geographical region (i.e. an authorized area). Ensuring that the mobile device is actually within the authorized area using positioning methods such as global positioning systems (GPS) may be difficult since the GPS signals appropriate to the authorized area may be spoofed (i.e. indicate that it is located in the authorized area, when in actuality it is outside of the authorized area).
- A system for location based security which includes a plurality of receivers. Each of the receivers determines times of arrival of received time varying signals. The system also includes a server in communication with the receivers and a mobile device. The server receives the times of arrival from the receivers, and times of arrival of the time varying signals determined by the mobile device. The server determines or validates a location of the mobile device based on the times of arrival. The server may then authorize the mobile device to perform secure communication over the secure communication network when the location of the mobile device is determined to be in an authorized communication area defined based on the times of arrival received from the receivers.
- The invention is best understood from the following detailed description when read in connection with the accompanying drawings, with like elements having the same reference numerals. This emphasizes that according to common practice, the various features of the drawings are not drawn to scale. On the contrary, the dimensions of the various features are arbitrarily expanded or reduced for clarity. Included in the drawings are the following figures:
-
FIG. 1 shows the location based security system when the mobile device located inside of the authorized area and when the mobile device is located outside of the authorized area, according to an embodiment of the present invention. -
FIG. 2 shows the location based security system where receivers with known positions are used to define the authorized area, according to an embodiment of the present invention. -
FIG. 3 shows the location based security system where transceivers with unknown positions are used to define the authorized area, according to an embodiment of the present invention. -
FIG. 4 shows the location based security system where the time varying signal is a radio frequency (RF) signal that is restricted within an authorized room, according to an embodiment of the present invention. -
FIG. 5 shows the location based security system where the time varying signal is an infrared signal that is restricted within an authorized room, according to an embodiment of the present invention. -
FIG. 1 shows an example of a location based security system that includes aserver 102 and amobile device 100. In general,mobile device 100 may be able to communicate with a server and other devices on a network using encryption and decryption keys. These encryption and decryption keys may be supplied to themobile device 100 viaserver 102. In this embodiment, however, the security of the system relies on location. That is, the location of themobile device 100 determines whenmobile device 100 can communicate withserver 102. - Assuming
area 104 is defined as a secure communication area, mobile device 100 (when located in area 104) may be able to perform bi-directional communication withserver 102 viacommunication lines document 114 may then be transferred between the two devices. In general, communication ofdevice 100 may be enabled (e.g. mobile device is given an encryption/decryption key) onceserver 102 determines thatdevice 100 is actually located inarea 104. - In another example, when
server 102 determines thatmobile device 100 is not insecure communication area 104, the bi-directional communication overlines mobile device 100 and server 102 (i.e., the server will not providemobile device 100 with the proper encryption/decryption keys to perform communication over the network since it is not located in authorized communication area 104). - In general, the system shown in
FIG. 1 provides a solution enabling geo-fences (e.g. a secure perimeter) to be used in the context of delivering the secure encryption/decryption keys for use of real time decryption. This enables secure communication to occur within the predefined perimeter ofarea 104. Outside ofarea 104 the secure communication is restricted. In some examples,secure communication area 104 may be an outdoor area or may be an indoor room which is deemed secure for mobile devices. - One way of ensuring that
mobile device 100 is located insecure communication area 104 is to rely on time varying information that is received locally bymobile device 100. By restricting the time varying signals to within a specific local region, it becomes even more difficult for a third party to capture and reproduce information (i.e. spoof the time varying signal). Thus, the current system combines both time varying signals and space restrictions to achieve these results. - Shown in
FIG. 2 is an embodiment wherereceivers FIG. 2 shows that the secure communication area has a somewhat kidney shaped perimeter that is partially in between and partially outside of a triangular region defined by the receivers. - In general,
receivers secure communication channel 218 back toserver 102.Receivers mobile device 100 as well as fromtransmitters - In operation,
transmitters receivers - Using techniques according to an embodiment of the subject invention, it is possible to capture times of arrival of the transmitted signals. It general, it is not necessary to know the positions of the transmitters. In one example, three receivers at known positions, a mobile receiver and five transmitters measured by all four receivers are implemented. Each of the
receivers mobile device 100 requesting secure information also measures time of arrivals of the transmitted signals. - One benefit of this system is that solving the equations is restricted to quasi-contemporaneous times of arrival measurements from all the elements. In other words, the device cannot perform the calculations unless it has access to the measurements made by all the receivers at the known positions. In operation, each receiver at a known position communicates its respective time of arrival measurements on a regular basis (e.g., every few seconds) to sever 102.
Mobile device 100 requesting a secure access can also deliver its own similar measurements toserver 102. In general, these measurements may be delivered toserver 102 via thesecure communication channel 218.Server 102 may then combine these measurements from the three receivers and the mobile device to determine the validity of mobile device's position based on the predefined secure communication area defined by the positions of receivers 202-206. - Thus, the system first defines a secure communication area by positioning receivers 202-206 at specific locations. Then, in order for
mobile device 100 to communicate over the secure network,mobile device 100 along with receivers 202-206 measure the times of arrival of the time varying signals transmitted from transmitters 208-216. These times of arrival are then transmitted frommobile device 100 and receivers 202-206 tocentralized server 102 which determines if the mobile device is actually within the secure communication area. Ifserver 102 determines thatmobile device 100 is within the secure communication area, thenserver 102 may transfer cryptographic keys tomobile device 100 allowingmobile device 100 to securely communicate over the network to other devices (not shown). Ifserver 102 determines thatmobile device 100 is not located in the secure communication area, then the cryptographic keys will not be transferred tomobile device 100 thereby preventingmobile device 100 from communicating over the network. - In one example, for clarification purposes, suppose there are M receivers (e.g. a mobile terminal and a plurality of other receivers defining the secure communication area) in a network. Each receiver is able to measure times of arrival of RF signals transmitted by N common RF base-stations. The RF signals may be the ETS if the network is a GSM network. In general, however, the RF signals can be from any network where the data being transmitted is a non-predictable sequence. Each receiver is able to time stamp the data as it is being received which are then utilized by the server to determine the positions of the receivers relative to each other. The range equations for these systems are thus:
-
R ks =∥x k −b s ∥+α s+εk, (1) - where:
k=1 . . . M, s=1 . . . N
xk=the two-dimensional location of the kth receiver
bs=the location of the sth base-station
αs=the equivalent distance of the time offset of the sth base-station, and
εk=the equivalent distance of the time offset of the kth receiver. - This defines a set of MN equations in 3M+N unknowns. The vector of variables, u, is given by equation (2).
-
u=(x1,y1,ε1,x2,y2,ε2 , . . . ,xM,yM,εM,α1,α2, . . . ,αN). (2) - In practice all of the receivers make relative measurements, (i.e. the timings of the signals received from the base-stations are measured relative to one another). For example one of the base-station time offsets, say α1, would be set to zero since the time offset of the base-station relative to itself is zero, and all others are measured relative to it. Therefore there are 3M+N−1 unknowns.
- Thus, two receivers (M=2) measuring five common base-stations (N=5) yields a set of 10 equations containing 10 unknowns which can be solved to yield the positions of both receivers and the time offsets of the five base-stations relative to one another. Similarly three receivers (M=3) each measuring four common base-station (N=4) yields a set of 12 equations with 12 unknowns allowing the positions of all three receivers to be determined as well as the relative time offsets of the base-stations. Thus, the centralized server in
FIG. 2 , can use the measurements from each of the three receivers and the fourth receiver (e.g. the mobile device) to determine the authorized area and if the mobile device is located in the authorized area. - Once the relative timings between the base-stations have been established linking any one of them to a master reference source, such as GPS time, allows the timings to determined relative to the same reference. Thus a single time transfer receiver may be used to transfer time via the measured relative timings of the base-stations to any of the receivers even though the network is unsynchronized. In one example, the transferred time could simply be the local clock of a selected one of the receivers which is utilized to establish a relative time with respect to the other receivers.
- In another embodiment shown in
FIG. 3 , rather than having separate transmitters and receivers, the system may include transceivers (e.g. WiFi or WiMax access points). In one example,transceivers FIG. 2 , these transceivers transmit time varying signals such as a detectable signal at a periodic interval which changes in an unpredictable manner. Each of the four transceivers also acts as a receiver measuring the time of arrival of the time varying signals from all of the other transceivers. - Thus, each transceiver transmits a signal to the other three transceivers and also acquires measurements from the other three transceivers (i.e., each transceiver measures a set of three measurements). Similar to the system described in
FIG. 2 , upon receiving a time varying signal, the transceiver determines the time of arrival of the signal.Mobile device 100 will also receive these signals from all four transceivers and determine times of arrival. - Once these times of arrival are computed by the transceivers and the mobile device, they are transferred from all four transceivers 302-308 and
mobile device 100 to securecentralized server 102 viasecure communication line 218. Using these times of arrival as well as a universal time references utilized by each of the transceivers and the mobile device,server 102 is able to estimate the distance between the respective transceivers. Once the relative distance between the four transceivers is determined, the distance between the receivers andmobile device 100 may also be computed. This process ultimately determines ifmobile device 100 is located within the perimeter of the secure communication area or not. As described above with respect toFIG. 2 ,server 102 either transfers cryptographic keys tomobile device 100 or does not transfer these keys tomobile device 100 depending on whethermobile device 100 is located in the secure communication area. - In one example, for computing the positions of the transceivers, assume each transceiver, Ri (i=1, . . . , 4), has a clock having an offset from a universal time reference represented by εi. The propagation delay of a signal from Ri to Rj is ti,j=ti,j, and the distance between transceivers Ri and Rj is given by:
-
d i,j =d j,i =t i,j×ν, (3) - where ν is the propagation speed of the signal.
- Each transceiver broadcasts an agreed timing signal at a particular time according to its internal clock. The rate of broadcast is low enough that there is no ambiguity in the receiver as to which signal has been received (e.g. on a millisecond boundary for transceivers that are less than a few Km apart). The other three transceivers and the mobile device also record the times of arrival of the signal. For any pair of transceivers, the arrival time may be represented by equation (4).
-
τi,j =t i,j−εi+εj, (4) - where τi,j is the time of arrival measured at transceiver Ri of the signal from transceiver Rj.
- From equation (4), the propagation delay from Ri to Rj may be determined as shown in equation (5).
-
- These equations provide an estimate for the values di,j.
- Revisiting equation (3), each εi may be determined as εi=εj+(ti,j−τi,j), where the value in parentheses is known. In one example, it is assumed that R1 lies at the origin of a 2-dimensional coordinate grid, R2 is on the positive x-axis and R3 is in the half plane y≧0. The values of d1,2, d1,3 and d2,3 fix the relative positions of the transceivers uniquely. The values of d1,4, d2,4 and d3,4 now uniquely determine the position of R4 on the local grid.
- Since the calculation is for relative clock offsets and positions, εi may be set to 0. Now, the four measurements made by the mobile device can be used in the same way as GPS measurements to give a position estimate for the mobile device, and the mobile device clock offset by using standard trilateration methods.
- It is noted that the beacons (e.g. time varying signals) transmitted from transceivers 302-304 do not need to be surveyed (i.e., their absolute position does not need to be determined at setup time). In general, just the positions of transceivers relative to each other are needed in order to determine if the mobile devices are within the secure communication area (absolute positions are not necessary).
- In general,
FIGS. 2 and 3 show two embodiments where a secure communication area is defined. The time varying signals transmitted from the transmitters within the secure communication area, however, may be intercepted by other devices outside of the communication area. In order to further increase the security of the system, it would be beneficial to restrict the transmitted time varying signals to occurring only within the secure communication area (i.e., devices that are located outside of the secure communication area cannot receive the time varying signals). Examples of such a restriction is at least shown inFIGS. 4 and 5 . - As shown in
FIG. 4 , a secure communication area may be defined asroom 404 within a building. In one example, a beacon 402 (e.g. short-range transmitter) may be set up withinroom 404 in order to create a secure communication area within the room. To further increase the security, the physical characteristics of the RF waves transmitted bybeacon 402 may be transmitted at high frequencies which have little or no penetration through the nearby walls of the room. In another example, the beacon may transmit infrared or ultrasonic signals which cannot penetrate the walls of the room. Alternatively, power reduction of the transmitted signal may also be utilized to restrict the transmission to only receivers withinroom 404. Thus, the example inFIG. 4 ,mobile device 100 would actually have to be inroom 404 in order to receive the time varying signals from the transceiver. This will prevent amobile device 100 located outside of the room from even receiving any of the signals. - Since the transmitted beacon signal is physically localized in the authorized area (i.e. the room) due to the short range transmission/reception, the data of a transmitted random or pseudorandom sequence (rather than the times of arrival) may be utilized by the system. Specifically, the data of the sequence may be received by the mobile device and/or other authorized receivers located in the authorized area, and then relayed back to the server for verification purposes. The server may compare the data captured by the receivers with the data captured by the mobile device to determine if a match occurs (i.e. determine if the authorized receivers and mobile device captured the same data sequence). The server may then compute the accuracy of the match or the number of matches to determine if the mobile device is located in the authorized area.
- In a first example, during operation,
server 102 could send the data sequence tobeacon 402 over a secure connection.Beacon 402 could then locally transmit the sequence inroom 404 using short-range transmission restricted bywalls 406.Mobile device 100 receives the sequence and then relay the sequence back toserver 102. Once received,server 102 can then compare the relayed sequence with the sequence transmitted by the beacon to determine if a match occurs. If a match occurs, then the cryptographic keys are delivered tomobile device 100. - In a second example, without the use of
beacon 402,server 102 could also send the random or pseudorandom data sequence directly tomobile device 100 via an RF broadcast.Mobile device 100 receives the sequence and then relays the sequence back toserver 102 via a short-range receiver (not shown) located in the room that can only receive signals that are transmitted from within the room (e.g. infrared signals). In this example, it does not matter that other mobile devices outside of the room may receive the sequence via the RF broadcast, because these devices are not able to relay the sequence back to the server via the short-range (e.g. infrared) receiver located in the room, - In a third example, during operation, the beacon itself could generate the random or pseudorandom data sequence independent of the server. In this example,
room 404 includes a short-range receiver (not shown). In general, the beacon generates and transmits the sequence within the room. The sequence is received by both themobile device 100 and the receiver (not shown) which are both located in the room. Both the mobile device and the receiver then relay their respectively received sequences back toserver 102, where a comparison will be performed by the server. If a match occurs, then the cryptographic keys are delivered tomobile device 100. - A specific example of the short-range receiver described in the second example, is shown in
FIG. 5 , where the room (i.e. authorized area) may be equipped with an infrared sensor (e.g. camera) (502). The random or pseudorandom sequence as described above may be generated and transmitted by an infrared beacon (not shown) located within the room. In order to confirm its own location, device 100 (located in the room) transmits the data sequence as an infrared modulatedsignal 504 toinfrared receiver 502.Infrared receiver 502 may then relay both the data sequence received from the mobile device and the data sequence received from the infrared beacon back toserver 102 for confirmation. In general, transmission from theinfrared receiver 502 to the server may be performed using standard RF communication or wired network transmissions. It is also noted that the infrared beacon may not be needed in this embodiment if the server generates the data sequence and transmits the generated sequence using RF signals. - The time varying data sequence in the embodiments of
FIGS. 4 and 5 transmitted by the short-range beacon may be captured at regular intervals at a rate that may be a function of a rate in which the beacons are changing the sequence. The mobile device in the authorized area may also capture the short-range beacon in a similar manner. - The transceivers and receivers in
FIGS. 2 and 3 are set at fixed positions which result in a static secure communication area. It is also contemplated, however, that the transceivers for example inFIG. 3 may not be stationary. For example, thetransceivers 100 may be included on a vehicle such as an automobile or an airplane such that a secure communication area is defined within the interior of the vehicle. Thus, the absolute position of the transceivers and their defined secure communication area is actually varying as the vehicle travels. However, since the relative positions of the transceivers within the vehicle remain constant, the server will still be able to compute the relative positions of the transceivers and themobile device 100. - Although the invention is illustrated and described herein with reference to specific embodiments, the invention is not intended to be limited to the details shown. Rather, various modifications may be made in the details within the scope and range of equivalents of the claims and without departing from the invention.
Claims (31)
1-20. (canceled)
21. A method for location based security in a system in an authorized communication area, the method comprising:
confirming, by a server, a location of a mobile device by:
transmitting a data sequence to the mobile device using a short range transmitter;
receiving, by the server from the mobile device, the transmitted data sequence transmitted;
confirming, by the server, whether the data sequence received from the mobile device matches the data sequence transmitted from the short range transmitter.
22. The method of claim 21 , wherein the short-range transmitter transmits the data sequence as one of an ultrasonic, infrared or RF signal in a frequency band such that transmitted signals tend not to propagate outside of the authorized communication area.
23. (canceled)
24. A method for achieving location based network security, comprising:
receiving, by a server, data sequences from a plurality of devices located within an authorized communication area;
determining, in the server, whether any of the received data sequences received from the plurality of devices matches a data sequence transmitted in the authorized communication area, wherein the transmitted data sequence is a random or pseudorandom data sequence; and
transferring, from the server, cryptographic keys to any of the plurality of devices from which a received data sequence matches the transmitted data sequence, wherein the cryptographic keys are configured to authorize secure network communication for the plurality of devices located within an authorized communication area.
25. The method of claim 24 , further comprising:
transmitting, by the server, the transmitted data sequence within the authorized communication area.
26. The method of claim 25 , wherein transmitting the transmitted data sequence within the authorized communication area comprises transmitting the transmitted data sequence by the server via a short range transmitter located within the authorized communication area.
27. The method of claim 24 , further comprising:
computing, in the server, an accuracy and number of received data sequences that match the transmitted data sequence.
28. The method of claim 27 , further comprising:
determining, by the server, whether the computed accuracy and number of received data sequences that match the transmitted data sequence exceeds a predetermined value; and
transferring, from the server, cryptographic keys to devices from which a received data sequence matches the transmitted data sequence in response to determining that the computed accuracy and number of received data sequences that match the transmitted data sequence exceeds the predetermined value.
29. The method of claim 24 , wherein:
receiving, by the server, data sequences from the plurality of devices located within an authorized communication area includes receiving data sequences from one or more mobile devices; and
transferring, from the server, cryptographic keys to devices from which a received data sequence matches the transmitted data sequence comprises transferring cryptographic keys to the one or more mobile devices from which a received data sequence matches the transmitted data sequence.
30. The method of claim 24 , wherein receiving, by the server, data sequences from the plurality of devices located within an authorized communication area includes receiving data sequences from one or more short range receivers.
31. The method of claim 24 , wherein the transmitted data sequence is transmitted using a medium that does not propagate outside of the authorized communication area.
32. The method of claim 24 , wherein transmitting, by the server, the transmitted data sequence within the authorized communication area comprises transmitting the transmitted data sequence by any one of infrared signals, radio frequency signals, and ultrasonic signals.
33. A server, comprising:
a processor configured with processor-executable instructions to perform operations comprising:
receiving data sequences from a plurality of devices located within an authorized communication area;
determining whether any of the received data sequences received from the plurality of devices matches a data sequence transmitted in the authorized communication area, wherein the transmitted data sequence is a random or pseudorandom data sequence; and
transferring cryptographic keys to any of the plurality of devices from which a received data sequence matches the transmitted data sequence, wherein the cryptographic keys are configured to authorize secure network communication for the plurality of devices located within an authorized communication area.
34. The server of claim 33 , wherein the processor is configured with processor-executable instructions to perform operations further comprising:
transmitting the transmitted data sequence within the authorized communication area.
35. The server of claim 33 , wherein the processor is configured with processor-executable instructions to perform operations further comprising transmitting the transmitted data sequence by the server via a short range transmitter located within the authorized communication area.
36. The server of claim 33 , wherein the processor is configured with processor-executable instructions to perform operations further comprising:
computing an accuracy and number of received data sequences that match the transmitted data sequence.
37. The server of claim 36 , wherein the processor is configured with processor-executable instructions to perform operations further comprising:
determining whether the computed accuracy and number of received data sequences that match the transmitted data sequence exceeds a predetermined value; and
transferring cryptographic keys to devices from which a received data sequence matches the transmitted data sequence in response to determining that the computed accuracy and number of received data sequences that match the transmitted data sequence exceeds the predetermined value.
38. The server of claim 33 , wherein the processor is configured with processor-executable instructions to perform operations such that:
receiving data sequences from the plurality of devices located within an authorized communication area includes receiving data sequences from one or more mobile devices; and
transferring cryptographic keys to devices from which a received data sequence matches the transmitted data sequence comprises transferring cryptographic keys to the one or more mobile devices from which a received data sequence matches the transmitted data sequence.
39. The server of claim 33 , wherein the processor is configured with processor-executable instructions to perform operations such that receiving data sequences from the plurality of devices located within an authorized communication area includes receiving data sequences from one or more short range receivers.
40. The server of claim 33 , wherein the transmitted data sequence is transmitted using a medium that does not propagate outside of the authorized communication area.
41. The server of claim 33 , wherein the processor is configured with processor-executable instructions to perform operations such that transmitting the transmitted data sequence within the authorized communication area comprises transmitting the transmitted data sequence by any one of infrared signals, radio frequency signals, and ultrasonic signals.
42. A non-transitory computer-readable medium having stored thereon server-executable instructions configured to cause a server to perform operations comprising:
receiving data sequences from a plurality of devices located within an authorized communication area;
determining whether any of the received data sequences received from the plurality of devices matches a data sequence transmitted in the authorized communication area, wherein the transmitted data sequence is a random or pseudorandom data sequence; and
transferring cryptographic keys to any of the plurality of devices from which a received data sequence matches the transmitted data sequence, wherein the cryptographic keys are configured to authorize secure network communication for the plurality of devices located within an authorized communication area.
43. The non-transitory computer-readable medium of claim 42 , wherein the stored server-executable instructions are configured to cause a server to perform operations further comprising:
transmitting the transmitted data sequence within the authorized communication area.
44. The non-transitory computer-readable medium of claim 43 , wherein the stored server-executable instructions are configured to cause a server to perform operations such that transmitting the transmitted data sequence within the authorized communication area comprises transmitting the transmitted data sequence by the server via a short range transmitter located within the authorized communication area.
45. The non-transitory computer-readable medium of claim 42 , wherein the stored server-executable instructions are configured to cause a server to perform operations further comprising:
computing an accuracy and number of received data sequences that match the transmitted data sequence.
46. The non-transitory computer-readable medium of claim 45 , wherein the stored server-executable instructions are configured to cause a server to perform operations further comprising:
determining whether the computed accuracy and number of received data sequences that match the transmitted data sequence exceeds a predetermined value; and
transferring cryptographic keys to devices from which a received data sequence matches the transmitted data sequence in response to determining that the computed accuracy and number of received data sequences that match the transmitted data sequence exceeds the predetermined value.
47. The non-transitory computer-readable medium of claim 42 , wherein the stored server-executable instructions are configured to cause a server to perform operations such that:
receiving data sequences from the plurality of devices located within an authorized communication area includes receiving data sequences from one or more mobile devices; and
transferring cryptographic keys to devices from which a received data sequence matches the transmitted data sequence comprises transferring cryptographic keys to the one or more mobile devices from which a received data sequence matches the transmitted data sequence.
48. The non-transitory computer-readable medium of claim 42 , wherein the stored server-executable instructions are configured to cause a server to perform operations such that receiving data sequences from the plurality of devices located within an authorized communication area includes receiving data sequences from one or more short range receivers.
49. The non-transitory computer-readable medium of claim 42 , wherein the transmitted data sequence is transmitted using a medium that does not propagate outside of the authorized communication area.
50. The non-transitory computer-readable medium of claim 42 , wherein the stored server-executable instructions are configured to cause a server to perform operations such that transmitting the transmitted data sequence within the authorized communication area comprises transmitting the transmitted data sequence by any one of infrared signals, radio frequency signals, and ultrasonic signals.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/006,431 US20160142918A1 (en) | 2012-12-17 | 2016-01-26 | Usage of beacon for location based security |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/716,365 US9282459B2 (en) | 2012-12-17 | 2012-12-17 | Usage of beacon for location based security |
US15/006,431 US20160142918A1 (en) | 2012-12-17 | 2016-01-26 | Usage of beacon for location based security |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/716,365 Division US9282459B2 (en) | 2012-12-17 | 2012-12-17 | Usage of beacon for location based security |
Publications (1)
Publication Number | Publication Date |
---|---|
US20160142918A1 true US20160142918A1 (en) | 2016-05-19 |
Family
ID=50000476
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/716,365 Expired - Fee Related US9282459B2 (en) | 2012-12-17 | 2012-12-17 | Usage of beacon for location based security |
US15/006,431 Abandoned US20160142918A1 (en) | 2012-12-17 | 2016-01-26 | Usage of beacon for location based security |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/716,365 Expired - Fee Related US9282459B2 (en) | 2012-12-17 | 2012-12-17 | Usage of beacon for location based security |
Country Status (3)
Country | Link |
---|---|
US (2) | US9282459B2 (en) |
DE (1) | DE102013021359A1 (en) |
GB (2) | GB2533876B (en) |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103562742B (en) * | 2011-04-18 | 2015-11-25 | 麦肯齐教会大学 | Synchronous and the forwarding of determination signal of geographic registration application and the method and system of the time variations in propagating for range observation, driver |
WO2016162847A1 (en) * | 2015-04-08 | 2016-10-13 | Zumtobel Lighting Inc. | System for location information retrieval |
US9363784B1 (en) * | 2015-04-30 | 2016-06-07 | Mist Systems Inc. | Methods and apparatus relating to the use of real and/or virtual beacons |
CA3001490C (en) * | 2015-11-09 | 2024-03-19 | Wiser Systems, Inc. | Methods for synchronizing multiple devices and determining location based on the synchronized devices |
US10237691B2 (en) * | 2017-08-09 | 2019-03-19 | Quintrax Limited | Proximal physical location tracking and management systems and methods |
US11061104B2 (en) * | 2019-05-24 | 2021-07-13 | U-Blox Ag | Method and apparatus for positioning with wireless signals |
US11265711B2 (en) * | 2019-09-13 | 2022-03-01 | Microsoft Technology Licensing, Llc | Proximity-based management of a computing device |
CN117031453A (en) * | 2023-10-08 | 2023-11-10 | 中国科学院空天信息创新研究院 | Low orbit satellite opportunistic signal pseudo-range calculation method |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2386014A (en) | 2002-03-01 | 2003-09-03 | Nec Technologies | Cellular location system using time of arrival to determine location of a mobile unit |
US8156539B1 (en) * | 2002-12-18 | 2012-04-10 | Cypress Semiconductor Corporation | Method and system for protecting a wireless network |
KR100917940B1 (en) | 2004-02-17 | 2009-09-21 | 자디 인코포레이티드 | Ultra wide band navigation system with mobile base stations |
CN101290642B (en) * | 2007-04-16 | 2010-09-29 | 瞬联软件科技(北京)有限公司 | Electronic file transmission control method and its system based on area limit |
US9091746B2 (en) * | 2010-07-01 | 2015-07-28 | Qualcomm Incorporated | Determination of positions of wireless transceivers to be added to a wireless communication network |
KR20150089666A (en) * | 2014-01-28 | 2015-08-05 | 삼성전자주식회사 | Electronic apparatus and method for performing service based on geofence |
-
2012
- 2012-12-17 US US13/716,365 patent/US9282459B2/en not_active Expired - Fee Related
-
2013
- 2013-12-10 GB GB1603908.3A patent/GB2533876B/en not_active Expired - Fee Related
- 2013-12-10 GB GB1321807.8A patent/GB2508997B/en not_active Expired - Fee Related
- 2013-12-16 DE DE102013021359.2A patent/DE102013021359A1/en not_active Withdrawn
-
2016
- 2016-01-26 US US15/006,431 patent/US20160142918A1/en not_active Abandoned
Also Published As
Publication number | Publication date |
---|---|
GB201321807D0 (en) | 2014-01-22 |
US20140171025A1 (en) | 2014-06-19 |
GB2533876B (en) | 2016-12-28 |
GB2533876A (en) | 2016-07-06 |
GB2508997B (en) | 2016-12-21 |
DE102013021359A1 (en) | 2014-06-18 |
US9282459B2 (en) | 2016-03-08 |
GB2508997A (en) | 2014-06-18 |
GB201603908D0 (en) | 2016-04-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9282459B2 (en) | Usage of beacon for location based security | |
US9357353B2 (en) | Positioning | |
KR100790041B1 (en) | Wireless clock synchronization | |
EP1897399B1 (en) | Method and apparatus for determining whether a mobile terminal has moved outside a given locale | |
EP1163819B1 (en) | Method and system for locating a mobile subscriber in a cdma communication system | |
US9197989B2 (en) | Reference signal transmission method and system for location measurement, location measurement method, device, and system using the same, and time synchronization method and device using the same | |
US20070252761A1 (en) | Method and arrangement for base station location, base station synchronization, and mobile station location | |
CN104898090A (en) | Indoor positioning system | |
CN105122080A (en) | Ranging and positioning system | |
US10274580B2 (en) | Position determination of a mobile station using modified Wi-Fi signals | |
US10725181B2 (en) | In-band pseudolite wireless positioning method, system and device | |
KR20070007132A (en) | Position detection with frequency smoothing | |
US11092665B2 (en) | High frequency geo-location methods and systems | |
JP2010230380A (en) | Apparatus and method for location estimation | |
KR20120050680A (en) | Navigation satellite repeater and navigation satellite signal repeating method | |
CN106714299A (en) | Positioning method, positioning system and auxiliary site | |
CN110988799A (en) | High-precision positioning system and method for moving object in tunnel based on ultrasonic waves | |
US20160112112A1 (en) | Method and apparatus for beamforming | |
CN113455020B (en) | System for trusted distance measurement | |
Facchi et al. | Emitter localisation from reception timestamps in asynchronous networks | |
US10015632B2 (en) | Precise positioning using time of arrival with pseudo-synchronized anchor nodes | |
GB2366490A (en) | Method of locating a transceiver | |
KR20170139984A (en) | Device for appreciating Moving location, system for having the same and method thereof | |
Shakeel et al. | Range frequency based distance computation technique for positioning in VANET | |
CN117793637A (en) | Multi-star RTT positioning verification method based on UL-AOA assistance |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: QUALCOMM TECHNOLOGIES INTERNATIONAL, LTD., UNITED Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:GRAUBE, NICOLAS;TARLOW, BEN;JARVIS, MURRAY ROBERT;REEL/FRAME:037623/0626 Effective date: 20160129 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO PAY ISSUE FEE |