US20170249816A1 - System and method for proving physical presence - Google Patents
System and method for proving physical presence Download PDFInfo
- Publication number
- US20170249816A1 US20170249816A1 US15/053,295 US201615053295A US2017249816A1 US 20170249816 A1 US20170249816 A1 US 20170249816A1 US 201615053295 A US201615053295 A US 201615053295A US 2017249816 A1 US2017249816 A1 US 2017249816A1
- Authority
- US
- United States
- Prior art keywords
- location
- identification token
- location identification
- signature
- portable computerized
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/22—Electrical actuation
- G08B13/24—Electrical actuation by interference with electromagnetic field distribution
- G08B13/2402—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
- G08B13/2451—Specific applications combined with EAS
- G08B13/2462—Asset location systems combined with EAS
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01S—RADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
- G01S5/00—Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations
- G01S5/02—Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations using radio waves
- G01S5/0252—Radio frequency fingerprinting
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01S—RADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
- G01S5/00—Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations
- G01S5/02—Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations using radio waves
- G01S5/0295—Proximity-based methods, e.g. position inferred from reception of particular signals
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01S—RADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
- G01S5/00—Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations
- G01S5/02—Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations using radio waves
- G01S5/14—Determining absolute distances from a plurality of spaced points of known location
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06018—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking one-dimensional coding
- G06K19/06028—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking one-dimensional coding using bar codes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06037—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/077—Constructional details, e.g. mounting of circuits in the carrier
- G06K19/07749—Constructional details, e.g. mounting of circuits in the carrier the record carrier being capable of non-contact communication, e.g. constructional details of the antenna of a non-contact smart card
- G06K19/07758—Constructional details, e.g. mounting of circuits in the carrier the record carrier being capable of non-contact communication, e.g. constructional details of the antenna of a non-contact smart card arrangements for adhering the record carrier to further objects or living beings, functioning as an identification tag
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/10009—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
- G06K7/10158—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves methods and means used by the interrogation device for reliably powering the wireless record carriers using an electromagnetic interrogation field
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/10009—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
- G06K7/10366—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves the interrogation device being adapted for miscellaneous applications
- G06K7/10475—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves the interrogation device being adapted for miscellaneous applications arrangements to facilitate interaction with further interrogation devices, e.g. such that at least two interrogation devices may function and cooperate in a network of such devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/10544—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation by scanning of the records by radiation in the optical part of the electromagnetic spectrum
- G06K7/10821—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation by scanning of the records by radiation in the optical part of the electromagnetic spectrum further details of bar or optical code scanning devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/088—Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3234—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
Definitions
- Systems and methods herein generally relate to security devices and, more particularly, to mobile devices for automatically detecting and recording the physical presence of the mobile device at a designated location.
- Tags or identification codes can be maintained in wireless devices that can be read by equipment such as near field communication systems (NFC), radio frequency identification systems (RFID), short-wave radio systems; optical systems (barcodes, quick reference codes (QR), etc.), or similar systems.
- NFC near field communication systems
- RFID radio frequency identification systems
- QR quick reference codes
- Such identification codes are commonly used to identify equipment and features or provide other information that is location-sensitive.
- Devices, such as smartphones can read machine-readable tags.
- the portable computerized device comprises a memory, a wireless receiver, a processor, and a communications device.
- the wireless receiver simultaneously receives a first location identification token from a first location transmitting device and a second location identification token from a second location transmitting device while the portable computerized device is within a predetermined distance from a designated location.
- the processor is operatively connected to the wireless receiver and automatically obtains a previously stored location signature associated with the first location identification token and the second location identification token from a non-transitory computer readable storage medium, using the wireless receiver.
- the processor automatically calculates a current location signature based on the first location identification token and the second location identification token.
- the processor automatically compares the current location signature with the previously stored location signature to determine a similarity measure of the current location signature and the previously stored location signature.
- the processor stores the first location identification token, the second location identification token, and the current location signature in the memory.
- the communications device is operatively connected to the processor.
- the communications device transmits the current location signature to a server as proof of presence of the portable computerized device at the designated location, using the processor.
- the system comprises a server, a first wireless location transmitting device transmitting a first location identification token, a second wireless location transmitting device transmitting a second location identification token, and a portable computerized device having computer-executable instructions.
- the portable computerized device comprises a memory, a wireless receiver simultaneously receiving the first location identification token from the first location transmitting device and the second location identification token from the second location transmitting device while the portable computerized device is within a predetermined distance from a designated location.
- a processor is operatively connected to the wireless receiver. The processor stores the first location identification token and the second location identification token in the memory.
- a communications device is operatively connected to the processor.
- the computer-executable instructions cause the processor to automatically obtain a previously stored location signature associated with the first location identification token and the second location identification token from a non-transitory computer readable storage medium, using the communications device.
- the processor automatically calculates a current location signature based on the first location identification token and the second location identification token.
- the processor automatically compares the current location signature with the previously stored location signature to determine a similarity measure of the current location signature and the previously stored location signature.
- the processor transmits the first location identification token, the second location identification token, and the current location signature to the server, using the communications device, as proof of presence of the portable computerized device at the designated location.
- a first location identification token is received from a first location transmitting device, using a wireless receiver of a portable computerized device, while the portable computerized device is within a predetermined distance from a designated location.
- a second location identification token is simultaneously received from a second location transmitting device, using the wireless receiver of the portable computerized device.
- a current location signature is automatically calculated based on the first location identification token and the second location identification token.
- a previously stored location signature associated with the first location identification token and the second location identification token is automatically obtained from a non-transitory computer readable storage medium, using a communications device of the portable computerized device.
- the current location signature is automatically compared with the previously stored location signature to determine a similarity measure of the current location signature and the previously stored location signature.
- the first location identification token, the second location identification token, and the current location signature is automatically stored in a memory of the portable computerized device.
- the first location identification token, the second location identification token, and the current location signature are transmitted to a server, using the portable computerized device.
- the presence of the portable computerized device at the designated location is verified based on the first location identification token, the second location identification token, and the current location signature.
- FIG. 1 is a flow diagram of methods herein;
- FIG. 2 is a schematic diagram illustrating devices herein
- FIG. 3 is a schematic diagram illustrating systems herein
- FIG. 4 is a plan view of room or building illustrating systems herein;
- FIG. 5 is a schematic diagram illustrating an app herein operating on a portable computing device.
- a “tag” or “tag identifier” refers to any machine-readable item containing data or codes, such as near field communication systems (NFC), radio frequency identification systems (RFID), Bluetooth® systems, optical systems (barcodes, quick reference codes (QR), etc.), or similar systems.
- a mobile device When the tag is initially placed into service, a mobile device reads the tag identifier, e.g. using NFC or optical systems, and simultaneously obtains a number of other tags detected by the mobile device.
- the systems and methods herein use such tag identifiers to calculate a location signature that is then associated with specific groups of tag. Recording both the tag identifiers and the location signature, locally on the mobile or in a server, allows later verification that a subsequent portable device is in the correct location by matching the current location signature against the previously stored location signature associated with the tag identifiers.
- Tags that can be read by mobile devices have many applications.
- the tags take multiple forms, such as NFC/RFID tags, or Bluetooth® tags, or printed tags like QR codes or other visually encoded forms.
- the tags may be read-only, or both readable and writeable.
- Such tags have unique identifiers that can be read.
- tags are used for identification purposes when affixed to a position or object, and if additional assumptions are made about the fixity of their location, to infer that the user is in a definite spot when reading them.
- NFC tags are disfavored since their location is inherently known.
- tags may be placed into service in a location where proof of physical presence may be required, such as a hospital, warehouse, or secured facility.
- the mobile device reads the tag identifier, e.g., using short-wavelength UHF radio waves and simultaneously obtains a token from a number of tags detected by the mobile device.
- Such short-wavelength UHF radio may be in the ISM band from 2.4 to 2.485 GHz.
- the systems and methods herein use such tokens to determine a time of receipt and identification of additional chained tags associated with that specific tag. Recording both the tag identifier and the token, locally on the mobile device, allows later verification that the token was received at the location where the proof of physical presence was required.
- the systems and methods herein provide assurance that a tag has not been moved or switched with some other tag from a different location. This prevents attempts to fool the user or the surrounding system using such a tag, say by misleadingly referring to a location that was not intended.
- tags are affixed in locations that are hard to locate physically. These may be devices or objects, or anything else to which a tag can be affixed, such as doors, lights, walls, and so on.
- the tags have a power supply, such as a battery, for example, for a transmitter. Variation of the transmission power makes locating the tags more difficult.
- the mobile device should be capable of reading identifiers from two or more tags at a time. Data received from the tags/transmitters is used to create a composite location signature, as described in further detail below.
- the mobile device can record the tokens received from the tags as the location signature (either locally using its own storage, or remotely on a server) and, at the same time, indicate the physical location where the tokens were received.
- the tag After the tag is initially affixed (or activated) and the location signature is established, each time a user approaches a location containing a tag, the tag allows the user to verify whether the tag is in the appropriate location while also verifying the physical presence of the user.
- the user can employ an application (app), which is a set of computer instructions causing the processor of the user's mobile device to execute some or all of the instructions.
- the app would cause the processor of the mobile device to obtain the token from two or more tags, record data from the tags, and calculate a current location signature.
- the app may also identify all the other tokens that are visible to each tag.
- the app then causes the processor of the portable computerized device to compare the current location signature with the previously stored location signature and determines a similarity measure of the current location signature and the previously stored location signature.
- the app then causes the processor to store the first location identification token, the second location identification token, and the current location signature in the memory.
- Storing the associated location signatures on a server has the advantage of allowing portable computerized devices to collaborate in establishing and refining the security for the location signatures. For example, every time a mobile device utilizes the tag, the time/date stamp will change and other sequence numbers and cryptographic schemes may be changed, as well.
- the app allows the processor of the portable computerized device to present the tokens immediately to a central service, such as a cloud-based service, or later to a local server.
- the app allows the communications device of the portable computerized device to transmit the current location signature to a server as proof of presence of the portable computerized device at the designated location, using the processor.
- the token and location information may also be presented to the user through the user interface of the mobile device to allow the user to act on the information given.
- the systems and methods herein thus provide the user accurate information about the probability that the tag was moved.
- the information regarding whether a tag is in the correct location calculated by the systems and methods herein is only relative, and can be based solely upon the tokens obtained from the associated tags, and does not need to be based on any specific geographic location information. This is contrasted to positioning systems such as GPS, which establish a geographic location that is comparable to other geographic locations on the longitude and latitude scales. Unobstructed access to satellite signals, which is problematic inside covered areas, makes it difficult to obtain accurate GPS-based geographic locations within buildings.
- the systems and methods herein use a much broader and more flexible determination of “location” which does not need to be comparable except in the sense that each token is separate.
- various methods herein obtain two or more coded location identification tokens from location transmitting tags, using a wireless reader of a portable computerized device, while the portable computerized device is within a predetermined distance from a designated location. Such methods automatically store the location identification tokens in a memory of the portable computerized device. The location identification tokens are interpreted and presented to a server. The presence of the portable computerized device at the designated location is verified based on the location identification tokens.
- such methods automatically obtain a previously stored location signature associated with the tags from a non-transitory computer readable storage medium, using a communications device of the portable computerized device. Further, such methods automatically compare the current location signature with the previously stored location signature to determine a similarity measure of the current location signature and the previously stored location signature, using the processor. These methods automatically verify whether the portable computerized device is in the correct location based on the similarity measure being above a predetermined threshold, using the processor. Such methods can also display a location validity message on a user interface of the portable computerized device based on the process of verifying whether the portable computerized device is in the correct location.
- FIG. 1 is flowchart illustrating exemplary methods herein.
- these methods install or activate two or more location transmitting devices in a designated location where physical presence is required.
- the location transmitting devices can comprise short-wavelength UHF radio transmitters, for example, a Bluetooth® device, particularly, a Bluetooth Low Energy (BLE) device.
- BLE Bluetooth Low Energy
- a location identification token (sometimes referred to herein as a “tag”) from the location transmitting devices using a first wireless reader of a first portable computerized device.
- first portable computerized device can be a smart phone or PDA of an administrator or service engineer who is performing the initial setup of the location transmitting devices.
- the location identification token will be read while the first portable computerized device is positioned at a location that is within a predetermined distance (e.g., 5 meters, 10 meters, etc.) from the location transmitting devices item 153 .
- Some protocols, such as Near Field Communication (NFC) require that the portable device be very close (less than 1 meter), while other protocols such as Bluetooth® or Wi-Fi allow greater distances. Accordingly, NFC is not preferred.
- NFC Near Field Communication
- these methods automatically calculate a location signature based on the location identification tokens obtained using the first wireless reader of the first portable computerized device.
- the location signature is calculated using a first processor of the first portable computerized device.
- such methods can automatically save the location signature (referred to herein as the “previously stored” location signature, for convenience) in a non-transitory computer readable storage medium (computer storage) using a first communications device of the first portable computerized device.
- the process of storing the location signature in item 159 also includes a process of associating the previously stored location signature with the location identification tokens (tags) (thereby allowing identification of the previously stored location signature to retrieve the location identification tokens, and vice versa). This completes the initial setup process for the location identification devices.
- these methods then read a possibly matching location identification tokens from two or more location identification transmitting devices in item 162 , using a second wireless reader of a second portable computerized device, while the second portable computerized device is positioned at a second location that is also within the predetermined distance from the designated location.
- these methods use the second portable computerized device and automatically calculate a current location signature based on the location identification tokens, using a second processor of the second portable computerized device.
- Such methods also automatically obtain the previously stored location signature associated with the possibly location identification tokens from the non-transitory computer readable storage medium in item 168 , using a second communications device of the second portable computerized device.
- these methods can automatically compare the current location signature with the previously stored location signature to determine a similarity measure of the location signatures (of the current location signature and the previously stored location signature) in item 171 , using the second processor.
- such methods can automatically save the location identification tokens in a non-transitory computer readable storage medium (computer storage) using a communications device of the portable computerized device.
- Such methods allow the location identification tokens and/or current location signature to be presented immediately to a central service, such as a cloud-based service, or later to a local server, in item 178 .
- such methods can display a location validity message on a user interface of the portable computerized device based on the process of verifying the location identification tokens and determining that the portable computerized device is in the correct location in item 175 .
- a location transmitting device 202 is installed in a location where physical presence in the location must be verified. Typically, a plurality of location transmitting devices 202 may be used.
- a portable computerized device 205 within a predetermined distance of a location transmitting device 202 receives a token 208 transmitted by the location transmitting device 202 .
- FIG. 2 also illustrates a server 211 (having storage) connected to the portable computerized device 205 by way of a wired or wireless network 214 .
- the portable computerized device 205 includes a wireless receiver 217 that can receive the token 208 from the location transmitting device 202 , as discussed above, a memory 220 to store the token 208 , a processor 223 operatively connected to the wireless receiver 217 , and a communications device 226 is operatively connected to the processor 223 .
- An application on the mobile device records the token 208 transmitted to it by several wireless tags that are within range. Later, the user with a portable computerized device 205 presents those tokens 208 as proof of physical presence.
- the tokens can utilize a cryptographic scheme to prevent replay, so that the user must be at the physical location where such tokens are visible in order to prove physical presence there at the given time. Recording and repeating previously seen tokens is not possible.
- Each tag signs its token using a private key (PK) embedded securely in the tag using known techniques such as tamper resistant hardware.
- PK private key
- An example signed token scheme is shown below:
- a mobile device 303 receives a location identification token from each location transmitting device (indicated as tags 306 , 309 ) within range of the mobile device 303 .
- tags 306 , 309 are directly visible to the mobile device 303 .
- a wireless protocol such as Bluetooth Low Energy (BLE) may be used to transmit the tokens.
- BLE Bluetooth Low Energy
- the mobile device 303 must only be within an approximate physical location, such as a building floor or within an entire building, and physical contact is not required, nor does the user know precisely where the tags actually are located.
- tag 306 is visible to tag 309 , and vice-versa.
- tag 312 may be visible to tags 306 , 309 , but out of range of the mobile device 303 .
- the systems and methods herein address an important security concern by making it difficult for a malfeasor to locate the tags/transmitters. If a scheme such as BLE is used, the signal strength of the tags 306 , 309 may be used to attempt to physically locate it, and then move it, transporting it to some other location. Such a change would effectively defeat the physical location guarantees given, since the user/mobile may still receive tokens from the tags 306 , 309 , without actually being where the tag was supposed to be. Because the tags are hard to locate physically, they have advantages over NFC tags, which are inherently physically accessible to the user.
- token transmitters/tags may employ different kinds of power sources and form factors.
- various alternative two-way communication systems may be used to transmit tokens issued and signed by a central service (such as by a cloud-based service) to the tags for counter-signature.
- FIG. 4 shows an exemplary floor plan of room or building having several location transmitting devices 404 A-J.
- Each of location transmitting devices 404 A-J may comprise short-wavelength UHF radio transmitters having different power levels, as indicated. In some cases, the transmitting power may variable.
- the arbitrarily named first portable computerized device can establish a location signature at specific designated locations, such as indicated at 407 , 408 , and 409 .
- location 407 may be visible to location transmitting devices 404 A, 404 C, and 404 F; location 408 may be visible to location transmitting devices 404 I and 404 J; and location 409 may be visible to location transmitting devices 404 E, 404 G, 404 H, and 404 J.
- Note-location transmitting device 404 B may not have enough power to be visible at location 707 .
- the location signature uses at least two location transmitting devices.
- the tokens from each location transmitting device may include other location transmitting device in its tag chain.
- the token from location transmitting device 404 A may indicate that it is visible to location transmitting devices 404 B and 404 C and the token from location transmitting device 404 F may indicate that it is visible to location transmitting device 404 D; although neither location transmitting device 404 D or 404 B may be visible at location 407 .
- exemplary portable computerized devices herein comprise a wireless reader and memory that receives a token from a location identification device while the portable computerized device is positioned at a location that is within a predetermined distance from the machine.
- the portable computerized device stores the tokens in the memory.
- the portable computerized devices include a processor operatively connected to the memory. The processor automatically interprets each location identification token and identifies additional location transmittal devices based on the received information.
- systems and methods herein provide a physical presence verification app 505 that can be downloaded (e.g., from an app store) to the user's portable computing device 508 .
- the physical presence verification app 505 can be displayed on the user interface 511 of the user's portable computing device 508 along with other apps 515 .
- the app 505 When the physical presence verification app 505 in FIG. 5 is selected by the user, the app 505 causes the user interface 511 of the user portable computing device to display a screen having menu options to begin physical presence verification, display a location validity message, transmit the current location signature to a server, etc.
- the portable computerized devices include a communications device operatively connected to the processor.
- the communications device transmits the tokens to a server as proof of presence of the portable computerized device at the designated location.
- the portable computerized devices further include a user interface operatively connected to the processor.
- the user interface displays a location validity message based on the processor determining that the location transmittal device is in the correct location.
- exemplary systems herein comprise a server 211 , a first wireless location transmitting device 306 transmitting a first location identification token 208 A, a second wireless location transmitting device 309 transmitting a second location identification token 208 B, and a portable computerized device 205 / 303 having computer-executable instructions.
- the portable computerized device 205 / 303 comprises a memory 220 and a wireless receiver 217 simultaneously receiving the first location identification token 208 A from the first location transmitting device 306 and the second location identification token 208 B from the second location transmitting device 309 while the portable computerized device 205 / 303 is within a predetermined distance from a designated location.
- a processor 223 is operatively connected to the wireless receiver 217 .
- the processor 223 stores the first location identification token 208 A and the second location identification token 208 B in the memory 220 .
- a communications device 226 is operatively connected to the processor 223 .
- the computer-executable instructions cause the processor 223 to automatically interpret each location identification token 208 and identify additional location transmittal devices ( 312 , 315 , . . . , 333 ) based on information from one of the first location identification token 208 A and the second location identification token 208 B.
- the processor 223 transmits the first location identification token 208 A and the second location identification token 208 B to the server 211 as proof of presence of the portable computerized device 205 / 303 at the designated location.
- tags are read to obtain proof of physical presence, while acquisition is passive, requiring no action by the user.
- An encryption scheme using a private key renders the distributed system tamper resistant.
- tag chaining fixes the location of multiple tags within a mesh of tags further rendering the system tamper resistant.
- Computerized devices that include chip-based central processing units (CPU's), input/output devices (including graphic user interfaces (GUI), memories, comparators, processors, etc. are well-known and readily available devices produced by manufacturers such as Dell Computers, Round Rock Tex., USA and Apple Computer Co., Cupertino Calif., USA.
- Such computerized devices commonly include input/output devices, power supplies, processors, electronic storage memories, wiring, etc., the details of which are omitted herefrom to allow the reader to focus on the salient aspects of the systems and methods described herein.
- scanners and other similar peripheral equipment are available from Xerox Corporation, Norwalk, Conn., USA and the details of such devices are not discussed herein for purposes of brevity and reader focus.
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Electromagnetism (AREA)
- Toxicology (AREA)
- Health & Medical Sciences (AREA)
- Computer Networks & Wireless Communication (AREA)
- Artificial Intelligence (AREA)
- General Health & Medical Sciences (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Signal Processing (AREA)
- Remote Sensing (AREA)
- Radar, Positioning & Navigation (AREA)
- Computer Hardware Design (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Automation & Control Theory (AREA)
- Mobile Radio Communication Systems (AREA)
- Position Fixing By Use Of Radio Waves (AREA)
Abstract
Description
- Systems and methods herein generally relate to security devices and, more particularly, to mobile devices for automatically detecting and recording the physical presence of the mobile device at a designated location.
- Many applications exist where it is valuable to be able to detect and prove physical presence of users. Examples include the healthcare industry, plant maintenance, and physical security providers. Current solutions use systems requiring an overt act by the user such as punching a code into a station, swiping a card at a reader, or making an entry in a log.
- Tags or identification codes can be maintained in wireless devices that can be read by equipment such as near field communication systems (NFC), radio frequency identification systems (RFID), short-wave radio systems; optical systems (barcodes, quick reference codes (QR), etc.), or similar systems. Such identification codes are commonly used to identify equipment and features or provide other information that is location-sensitive. Devices, such as smartphones, can read machine-readable tags.
- Many applications exist where it is valuable to be able to detect and prove physical presence of users who are carrying mobile devices, without requiring actual physical contact with features of that location, such as tags. An application on the mobile device records the tokens transmitted to it by several wireless tags that are within range. Later, the user/mobile presents those tokens as proof of physical presence at the designated location.
- According to a portable computerized device, the portable computerized device comprises a memory, a wireless receiver, a processor, and a communications device. The wireless receiver simultaneously receives a first location identification token from a first location transmitting device and a second location identification token from a second location transmitting device while the portable computerized device is within a predetermined distance from a designated location. The processor is operatively connected to the wireless receiver and automatically obtains a previously stored location signature associated with the first location identification token and the second location identification token from a non-transitory computer readable storage medium, using the wireless receiver. The processor automatically calculates a current location signature based on the first location identification token and the second location identification token. The processor automatically compares the current location signature with the previously stored location signature to determine a similarity measure of the current location signature and the previously stored location signature. The processor stores the first location identification token, the second location identification token, and the current location signature in the memory. The communications device is operatively connected to the processor. The communications device transmits the current location signature to a server as proof of presence of the portable computerized device at the designated location, using the processor.
- According to a system herein, the system comprises a server, a first wireless location transmitting device transmitting a first location identification token, a second wireless location transmitting device transmitting a second location identification token, and a portable computerized device having computer-executable instructions. The portable computerized device comprises a memory, a wireless receiver simultaneously receiving the first location identification token from the first location transmitting device and the second location identification token from the second location transmitting device while the portable computerized device is within a predetermined distance from a designated location. A processor is operatively connected to the wireless receiver. The processor stores the first location identification token and the second location identification token in the memory. A communications device is operatively connected to the processor. The computer-executable instructions cause the processor to automatically obtain a previously stored location signature associated with the first location identification token and the second location identification token from a non-transitory computer readable storage medium, using the communications device. The processor automatically calculates a current location signature based on the first location identification token and the second location identification token. The processor automatically compares the current location signature with the previously stored location signature to determine a similarity measure of the current location signature and the previously stored location signature. The processor transmits the first location identification token, the second location identification token, and the current location signature to the server, using the communications device, as proof of presence of the portable computerized device at the designated location.
- According to a method herein, a first location identification token is received from a first location transmitting device, using a wireless receiver of a portable computerized device, while the portable computerized device is within a predetermined distance from a designated location. A second location identification token is simultaneously received from a second location transmitting device, using the wireless receiver of the portable computerized device. A current location signature is automatically calculated based on the first location identification token and the second location identification token. A previously stored location signature associated with the first location identification token and the second location identification token is automatically obtained from a non-transitory computer readable storage medium, using a communications device of the portable computerized device. The current location signature is automatically compared with the previously stored location signature to determine a similarity measure of the current location signature and the previously stored location signature. The first location identification token, the second location identification token, and the current location signature is automatically stored in a memory of the portable computerized device. The first location identification token, the second location identification token, and the current location signature are transmitted to a server, using the portable computerized device. The presence of the portable computerized device at the designated location is verified based on the first location identification token, the second location identification token, and the current location signature.
- These and other features are described in, or are apparent from, the following detailed description.
- Various exemplary systems and methods are described in detail below, with reference to the attached drawing figures, in which:
-
FIG. 1 is a flow diagram of methods herein; -
FIG. 2 is a schematic diagram illustrating devices herein; -
FIG. 3 is a schematic diagram illustrating systems herein; -
FIG. 4 is a plan view of room or building illustrating systems herein; and -
FIG. 5 is a schematic diagram illustrating an app herein operating on a portable computing device. - For a general understanding of the features of the disclosure, reference is made to the drawings. It will be readily understood that the systems and methods of the present disclosure, as generally described and illustrated in the drawings herein, may be arranged and designed in a wide variety of configurations in addition to the systems and methods described herein. In the drawings, like reference numerals have been used to identify identical elements. While the disclosure will be described hereinafter in connection with specific systems and methods thereof, it will be understood that limiting the disclosure to such specific systems and methods is not intended. Thus, the following detailed description of the systems and methods, as represented in the drawings, is not intended to limit the scope defined by the appended claims. On the contrary, it is intended to cover all alternatives, modifications, and equivalents as may be included within the spirit and scope of the disclosure as defined by the appended claims.
- The systems and methods herein use a mobile device's receiver to receive and record tokens transmitted to it by a plurality of wireless tags that are within its range. Later the systems and methods herein use the mobile device's transmitter to present those tokens as proof of physical presence within the range of the wireless tags. For purposes herein, a “tag” or “tag identifier” refers to any machine-readable item containing data or codes, such as near field communication systems (NFC), radio frequency identification systems (RFID), Bluetooth® systems, optical systems (barcodes, quick reference codes (QR), etc.), or similar systems.
- When the tag is initially placed into service, a mobile device reads the tag identifier, e.g. using NFC or optical systems, and simultaneously obtains a number of other tags detected by the mobile device. The systems and methods herein use such tag identifiers to calculate a location signature that is then associated with specific groups of tag. Recording both the tag identifiers and the location signature, locally on the mobile or in a server, allows later verification that a subsequent portable device is in the correct location by matching the current location signature against the previously stored location signature associated with the tag identifiers.
- Tags that can be read by mobile devices have many applications. The tags take multiple forms, such as NFC/RFID tags, or Bluetooth® tags, or printed tags like QR codes or other visually encoded forms. The tags may be read-only, or both readable and writeable. Such tags have unique identifiers that can be read. Typically, such tags are used for identification purposes when affixed to a position or object, and if additional assumptions are made about the fixity of their location, to infer that the user is in a definite spot when reading them.
- One prominent kind of tag is the rewritable passive NFC tag. The reader and writer of such tags has to be physically close to the tag (say, less than 1 meter or similar distance limit) and the tag is passive in that the reader/writer supplies the power source, so that the tag can be affixed externally or internally without any other integration to a broad range of objects or places. According to systems and methods herein, NFC tags are disfavored since their location is inherently known.
- Multiple tags may be placed into service in a location where proof of physical presence may be required, such as a hospital, warehouse, or secured facility. The mobile device reads the tag identifier, e.g., using short-wavelength UHF radio waves and simultaneously obtains a token from a number of tags detected by the mobile device. Such short-wavelength UHF radio may be in the ISM band from 2.4 to 2.485 GHz. The systems and methods herein use such tokens to determine a time of receipt and identification of additional chained tags associated with that specific tag. Recording both the tag identifier and the token, locally on the mobile device, allows later verification that the token was received at the location where the proof of physical presence was required.
- The systems and methods herein provide assurance that a tag has not been moved or switched with some other tag from a different location. This prevents attempts to fool the user or the surrounding system using such a tag, say by misleadingly referring to a location that was not intended.
- In an oversimplified example, with systems and methods herein, multiple tags are affixed in locations that are hard to locate physically. These may be devices or objects, or anything else to which a tag can be affixed, such as doors, lights, walls, and so on. Typically, the tags have a power supply, such as a battery, for example, for a transmitter. Variation of the transmission power makes locating the tags more difficult. The mobile device should be capable of reading identifiers from two or more tags at a time. Data received from the tags/transmitters is used to create a composite location signature, as described in further detail below. The mobile device can record the tokens received from the tags as the location signature (either locally using its own storage, or remotely on a server) and, at the same time, indicate the physical location where the tokens were received.
- After the tag is initially affixed (or activated) and the location signature is established, each time a user approaches a location containing a tag, the tag allows the user to verify whether the tag is in the appropriate location while also verifying the physical presence of the user. To do so, the user can employ an application (app), which is a set of computer instructions causing the processor of the user's mobile device to execute some or all of the instructions. In this example, the app would cause the processor of the mobile device to obtain the token from two or more tags, record data from the tags, and calculate a current location signature. The app may also identify all the other tokens that are visible to each tag.
- The app then causes the processor of the portable computerized device to compare the current location signature with the previously stored location signature and determines a similarity measure of the current location signature and the previously stored location signature. The app then causes the processor to store the first location identification token, the second location identification token, and the current location signature in the memory.
- Storing the associated location signatures on a server (or other common-access storage location) has the advantage of allowing portable computerized devices to collaborate in establishing and refining the security for the location signatures. For example, every time a mobile device utilizes the tag, the time/date stamp will change and other sequence numbers and cryptographic schemes may be changed, as well.
- The app allows the processor of the portable computerized device to present the tokens immediately to a central service, such as a cloud-based service, or later to a local server. The app allows the communications device of the portable computerized device to transmit the current location signature to a server as proof of presence of the portable computerized device at the designated location, using the processor.
- The token and location information may also be presented to the user through the user interface of the mobile device to allow the user to act on the information given. The systems and methods herein thus provide the user accurate information about the probability that the tag was moved.
- The information regarding whether a tag is in the correct location calculated by the systems and methods herein is only relative, and can be based solely upon the tokens obtained from the associated tags, and does not need to be based on any specific geographic location information. This is contrasted to positioning systems such as GPS, which establish a geographic location that is comparable to other geographic locations on the longitude and latitude scales. Unobstructed access to satellite signals, which is problematic inside covered areas, makes it difficult to obtain accurate GPS-based geographic locations within buildings. The systems and methods herein use a much broader and more flexible determination of “location” which does not need to be comparable except in the sense that each token is separate.
- As noted above, various methods herein obtain two or more coded location identification tokens from location transmitting tags, using a wireless reader of a portable computerized device, while the portable computerized device is within a predetermined distance from a designated location. Such methods automatically store the location identification tokens in a memory of the portable computerized device. The location identification tokens are interpreted and presented to a server. The presence of the portable computerized device at the designated location is verified based on the location identification tokens.
- Also, such methods automatically obtain a previously stored location signature associated with the tags from a non-transitory computer readable storage medium, using a communications device of the portable computerized device. Further, such methods automatically compare the current location signature with the previously stored location signature to determine a similarity measure of the current location signature and the previously stored location signature, using the processor. These methods automatically verify whether the portable computerized device is in the correct location based on the similarity measure being above a predetermined threshold, using the processor. Such methods can also display a location validity message on a user interface of the portable computerized device based on the process of verifying whether the portable computerized device is in the correct location.
-
FIG. 1 is flowchart illustrating exemplary methods herein. Initem 150, these methods install or activate two or more location transmitting devices in a designated location where physical presence is required. The location transmitting devices can comprise short-wavelength UHF radio transmitters, for example, a Bluetooth® device, particularly, a Bluetooth Low Energy (BLE) device. - These methods read a location identification token (sometimes referred to herein as a “tag”) from the location transmitting devices using a first wireless reader of a first portable computerized device. For example, the arbitrarily named “first” portable computerized device can be a smart phone or PDA of an administrator or service engineer who is performing the initial setup of the location transmitting devices. The location identification token will be read while the first portable computerized device is positioned at a location that is within a predetermined distance (e.g., 5 meters, 10 meters, etc.) from the location
transmitting devices item 153. Some protocols, such as Near Field Communication (NFC) require that the portable device be very close (less than 1 meter), while other protocols such as Bluetooth® or Wi-Fi allow greater distances. Accordingly, NFC is not preferred. - In
item 156, these methods automatically calculate a location signature based on the location identification tokens obtained using the first wireless reader of the first portable computerized device. The location signature is calculated using a first processor of the first portable computerized device. - Then, in
item 159, such methods can automatically save the location signature (referred to herein as the “previously stored” location signature, for convenience) in a non-transitory computer readable storage medium (computer storage) using a first communications device of the first portable computerized device. The process of storing the location signature initem 159 also includes a process of associating the previously stored location signature with the location identification tokens (tags) (thereby allowing identification of the previously stored location signature to retrieve the location identification tokens, and vice versa). This completes the initial setup process for the location identification devices. - Once the initial setup process is complete, users will want to use the location identification devices to prove their physical presence in a designated location. Therefore, these methods then read a possibly matching location identification tokens from two or more location identification transmitting devices in
item 162, using a second wireless reader of a second portable computerized device, while the second portable computerized device is positioned at a second location that is also within the predetermined distance from the designated location. - In
item 165, these methods use the second portable computerized device and automatically calculate a current location signature based on the location identification tokens, using a second processor of the second portable computerized device. - Such methods also automatically obtain the previously stored location signature associated with the possibly location identification tokens from the non-transitory computer readable storage medium in
item 168, using a second communications device of the second portable computerized device. - Thus, these methods can automatically compare the current location signature with the previously stored location signature to determine a similarity measure of the location signatures (of the current location signature and the previously stored location signature) in
item 171, using the second processor. - Then, in
item 174, such methods can automatically save the location identification tokens in a non-transitory computer readable storage medium (computer storage) using a communications device of the portable computerized device. Such methods allow the location identification tokens and/or current location signature to be presented immediately to a central service, such as a cloud-based service, or later to a local server, initem 178. - Further, such methods can display a location validity message on a user interface of the portable computerized device based on the process of verifying the location identification tokens and determining that the portable computerized device is in the correct location in
item 175. - As shown in
FIG. 2 , alocation transmitting device 202 is installed in a location where physical presence in the location must be verified. Typically, a plurality oflocation transmitting devices 202 may be used. A portablecomputerized device 205 within a predetermined distance of alocation transmitting device 202 receives a token 208 transmitted by thelocation transmitting device 202.FIG. 2 also illustrates a server 211 (having storage) connected to the portablecomputerized device 205 by way of a wired orwireless network 214. - Further, the portable
computerized device 205 includes awireless receiver 217 that can receive the token 208 from thelocation transmitting device 202, as discussed above, amemory 220 to store the token 208, aprocessor 223 operatively connected to thewireless receiver 217, and acommunications device 226 is operatively connected to theprocessor 223. - An application on the mobile device records the token 208 transmitted to it by several wireless tags that are within range. Later, the user with a portable
computerized device 205 presents thosetokens 208 as proof of physical presence. - The tokens can utilize a cryptographic scheme to prevent replay, so that the user must be at the physical location where such tokens are visible in order to prove physical presence there at the given time. Recording and repeating previously seen tokens is not possible. Each tag signs its token using a private key (PK) embedded securely in the tag using known techniques such as tamper resistant hardware. An example signed token scheme is shown below:
-
- SK(tag id, timestamp, salt, sequence number, additional chained tokens)
The token contains the current timestamp, a random cryptographic salt, and a sequence number (chained tokens are explained below). The signed token can then be verified by using the corresponding public key (PK). Thus each signed token is unique and attempts to proffer duplicates are easily detected. Note that other encryption schemes may be used instead.
- SK(tag id, timestamp, salt, sequence number, additional chained tokens)
- Referring to
FIG. 3 , amobile device 303 receives a location identification token from each location transmitting device (indicated as tags 306, 309) within range of themobile device 303. As shown inFIG. 3 , two tags 306, 309 are directly visible to themobile device 303. A wireless protocol such as Bluetooth Low Energy (BLE) may be used to transmit the tokens. Themobile device 303 must only be within an approximate physical location, such as a building floor or within an entire building, and physical contact is not required, nor does the user know precisely where the tags actually are located. According to systems and methods herein, tag 306 is visible to tag 309, and vice-versa. In addition,tag 312 may be visible to tags 306, 309, but out of range of themobile device 303. - The systems and methods herein address an important security concern by making it difficult for a malfeasor to locate the tags/transmitters. If a scheme such as BLE is used, the signal strength of the tags 306, 309 may be used to attempt to physically locate it, and then move it, transporting it to some other location. Such a change would effectively defeat the physical location guarantees given, since the user/mobile may still receive tokens from the tags 306, 309, without actually being where the tag was supposed to be. Because the tags are hard to locate physically, they have advantages over NFC tags, which are inherently physically accessible to the user.
- The system and methods herein disclose the use of several techniques to raise the cost, in time and energy, in locating and moving tags:
-
- 1. Randomly varying transmission power of the tags 306, 309 when the wireless signals are emitted, to frustrate use of the signal strength to attempt to determine the location of the tag.
- 2. Allows requiring visibility of more than one token so that moving one tag would not be sufficient, the malefactor would have to move as many as are required for that location by the particular installation. Since these tags are used within a mesh the movement of one or
more tags 306, 309, 312 may affect the signature required for more than one location. - 3. Tag chaining, so that each tag 306, 309 includes in its broadcast token all the other tokens that are visible to it, recursively, establishing a chain of reference over an entire facility, which can stretch far beyond the immediate physical environment of the user, such as
tags 315 . . . 333, etc. A subset of visible tags may be used to reduce bandwidth costs of transmitting this information, using a statistical sampling technique. The combined tags form a mesh of tags.
- Use of these techniques also raises the probability of detection if any user attempts to compromise the system, since significant physical intervention by the user would be required to gain access to all the tag locations. Systems and methods herein comprehend that simpler deployments need not utilize all these elements and may settle for a subset that is good enough for the purposes at hand.
- Many different types of token transmitters/tags may be used. According to systems and methods herein, the token transmitters/tags may employ different kinds of power sources and form factors. In addition, various alternative two-way communication systems may be used to transmit tokens issued and signed by a central service (such as by a cloud-based service) to the tags for counter-signature.
-
FIG. 4 shows an exemplary floor plan of room or building having severallocation transmitting devices 404A-J. Each oflocation transmitting devices 404A-J may comprise short-wavelength UHF radio transmitters having different power levels, as indicated. In some cases, the transmitting power may variable. During initial setup, the arbitrarily named first portable computerized device can establish a location signature at specific designated locations, such as indicated at 407, 408, and 409. For example,location 407 may be visible tolocation transmitting devices location 408 may be visible tolocation transmitting devices 404I and 404J; andlocation 409 may be visible tolocation transmitting devices location transmitting device 404B may not have enough power to be visible at location 707. - According to systems and methods herein, the location signature uses at least two location transmitting devices. The tokens from each location transmitting device may include other location transmitting device in its tag chain. For example, the token from
location transmitting device 404A may indicate that it is visible tolocation transmitting devices location transmitting device 404F may indicate that it is visible tolocation transmitting device 404D; although neitherlocation transmitting device location 407. - Thus, as explained above, exemplary portable computerized devices herein comprise a wireless reader and memory that receives a token from a location identification device while the portable computerized device is positioned at a location that is within a predetermined distance from the machine. The portable computerized device stores the tokens in the memory. The portable computerized devices include a processor operatively connected to the memory. The processor automatically interprets each location identification token and identifies additional location transmittal devices based on the received information.
- As shown in
FIG. 5 , systems and methods herein provide a physicalpresence verification app 505 that can be downloaded (e.g., from an app store) to the user'sportable computing device 508. As shown inFIG. 5 , the physicalpresence verification app 505 can be displayed on theuser interface 511 of the user'sportable computing device 508 along withother apps 515. - When the physical
presence verification app 505 inFIG. 5 is selected by the user, theapp 505 causes theuser interface 511 of the user portable computing device to display a screen having menu options to begin physical presence verification, display a location validity message, transmit the current location signature to a server, etc. - Also, the portable computerized devices include a communications device operatively connected to the processor. The communications device transmits the tokens to a server as proof of presence of the portable computerized device at the designated location.
- The portable computerized devices further include a user interface operatively connected to the processor. The user interface displays a location validity message based on the processor determining that the location transmittal device is in the correct location.
- Thus, exemplary systems herein comprise a
server 211, a first wireless location transmitting device 306 transmitting a first location identification token 208A, a second wireless location transmitting device 309 transmitting a second location identification token 208B, and a portablecomputerized device 205/303 having computer-executable instructions. The portablecomputerized device 205/303 comprises amemory 220 and awireless receiver 217 simultaneously receiving the first location identification token 208A from the first location transmitting device 306 and the second location identification token 208B from the second location transmitting device 309 while the portablecomputerized device 205/303 is within a predetermined distance from a designated location. Aprocessor 223 is operatively connected to thewireless receiver 217. Theprocessor 223 stores the first location identification token 208A and the second location identification token 208B in thememory 220. Acommunications device 226 is operatively connected to theprocessor 223. The computer-executable instructions cause theprocessor 223 to automatically interpret eachlocation identification token 208 and identify additional location transmittal devices (312, 315, . . . , 333) based on information from one of the first location identification token 208A and the second location identification token 208B. Theprocessor 223 transmits the first location identification token 208A and the second location identification token 208B to theserver 211 as proof of presence of the portablecomputerized device 205/303 at the designated location. - In this manner, multiple tags are read to obtain proof of physical presence, while acquisition is passive, requiring no action by the user. An encryption scheme using a private key renders the distributed system tamper resistant. Furthermore, tag chaining fixes the location of multiple tags within a mesh of tags further rendering the system tamper resistant.
- Many computerized devices are discussed above. Computerized devices that include chip-based central processing units (CPU's), input/output devices (including graphic user interfaces (GUI), memories, comparators, processors, etc. are well-known and readily available devices produced by manufacturers such as Dell Computers, Round Rock Tex., USA and Apple Computer Co., Cupertino Calif., USA. Such computerized devices commonly include input/output devices, power supplies, processors, electronic storage memories, wiring, etc., the details of which are omitted herefrom to allow the reader to focus on the salient aspects of the systems and methods described herein. Similarly, scanners and other similar peripheral equipment are available from Xerox Corporation, Norwalk, Conn., USA and the details of such devices are not discussed herein for purposes of brevity and reader focus.
- It will be appreciated that the above-disclosed and other features and functions, or alternatives thereof, may be desirably combined into many other different systems or applications. Various presently unforeseen or unanticipated alternatives, modifications, variations, or improvements therein may be subsequently made by those skilled in the art which are also intended to be encompassed by the following claims. Unless specifically defined in a specific claim itself, steps or components of the systems and methods herein cannot be implied or imported from any above example as limitations to any particular order, number, position, size, shape, angle, color, or material.
Claims (20)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/053,295 US9747768B1 (en) | 2016-02-25 | 2016-02-25 | System and method for proving physical presence |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/053,295 US9747768B1 (en) | 2016-02-25 | 2016-02-25 | System and method for proving physical presence |
Publications (2)
Publication Number | Publication Date |
---|---|
US9747768B1 US9747768B1 (en) | 2017-08-29 |
US20170249816A1 true US20170249816A1 (en) | 2017-08-31 |
Family
ID=59653572
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/053,295 Expired - Fee Related US9747768B1 (en) | 2016-02-25 | 2016-02-25 | System and method for proving physical presence |
Country Status (1)
Country | Link |
---|---|
US (1) | US9747768B1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3937097A1 (en) * | 2020-07-06 | 2022-01-12 | Guardtime SA | System and method for verifiably proving proximity |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10409974B2 (en) * | 2016-10-01 | 2019-09-10 | Intel Corporation | Technologies for authorizing a user to a protected system |
US10708451B1 (en) | 2019-01-17 | 2020-07-07 | Xerox Corporation | Method and system for device location updating using map validation by an end user |
US11037101B2 (en) * | 2019-05-17 | 2021-06-15 | Direct Supply, Inc. | Systems, methods, and media for managing inventory associated with a facility |
FR3097065B1 (en) * | 2019-06-10 | 2021-11-26 | Imprimerie Nat | Method and System for Acquiring, Saving and Using Evidence Data |
Family Cites Families (28)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7688794B2 (en) | 2005-12-13 | 2010-03-30 | Xerox Corporation | System and method for diverting a printing job to a proximal networked device |
US7839523B2 (en) | 2005-12-13 | 2010-11-23 | Xerox Corporation | System and method for resolving a hardware identifier to a network address of networked device |
US7741967B2 (en) | 2006-02-13 | 2010-06-22 | Xerox Corporation | Locating system for items having RFID tags |
US8570172B2 (en) | 2006-09-08 | 2013-10-29 | Intelleflex Corporation | RFID system with distributed transmitters |
US8143996B2 (en) | 2007-01-08 | 2012-03-27 | The Curators Of The University Of Missouri | Decentralized radio frequency identification system |
US8229458B2 (en) | 2007-04-08 | 2012-07-24 | Enhanced Geographic Llc | Systems and methods to determine the name of a location visited by a user of a wireless device |
US7984507B2 (en) | 2007-12-07 | 2011-07-19 | Xerox Corporation | Document access management method and system |
US10755268B2 (en) | 2008-05-09 | 2020-08-25 | Verient, Inc. | Apparatus and methods for payment transactions using near field communication |
KR101508794B1 (en) | 2008-07-09 | 2015-04-06 | 삼성전자주식회사 | Method for selectively securing records in a ndef message |
US8112066B2 (en) | 2009-06-22 | 2012-02-07 | Mourad Ben Ayed | System for NFC authentication based on BLUETOOTH proximity |
EP2420854B1 (en) | 2010-08-17 | 2014-04-09 | BlackBerry Limited | Tagging a location by pairing devices |
US20120143495A1 (en) | 2010-10-14 | 2012-06-07 | The University Of North Texas | Methods and systems for indoor navigation |
US8953570B2 (en) | 2010-11-23 | 2015-02-10 | Symbol Technologies, Inc. | Radio frequency identification system and related operating methods |
EP2485542B1 (en) | 2011-02-03 | 2019-02-27 | Sony Corporation | Portable electronic device and operation method for establishing a near field communication link |
US8583400B2 (en) | 2011-05-13 | 2013-11-12 | Google Inc. | Indoor localization of mobile devices |
WO2013020172A1 (en) | 2011-08-08 | 2013-02-14 | Mikoh Corporation | Radio frequency identification technology incorporating cryptographics |
US8555363B2 (en) | 2011-09-16 | 2013-10-08 | Google Inc. | Authenticating a user of a system using near field communication |
US20130104238A1 (en) * | 2011-10-24 | 2013-04-25 | Nokia Corporation | Method and apparatus for verifying proof of presence |
WO2013072437A1 (en) | 2011-11-18 | 2013-05-23 | Famoco | Key protected nfc tag method and system, and a method for diversify coupon on a viral distribution chain by nfc |
US10037522B2 (en) | 2012-01-17 | 2018-07-31 | Raytheon Bbn Technologies Corp. | Near-field communication (NFC) system and method for private near-field communication |
WO2013121356A2 (en) | 2012-02-13 | 2013-08-22 | Tresbu Technologies Pvt Ltd | Near field communication (nfc) based counterfeit product identification system |
US20130303085A1 (en) | 2012-05-11 | 2013-11-14 | Research In Motion Limited | Near field communication tag data management |
EP3910876A1 (en) * | 2013-03-15 | 2021-11-17 | Assa Abloy Ab | Method, system, and device for generating, storing, using, and validating nfc tags and data |
US9609515B2 (en) | 2013-03-27 | 2017-03-28 | Xerox Corporation | System and method for verifying physical proximity to a network device |
US9515836B2 (en) * | 2013-03-28 | 2016-12-06 | Xerox Corporation | System and method for location assurance using passive computational tags |
US9016562B1 (en) | 2013-12-17 | 2015-04-28 | Xerox Corporation | Verifying relative locations of machine-readable tags using composite sensor data |
US9191213B2 (en) | 2013-12-18 | 2015-11-17 | Xerox Corporation | Methods and systems for messaging with physical presence and temporal verifications |
US10027770B2 (en) * | 2014-04-21 | 2018-07-17 | International Business Machines Corporation | Expected location-based access control |
-
2016
- 2016-02-25 US US15/053,295 patent/US9747768B1/en not_active Expired - Fee Related
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3937097A1 (en) * | 2020-07-06 | 2022-01-12 | Guardtime SA | System and method for verifiably proving proximity |
Also Published As
Publication number | Publication date |
---|---|
US9747768B1 (en) | 2017-08-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
TWI599990B (en) | Method, system and communication terminal for patrol with scanning tags | |
US9747768B1 (en) | System and method for proving physical presence | |
US9911260B2 (en) | Associating external credentials with mobile devices | |
US9342974B2 (en) | Autonomous aggregated search platform and methods using the same | |
US20180144563A1 (en) | Hands-free fare gate operation | |
KR101972252B1 (en) | Method, device, program and storage medium for determining target portable device location | |
US20130135082A1 (en) | Rfid reading device and rfid tag grid for asset management | |
US20140077944A1 (en) | Personal area mapping | |
CN104392502A (en) | Two-dimensional code attendance checking system based on intelligent cell phone and application method of two-dimensional code attendance checking system based on intelligent cell phone | |
TWI622004B (en) | Transfer monitoring system and transfer monitoring method of POS terminal | |
EP2800403A1 (en) | Communication tag, system and method | |
US11917070B2 (en) | Method and system for managing a multiplicity of credentials | |
JP5304612B2 (en) | Entrance / exit management system | |
US11023624B2 (en) | Method and apparatus for locating tracked items using a multipart sensor | |
CA3033760A1 (en) | Smart commissioning for first responders in incident command system | |
US20170068959A1 (en) | User equipment, service providing device, payment system comprising the same, control method thereof and non-transitory computer-readable storage medium storing computer program recorded thereon | |
CN105046177A (en) | Proximity check for communication devices | |
US10469493B2 (en) | Mobile device, authentication device and authentication methods thereof | |
KR101297863B1 (en) | Missing protection system and method available for checking location and information with real-time through setting location information | |
US9412090B2 (en) | System, mobile communication terminal and method for providing information | |
US9016562B1 (en) | Verifying relative locations of machine-readable tags using composite sensor data | |
KR20140082949A (en) | Access control system using NFC communication and data exchange methods | |
CN103970912A (en) | Article information reporting and processing methods, devices and systems | |
US20150227855A1 (en) | Authentication processing system | |
CN205103858U (en) | Radio station management system that stands based on RFID |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: XEROX CORPORATION, CONNECTICUT Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ZEHLER, PETER J.;TREDOUX, GAVAN;RAJENDRAN, PREMKUMAR;REEL/FRAME:037828/0938 Effective date: 20160218 |
|
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN) |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
LAPS | Lapse for failure to pay maintenance fees |
Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20210829 |