METHOD AND DEVICE TO ARRANGE PROTECTION OF LOCATION INFORMATION AND TO CONTROL ACCESS WITH APPLICATION OF LOCATION INFORMATION Russian patent published in 2011 - IPC H04L29/06 

Abstract RU 2428808 C2

FIELD: information technologies.

SUBSTANCE: information is generated on location of a wireless transfer/reception unit (WTRU) with the help of a location detection object; the location detection object integrity is verified with the help of a confidence processing module in WTRU; information on location generated with the help of the location detection object is recognised, if the location detection object integrity has been verified; and the location information integrity is reported.

EFFECT: improved immunity of location information.

15 cl, 5 dwg

Similar patents RU2428808C2

Title Year Author Number
DIGITAL RIGHTS CONTROL USING PROCEDURES OF CONFIDENCE PROCESSING 2007
  • Singkhal Amit Ks.
  • Cha Inkhiok
  • Shakh Jodzhendra S.
RU2419235C2
TRUSTED INTEGRITY MANAGER (TIM) 2010
  • Tavo Sebast'En
  • Nakhari Khadi
  • Djupra Ehrik
RU2523304C2
SUPPORTING EMERGENCY CALLS IN MODE OF CHANNELS SWITCHING 2006
  • Ehdzh Stefen
  • Barroz Kirk
  • Vakhter Andreas
RU2396733C2
METHOD OF AUTHORISING OPERATION TO BE PERFORMED ON TARGETED COMPUTING DEVICE 2014
  • Stern Allon Dzh.
RU2675902C2
HOME (e)NODE-B WITH NEW FUNCTIONALITY 2008
  • Mukerdzhi Radzhat P.
  • Somasundaram Shankar
  • Olvera-Ehrnandes Julizis
  • Shakh Jodzhendra K.
  • Chitrapu Prabkhakar R.
  • Cha Inkhiok
RU2429590C2
TRUSTED REMOTE ATTESTATION AGENT (TRAA) 2010
  • Nakhari Khadi
RU2537795C2
MOBILE COMMUNICATION DEVICE AND METHOD FOR OPERATION THEREOF 2014
  • Stern Allon Dzh.
  • Khejli Dzhon
RU2673969C2
MOBILE COMMUNICATION DEVICE AND METHOD FOR OPERATION THEREOF 2014
  • Stern Allon Dzh.
RU2672712C2
ATTESTATION OF HOST CONTAINING TRUSTED EXECUTION ENVIRONMENT 2015
  • Fergyuson Nils T.
  • Samsonov Evgenij Anatolevich
  • Kinskhumann
  • Chandrashekar Samartkha
  • Messek Dzhon Entoni
  • Novak Mark Fishel
  • Makkarron Kristofer
  • Temkhejn Amitabkh Prakash
  • Van Tsyan
  • Krus Devid Mettyu
  • Ben-Zvi Nir
  • Vinberg Anders Bertil
RU2679721C2
METHOD TO CONTROL ACCESS TO SECURED NETWORK BASED ON THREE-ELEMENT AUTHENTICATION OF PEER-TO-PEER OBJECTS 2008
  • Sjao Juehlehj
  • Tsao Tszjun'
  • Laj Sjaolun
  • Khuan Chzhehn'Khaj
RU2444156C1

RU 2 428 808 C2

Authors

Cha Inkhiok

Shakh Jodzhendra K.

E Chun'Sjuan'

Dates

2011-09-10Published

2008-01-25Filed