US 11,706,026 B2
Location aware cryptography
Ambuj Kumar, Sunnyvale, CA (US); Mark Evan Marson, Carlsbad, CA (US); and Daniel Robert Beitel, San Francisco, CA (US)
Assigned to Cryptography Research, Inc., San Jose, CA (US)
Filed by Cryptography Research, Inc., San Jose, CA (US)
Filed on Jul. 30, 2021, as Appl. No. 17/389,746.
Application 17/389,746 is a continuation of application No. 16/445,708, filed on Jun. 19, 2019, granted, now 11,082,224.
Application 16/445,708 is a continuation of application No. 15/900,722, filed on Feb. 20, 2018, granted, now 10,341,106, issued on Jul. 2, 2019.
Application 15/900,722 is a continuation of application No. 14/949,254, filed on Nov. 23, 2015, granted, now 9,923,719, issued on Mar. 20, 2018.
Claims priority of provisional application 62/089,700, filed on Dec. 9, 2014.
Prior Publication US 2022/0021534 A1, Jan. 20, 2022
This patent is subject to a terminal disclaimer.
Int. Cl. H04L 9/30 (2006.01); H04L 9/32 (2006.01); H04W 12/02 (2009.01); G06F 21/60 (2013.01); H04L 9/08 (2006.01); H04L 9/40 (2022.01); H04W 12/63 (2021.01); H04W 4/40 (2018.01); H04W 4/46 (2018.01)
CPC H04L 9/3066 (2013.01) [G06F 21/606 (2013.01); H04L 9/0872 (2013.01); H04L 9/3263 (2013.01); H04W 12/02 (2013.01); G06F 2221/2107 (2013.01); G06F 2221/2111 (2013.01); H04L 63/0442 (2013.01); H04L 63/107 (2013.01); H04W 4/40 (2018.02); H04W 4/46 (2018.02); H04W 12/63 (2021.01)] 20 Claims
OG exemplary drawing
 
1. A method of operating a first device, the method comprising:
initiating a communication session with a second device;
generating first location information associated with the first device;
retrieving a public key and a private key associated with the first device;
generating a location-based private key based on the first location information and the private key;
transmitting a public key and a certificate to the second device;
receiving, from the second device, a session key encrypted based on the public key and second location information associated with the second device; and
communicating encrypted data with the second device in the communication session, wherein the encrypted data is encrypted with the session key.