Location information verification
阅读说明:本技术 定位信息验证 (Location information verification ) 是由 E·马丁洛佩兹 T·罗恩诺 K·帕柳蒂娜 于 2018-05-16 设计创作,主要内容包括:根据本发明的示例性方面,提供了一种方法,其包括:由定位信息接收机从定位信息源接收认证信息元素;基于认证信息元素和已验证定位信息源的分布式账本,请求对定位信息源的真实性的验证;以及响应于接收到对定位信息源的真实性的验证的指示,与定位信息源建立加密会话以用于接收定位信息。(According to an exemplary aspect of the invention, there is provided a method comprising: receiving, by a positioning information receiver, an authentication information element from a positioning information source; requesting verification of authenticity of the location information source based on the authentication information element and the distributed ledger of the verified location information source; and in response to receiving an indication of verification of authenticity of the location information source, establishing an encrypted session with the location information source for receiving the location information.)
1. An apparatus, comprising:
at least one processor;
at least one memory including computer program code, the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus at least to:
-receiving an authentication information element from a positioning information source;
-requesting a verification of the authenticity of a location information source based on the authentication information element and a distributed ledger of verified location information sources; and
-in response to receiving an indication of verification of authenticity of the positioning information source, establishing an encrypted session with the positioning information source for receiving positioning information.
2. An apparatus according to claim 1, wherein the apparatus is caused to verify authenticity of the received positioning information based on a signature provided with the received positioning information during the session, and the apparatus is caused to define the signal as an emulated signal in response to failing to receive an appropriate signature for the received positioning signal or failing to verify the signature associated with the signal.
3. The apparatus of claim 1 or 2, wherein the locating information source is a locating device and the authentication information element is a public encryption key stored in the distributed ledger and associated with a secret encryption key of the locating device.
4. An apparatus according to any of the preceding claims, wherein the apparatus is caused to establish a shared key for the session with the positioning information source, and to verify the authenticity of the received positioning information based on the shared key.
5. The apparatus of any preceding claim, wherein the distributed ledger is a private blockchain ledger generated by a transaction of a manufactured positioning device added by a positioning device manufacturer, and the apparatus is caused to request verification of the authenticity of the positioning information source based on the blockchain ledger through an application programming interface or one or more intermediate blockchain nodes.
6. An apparatus according to any preceding claim, wherein the apparatus is caused to send a digital signature to an access control device that controls access to a distributed store of verified location devices, the access control device being configured to allow verification of the public key based on the distributed store for authenticated authorization requesting entities.
7. A mobile communication device comprising the apparatus of any of the preceding claims and the positioning information source.
8. A method, comprising:
receiving, by a positioning information receiver, an authentication information element from a positioning information source;
requesting verification of authenticity of a location information source based on the authentication information element and a distributed ledger of a verified location information source; and
in response to receiving an indication of verification of authenticity of the location information source, establishing an encrypted session with the location information source for receiving location information.
9. The method of claim 8, further comprising:
verifying the authenticity of the received positioning information based on a signature provided with the received positioning information during the session; and
in response to a failure to receive an appropriate signature for the received positioning signal or a failure to verify the signature associated with the signal, defining the signal as an emulated-signal emulation.
10. The method of claim 8 or 9, wherein the location information source is a location device and the authentication information element is a public encryption key stored in the distributed ledger and associated with a secret encryption key of the location device.
11. The method of any preceding claim 8 to 10, further comprising:
establishing a shared key for the session with the positioning information source; and
verifying the authenticity of the received positioning information based on the shared key.
12. The method of any preceding claim 8 to 11, wherein the distributed ledger is a private blockchain ledger generated by a transaction of a manufactured positioning device added by a positioning device manufacturer, and verification of the authenticity of the positioning information source is requested on the basis of the blockchain ledger by an application programming interface or one or more intermediate blockchain nodes.
13. The method of any preceding claim 8 to 12, further comprising:
sending a digital signature to an access control device that controls access to a distributed store of verified location devices, the access control device configured to allow verification of the public key based on the distributed store for authenticated authorization requesting entities.
14. A computer program configured to cause a method according to at least one of claims 7 to 13 to be performed when executed in a computer.
15. A non-transitory computer-readable medium having stored thereon a set of computer-readable instructions that, when executed by at least one processor, cause an apparatus to perform the method of any of claims 7-13.
Technical Field
The present invention relates to verification of location information, and more particularly to verifying the authenticity of received location signals or data.
Background
A GPS (global positioning system) is a global navigation satellite system that provides a GPS receiver with geographical location and time information in all weather conditions, anywhere near or on the earth where the lines of sight of four or more GPS satellites are unobstructed.
Location emulation refers to bypassing a positioning device, such as a GPS receiver of the device, to feed custom geographical location coordinates to services running in the device. This possibility is a useful software developer tool, but misusing it for spoofing location-based applications is a current problem.
Location impersonation can result in significant losses, for example, to location-based internet services. Some popular internet services use GPS location to locate people in your vicinity and they charge a premium to allow browsing of people outside of your area. Furthermore, online games with in-app purchase functionality are based entirely on players moving in the real world with their own devices. Robotic program attacks, in which an automated player floods the entire game, can cause legitimate players to abandon the game and have a significant physical impediment to having to change their position in the real world. However, if position emulation is used, the player's movements may be simulated using an emulator running on the stationary machine. An upper speed limit may be set to move between subsequent GPS signals. However, there is a need for improvement with respect to detecting false GPS signals.
Disclosure of Invention
The invention is defined by the features of the independent claims. Specific embodiments are defined in the dependent claims. According to a first aspect of the present invention, there is provided an apparatus comprising: at least one processor; at least one memory including computer program code, the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus at least to: receiving an authentication information element from a positioning information source; requesting verification of authenticity of the location information source based on the authentication information element and the distributed ledger of the verified location information source; and establishing an encrypted session with the location information source for receiving the location information in response to receiving the indication of the verification of the authenticity of the location information source.
According to a second aspect of the invention, there is provided a method comprising: receiving, by a positioning information receiver, an authentication information element from a positioning information source; requesting verification of authenticity of the location information source based on the authentication information element and the distributed ledger of the verified location information source; and in response to receiving an indication of verification of authenticity of the location information source, establishing an encrypted session with the location information source for receiving the location information. According to an embodiment, the apparatus is caused to verify the authenticity of the received positioning information based on a signature provided with the received positioning information during the session, and is caused to define the signal as an emulated signal in response to failing to receive an appropriate signature for the received positioning signal or failing to verify a signature associated with the signal.
According to an embodiment, the distributed ledger is a private blockchain ledger generated by a transaction of a manufactured positioning device added by a positioning device manufacturer, and verification of authenticity of a positioning information source is requested based on the blockchain ledger through an application programming interface or one or more intermediate blockchain nodes.
Drawings
FIG. 1 illustrates an exemplary system capable of supporting at least some embodiments of the invention;
FIG. 2 illustrates a method in accordance with at least some embodiments of the inventions;
FIG. 3 illustrates an exemplary transaction record;
figure 4 illustrates signaling in accordance with at least some embodiments of the invention;
FIG. 5 illustrates a method in accordance with at least some embodiments of the inventions;
FIG. 6 illustrates an apparatus according to at least some embodiments of the inventions.
Detailed Description
A method and apparatus are now provided that facilitate real-time verification of location information by using a distributed ledger, which refers to a distributed network, storage, or database that stores at least authentication information for verifying the authenticity of location devices and/or signals. A non-limiting example of such a distributed ledger is a blockchain ledger.
FIG. 1 illustrates an exemplary system in accordance with at least some embodiments of the invention. The positioning information source 12 provides position information or positioning related information to the
The
Fig. 1 shows that the
In some embodiments,
The
An Application Programming Interface (API) may be provided in the
The
The
Fig. 2 illustrates a method according to some embodiments. The method may be implemented, for example, by the
An authentication information element is received 200 from a positioning information source for identifying or authenticating the positioning information source, such as a GPS receiver. The authentication information element may be received during authentication of the positioning device or during reception of the positioning information.
Based on the authentication information element and the distributed ledger of the verified location information source, a verification of the authenticity of the location information source is requested 210. Thus, the request to validate the source based on the distributed ledger may include at least an authentication information element and/or some other identification of the location information source. A particular request may be sent for another device or unit, such as
In response to receiving an indication of verification of authenticity of the location information source, an encrypted session is established 220 with the location information source for receiving the location information. In response to a verification failure, the information source is deemed to be untrusted, and the received positioning signal may be set or marked as an emulated signal.
As part of
In one embodiment, the authenticity of the received location information is verified based on a signature provided with the received location information. A shared key for the session may be established with the location information source and the authenticity of the received location information may be verified based on the shared key. Thus, in response to a failure to receive an appropriate signature for the received positioning signal or a failure to verify a signature associated with the signal, the signal is defined as an emulated signal.
In some embodiments, the authentication information element is a public encryption key stored in the distributed ledger and associated with a secret encryption key of the locating information source 12. However, it should be understood that various other options and authentication information may be used to set authenticity verification of the information source. For example, an authenticity verification method based on a shared key such as a secret password may be applied. Thus, the
The distributed ledger may be a private blockchain ledger generated by transactions of manufactured location devices added by location device manufacturers. Thus, verification of authenticity of a location information source may be requested based on the blockchain ledger through an application programming interface or one or more intermediate blockchain nodes.
According to some embodiments, a distributed ledger of verified device public keys, which may be referred to as ledger a, is maintained and used for verification of the authenticity of the location information source 12. Examples of which are provided below.
A communication network, such as a blockchain based network, is established between authenticated positioning device manufacturers. After a successful verification process (which may be performed off-line), each manufacturer possesses a pair of asymmetric keys that can be used for Digital Signature Authentication (DSA). The network is private and can only be joined by other manufacturers with the approval of the current member in a verification process that can be performed offline. In an exemplary embodiment, the purpose of the network is to maintain a record of the registered public key corresponding to the manufactured GPS receiver device.
Each
In embodiments employing a blockchain based system, blockchain status information stored in or as a blockchain ledger shared by
Fig. 3 shows a simplified example of a blockchain
In an embodiment,
Once a new tile is established that includes information about the authenticated device, the tile chain becomes longer. The more reliable the transaction is considered, the greater the number of blocks established since the block in which the transaction was included. This is because transactions are hashed into blockchains, and as blockchains become longer, differences in blockchains are resolved. In particular, maliciously modifying a transaction in a chunk that is remote in the chain will involve redoing the search attestation work for all subsequent chunks, as the inputs to the hash function for the chunk that includes the transaction will be altered, resulting in the resulting hash value and attestation in that chunk no longer being placed in the desired region in the output space of the hash function.
In another embodiment, a distributed ledger data structure is implemented without a block chaining structure, such as adding a public key in each newly verified block to a Distributed Relational Database (DRDA). In this way, a distributed ledger of verified location device public keys is achieved.
Once a set of verified positioning information sources is established, the geographic location based software service provider becomes a provider interested in using the data. The authenticated device public key from distributed ledger a may be made available by the location information source (receiver) device manufacturer by means of an API that will allow the software services client to check whether the public key corresponds to an authenticated device.
For example, an access control unit or device may be provided by
In some embodiments, access control to a distributed (first) ledger (which may be referred to as ledger a) of validated location devices is set up based on another (second) distributed ledger (which may be referred to as ledger B). Ledger B may include identification or authentication information for a location information receiver, such as a software services client, that is authorized to check, access, or receive this information for a verified location device, e.g., via an API for this purpose.
Due to the decentralized nature of distributed ledger a, distributed ledger B may be similarly distributed. In an embodiment, DSA may be performed for the requesting
Consensus regarding distributed ledger B can be technically implemented in the same way as the first distributed ledger of authenticated devices, and can be applied in a similar format as shown in fig. 3.
With reference to fig. 4, let us consider an exemplary communication session between a GPS receiver GPSR and a location based services LBS. Triggered by a software service request 400 for location information (PI), such as the current location of the
Service request 404 verifies the public key. In the example of fig. 4, the request is sent to a first authentication node (VN1), such as
In some alternative embodiments, VN1 may check ledger B directly, PK requests 404 may be sent directly to APIs of ledger a, or VN2 checks ledger a after authorization based on checking ledger B.
Request 404 will only pass if LBS is included in ledger B. If the receiver's public key is not included in ledger A, the signal will have been treated as an emulated signal, which may be indicated in the response.
In response to the response 414 indicating that the GPS receiver is authenticated, an encryption session may be established. In this example, at the start of a session between the GPS receiver and the location-based software service, a shared key consisting of M bits is established 416. The shared key may be established, for example, by using the Diffie-Hellman algorithm.
The received PI signal 418 is verified 420, for example, periodically. In an example, a session may include N signals and be divided into blocks of N/M signals. Thus, an M-bit shared key may be established. If an integer number of M tiles needs to be implemented, initial or final padding may be added. The software service verifies the presence or absence of the signed signal via the API according to the corresponding bit of the M-bit shared secret. In the real-time version of this example, the first p bits of the shared key indicate the periodicity of signature verification, that is, the p real-time location information points constitute a signed or unsigned set. The remaining M-p bits indicate in order whether the subsequent set of real-time anchor points gets a signature ("1") or is not signed ("0"). If the communication is longer than the set of M-p points and therefore M-p bits are consumed, they are used again from the beginning. Thus, the verifier expects that only some of the point sets are signed according to the shared key.
If either an undesired signature is received or a desired signature is not received, the GPS signal is marked as an emulated signal as a result of the
GPS spoofing is an attack that attempts to fool a GPS receiver by broadcasting incorrect GPS signals that are structured to look like a set of normal GPS signals, or by rebroadcasting real signals captured elsewhere or at different times. GPS spoofing attacks are clearly problematic. To illustrate this, let us consider a common type known as "carry-off" attack, which starts by broadcasting a signal that is synchronized with the true signal observed by the target receiver. The power of the spurious signal may gradually increase and be extracted from the real signal. Such an attack does not directly control the driving of the mobile system. Instead, it tells the GPS-based autopilot system that it is not on its route, and thus expects it to "correct" its trajectory in such a way that the mobile system enters an area decided by an attacker.
According to an aspect of the present invention, there is provided a method for peer-to-peer consensus based positioning signal authentication, as illustrated in fig. 5. There is also provided an apparatus, comprising: at least one processor, at least one memory including computer program code, the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus at least to: receiving 500 a cryptographically signed location signal report reported by a mobile device and stored in or sent to a decentralized network; verifying 510 the location signal reported in the report based on at least one of: location information of at least one cell associated with the mobile device, signal originating satellite identification information in the received location report message, a device identifier of the mobile device, and a distance between earlier reported locations; and sending 520 an indication of the result of the verification to the distributed network. The satellite identification information may be obtained based on satellite position data associated with the received identifier.
The apparatus may be a cellular mobile communications system base station, a base station controller, or a radio network controller configured to communicate with a mobile device.
According to an embodiment, the distributed network is a blockchain based network and receives location reports from blockchain clients in the mobile devices. A light blockchain client in a mobile device may be installed in a device such as a smartphone that has an embedded GPS receiver and is further provided with a location-based software service (as the positioning information receiver 10). For example, referring to the variation of fig. 1, the
The apparatus may be configured to operate as a complete node in a blockchain based network. According to an embodiment, the apparatus is caused to generate a blockchain transaction comprising indicating and causing a mechanism of consensus between blockchain nodes and adding a new blockchain in response to verification of the transaction. The transaction is included in a block of the blockchain with other complete or mined nodes, such as base stations, following a consensus algorithm such as PoS, PoW or PBFT.
According to an embodiment, the apparatus is caused to verify the location information received in the report on the basis of triangulation of the location of the mobile device based on the distance of the mobile device to the neighbouring base station. The device has access to cell ID data and is therefore able to triangulate the location of the customer based on their distance to different base stations.
According to an embodiment, the apparatus is caused to define or mark the positioning signal as an emulated signal in response to a verification failure, and provide an indication in the distributed network that the reported positioning signal from the mobile device is the emulated signal. Accordingly, an alert to at least one of the mobile device and a service to which a positioning signal from the mobile device has been applied may be caused in response to a predetermined number of simulated signals being reported for the mobile device within a given time period.
Both the location information source 12 and the
According to yet another embodiment, the apparatus is caused to receive a report message from the short-range radio, the report message including the short-range radio identifier and location information from a positioning device of the mobile device. The apparatus may be caused to communicate with a short-range radio in a distributed network to perform at least one of: validating the reported location signal; and sending an indication of the result of the verification. In another example, a blockchain client may thus serve as a node in a decentralized network consisting of devices communicating within a short distance using radio signals such as bluetooth, WiFi or even NFC.
A device in a short-range network may send a signed message over the network, including the MAC address of the corresponding radio transceiver and the GPS location from its own GPS receiver. The device may use the MAC address and the distance between reported locations within a certain range to verify the presence of the transmitted message. A mechanism of light consensus, e.g. based on majority voting, may be established between the devices to mark potential fraud events to the corresponding devices. These flags are useful for both GPS receivers and location-based software services.
The above embodiments may be combined in various ways, the features of which allow to avoid or at least reduce GPS spoofing. Embodiments may correspond to two modes of operation of a blockchain client of a device. The apparatus may be configured to use a first mode (employing a base station or other mobile network element for validating location signals) in the absence of nearby radios, and a second mode (between mobile devices in a short-range network) when suitable nearby radios are available. As another example, the
An electronic device comprising electronic circuitry may be a means for implementing at least some embodiments of the invention and capable of performing at least some of the features described above. The apparatus may be or may be included in a computer, laptop computer, tablet computer, cellular telephone, machine-to-machine (M2M) device (e.g., a sensor device), wearable device, or any other apparatus that is provided with radio communication capabilities. In another embodiment, means for performing the functions described above are included in such a device, for example the means may comprise circuitry, such as a chip, chipset, microcontroller, or combination of these in any of the devices described above.
FIG. 6 illustrates an exemplary apparatus capable of supporting at least some embodiments of the invention. An
Included in
A computer program and a non-transitory computer readable medium are also provided, the non-transitory computer readable medium having stored thereon a set of computer readable instructions, which when executed by at least one processor, cause an apparatus to perform the method of any of the embodiments shown above. For example, the computer program and computer readable instructions may be configured to cause an apparatus to perform at least some of the features shown in connection with fig. 2, 4 and 5.
The
The
The
The
It is to be understood that the disclosed embodiments of the invention are not limited to the particular structures, process steps, or materials disclosed herein, but extend to equivalents thereof as would be recognized by those ordinarily skilled in the relevant arts. It is also to be understood that the terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting.
Reference in the specification to one embodiment or an embodiment means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the invention. Thus, the appearances of the phrases "in one embodiment" or "in an embodiment" in various places throughout this specification are not necessarily referring to the same embodiment. Those skilled in the art will appreciate that the embodiments described above can be combined in various ways. The embodiments shown in connection with fig. 1 to 5 may be used individually or further combined together. For example, the embodiment illustrated in connection with fig. 5 may be combined with at least some of the embodiments illustrated in connection with fig. 2 and 4.
Reference may be made herein to various embodiments and examples of the invention and alternatives for various components thereof. It should be understood that such embodiments, examples, and alternatives are not to be construed as actual equivalents of each other, but are to be considered as separate and autonomous representations of the invention.
Furthermore, the described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the previous description, numerous specific details are provided, such as examples of lengths, widths, shapes, etc., to provide a thorough understanding of embodiments of the invention. One skilled in the relevant art will recognize, however, that the invention can be practiced without one or more of the specific details, or with other methods, components, materials, and so forth. In other instances, well-known structures, materials, or operations are not shown or described in detail to avoid obscuring aspects of the invention.
While the above examples illustrate the principles of the invention in one or more particular applications, it will be apparent to those of ordinary skill in the art that numerous modifications in form, usage and details of implementation can be made without the exercise of inventive faculty, and without departing from the principles and concepts of the invention. Accordingly, it is not intended that the invention be limited, except as by the appended claims.
The verbs "comprise" and "comprise" are used in this document as open-ended limitations that neither exclude nor require the presence of unrecited features. The features recited in the dependent claims may be combined with one another in any desired manner, unless explicitly stated otherwise. Furthermore, it should be understood that the use of "a" or "an" in this document, i.e. the singular, does not exclude a plurality.
INDUSTRIAL APPLICABILITY
At least some embodiments of the invention find industrial application in communications.
List of abbreviations
API application programming interface
ASIC specific integrated circuit
BCBS block chain based storage
CHAP challenge handshake authentication protocol
DRDA distributed relational database
DSA digital signature authentication
Extensible authentication protocol for EAP
FPGA field programmable gate array
GSM global mobile communication system
IC integrated circuit
LTE Long term evolution
M2M machine-to-machine
MAC medium access control
NFC near field communication
P2P Peer-to-peer
PBFT practical Byzantine fault tolerance
PoS equity certification
PoW workload attestation
PPP point-to-point authentication protocol
UI user interface
WCDMA wideband code division multiple access
WiMAX worldwide interoperability for microwave access
WLAN wireless local area network
- 上一篇:一种医用注射器针头装配设备
- 下一篇:位置测量用终端装置、计算机程序及系统