Browse Prior Art Database

A means to prove beyond reasonable doubt, that an identified person was at a specific location at a specific time

IP.com Disclosure Number: IPCOM000213380D
Publication Date: 2011-Dec-13
Document File: 2 page(s) / 117K

Publishing Venue

The IP.com Prior Art Database

Abstract

Where it is necessary for a person to prove that they were at a particular location at a particular time, an encrypted combination of their biometric and the time and location the biometric was taken can be used as a token for that proof. This is particularly useful for environments where no network availability means that realtime identity checking is not possible. The idea illustrates some useful contexts, the justification for the use of such a mechanism and describes, at a high level, the logical parts required to implement a solution.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 51% of the total text.

Page 01 of 2

A means to prove beyond reasonable doubt , that an identified person was at a specific location at a specific time

There are a variety of cases where it is necessary for a person to prove that they were at a particular location at a particular time. For example, a security guard, making a tour of inspection of a sensitive government, industrial, commercial or military site or perhaps, an oilfield pipeline maintenance engineer or marine engineer. This disclosure describes a means by which the assertion that a particular person was where they said they were at a particular time can be confidently proven, within the bounds of confidence provided by whatever level of encryption is chosen to implement a solution.

Existing solutions, such as GPS or mobile phone triangulation, signatures and others are based on trust and primarily indicate, rather than prove that a location visit was made, and perhaps the time of the visit. None of these prove who it was that visited the location. Another class of solution may provide a stronger indication of the genuine identity of the location visitor but would require some form of reasonably sophisticated computing capability and communications infrastructure. An example might be a biometric scanner, at the location, which checks the identity of the visitor at the time and place of the visit and updates a local or remote record to verify the identity, time and place data of the visit. Unlike the proposal in this disclosure, these type of solutions require network connectivity to work.

This disclosure describes a mechanism that can be implemented on low power and self sufficient hardware, which is communications isolated, but which provides a strong degree of confidence in the identity of the person visiting and the time and location of the visit, for example, for use in auditing security or maintenance.

The device is attached firmly to the location that a visitor may have to prove they have visited at a certain time. On visiting the location, the visitor provides some proof of their identity. This is most likely to be a biometric measure. The device then creates a file, containing the biometric scan data, the device's unique ID and a timestamp. The device encrypts the file with a sufficiently strong encryption for the application context, which the owner or responsible authority has the private key to unlock. This encrypted file is provided back to the visitor as a toke...