Intertrust Technologies Corporation Patent applications |
Patent application number | Title | Published |
20150067837 | SOFTWARE SELF-CHECKING SYSTEMS AND METHODS - Software self-checking mechanisms are described for improving software tamper resistance and/or reliability. Redundant tests are performed to detect modifications to a program while it is running. Modifications are recorded or reported. Embodiments of the software self-checking mechanisms can be implemented such that they are relatively stealthy and robust, and so that it they are compatible with copy-specific static watermarking and other tamper-resistance techniques. | 03-05-2015 |
20140380408 | Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions and rights management - An integrated, modular array of administrative and support services are provided for electronic commerce and electronic rights and transaction management. These administrative and support services supply a secure foundation for conducting transaction-related capabilities over electronic networks, and can also be adapted to the specific needs of electronic commerce value chains. In one embodiment a Distributed Commerce Utility having a secure, programmable, distributed architecture provides these administrative and support services. The Distributed Commerce Utility may comprise a number of Commerce Utility Systems. These Commerce Utility Systems provide a web of infrastructure support available to, and reusable by, the entire electronic community and/or many of its participants. Different support functions can be collected together in hierarchical and/or networked relationships to suit various business models or other objectives. Modular support functions can be combined in different arrays to form different Commerce Utility Systems for different design implementations and purposes. | 12-25-2014 |
20140351911 | SECURE AUTHORIZATION SYSTEMS AND METHODS - Systems and methods for secure user authentication are described. In certain embodiments, a client device such as a smartphone may be provisioned with a secure key and/or other secret information. The client device may be used to generate unique secure tokens and/or other credentials used in connection with an authentication processes. A user may provide the generated tokens and/or other credentials to a service provider in connection with a request to access a managed service. The validity of the generated tokens and/or other credentials may be verified by an authentication service in communication with the service provider. | 11-27-2014 |
20140325587 | BIOINFORMATIC PROCESSING SYSTEMS AND METHODS - The present disclosure relates to systems and methods for facilitating trusted handling of genomic and/or other bioinformatic information. Certain embodiments may facilitate policy-based governance of access to and/or use of bioinformatic information, improved interaction with and/or use of distributed bioinformatic information, parallelization of various processes involving bioinformatic information, and/or reduced user involvement in bioinformatic workflow processes, and/or the like. Further embodiments may provide for memoization processes that may persistently store final and/or intermediate results of computations performed using genomic data for use in connection with future computations. | 10-30-2014 |
20140196135 | SECURE AUTHENTICATION SYSTEMS AND METHODS - Systems and methods are provided for authentication by combining a Reverse Turing Test (RTT) with password-based user authentication protocols to provide improved resistance to brute force attacks. In accordance with one embodiment of the invention, a method is provided for user authentication, the method including receiving a username/password pair associated with a user; requesting one or more responses to a first Reverse Turing Test (RTT); and granting access to the user if a valid response to the first RTT is received and the username/password pair is valid. | 07-10-2014 |
20140148203 | Content Publishing Systems and Methods - A system for publishing digital content is described which, in one embodiment, includes a beacon device associated with a first user configured to transmit identification information and information indicating its current position. A browsing device includes a display configured and adapted to display to a second user a representation of a local geographical area, and to selectively display to the second user content information associated with the first user, based at least in part on whether the location of the beacon device is within the local geographical area. | 05-29-2014 |
20140143889 | SYSTEMS AND METHODS FOR SECURE TRANSACTION MANAGEMENT AND ELECTRONIC RIGHTS PROTECTION - The present disclosure provides systems and methods for electronic commerce including secure transaction management and electronic rights protection. Electronic appliances such as computers employed in accordance with the present disclosure help to ensure that information is accessed and used only in authorized ways, and maintain the integrity, availability, and/or confidentiality of the information. Secure subsystems used with such electronic appliances provide a distributed virtual distribution environment that may enforce a secure chain of handling and control, for example, to control and/or meter or otherwise monitor use of electronically stored or disseminated information. Secure distributed and other operating system environments and architectures, employing, for example, secure semiconductor processing arrangements that may establish secure, protected environments at each node. These techniques may be used to support an end-to-end electronic information distribution capability that may be used, for example, utilizing the “electronic highway.” | 05-22-2014 |
20140143216 | SYSTEMS AND METHODS FOR MATCHING, SELECTING, NARROWCASTING, AND/OR CLASSIFYING BASED ON RIGHTS MANAGEMENT AND/OR OTHER INFORMATION - Rights management information is used at least in part in a matching, narrowcasting, classifying and/or selecting process. A matching and classification utility system comprising a kind of Commerce Utility System is used to perform the matching, narrowcasting, classifying and/or selecting. The matching and classification utility system may match, narrowcast, classify and/or select people and/or things, non-limiting examples of which include software objects. The Matching and Classification Utility system may use any pre-existing classification schemes, including at least some rights management information and/or other qualitative and/or parameter data indicating and/or defining classes, classification systems, class hierarchies, category schemes, class assignments, category assignments, and/or class membership. The Matching and Classification Utility may also use at least some rights management information together with any artificial intelligence, expert system, statistical, computational, manual, or any other means to define new classes, class hierarchies, classification systems, category schemes, and/or assign persons, things, and/or groups of persons and/or things to at least one class. | 05-22-2014 |
20140129599 | PERSONALIZED DATA MANAGEMENT SYSTEMS AND METHODS - This disclosure relates to systems and methods for managing data associated with a user using a personalized cloud storage platform operating as a centralized repository for user data generated from a variety of sources and/or user devices. By centralizing the storage and/or management of personal data that would conventionally be confined between multiple information silos, embodiments of the systems and methods disclosed herein may improve the ability of a user to control their personal data, facilitate utilization of their personal data in a variety of ways not offered by services associated with the silos, and/or allow a user to centrally manage their personal data. Further embodiments disclosed herein allow a user to define one or more policies or other rules associated with personal data stored in their personal cloud. | 05-08-2014 |
20140129139 | VEHICLE CHARGING PATH OPTIMIZATION SYSTEMS AND METHODS - Systems and methods are described for determining an optimal path and/or route to a destination for a vehicle. Embodiments of the systems and methods disclosed herein facilitate intelligent route planning to a desired destination by a vehicle. In certain embodiments, a path and/or route to a desired destination is determined that accounts for vehicle charging and/or refueling requirements. Disclosed systems and methods may further generate and distribute reservation information ensuring availability of vehicle charging and/or refueling stations along a selected route. Further embodiments disclosed herein may implement information targeting services in connection with intelligent route planning. | 05-08-2014 |
20140082741 | DATA PROTECTION SYSTEMS AND METHODS - Systems and methods are provided for protecting electronic content from the time it is packaged through the time it is experienced by an end user. Protection against content misuse is accomplished using a combination of encryption, watermark screening, detection of invalid content processing software and hardware, and/or detection of invalid content flows. Encryption protects the secrecy of content while it is being transferred or stored. Watermark screening protects against the unauthorized use of content. Watermark screening is provided by invoking a filter module to examine content for the presence of a watermark before the content is delivered to output hardware or software. The filter module is operable to prevent delivery of the content to the output hardware or software if it detects a predefined protection mark. Invalid content processing software is detected by a monitoring mechanism that validates the software involved in processing protected electronic content. Invalid content flows can be detected by scanning the information passed across system interfaces for the attempted transfer of bit patterns that were released from an application and/or a piece of content management software. | 03-20-2014 |
20140074813 | MEDIA DISCOVERY AND PLAYLIST GENERATION - A computer implemented method and system that generates a video playlist having recommended videos based on a user query object is disclosed. A user query object is used to search for a number of web pages. Summaries are generated for the returned web page search results. Valuable terms and phrases from those summaries may be extracted and used to search video storage sites based on the original user query. Playable videos returned from the video storage sites may be compared to the user query or to the extracted terms and phrases in order to rank the videos, and the most relevant videos may be returned. Those videos may be displayed to the user as a playlist in an Internet browser having an embedded video player. | 03-13-2014 |
20140068249 | TRUST MANAGEMENT SYSTEMS AND METHODS - The present invention provides systems and methods for making efficient trust management decisions. A trust management engine is provided that processes requests for system resources, authorizations or certificates, and the identity of one or more root authorities that are ultimately responsible for granting or denying the requests. To determine whether a request should be granted, the trust management engine identifies a set principals from whom authorization may flow, and interprets each of the certificates as a function of the state of one or more of the principals. The processing logic iteratively evaluates the functions represented by the certificates, updates the states of the principals, and repeats this process until a reliable determination can be made as to whether the request should be granted or denied. The certificates may be evaluated until the state of the root authority indicates that the request should be granted, or until further evaluation of the certificates is ineffective in changing the state of the principals. | 03-06-2014 |
20140064484 | METHODS AND APPARATUS FOR PERSISTENT CONTROL AND PROTECTION OF CONTENT - A novel method and apparatus for protection of streamed media content is disclosed. In one aspect, the apparatus includes control means for governance of content streams or content objects, decryption means for decrypting content streams or content objects under control of the control means, and feedback means for tracking actual use of content streams or content objects. The control means may operate in accordance with rules received as part of the streamed content, or through a side-band channel. The rules may specify allowed uses of the content, including whether or not the content can be copied or transferred, and whether and under what circumstances received content may be “checked out” of one device and used in a second device. The rules may also include or specify budgets, and a requirement that audit information be collected and/or transmitted to an external server. In a different aspect, the apparatus may include a media player designed to call plugins to assist in rendering content. A “trust plugin” is disclosed, along with a method of using the trust plugin so that a media player designed for use with unprotected content may render protected content without the necessity of requiring any changes to the media player. In one aspect, the streamed content may be in a number of different formats, including MPEG-4, MP3, and the RMFF format. | 03-06-2014 |
20140058952 | SYSTEMS AND METHODS FOR CONDUCTING TRANSACTIONS AND COMMUNICATIONS USING A TRUSTED THIRD PARTY - Systems and methods are provided for performing transactions and managing communications using a trusted third party. In one embodiment, a sender transfers an encrypted version of a file (such as a digitally encoded audio track, movie, document, or the like) to someone who wishes to receive it. The receiver computes a first hash of at least a portion of the encrypted data content, and sends the first hash to a third party configured to compare at least a portion of the first hash to at least a portion of a second hash. The receiver receives a file decryption key from the third party, and decrypts at least the portion of the received encrypted data content with the decryption key. In some cases, multiple hashes of the encrypted data content may be computed, each using a different portion of the encrypted data content. | 02-27-2014 |
20140045524 | Policy Determined Accuracy of Transmitted Information - Systems and methods for controlling accuracy of transmitted information are described. A package is assembled based on a numerical value, such as a measurement, and one or more policies associated with the sender. When the package is received by a receiver, it is unpacked to yield a second value representing the numerical value and having a reduced accuracy with respect to the first value. The accuracy reduction depends on policies associated with the receiver and/or the sender. Examples of numerical values in different applications include geo-location data, medical data, and financial data. | 02-13-2014 |
20140006791 | SYSTEMS AND METHODS USING CRYPTOGRAPHY TO PROTECT SECURE COMPUTING ENVIRONMENTS | 01-02-2014 |
20130332987 | DATA COLLECTION AND ANALYSIS SYSTEMS AND METHODS - This disclosure relates to systems and methods for the secure management of digital or electronic information relating to a user. In certain embodiments, systems and methods disclosed herein may allow for personal information related to a user to be managed, shared, and/or aggregated between one or more devices used by the user to consume content. In further embodiments, systems and methods disclosed herein may be used to ensure privacy and/or security of user personal information. | 12-12-2013 |
20130297941 | METHODS AND SYSTEMS FOR ENCODING AND PROTECTING DATA USING DIGITAL SIGNATURE AND WATERMARKING TECHNIQUES - Systems and methods are provided for determining a presence of a watermark in electronic data. In certain embodiments, a plurality of keys is generated, and a plurality of payloads are retrieved from electronic data using the keys. A statistical indicia of randomness is generated based on the payloads, and the presence of a watermark is determined when the indicia is below a threshold. | 11-07-2013 |
20130254255 | DISTRIBUTED COMPUTATION SYSTEMS AND METHODS - Systems and methods are described for performing distributed computations over a data set potentially owned or controlled by many stakeholders, each of whom may set their own policies governing access to and/or other use of their individual data. | 09-26-2013 |
20130232343 | SOFTWARE SELF-DEFENSE SYSTEMS AND METHODS - Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image. | 09-05-2013 |
20130219459 | CONTENT MANAGEMENT SYSTEMS AND METHODS - This disclosure relates to systems and methods for managing content. In one embodiment, a method of managing electronic content from a plurality of a user's computing devices is disclosed. Content from the devices is automatically uploaded to a media hub service that securely routes, processes, synchronizes, and/or stores the content in accordance one or more user-specified policies. | 08-22-2013 |
20130217331 | SYSTEMS AND METHODS FOR VEHICLE POLICY ENFORCEMENT - This disclosure relates to systems and methods for vehicle policy management and enforcement. In certain embodiments, a method for enforcing a policy may include receiving policy information at a device including one or more conditions relating to a policy-managed location in a vehicle. A determination may be made whether the device is within the policy-managed location based on signals received by a short-range communication system included in the device and/or the vehicle. The received policy information may be evaluated to determine and implement one or more device actions associated with the one or more conditions. | 08-22-2013 |
20130216071 | AUDIO REPRODUCTION SYSTEMS AND METHODS - Systems and method are disclosed for facilitating efficient calibration of filters for correcting room and/or speaker-based distortion and/or binaural imbalances in audio reproduction, and/or for producing three-dimensional sound in stereo system environments. According to some embodiments, using a portable device such as a smartphone or tablet, a user can calibrate speakers by initiating playback of a test signal, detecting playback of the test signal with the portable device's microphone, and repeating this process for a number of speakers and/or device positions (e.g., next to each of the user's ears). A comparison can be made between the test signal and the detected signal, and this can be used to more precisely calibrate rendering of future signals by the speakers. | 08-22-2013 |
20130212659 | TRUSTED CONNECTED VEHICLE SYSTEMS AND METHODS - This disclosure relates to systems and methods for facilitating a security and trust architecture in connected vehicles. In certain embodiments, a method for creating a trusted architecture in a connected vehicle may include generating a connected vehicle ecosystem map including information relating to a plurality of electronic control units and network connections included in the connected vehicle. Based on the vehicle ecosystem map, trusted relationships involving electronic control units may be identified. Trusted credentials may be generated and issued to electronic control units that meet one or more trust requirements. Using the trusted credentials, trusted communication within the connected vehicle may be achieved. | 08-15-2013 |
20130111215 | SOFTWARE SELF-CHECKING SYSTEMS AND METHODS | 05-02-2013 |
20130096943 | SYSTEMS AND METHODS FOR PROTECTING AND GOVERNING GENOMIC AND OTHER INFORMATION - Trusted, privacy-protected systems and method are disclosed for processing, handling, and performing tests on human genomic and other information. According to some embodiments, a system is disclosed that is a cloud-based system for the trusted storage and analysis of genetic and other information. Some embodiments of the system may include or support some or all of authenticated and certified data sources; authenticated and certified diagnostic tests; and policy-based access to data. | 04-18-2013 |
20130013493 | SYSTEMS AND METHODS FOR CONDUCTING TRANSACTIONS AND COMMUNICATIONS USING A TRUSTED THIRD PARTY - Systems and methods are provided for performing transactions and managing communications using a trusted third party. In one embodiment, a sender transfers an encrypted version of a file (such as a digitally encoded audio track, movie, document, or the like) to someone who wishes to receive it. The receiver computes a first hash of at least a portion of the encrypted data content, and sends the first hash to a third party configured to compare at least a portion of the first hash to at least a portion of a second hash. The receiver receives a file decryption key from the third party, and decrypts at least the portion of the received encrypted data content with the decryption key. In some cases, multiple hashes of the encrypted data content may be computed, each using a different portion of the encrypted data content. | 01-10-2013 |
20130006800 | SYSTEMS AND METHODS FOR PRICING AND SELLING DIGITAL GOODS - Systems and methods are provided for pricing, selling, and/or otherwise distributing electronic content using auction mechanisms. A randomized auction mechanism is used to determine both the number of goods that are sold and the selling price. The auction mechanism automatically adapts to the bid distribution to yield revenue that is competitive with that which could be obtained if the vendor were able to determine the optimal fixed price for the goods. In one embodiment a set of bids is randomly or quasi-randomly partitioned into two or more groups. An optimal threshold is determined for each group, and this threshold is then used to select winning bids from one or more of the other groups. In another embodiment, each bid is compared to a competing bid that is randomly or quasi-randomly selected from the set of bids. If the bid is less than the randomly-selected competing bid, the bid is rejected. Otherwise, the bid is accepted and the bidder buys the auctioned item at the price of the randomly-selected bid. | 01-03-2013 |
20120260346 | INFORMATION SECURITY SYSTEMS AND METHODS - Systems and methods for governing derived electronic resources are provided. In one embodiment, a digital resource is associated with one or more rules and a set of one or more computations, wherein the rules correspond to one or more conditions for accessing the digital resource and the computations operate upon the digital resource in order to provide a specific view of the digital resource that differs from the digital resource. | 10-11-2012 |
20110277036 | Policy Determined Accuracy of Transmitted Information - Systems and methods for controlling accuracy of transmitted information are described. A package is assembled based on a numerical value, such as a measurement, and one or more policies associated with the sender. When the package is received by a receiver, it is unpacked to yield a second value representing the numerical value and having a reduced accuracy with respect to the first value. The accuracy reduction depends on policies associated with the receiver and/or the sender. Examples of numerical values in different applications include geo-location data, medical data, and financial data. | 11-10-2011 |
20110246782 | Data Protection Systems and Methods - Systems and methods are provided for protecting electronic content from the time it is packaged through the time it is experienced by an end user. Protection against content misuse is accomplished using a combination of encryption, watermark screening, detection of invalid content processing software and hardware, and/or detection of invalid content flows. Encryption protects the secrecy of content while it is being transferred or stored. Watermark screening protects against the unauthorized use of content. Watermark screening is provided by invoking a filter module to examine content for the presence of a watermark before the content is delivered to output hardware or software. The filter module is operable to prevent delivery of the content to the output hardware or software if it detects a predefined protection mark. Invalid content processing software is detected by a monitoring mechanism that validates the software involved in processing protected electronic content. Invalid content flows can be detected by scanning the information passed across system interfaces for the attempted transfer of bit patterns that were released from an application and/or a piece of content management software. | 10-06-2011 |
20100299522 | Content Sharing Systems and Methods - Systems and methods are described for peer-to-peer sharing of electronic content. In one embodiment, if a license associated with a content item permits a sharing peer to share the content item with a receiving peer, the sharing peer rebinds a cryptographic key associated with the content item to the receiving peer and generates a sharing license for the content item. The sharing peer sends the sharing license and the content item to the receiving peer for consumption. | 11-25-2010 |
20100293058 | Ad Selection Systems and Methods - Systems and methods are described for dynamically selecting an advertisement for presentation to an end user in combination with an electronic content item. In one embodiment, a control associated with the electronic content item is evaluated to determine whether the advertisement is permitted to be presented in combination with the electronic content item. A control associated with the advertisement is also evaluated to determine an amount that the provider of the advertisement is willing to pay to have the advertisement presented to the end user in combination with the electronic content item. If this amount is greater than the amount bid by other advertisements, then the advertisement and the content item are presented together to the end user. | 11-18-2010 |
20100293050 | Dynamic, Local Targeted Advertising Systems and Methods - Systems and methods are described for targeting advertisements to a user of an electronic device. In one embodiment, the user's device receives multiple advertisements and at least one content item. Using a control associated with the content item and controls associated with the advertisements, the user's system dynamically determines the optimum advertisements to render with the content item. Information about the advertisements that were selected can be sent to a remote party to facilitate payment by the provider of the advertisements to the provider of the content. | 11-18-2010 |
20100228999 | Trusted Storage Systems and Methods - Systems and methods are disclosed for providing a trusted database system that leverages a small amount of trusted storage to secure a larger amount of untrusted storage. Data are encrypted and validated to prevent unauthorized modification or access. Encryption and hashing are integrated with a low-level data model in which data and meta-data are secured uniformly. Synergies between data validation and log-structured storage are exploited. | 09-09-2010 |
20100223672 | Systems and Methods for Managing and Protecting Electronic Content and Applications - Systems and methods are disclosed for managing and protecting electronic content and applications. Applications, content, and/or users can be given credentials by one or more credentialing authorities upon satisfaction of a set of requirements. Rights management software/hardware is used to attach and detect these credentials, and to enforce rules that indicate how content and applications may be used if certain credentials are present or absent. In one embodiment an application may condition access to a piece of electronic content upon the content's possession of a credential from a first entity, while the content may condition access upon the application's possession of a credential from a second entity and/or the user's possession of a credential from a third entity. Use of credentials in this manner enables a wide variety of relatively complex and flexible control arrangements to be put in place and enforced with relatively simple rights management technology. | 09-02-2010 |
20100030869 | SYSTEMS AND METHODS FOR MANAGING THE DISTRIBUTION OF ELECTRONIC CONTENT - The present invention provides systems and methods for transferring electronic information from one location to another such that only one original work exists at a given time. The methods and systems of the present invention allow distribution of originals without requiring a registration authority or other entity to vouch for what constitutes an “original” piece of information, thus reducing (or eliminating entirely) the need to centrally record changes in ownership each time originals change hands. | 02-04-2010 |
20100017620 | SOFTWARE SELF-CHECKING SYSTEMS AND METHODS - Software self-checking mechanisms are described for improving software tamper resistance and/or reliability. Redundant tests are performed to detect modifications to a program while it is running. Modifications are recorded or reported. Embodiments of the software self-checking mechanisms can be implemented such that they are relatively stealthy and robust, and so that it they are compatible with copy-specific static watermarking and other tamper-resistance techniques. | 01-21-2010 |
20090298480 | DATA COLLECTION AND TARGETED ADVERTISING SYSTEMS AND METHODS - Embodiments of a mobile device and server system are described. The mobile devices communicate with the server system and present targeted content, such as advertisements to the mobile device users. The content is targeted based on usage statistics stored on the server system which were previously collected from the mobile device. The server receives the usage statistics collected from the mobile device, makes inferences about preferences of users by tracking application and/or content usage behaviors of the users, generates recommendations for advertisements targeted toward the users of the mobile devices based on usage statistics; and transmits the recommendations to one or more of the mobile devices for presentation to the user(s). | 12-03-2009 |
20090037732 | TETHERED DEVICE SYSTEMS AND METHODS - Systems and methods are described for applying digital rights management techniques to tethered devices. In one embodiment, a host device is operable to translate a relatively sophisticated license into a simpler format for use on a relatively low-capability device. In another embodiment, a method of using extended SCSI commands to communicate over a USB connection is provided. | 02-05-2009 |
20090031431 | DYNAMIC MEDIA ZONES SYSTEMS AND METHODS - Systems and methods are described for applying digital rights management techniques to manage zones in electronic content. In one embodiment, zones are defined in a piece of electronic content, and a license is associated with the electronic content that indicates how the zones are to be accessed or otherwise used. A digital rights management engine governs access to or other use of the zoned content in accordance with the license. | 01-29-2009 |
20090031126 | Trust Management Systems and Methods - The present invention provides systems and methods for making efficient trust management decisions. A trust management engine is provided that processes requests for system resources, authorizations or certificates, and the identity of one or more root authorities that are ultimately responsible for granting or denying the requests. To determine whether a request should be granted, the trust management engine identifies a set principals from whom authorization may flow, and interprets each of the certificates as a function of the state of one or more of the principals. The processing logic iteratively evaluates the functions represented by the certificates, updates the states of the principals, and repeats this process until a reliable determination can be made as to whether the request should be granted or denied. The certificates may be evaluated until the state of the root authority indicates that the request should be granted, or until further evaluation of the certificates is ineffective in changing the state of the principals. | 01-29-2009 |
20090029718 | CONTENT PUBLISHING SYSTEMS AND METHODS - A system for publishing digital content is described which, in one embodiment, includes a beacon device associated with a first user configured to transmit identification information and information indicating its current position. A browsing device includes a display configured and adapted to display to a second user a representation of a local geographical area, and to selectively display to the second user content information associated with the first user, based at least in part on whether the location of the beacon device is within the local geographical area. | 01-29-2009 |