Tom PriceFollow


This publication describes systems and techniques directed to managing access to location information. A wireless-communication device, such as a smartphone, includes a sequestered location integrated circuit (IC) component that includes a location security manager application stored in memory circuitry of the sequestered location IC component. The wireless-communication device, using the sequestered location IC component, performs a technique that includes generating, from received data, a set of location information corresponding to a determined security-access level, encrypting the set of location information, and generating, for the encrypted set of location information, a security key that corresponds to the determined security-access level. The technique also includes determining that an application is allowed access to the encrypted set of location information corresponding to the determined security-access level and providing, to the application, the security key.

Creative Commons License

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.