×

Identity recognition

  • US 10,169,939 B2
  • Filed: 03/16/2016
  • Issued: 01/01/2019
  • Est. Priority Date: 03/16/2016
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method comprising:

  • receiving, by a user device of a first user, identification data comprising a universally unique identifier (UUID) that is associated with a security database of a second user and a first security token associated with the second user;

    verifying, by the user device, the received identification data by utilizing the UUID to access the security database that purportedly issued the UUID and verifying that the first security token matches a second security token generated by the security database;

    responsive to verifying the received identification data, disarming a security system associated with the user device for a specified time period;

    detecting the presence or absence of the second user;

    confirming whether the second user has completed a task associated with the first security token; and

    responsive to detecting the absence of the second user and confirming whether the second user has completed the task, automatically re-arming the security system associated with the user device after the specified time period expires.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×