Identity recognition
First Claim
1. A computer-implemented method comprising:
- receiving, by a user device of a first user, identification data comprising a universally unique identifier (UUID) that is associated with a security database of a second user and a first security token associated with the second user;
verifying, by the user device, the received identification data by utilizing the UUID to access the security database that purportedly issued the UUID and verifying that the first security token matches a second security token generated by the security database;
responsive to verifying the received identification data, disarming a security system associated with the user device for a specified time period;
detecting the presence or absence of the second user;
confirming whether the second user has completed a task associated with the first security token; and
responsive to detecting the absence of the second user and confirming whether the second user has completed the task, automatically re-arming the security system associated with the user device after the specified time period expires.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments of the present invention provide methods, computer program products, and systems to automatically verify a person'"'"'s claimed identity using wireless token passing. Embodiments of the present invention can be used to receive identification data comprising a universally unique identifier (UUID) and a first security token and process the received identification data by matching the UUID to an associated website and verifying the first security token against a second security token. Embodiments of the present invention can be used to notify a first user of the processed identification data by displaying an indication that verification of the identification data was successful or unsuccessful.
-
Citations
17 Claims
-
1. A computer-implemented method comprising:
-
receiving, by a user device of a first user, identification data comprising a universally unique identifier (UUID) that is associated with a security database of a second user and a first security token associated with the second user; verifying, by the user device, the received identification data by utilizing the UUID to access the security database that purportedly issued the UUID and verifying that the first security token matches a second security token generated by the security database; responsive to verifying the received identification data, disarming a security system associated with the user device for a specified time period; detecting the presence or absence of the second user; confirming whether the second user has completed a task associated with the first security token; and responsive to detecting the absence of the second user and confirming whether the second user has completed the task, automatically re-arming the security system associated with the user device after the specified time period expires. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer program product comprising:
one or more computer readable storage media and program instructions stored on the one or more computer readable storage media, the program instructions comprising; program instructions to receive, by a user device of a first user, identification data comprising a universally unique identifier (UUID) that is associated with a security database of a second user and a first security token associated with the second user; program instructions to verify, by the user device, the received identification data by utilizing the UUID to access the security database that purportedly issued the UUID and verifying that the first security token matches a second security token generated by the security database; responsive to verifying the received identification data, disarming a security system associated with the user device for a specified time period; program instructions to, responsive to verifying the received identification data, disarm a security system associated with the user device for a specified time period; program instructions to detect the presence or absence of the second user; program instructions to confirm whether the second user has completed a task associated with the first security token; and program instructions to, responsive to detecting the absence of the second user and confirming whether the second user has completed the task, automatically re-arm the security system associated with the user device after the specified time period expires. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
15. A computer system comprising:
-
one or more computer processors; one or more computer readable storage media; and program instructions stored on the one or more computer readable storage media for execution by at least one of the one or more computer processors, the program instructions comprising; program instructions to receive, by a user device of a first user, identification data comprising a universally unique identifier (UUID) that is associated with a security database of a second user and a first security token associated with the second user; program instructions to verify, by the user device, the received identification data by utilizing the UUID to access the security database that purportedly issued the UUID and verifying that the first security token matches a second security token generated by the security database; responsive to verifying the received identification data, disarming a security system associated with the user device for a specified time period; program instructions to, responsive to verifying the received identification data, disarm a security system associated with the user device for a specified time period; program instructions to detect the presence or absence of the second user; program instructions to confirm whether the second user has completed a task associated with the first security token; and program instructions to, responsive to detecting the absence of the second user and confirming whether the second user has completed the task, automatically re-arm the security system associated with the user device after the specified time period expires. - View Dependent Claims (16, 17)
-
Specification