×

Credential management system and peer detection

  • US 10,257,179 B1
  • Filed: 01/26/2016
  • Issued: 04/09/2019
  • Est. Priority Date: 01/26/2015
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method comprising:

  • receiving, by a first user device, a request to identify devices that are associated with a credential management system and are located within a threshold distance of the first user device;

    responsive to receiving the request, searching for one or more devices that are (i) associated with the credential management system, (ii) wirelessly connected to a computer network through a particular communication protocol, and (iii) are located within the threshold distance of the first user device;

    detecting, using the particular communication protocol, one or more wireless devices based on one more wireless signals received from the one or more wireless devices;

    filtering the detected one or more wireless devices to identify a subset of wireless devices comprising one or more second devices that are (i) associated with the credential management system, (ii) wirelessly connected to the computer network through the particular communication protocol, and (iii) are located within the threshold distance of the first user device;

    obtaining identification information that includes one or more credential representations representative of one or more users associated with the one or more second devices, respectively;

    validating the one or more credential representations included in the identification information by communicating with a validation server associated with the credential management system;

    responsive to validation of the credential representations included in the identification information, controlling the first user device to display (i) an indication of the one or more users associated with the one or more second devices, and (ii) an indication that the one or more second devices are located within the threshold distance of the first user device;

    receiving, by the first user device, a second request for activity data of a second user from among the one or more users associated with the one or more second devices, wherein the activity data of the second user includes data indicating (I) one or more interactions of the second user with the credential management system, and (II) one or more respective locations of the one or more interactions of the second user;

    responsive to receiving the second request, determining that a first user of the first user device is authorized to view the activity data of the second user;

    responsive to determining that the first user of the first user device is authorized to view the activity data of the second user, obtaining the activity data of the second user; and

    providing, for display at the first user device, the activity data of the second user.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×