Credential management system and peer detection
First Claim
1. A computer-implemented method comprising:
- receiving, by a first user device, a request to identify devices that are associated with a credential management system and are located within a threshold distance of the first user device;
responsive to receiving the request, searching for one or more devices that are (i) associated with the credential management system, (ii) wirelessly connected to a computer network through a particular communication protocol, and (iii) are located within the threshold distance of the first user device;
detecting, using the particular communication protocol, one or more wireless devices based on one more wireless signals received from the one or more wireless devices;
filtering the detected one or more wireless devices to identify a subset of wireless devices comprising one or more second devices that are (i) associated with the credential management system, (ii) wirelessly connected to the computer network through the particular communication protocol, and (iii) are located within the threshold distance of the first user device;
obtaining identification information that includes one or more credential representations representative of one or more users associated with the one or more second devices, respectively;
validating the one or more credential representations included in the identification information by communicating with a validation server associated with the credential management system;
responsive to validation of the credential representations included in the identification information, controlling the first user device to display (i) an indication of the one or more users associated with the one or more second devices, and (ii) an indication that the one or more second devices are located within the threshold distance of the first user device;
receiving, by the first user device, a second request for activity data of a second user from among the one or more users associated with the one or more second devices, wherein the activity data of the second user includes data indicating (I) one or more interactions of the second user with the credential management system, and (II) one or more respective locations of the one or more interactions of the second user;
responsive to receiving the second request, determining that a first user of the first user device is authorized to view the activity data of the second user;
responsive to determining that the first user of the first user device is authorized to view the activity data of the second user, obtaining the activity data of the second user; and
providing, for display at the first user device, the activity data of the second user.
2 Assignments
0 Petitions
Accused Products
Abstract
A credential management system is described. The credential management system allows a user to identify peers and obtain additional information regarding the peers through the credential management system. The credential management system may perform user analytics and provide the requested additional information to the user. The credential management system may associate the discovered peers with a group or credential, and share information and data with one or more of the discovered peers associated with a particular group or credential in a convenient manner. The credential management system may also implement a hierarchical menu and/or conditions to determine which users of the credential management system may be able to view other users'"'"' information and to determine a type of information or data that is transmitted between users.
-
Citations
20 Claims
-
1. A computer-implemented method comprising:
-
receiving, by a first user device, a request to identify devices that are associated with a credential management system and are located within a threshold distance of the first user device; responsive to receiving the request, searching for one or more devices that are (i) associated with the credential management system, (ii) wirelessly connected to a computer network through a particular communication protocol, and (iii) are located within the threshold distance of the first user device; detecting, using the particular communication protocol, one or more wireless devices based on one more wireless signals received from the one or more wireless devices; filtering the detected one or more wireless devices to identify a subset of wireless devices comprising one or more second devices that are (i) associated with the credential management system, (ii) wirelessly connected to the computer network through the particular communication protocol, and (iii) are located within the threshold distance of the first user device; obtaining identification information that includes one or more credential representations representative of one or more users associated with the one or more second devices, respectively; validating the one or more credential representations included in the identification information by communicating with a validation server associated with the credential management system; responsive to validation of the credential representations included in the identification information, controlling the first user device to display (i) an indication of the one or more users associated with the one or more second devices, and (ii) an indication that the one or more second devices are located within the threshold distance of the first user device; receiving, by the first user device, a second request for activity data of a second user from among the one or more users associated with the one or more second devices, wherein the activity data of the second user includes data indicating (I) one or more interactions of the second user with the credential management system, and (II) one or more respective locations of the one or more interactions of the second user; responsive to receiving the second request, determining that a first user of the first user device is authorized to view the activity data of the second user; responsive to determining that the first user of the first user device is authorized to view the activity data of the second user, obtaining the activity data of the second user; and providing, for display at the first user device, the activity data of the second user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable storage medium storing instructions executable by one or more computers which, upon such execution, cause the one or more computers to perform operations comprising:
-
receiving, by a first user device, a request to identify devices that are associated with a credential management system and are located within a threshold distance of the first user device; responsive to receiving the request, searching for one or more devices that are (i) associated with the credential management system, (ii) wirelessly connected to a computer network through a particular communication protocol, and (iii) and are located within the threshold distance of the first user device; detecting, using the particular communication protocol, one or more wireless devices based on one more wireless signals received from the one or more wireless devices; filtering the detected one or more wireless devices to identify a subset of wireless devices comprising one or more second devices that are ( ) associated with the credential management system, (ii) wirelessly connected to the computer network through the particular communication protocol, and (iii) are located within the threshold distance of the first user device; obtaining identification information that includes one or more credential representations representative of one or more users associated with the one or more second devices, respectively; validating the one or more credential representations included in the identification information by communicating with a validation server associated with the credential management system; responsive to validation of the credential representations included in the identification information, controlling the first user device to display (i) an indication of the one or more users associated with the one or more second devices, and (ii) an indication that the one or more second devices are located within the threshold distance of the first user device; receiving, by the first user device, a second request for activity data of a second user from among the one or more users associated with the one or more second devices, wherein the activity data of the second user includes data indicating (I) one or more interactions of the second user with the credential management system, and (II) one or more respective locations of the one or more interactions of the second user; responsive to receiving the second request, determining that a first user of the first user device is authorized to view the activity data of the second user; responsive to determining that the first user of the first user device is authorized to view the activity data of the second user, obtaining the activity data of the second user; and providing, for display at the first user device, the activity data of the second user. - View Dependent Claims (16, 17)
-
-
18. A system comprising:
-
one or more computers; and one or more storage devices storing instructions that upon execution by the one or more computers, cause the one or more computers to perform operations comprising; receiving, by a first user device, a request to identify devices that are associated with a credential management system and are located within a threshold distance of the first user device; responsive to receiving the request, searching for one or more devices that are (i) associated with the credential management system, (ii) wirelessly connected to a computer network through a particular communication protocol, and (iii) are located within the threshold distance of the first user device; detecting, using the particular communication protocol, one or more wireless devices based on one more wireless signals received from the one or more wireless devices; filtering the detected one or more wireless devices to identify a subset of wireless devices comprising one or more second devices that are (i) associated with the credential management system, (ii) wirelessly connected to the computer network through the particular communication protocol, and (iii) are located within the threshold distance of the first user device; obtaining identification information that includes one or more credential representations representative of one or more users associated with the one or more second devices, respectively; validating the one or more credential representations included in the identification information by communicating with a validation server associated with the credential management system; responsive to validation of the credential representations included in the identification information, controlling the first user device to display (i) an indication of the one or more users associated with the one or more second devices, and (ii) an indication that the one or more second devices are located within the threshold distance of the first user device; receiving, by the first user device, a second request for activity data of a second user from among the one or more users associated with the one or more second devices, wherein the activity data of the second user includes data indicating (I) one or more interactions of the second user with the credential management system, and (II) one or more respective locations of the one or more interactions of the second user; responsive to receiving the second request, determining that a first user of the first user device is authorized to view the activity data of the second user; responsive to determining that the first user of the first user device is authorized to view the activity data of the second user, obtaining the activity data of the second user; and providing, for display at the first user device, the activity data of the second user. - View Dependent Claims (19, 20)
-
Specification