×

System and method for using unique device identifiers to enhance security

  • US 10,402,580 B2
  • Filed: 10/15/2018
  • Issued: 09/03/2019
  • Est. Priority Date: 12/09/2002
  • Status: Expired due to Term
First Claim
Patent Images

1. A computer-implemented method, comprising:

  • enabling, at a mobile device including a camera, monitoring of a camera feed from the mobile device;

    detecting from the camera feed, a first feature of a physical manifestation of an access right to a resource, the first feature being included in one or more images of the camera feed, the first feature including a first machine-readable code, and the first machine-readable code corresponding to an identifier that uniquely identifies the access right;

    generating, at the mobile device, a time indicator associated with the first feature, the time indicator identifying a time of detecting the first feature;

    transmitting the detected first feature and the time indicator from the mobile device to a remote server;

    determining, by the remote server, that the first feature corresponds to a valid access right that grants access to the resource, the valid access right indicating that the first feature is valid to grant access to the resource;

    transmitting, by the remote server, a communication that indicates that the first feature corresponds to the valid access right;

    receiving, at the mobile device and from the remote server, the communication that indicates that the first feature corresponds to the valid access right;

    in response to receiving the communication, presenting an authenticity indication for the physical manifestation of the access right that indicates that the access right is authentic;

    generating, by the remote server, a timestamp that identifies a time the first feature was sent from the mobile device to the remote server, the timestamp being generated using the time indicator;

    determining, by the remote server, a transformation eligibility of the physical manifestation of the access right based on the generated timestamp and an estimated time that the resource will be available for accessing, the transformation eligibility indicating that the first machine-readable code is eligible to be transformed into another machine-readable code;

    receiving, at the mobile device and from the remote server, a transformation eligibility indication, based on the determined transformation eligibility, for the first machine readable code that indicates that a transformation-eligibility condition is satisfied for the physical manifestation of the access right so as to enable the physical manifestation of the access right to be converted into a digital manifestation of the access right, the transformation-eligibility condition specifying a time period before the resource is available for accessing during which transformation is enabled;

    transmitting, from the mobile device, a request to transform the physical manifestation of the access right into the digital manifestation of the access right, the request including the first feature, wherein receiving the request to transform the physical manifestation of the access right into the digital manifestation of the access right at the remote server initiates a transformation protocol at the remote server that transforms the physical manifestation of the access right into the digital manifestation;

    receiving a response to the request indicating that the transformation has occurred and that the first machine readable code has been invalidated; and

    displaying, at a display of the mobile device, a visual representation of the response to the request indicating that the physical manifestation of the access right has been transformed or has been invalidated.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×