NETWORK SECURITY BASED ON PROXIMITY
First Claim
1. A computer-implemented method to provide secure data access based on computing device proximity verification, comprising:
- generating, by one or more computing devices, a first beacon device identifier code and a first random nonce;
associating, by the one or more computing devices, the first beacon device identifier code and the first random nonce with a first system location;
transmitting, by the one or more computing devices and to a beacon device at the first system location, the first beacon device identifier code and the first random nonce, wherein the beacon device broadcasts the first beacon device identifier code and the first random nonce at the first system location;
receiving, by the one or more computing devices and from each of one or more user computing devices at the first system location, data comprising the first beacon device identifier code received by the respective user computing device from the beacon device at the first system location, current location data, and a respective user account identifier associated with a user account associated with the respective user computing device;
receiving, by the one or more computing devices and from a computing device associated with the first system location, data comprising a request for user account information, and a random nonce received by the computing device associated with the first system location from the beacon device at the first system location;
comparing, by the one or more computing devices, the random nonce received from the computing device associated with the first system location to the random nonce associated with the first system location by the one or more computing devices;
in response to determining a correspondence between the received random nonce and the associated random nonce, identifying, by the one or more computing devices, one or more user account identifiers associated with the one or more user computing devices that retransmitted the first beacon device identifier code and that have current location data corresponding to the first system location; and
transmitting, by the one or more computing devices and to the computing device associated with the first system location, the one or more user account identifiers.
2 Assignments
0 Petitions
Accused Products
Abstract
A processing system periodically configures a beacon code and random nonce to transmit to a beacon device at a location. Multiple users enter the location with associated user computing devices. The user computing devices retransmit the beacon code broadcasted by the beacon device to the processing system. A particular user initiates a transaction at a computing device at the location, which transmits to the processing system a request for account data and retransmits the beacon code and a random nonce. The processing system verifies the beacon code and random nonce and transmits, to the computing device at the location, user account identifiers associated with user computing devices that retransmitted the beacon code. The processing system receives a selection of the user identifier from the merchant point of sale device and transmits account information to the computing device at the location.
-
Citations
22 Claims
-
1. A computer-implemented method to provide secure data access based on computing device proximity verification, comprising:
-
generating, by one or more computing devices, a first beacon device identifier code and a first random nonce; associating, by the one or more computing devices, the first beacon device identifier code and the first random nonce with a first system location; transmitting, by the one or more computing devices and to a beacon device at the first system location, the first beacon device identifier code and the first random nonce, wherein the beacon device broadcasts the first beacon device identifier code and the first random nonce at the first system location; receiving, by the one or more computing devices and from each of one or more user computing devices at the first system location, data comprising the first beacon device identifier code received by the respective user computing device from the beacon device at the first system location, current location data, and a respective user account identifier associated with a user account associated with the respective user computing device; receiving, by the one or more computing devices and from a computing device associated with the first system location, data comprising a request for user account information, and a random nonce received by the computing device associated with the first system location from the beacon device at the first system location; comparing, by the one or more computing devices, the random nonce received from the computing device associated with the first system location to the random nonce associated with the first system location by the one or more computing devices; in response to determining a correspondence between the received random nonce and the associated random nonce, identifying, by the one or more computing devices, one or more user account identifiers associated with the one or more user computing devices that retransmitted the first beacon device identifier code and that have current location data corresponding to the first system location; and transmitting, by the one or more computing devices and to the computing device associated with the first system location, the one or more user account identifiers. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer program product, comprising:
a non-transitory computer-readable medium having computer-readable program instructions embodied thereon that when executed by a computer cause the computer to provide secure data access based on computing device proximity verification, the computer-readable program instructions comprising; computer-executable program instructions to generate a first beacon device identifier code; computer-executable program instructions to associate the first beacon device identifier code with a beacon device and a first system location; computer-executable program instructions to transmit, to the beacon device, the first beacon device identifier code, wherein the beacon device broadcasts the first beacon device identifier code at the merchant system location; computer-executable program instructions to receive, from each of one or more user computing devices at the merchant system location, data comprising the first beacon device identifier code, current location data, and a respective user account identifier; computer-executable program instructions to receive, from a computing device associated with the first system location, data comprising a request for user account information and the first beacon device identifier code; computer-executable program instructions to compare the first beacon device code received from the computing device associated with the first system location against the associated first beacon device identifier code associated with the first system location; in response to determining an exact correspondence between the received first beacon device identifier code and the associated first beacon device identifier code, computer-executable program instructions to identify user account identifiers associated with the one or more user computing devices that retransmitted the first beacon device identifier code and having current location data corresponding to the first system location; and computer-executable program instructions to transmit, to the computing device associated with the first system location, the one or more user account identifiers for display on the computing device associated with the first system location. - View Dependent Claims (12, 13, 14, 15, 16)
-
17. A system to provide secure data access based on computing device proximity verification, comprising:
-
a storage device; and a processor communicatively coupled to the storage device, wherein the processor executes application code instructions that are stored in the storage device to cause the system to; generate a first beacon device identifier code; associate the first beacon device identifier code with a beacon device and a first system location; transmit, to the beacon device, the first beacon device identifier code, wherein the beacon device broadcasts the first beacon device identifier code at the merchant system location; receive, from each of one or more user computing devices at the merchant system location, data comprising the first beacon device identifier code, current location data, and a respective user account identifier; receive, from a computing device associated with the first system location, data comprising a request for user account information and the first beacon device identifier code; compare the first beacon device code received from the computing device associated with the first system location against the associated first beacon device identifier code associated with the first system location; in response to determining an exact correspondence between the received first beacon device identifier code and the associated first beacon device identifier code, identify user account identifiers associated with the one or more user computing devices that retransmitted the first beacon device identifier code and having current location data corresponding to the first system location; and transmit, to the computing device associated with the first system location, the one or more user account identifiers for display on the computing device associated with the first system location. - View Dependent Claims (18, 19, 20, 21, 22)
-
Specification