IDENTIFYING USER COMPUTING DEVICE SPECIFIC LOCATIONS
First Claim
1. A computer-implemented method to identify user computing device locations based on location data and beacon signal strength, comprising:
- receiving, by a user computing device, a geofence boundary associated with a particular location, a location of a beacon device at the particular location, and a beacon device identifier associated with the beacon device;
determining, by the user computing device, that a first location of the user computing device is located within the geofence boundary;
in response to determining that the user computing device is located within the geofence boundary, performing a wireless network scan by scanning, by the user computing device, for wireless signals over a wireless network;
receiving, by the user computing device, a beacon signal comprising the beacon device identifier from the beacon device via the wireless network scan;
determining, by the user computing device, that a second location of the user computing device is within the geofence boundary and is less than a predefined distance from the location of the beacon device based on a beacon signal strength of the beacon device the beacon signal strength being based on at least one of the received beacon signal and further signals received from the beacon device via the wireless network scan; and
in response to determining that the second location is less than the predefined distance from the location of the beacon device, transmitting, by the user computing device, a next in line status message indicating the location of the user computer device and a user identifier associated with the user computing device to a computing device associated with the beacon device.
2 Assignments
0 Petitions
Accused Products
Abstract
The proposed solution in particular relates to a computer-implemented method to identify user computing device locations based on location data and beacon signal strength in which a user computing device receives a beacon signal comprising a beacon device identifier from a beacon device via a wireless network scan and determines that a second location of the user computing device is within a geofence boundary and is less than a predefined distance from a location of the beacon device based on a beacon signal strength of the beacon device. The beacon signal strength is based on at least one of the received beacon signal and further signals received from the beacon device via the wireless network scan. In response to determining that the second location is less than the predefined distance from the location of the beacon device, the user computing device transmits a next in line status message indicating the location of the user computer device and a user identifier associated with the user computing device to a computing device associated with the beacon device.
-
Citations
22 Claims
-
1. A computer-implemented method to identify user computing device locations based on location data and beacon signal strength, comprising:
-
receiving, by a user computing device, a geofence boundary associated with a particular location, a location of a beacon device at the particular location, and a beacon device identifier associated with the beacon device; determining, by the user computing device, that a first location of the user computing device is located within the geofence boundary; in response to determining that the user computing device is located within the geofence boundary, performing a wireless network scan by scanning, by the user computing device, for wireless signals over a wireless network; receiving, by the user computing device, a beacon signal comprising the beacon device identifier from the beacon device via the wireless network scan; determining, by the user computing device, that a second location of the user computing device is within the geofence boundary and is less than a predefined distance from the location of the beacon device based on a beacon signal strength of the beacon device the beacon signal strength being based on at least one of the received beacon signal and further signals received from the beacon device via the wireless network scan; and in response to determining that the second location is less than the predefined distance from the location of the beacon device, transmitting, by the user computing device, a next in line status message indicating the location of the user computer device and a user identifier associated with the user computing device to a computing device associated with the beacon device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method to identify user computing device locations based on location data and beacon signal strength, comprising:
-
broadcasting, by a service provider computing device, a beacon signal at a service provider location; receiving, by a service provider computing device, at a service provider location over a network, a next in line request from a user computing device, wherein the user computing device transmits the next in line request in response to determining that the beacon signal broadcast at the service provider location exceeds a threshold signal strength and wherein the next in line request comprises an account identifier of a user the account identifier identifying a user account of the user; transmitting, by a service provider computing device and to a service processing device, a request for user account data associated with the user account and the account identifier; receiving, by a service provider computing device and from the service processing device, multiple user account data; displaying, by a service provider computing device via a user interface, the multiple user account data; receiving, by a service provider computing device, an input of a selection of particular user account data from the multiple user account data via the user interface; transmitting, by a service provider computing device, a processing request to the service processing device comprising the particular user account data; receiving, by a service provider computing device, results of the processing request from the service processing device; and displaying, by a service provider computing device, the results of the processing request. - View Dependent Claims (10, 11, 12)
-
-
13. A computer program product, comprising:
a non-transitory computer-readable medium having computer-executable program instructions embodied thereon that when executed by a computer cause the computer to identify user computing device locations based on location data and beacon signal strength, the computer-executable program instructions comprising; computer-executable program instructions to broadcast a beacon signal at a service provider location; computer-executable program instructions to receive, at a service provider location over a network, a next in line request from a user computing device, wherein the user computing device transmits the next in line request in response to determining that a beacon signal broadcast at the service provider location exceeds a threshold signal strength, and wherein the next in line request comprises an account identifier associated with the user computing device; computer-executable program instructions to transmit, to a service processing device, a request for user account data associated with the account identifier; computer-executable program instructions to receive, from the service processing device, multiple user account data; computer-executable program instructions to display, via a user interface, the multiple user account data; computer-executable program instructions to receive an input of a selection of particular user account data from the multiple user account data via the user interface; computer-executable program instructions to transmit a processing request to the service processing device comprising the selection of the particular user account data; computer-executable program instructions to receive results of the processing request from the service processing device; and computer-executable program instructions to display the results of the processing request. - View Dependent Claims (14, 15, 16)
-
17. A system to identify users, comprising:
-
a storage device; and a processor communicatively coupled to the storage device, wherein the processor executes application code instructions that are stored in the storage device to cause the system to; receive, at a service provider location over a network, a next in line request from a user computing device, wherein the user computing device transmits the next in line request in response to determining that a beacon signal broadcast at the service provider location exceeds a threshold signal strength and wherein the next in line request comprises an account identifier of the user; transmit a processing request to a service processing device comprising the user identity and processing details; receive results of the processing request from the service processing device, wherein the processing device processes the processing request using user account data associated with the user account identity and the transaction details; and display the results of the processing request. - View Dependent Claims (18, 19, 20, 21, 22)
-
Specification