Visual identification information used as confirmation in a wireless communication
First Claim
1. A method for operating a first wireless device, the first wireless device communicating using two different wireless communication protocols, such that a first wireless protocol is used to receive identifiers from other wireless devices, and such that a second wireless protocol, different from the first wireless protocol, is used to communicate with a trusted server to confirm an identity of an object or entity associated with one of the other wireless devices, the method comprising the steps of:
- receiving an identifier from a second wireless device using the first wireless protocol, the identifier relating to an object or entity associated with the second wireless device;
connecting to the trusted server using the second wireless protocol;
sending the received identifier from the first wireless device to the trusted server using the second wireless protocol;
receiving visual identification information from the trusted server also using the second wireless protocol, the visual identification information also associated with the entity or object associated with the second wireless device, wherein the visual identification information additionally includes at least an identifying picture of the object or entity associated with the second wireless device;
displaying, on the first wireless device, the identifying picture of the object or entity associated with the second wireless device;
receiving user input indicating a user of the first wireless device has compared the identifying picture to the object or entity associated with the second wireless device and the user considering them to match; and
confirming, to the trusted server, verification of the identity of the object or entity associated with the second wireless device.
2 Assignments
0 Petitions
Accused Products
Abstract
Techniques for facilitating the exchange of information and transactions between two entities associated with two wireless devices when the devices are in close proximity to each other. A first device uses a first short range wireless capability to detect an identifier transmitted from a second device in proximity, ideally using existing radio capabilities such as Bluetooth (IEEE802.15.1-2002) or Wi-Fi (IEEE802.11). The detected identifier, being associated with the device, is also associated with an entity. Rather than directly exchanging application data flow between the two devices using the short range wireless capability, a second wireless capability allows for one or more of the devices to communicate with a central server via the internet, and perform the exchange of application data flow. By using a central server to draw on stored information and content associated with the entities the server can broker the exchange of information between the entities and the devices.
417 Citations
29 Claims
-
1. A method for operating a first wireless device, the first wireless device communicating using two different wireless communication protocols, such that a first wireless protocol is used to receive identifiers from other wireless devices, and such that a second wireless protocol, different from the first wireless protocol, is used to communicate with a trusted server to confirm an identity of an object or entity associated with one of the other wireless devices, the method comprising the steps of:
-
receiving an identifier from a second wireless device using the first wireless protocol, the identifier relating to an object or entity associated with the second wireless device; connecting to the trusted server using the second wireless protocol; sending the received identifier from the first wireless device to the trusted server using the second wireless protocol; receiving visual identification information from the trusted server also using the second wireless protocol, the visual identification information also associated with the entity or object associated with the second wireless device, wherein the visual identification information additionally includes at least an identifying picture of the object or entity associated with the second wireless device; displaying, on the first wireless device, the identifying picture of the object or entity associated with the second wireless device; receiving user input indicating a user of the first wireless device has compared the identifying picture to the object or entity associated with the second wireless device and the user considering them to match; and confirming, to the trusted server, verification of the identity of the object or entity associated with the second wireless device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 16, 17, 18, 19, 20, 21)
-
-
8. A first wireless communication device communicating with two different wireless communication protocols, such that a first wireless protocol is used to receive identifiers from other wireless devices, and such that a second wireless protocol, different from a first wireless protocol, is used to communicate with a trusted server to confirm an identity of an object or entity associated with one of the other wireless devices, the first wireless communication device further comprising:
-
a first receiver, for receiving an identifier from a second wireless device using the first wireless protocol, the identifier relating to an object or entity associated with the second wireless device; a server transmitter, for sending the received identifier from the first wireless device to the trusted server using the second wireless protocol; a server receiver, for receiving visual identification information from the trusted server using the second wireless protocol, the visual identification information associated with the entity or object associated with the second wireless device, wherein the further information additionally includes at least an identifying picture of the object or entity associated with the second wireless device; a display, for displaying on the first wireless device the identifying picture of the object or entity associated with the second wireless device; a user input device, for receiving user input from a user of the first wireless device indicating that the user has compared the identifying picture with the object or entity associated with the second wireless device and considers them to match; and wherein the server transmitter then confirms, to the trusted server, verification of the identity of the object or entity associated with the second wireless device. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15)
-
-
22. A method for operating a first wireless communication device, the first wireless device communicating using two different wireless communication protocols, such that a first wireless protocol is used to receive identifiers from other wireless devices, and such that a second wireless protocol, different from the first wireless protocol, is used to communicate with a trusted server to confirm an identity of an object or entity associated with one of the other wireless devices, the method comprising the steps of:
-
scanning for identifiers received from a plurality of other wireless devices using the first wireless protocol, the identifiers relating to an object or entity associated with the other wireless devices; connecting to a trusted server using the second wireless protocol; sending a plurality of the received identifiers from the first wireless device to the trusted server using the second wireless protocol; receiving visual identification information from the trusted server also using the second wireless protocol, the visual identification information also associated with the plurality of entities or objects associated with the other wireless devices, wherein the visual identification information additionally includes at least an identifying picture of the object or entity associated with each of the plurality of other wireless devices; displaying, on the first wireless device, a plurality of the identifying pictures of the objects or entities associated with the other wireless devices; receiving user input indicating a user of the first wireless device has compared at least one of the identifying pictures with an object or entity associated with a selected one of the other wireless devices and that they match; and confirming, to the trusted server, verification of the identity of the object or entity associated with the selected one of the other wireless devices. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29)
-
Specification