×

System and method for electronic ticket verification, identification, and authorization with a wireless communication device

  • US 8,496,169 B2
  • Filed: 01/02/2009
  • Issued: 07/30/2013
  • Est. Priority Date: 01/02/2009
  • Status: Active Grant
First Claim
Patent Images

1. A method, comprising:

  • receiving, at a security server from a vendor server, a symbology, the symbology associated with an electronic ticket purchased by a consumer and associated with personally identifiable information provided by the consumer;

    after receiving the symbology from the vendor server, receiving, at the security server, the symbology from a wireless device of the consumer located at a first checkpoint;

    comparing, by the security server, the symbology received from the vendor server with the symbology received from the wireless device of the consumer at the first checkpoint;

    if the symbology received from the wireless device of the consumer at the first checkpoint matches the symbology received from the vendor server, authenticating, by the security server, the consumer at the first checkpoint;

    while comparing the symbology received from the vendor server with the symbology received from the wireless device of the consumer at the first checkpoint and authenticating the consumer,receiving, at the security server, a digital image of the consumer captured at the first checkpoint, andreceiving, at the security server, data stored, at the first checkpoint, on the wireless device of the consumer;

    receiving, at the security server, the symbology from the wireless device of the consumer located at a second checkpoint; and

    in response to receiving the symbology from the wireless device of the consumer located at the second checkpoint,providing, by the security server, a copy of the digital image of the consumer to the second checkpoint,receiving, at the security server, the data read, at the second checkpoint, from the wireless device of the consumer,comparing, by the security server, the data read at the second checkpoint with the data stored at the first checkpoint, andif the digital image captured at the first checkpoint matches the consumer at the second checkpoint and the data read at the second checkpoint matches the data stored at the first checkpoint, then authenticating the consumer at the second checkpoint.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×