System and method for electronic ticket verification, identification, and authorization with a wireless communication device
First Claim
1. A method, comprising:
- receiving, at a security server from a vendor server, a symbology, the symbology associated with an electronic ticket purchased by a consumer and associated with personally identifiable information provided by the consumer;
after receiving the symbology from the vendor server, receiving, at the security server, the symbology from a wireless device of the consumer located at a first checkpoint;
comparing, by the security server, the symbology received from the vendor server with the symbology received from the wireless device of the consumer at the first checkpoint;
if the symbology received from the wireless device of the consumer at the first checkpoint matches the symbology received from the vendor server, authenticating, by the security server, the consumer at the first checkpoint;
while comparing the symbology received from the vendor server with the symbology received from the wireless device of the consumer at the first checkpoint and authenticating the consumer,receiving, at the security server, a digital image of the consumer captured at the first checkpoint, andreceiving, at the security server, data stored, at the first checkpoint, on the wireless device of the consumer;
receiving, at the security server, the symbology from the wireless device of the consumer located at a second checkpoint; and
in response to receiving the symbology from the wireless device of the consumer located at the second checkpoint,providing, by the security server, a copy of the digital image of the consumer to the second checkpoint,receiving, at the security server, the data read, at the second checkpoint, from the wireless device of the consumer,comparing, by the security server, the data read at the second checkpoint with the data stored at the first checkpoint, andif the digital image captured at the first checkpoint matches the consumer at the second checkpoint and the data read at the second checkpoint matches the data stored at the first checkpoint, then authenticating the consumer at the second checkpoint.
1 Assignment
0 Petitions
Accused Products
Abstract
An enhanced security system utilizes a consumer wireless device and independent secure servers to enhance identification and authentication of the electronic ticketing. The consumer may make an eTicket purchase using a network, such as the Internet, in a conventional manner. The server involved in the purchase may send an eTicket confirmation to a consumer wireless device. However, master records of the transaction are sent via a secure link to a vendor server, typically associated with a wireless service provider. At a point just-in-time, the vendor server transmits symbology to the consumer wireless device and transmits additional data related to the symbology to a security server. When the consumer arrives with the eTicket, the consumer also uses the displayed symbology on the consumer wireless device. The symbology is scanned and compared with data transmitted from the vendor server to the security server. If authenticated, the eTicket may be authenticated. In addition, a near field communicator in the consumer wireless device may be programmed to provide additional security. The programmed NFC may be scanned to provide additional authentication.
32 Citations
14 Claims
-
1. A method, comprising:
-
receiving, at a security server from a vendor server, a symbology, the symbology associated with an electronic ticket purchased by a consumer and associated with personally identifiable information provided by the consumer; after receiving the symbology from the vendor server, receiving, at the security server, the symbology from a wireless device of the consumer located at a first checkpoint; comparing, by the security server, the symbology received from the vendor server with the symbology received from the wireless device of the consumer at the first checkpoint; if the symbology received from the wireless device of the consumer at the first checkpoint matches the symbology received from the vendor server, authenticating, by the security server, the consumer at the first checkpoint; while comparing the symbology received from the vendor server with the symbology received from the wireless device of the consumer at the first checkpoint and authenticating the consumer, receiving, at the security server, a digital image of the consumer captured at the first checkpoint, and receiving, at the security server, data stored, at the first checkpoint, on the wireless device of the consumer; receiving, at the security server, the symbology from the wireless device of the consumer located at a second checkpoint; and in response to receiving the symbology from the wireless device of the consumer located at the second checkpoint, providing, by the security server, a copy of the digital image of the consumer to the second checkpoint, receiving, at the security server, the data read, at the second checkpoint, from the wireless device of the consumer, comparing, by the security server, the data read at the second checkpoint with the data stored at the first checkpoint, and if the digital image captured at the first checkpoint matches the consumer at the second checkpoint and the data read at the second checkpoint matches the data stored at the first checkpoint, then authenticating the consumer at the second checkpoint. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A security server, comprising:
-
a processor; and a method storing instructions that, when executed by the processor, cause the processor to perform operations comprising receiving, from a vendor server, a symbology, the symbology associated with an electronic ticket purchased by a consumer and associated with personally identifiable information provided by the consumer, after receiving the symbology from the vendor server, receiving the symbology from a wireless device of the consumer located at a first checkpoint, comparing the symbology received from the vendor server with the symbology received from the wireless device of the consumer at the first checkpoint, if the symbology received from the wireless device of the consumer at the first checkpoint matches the symbology received from the vendor server, authenticating the consumer at the first checkpoint, while comparing the symbology received from the vendor server with the symbology received from the wireless device of the consumer at the first checkpoint and authenticating the consumer, receiving a digital image of the consumer captured at the first checkpoint, and receiving data stored, at the first checkpoint, on the wireless device of the consumer, receiving the symbology from the wireless device of the consumer located at a second checkpoint, and in response to receiving the symbology from the wireless device of the consumer located at the second checkpoint, providing a copy of the digital image of the consumer to the second checkpoint, receiving the data read, at the second checkpoint, from the wireless device of the consumer, comparing the data read at the second checkpoint with the data stored at the first checkpoint, and if the digital image captured at the first checkpoint matches the consumer at the second checkpoint and the data read at the second checkpoint matches the data stored at the first checkpoint, then authenticating the consumer at the second checkpoint. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
Specification