×

Pedestrian traffic monitoring and analysis using location and authentication of mobile computing devices

  • US 9,571,981 B2
  • Filed: 10/09/2013
  • Issued: 02/14/2017
  • Est. Priority Date: 12/28/2012
  • Status: Active Grant
First Claim
Patent Images

1. A computer system comprising:

  • at least one processor;

    a computer readable medium that is operatively coupled to the processor;

    network access circuitry that is operatively coupled to the processor; and

    location monitoring and assessment logic (i) that executes at least in part in the processor from the computer readable medium and (ii) that, when executed, causes the processor to report traffic information regarding a population of people by performing a method, the method comprising;

    receiving a request for the traffic information from a remotely located client device, wherein the request specifies one or more attributes of the traffic information;

    in response to the request, determining respective locations of two or more computing devices wherein determining includes, for each of the computing devices;

    sending an authentication challenge to the computing device, wherein the authentication challenge specifies one or more parts of a digital fingerprint of the computing device to be provided by the computing device;

    receiving location data and authentication data from the computing device wherein the authentication data is responsive to the authentication challenge, and wherein the location data comprises (i) GPS location data if available, otherwise if GPS location data is not available (ii) coarse location data if available, otherwise if GPS location data and coarse location data are not available (iii) WiFi GUID information if available, otherwise if GPS location data, coarse location data, and WiFi GUID information are not available (iv) wireless telephone network base station identifying information;

    comparing the authentication data to predetermined authentication data associated with the computing device; and

    accepting a location identified by the location data as the respective location of the computing device upon a condition in which the authentication data matches the predetermined authentication data;

    preparing the traffic information from the attributes and the locations; and

    sending the traffic information to the client device.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×