×

Accessing secure areas based on identification via personal device

  • US 9,734,643 B2
  • Filed: 07/10/2014
  • Issued: 08/15/2017
  • Est. Priority Date: 07/10/2014
  • Status: Active Grant
First Claim
Patent Images

1. A method, comprising:

  • receiving, by a location determination and user identification system operating in a personal computing device having at least one processor, data associated with a signal from a location beacon, the signal being a low-power radio signal emitted from a location beacon at a banking center of a financial institution;

    determining, by the location determination and user identification system operating in the personal computing device, a location of the personal computing device based on the received data associated with the signal emitted from the location beacon, wherein the location of the personal computing device is within a predefined proximity of a location of the location beacon;

    identifying, by the location determination and user identification system, a unique identifier associated with the personal computing device within the predefined proximity of the location of the location beacon, the unique identifier including an international mobile station equipment identity (IMEI) of the personal computing device;

    based on the unique identifier associated with the personal computing device within the predefined proximity of the location of the location beacon, identifying a user associated with the personal computing device within the predefined proximity of the location of the location beacon;

    determining, by the location determination and user identification system, whether the identified user is entitled to access a secure area within the banking center;

    responsive to determining that the user is entitled to access to the secure area, providing access to the secure area within the banking center to the user based on the identification of the user associated with the personal computing device, the access being provided for a predetermined amount of time;

    determining whether the user has accessed the secure area within the predetermined amount of time; and

    responsive to determining that the user has not accessed the secure area within the predetermined amount of time, canceling the provided access.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×