×

Systems and methods for location-based automated authentication

  • US 9,922,473 B1
  • Filed: 01/23/2017
  • Issued: 03/20/2018
  • Est. Priority Date: 01/23/2017
  • Status: Active Grant
First Claim
Patent Images

1. A system for location-based automated authentication, comprising:

  • a user device, a sensor and a backend platform;

    wherein the sensor and the backend platform are in network communication;

    wherein the user device is operable to construct a Bluetooth Low Energy (BLE) signal through;

    constructing a unique value based on an original account timestamp, a changing time interval, and a current timestamp;

    encrypting the unique value with a unique encryption key and compressing the encrypted unique value to derive a changing encrypted identifier, wherein the changing encrypted identifier changes based on the changing time interval;

    combining the changing encrypted identifier with a unique identifier to form an encrypted transitory identifier;

    packaging the encrypted transitory identifier into the BLE signal;

    wherein the user device is operable to continuously transmit the BLE signal comprising the encrypted transitory identifier;

    wherein the sensor is operable to receive the BLE signal from the user device when the user device is within a predetermined range, and transmit the encrypted transitory identifier comprised in the BLE signal to the backend platform;

    wherein the backend platform is operable to;

    extract the unique identifier and the changing encrypted identifier from the received encrypted transitory identifier;

    retrieve user identification parameters based on the unique identifier, wherein the user identification parameters include the original account timestamp, the changing time interval, the current timestamp, and the unique encryption key;

    construct a second unique value based on the user identification parameters;

    encrypt the second unique value with the unique encryption key and compress the encrypted second unique value to derive a second changing encrypted identifier;

    validate a user identification by comparing the second changing encrypted identifier and the extracted changing encrypted identifier;

    charge a user account according to a predefined amount upon validating the user identification; and

    generate and store a log of charges and send a charge notification to the user device.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×