Systems and methods for location-based automated authentication
First Claim
1. A system for location-based automated authentication, comprising:
- a user device, a sensor and a backend platform;
wherein the sensor and the backend platform are in network communication;
wherein the user device is operable to construct a Bluetooth Low Energy (BLE) signal through;
constructing a unique value based on an original account timestamp, a changing time interval, and a current timestamp;
encrypting the unique value with a unique encryption key and compressing the encrypted unique value to derive a changing encrypted identifier, wherein the changing encrypted identifier changes based on the changing time interval;
combining the changing encrypted identifier with a unique identifier to form an encrypted transitory identifier;
packaging the encrypted transitory identifier into the BLE signal;
wherein the user device is operable to continuously transmit the BLE signal comprising the encrypted transitory identifier;
wherein the sensor is operable to receive the BLE signal from the user device when the user device is within a predetermined range, and transmit the encrypted transitory identifier comprised in the BLE signal to the backend platform;
wherein the backend platform is operable to;
extract the unique identifier and the changing encrypted identifier from the received encrypted transitory identifier;
retrieve user identification parameters based on the unique identifier, wherein the user identification parameters include the original account timestamp, the changing time interval, the current timestamp, and the unique encryption key;
construct a second unique value based on the user identification parameters;
encrypt the second unique value with the unique encryption key and compress the encrypted second unique value to derive a second changing encrypted identifier;
validate a user identification by comparing the second changing encrypted identifier and the extracted changing encrypted identifier;
charge a user account according to a predefined amount upon validating the user identification; and
generate and store a log of charges and send a charge notification to the user device.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods for location-based automated authentication are disclosed. A system comprises a mobile device, a sensor and a backend platform. The sensor and the backend platform is in network communication. The mobile device is operable to continuously transmit Bluetooth Low Energy (BLE) signals comprising encrypted transitory identifiers. The sensor is operable to receive a BLE signal from the mobile device when the mobile device is within a predetermined range, and communicate over a network connection the encrypted transitory identifier comprised in the BLE signal to the backend platform. The backend platform is operable to extract a unique identifier and a changing encrypted identifier from the received encrypted transitory identifier, generate a changing encrypted identifier, and validate a user identification by comparing the generated changing encrypted identifier and the extracted encrypted transitory identifier.
19 Citations
15 Claims
-
1. A system for location-based automated authentication, comprising:
-
a user device, a sensor and a backend platform; wherein the sensor and the backend platform are in network communication; wherein the user device is operable to construct a Bluetooth Low Energy (BLE) signal through; constructing a unique value based on an original account timestamp, a changing time interval, and a current timestamp; encrypting the unique value with a unique encryption key and compressing the encrypted unique value to derive a changing encrypted identifier, wherein the changing encrypted identifier changes based on the changing time interval; combining the changing encrypted identifier with a unique identifier to form an encrypted transitory identifier; packaging the encrypted transitory identifier into the BLE signal; wherein the user device is operable to continuously transmit the BLE signal comprising the encrypted transitory identifier; wherein the sensor is operable to receive the BLE signal from the user device when the user device is within a predetermined range, and transmit the encrypted transitory identifier comprised in the BLE signal to the backend platform; wherein the backend platform is operable to; extract the unique identifier and the changing encrypted identifier from the received encrypted transitory identifier; retrieve user identification parameters based on the unique identifier, wherein the user identification parameters include the original account timestamp, the changing time interval, the current timestamp, and the unique encryption key; construct a second unique value based on the user identification parameters; encrypt the second unique value with the unique encryption key and compress the encrypted second unique value to derive a second changing encrypted identifier; validate a user identification by comparing the second changing encrypted identifier and the extracted changing encrypted identifier; charge a user account according to a predefined amount upon validating the user identification; and generate and store a log of charges and send a charge notification to the user device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method for location-based automated authentication, comprising:
-
a user device constructing a unique value based on an original account timestamp, a changing time interval, and a current timestamp; the user device encrypting the unique value with a unique encryption key and compressing the encrypted unique value to derive a changing encrypted identifier, wherein the changing encrypted identifier changes based on the changing time interval; the user device combining the changing encrypted identifier with a unique identifier to form an encrypted transitory identifier; the user device packaging the encrypted transitory identifier into a Bluetooth Low Energy (BLE) signal; the user device continuously transmitting the BLE signal; a sensor receiving the BLE signal when the user device is within a predetermined range; the sensor communicating the encrypted transitory identifier comprised in the BLE signal to a backend platform via network communication; the backend platform receiving the encrypted transitory identifier; the backend platform extracting the unique identifier and the changing encrypted identifier from the received encrypted transitory identifier; the backend platform retrieving user identification parameters based on the unique identifier, including the original account timestamp, the changing time interval, the current timestamp, and the unique encryption key and constructing a second unique value based on the user identification parameters; the backend platform encrypting the second unique value with the unique encryption key and compressing the encrypted second unique value to derive a second changing encrypted identifier; the backend platform validating a user identification by comparing the second changing encrypted identifier and the extracted changing encrypted identifier; and the backend platform providing a visual indication of a successful validation or an unsuccessful validation. - View Dependent Claims (12, 13, 14, 15)
-
Specification