Various embodiments described herein relate to user authentication, and more specifically to user authentication for location-based deliveries.
Many jurisdictions have rules where goods shipped in or out of the jurisdiction may be subjected to restrictions or taxes. Examples of activities that are exempt from such jurisdiction-based taxes include duty free shopping, which is applicable when a person is travelling from one country to another. Other examples of a jurisdiction-based restriction are that a person may need to be a certain age if particular goods are to be delivered to them, or the person who accepts delivery of particular goods needs to be authorized by the person who purchased the goods to be delivered. The goods may be moved from location A to location B after the purchase has occurred. The jurisdiction or location may be countries, states, counties, or particular geofenced areas.
Various embodiments of the present inventive concepts include a method for authenticating a user. The method includes authenticating a first user located at a first location for a transaction associated with an item, authenticating a second user located at a second location that is different from the first location, verifying that the first user at the first location corresponds to the second user at the second location, and authorizing access to the item at the second location, responsive to verifying that first user at the first location corresponds to the second user at the second location.
According to some embodiments, authenticating the first user may include obtaining first biometric information of the first user using a first device at the first location, and authenticating the second user may include obtaining second biometric information of the second user using a second device at the second location. The first biometric information and the second biometric information each may include one or more of fingerprinting, retina scans, iris recognition, facial recognition, voice identification, or finger vein identification.
According to some embodiments, verifying that the first user at the first location corresponds to the second user at the second location may include determining that first authentication information associated with the first user corresponds to second authentication information associated with the second user, and identifying that the second user is same as the first user, responsive to the first authentication information corresponding to the second authentication information.
According to some embodiments, the method may include determining that the second location corresponds to a delivery location established at a time of the transaction, and delivering the item to the delivery location, responsive to the authorizing access to the item. The method may include, prior to the transaction, transmitting a scan of an identification document of the user to a server that communicates with a validation agency, and receiving, from the server, an indication that the identification document has been accepted. The method may further include transmitting, responsive to the indication that the identification document being accepted, biometric identification information of the user for storing at the server. The biometric identification information may be used for authenticating the first user and/or for authenticating the second user.
According to some embodiments, the method may include determining that the second user at the second location is different from the first user at the first location, determining if the second user is an authorized recipient designated by the first user, and authorizing access to the item by the second user at the second location, responsive to determining that the second user is the authorized recipient designated by the first user. The method for authenticating the user may include receiving an indication from the first user indicating an identification of the second user as the authorized recipient. Authorizing access to the item may include determining if the item is a restricted delivery item, comparing one or more parameters of the second user corresponding to one or more restriction parameters associated with the restricted delivery item, and authorizing access to the item, responsive to the comparing the one or more parameters of the second user with the one or more restriction parameters associated with the restricted delivery item.
According to some embodiments, the delivery of the item is authorized if the second location of the second user is within a predetermined proximity of a delivery location established at a time of the transaction. The delivery of the item may be authorized for a specific time window. Authenticating the second user may include receiving, by the second user, a request from a delivery representative to provide biometric information, providing by the second user, the biometric information requested by the delivery representative, and verifying that the biometric information provided by the second user corresponds to stored biometric information that was stored in a server that is remote from the second user.
According to some embodiments, the first user may be the same as the second user. The method may include storing, in a database, a certificate associated with the transaction and biometric information of the first user, responsive to the transaction by the first user. The method may include retrieving the certificate and the biometric information of the first user from the database when the first user attempts to authenticate at the second location, verifying if the biometric information of the first user from the database matches with biometric information of the first user collected at the second location, and providing access to the certificate, responsive to verifying that the biometric information of the first user from the database matches with biometric information of the first user collected at the second location. The certificate may include a proof of vaccination, a prescription for a medication, and/or an authorization to carry the medication. A cost of the item may be determined based on the second location associated with delivery of the item. The cost may be provided to the first user upon delivery of the item.
According to some embodiments, a wireless electronic device may be configured to perform the operations described herein. According to some embodiments, a computer program product may include a non-transitory computer readable storage medium comprising computer readable program code therein that when executed by a processor causes the processor to perform operations described herein.
According to some embodiments, a wireless electronic device for authenticating a delivery of an item may include a transceiver configured to perform operations including receiving first biometric information of a user located at a first location corresponding to a transaction location associated with the item, and receiving second biometric information of the user located at a second location corresponding to a delivery location. The wireless electronic device may include one or more processors configured to perform operations including verifying that the first biometric information of the user at the first location corresponds to the second biometric information of the user at the second location, and authorizing access to the item at the second location, responsive to verifying that first biometric information corresponds to the second biometric information.
According to some embodiments, a system may include a server and a first wireless electronic device that includes a first processor configured to collect first biometric information of a user located at a first location for a transaction associated with an item, and a first transceiver configured to transmit the first biometric information from the wireless electronic device to the server. The system may include a second wireless electronic device that includes a second processor configured to collect second biometric information of the user located at a second location that is different from the first location, and a second transceiver configured to transmit the second biometric information from the wireless electronic device to the server. The server is configured to perform operations including verifying that the first biometric information of the user at the first location corresponds to the second biometric information of the user at the second location, and authorizing access to the item at the second location, responsive to verifying that first biometric information corresponds to the second biometric information.
According to some embodiments, authenticating the first user may include transmitting first biometric information of a first user for a transaction associated with an item from a first electronic device at a first location via a first communications link. A first indication that the first user has been biometrically authenticated may be received at the first electronic device via the first communications link. Second biometric information of a second user may be transmitted from a second electronic device at a second location via a second communications link. A second indication that the second user has been biometrically authenticated may be received at the second electronic device via the second communications link. A verification indication from a server that the first user at the first location corresponds to the second user at the second location may be received at the second electronic device. Access to the item at the second location may be authorized, responsive to receiving the verification indication from the server.
It is noted that aspects of the inventive concepts described with respect to one embodiment, may be incorporated in a different embodiment although not specifically described relative thereto. That is, all embodiments and/or features of any embodiment can be combined in any way and/or combination. Other operations according to any of the embodiments described herein may also be performed. These and other aspects of the inventive concepts are described in detail in the specification set forth below.
The accompanying drawings are included to provide a further understanding of the present disclosure and are incorporated in and constitute a part of this application. These drawings illustrate certain example embodiments. In the drawings:
Various embodiments will be described more fully hereinafter with reference to the accompanying drawings. Other embodiments may take many different forms and should not be construed as limited to the embodiments set forth herein. Like numbers refer to like elements throughout.
Secure authentication of a user making a transaction or purchase and/or receiving delivery of an item is needed for geographically remote distribution networks and/or for contactless transactions. Different jurisdictions related to the location of an order or a purchase and the location of a delivery or receipt of the order may have different rules that govern the transactions. The present inventive concepts arise from the recognition that a combination of authentication at a first jurisdiction in a location or geofenced area and authentication at a second jurisdiction that is in a different location from the previous geofenced location are needed for secure transactions. Authentication may include biometric authentication of the user and/or delivery recipient. In some embodiments, authentication may include password-based authentication, multi-factor authentication, certificate-based authentication, and/or token based authentication. In some embodiments, two or more types of authentication may be combined. For example, biometric authentication may be combined with another method of authentication before authenticating the user and authorizing delivery.
Prior to initiating transactions from the user, a setup operation may be performed in which the user establishes a profile and/or an account with a vendor or supplier. The setup process may include verifying the user's information such as age, citizenship, etc. by identification documents. These identification documents may, for example, be scanned via an application on a terminal or mobile device and verified remotely or by Artificial Intelligence (AI) in order to complete the account profile. This verification may be part of a sign up or registration process. Identification documents such as a driver's license or passport may be verified by recognizing portions of a scan or an image of the identification document, or by validating watermarks or other symbols in the identification document. In some embodiments, a scan or image of the identification document may be sent to a server at a validation agency or government agency that verifies and validates the document and/or identifying information. The server at the validation agency or government agency may send an indication to the vendor or server associated with the vendor that the identification document is valid. Upon verification, the information may be stored securely in an application database and/or vendor server so that this verification and/or identification process do not have to be repeated with each transaction and/or delivery. Thereafter, the application may verify the user via biometric identification such as fingerprinting, retina scans, iris recognition, facial recognition, voice identification, finger vein identification, etc. The biometric identification may be performed at a terminal or device at the location of the sale or order for goods or services. The biometric identification of the user may be validated locally at the terminal or device or related information may be sent to a secure server that validates the biometric identification. Biometric identification may also be used at the point of delivery or pickup of the purchased goods or services.
An authentication, such as biometric authentication, may be done by an application or other program on a terminal or mobile device at the time a person (or a business entity) places the order for the goods or services to be delivered. In some embodiments, the biometric authentication may be performed at a server that receives the biometric information collected from sensors associated with the terminal or mobile device. The location of the user may be stored in the terminal or device at the point of sale and/or in a database that is remote from the terminal or place of business. A unique order number may be assigned to the user that placed the order.
When a person such as the user that placed the order or a designated pick up person arrives in a location (i.e., different jurisdiction) where goods are to be delivered, applicable rules are checked related to the specific goods that are to be shipped or delivered. The user may be requested for the biometric information by an application running on a terminal at the pick-up location or on a mobile device associated with the user. If the biometric authentication matches with the authentication at the time or sale or order, and/or the location matches with the location (jurisdiction) of where the goods are supposed to be delivered, then the goods or services may be cleared for delivery.
Upon completing biometric authentication, goods may be delivered to a location (i.e., jurisdiction) which was identified at the time of sale or order. The delivery of the goods or services also may be accepted by a person who has the unique code or order number assigned at the time of order or purchase and/or meets the criteria to accept the goods (such as age, location, etc.). If the authorized recipient of goods is within proximity, goods can be delivered without a physical signature, thereby providing contactless delivery.
The present inventive concepts provide authentication of a person who purchased an item or service, verification that the same person or their designated agent moved from the location of purchase to a point of delivery or receipt of the item or service, and/or verification of physical location of the purchase and/or delivery. The different locations of the point of purchase and the point of delivery or receipt of the goods or services may be of importance in view of regulatory laws, trafficking laws, tax structure, and/or duty-free concessions associated with particular jurisdictions.
For example, regulatory laws may restrict the purchase of items such as guns, alcohol, marijuana, etc. These regulatory laws may be jurisdiction specific such that sales may be allowed in some townships, counties, states, or countries, but restricted in other areas. Trafficking laws may prevent, for example, making or selling goods in some jurisdictions and transferring these goods for sale in a different jurisdiction such as, for example, across state lines. Tax laws and duties that are imposed may vary in different jurisdictions. For example, a person that works and shops in New York, but resides in New Jersey, may pay taxes at the New Jersey tax rate on goods purchased in New York, but delivered to their residence in New Jersey. At the time and/or location of sale, the user's profile may indicate their residence and/or associated tax rate for New Jersey. The user may also manually indicate their residence/delivery jurisdiction at a terminal or mobile device on which an order or sale is placed. At the pickup or delivery of the goods or services, the user and/or the location may be authenticated in order to apply the proper tax rate that should be charged. In some cases, items may be designated as being duty-free if the user purchases in a first location and then receives the items or services at a second location.
The sale and/or delivery of items such as alcohol may be regulated in terms of time of sale, time of delivery, quantity of purchase, and/or verification of age of the purchaser and/or the delivery recipient. Conventional delivery of regulated items may require a signature from the recipient. Obtaining a signature by a delivery company may be inconvenient since it requires the recipient to be home at the time that the delivery representative attempts the delivery. Additionally, obtaining a signature typically includes interaction between the delivery representative and the recipient, which may not be desirable due to health and other concerns.
According to various embodiments described herein, a verification or authentication of the recipient may be performed by a terminal or other device using biometric authentication to determine if the purchaser or designated recipient is indeed an authorized recipient. The authentication may include determining if the recipient has been in the proximity of the designated delivery location (i.e., a geo-fenced area) within a period of time prior to the delivery. For example, a mobile device of the delivery recipient may indicate to a server accessible by the delivery company that the delivery recipient was in the house or building at the delivery address within the previous 12 hours of the attempted delivery. If the location of the user's mobile device has been in the delivery location within a threshold amount of time, the delivery may be authorized.
Specifically, the delivery recipient may have been within the geo-fenced area including the delivery address until 8:00 am, at which time they left to travel to their work location. The delivery recipient may log into an application on their mobile device, provide biometric authentication information, and authorize delivery of the package that day. In some embodiments, the recipient may need to verify their age or enter a code provided at the time of purchase in order to authenticate the delivery, in addition to providing the biometric information. A delivery representative may arrive four hours later, at 12:00 pm, to attempt to deliver the package. Upon arrival at the delivery location, the delivery representative may receive a notification that the recipient was authenticated and within the proximity during the last 12 hours. Therefore, the recipient is authenticated and the delivery representative may leave the package at the location since the recipient was authenticated based on their identity and their location. The delivery representative may be a person representing the vendor or a delivery company, or may be a drone that is configured to deliver packages based on various conditions described herein.
In some embodiments, the delivery may be completed only if the present location of the recipient is within a specified distance from the delivery location. For example, if the recipient is within five miles of the delivery location, such as at a local grocery store, gym, or workplace, the delivery may be authorized. However, if the recipient is farther than the specified distance, such as having traveled outside of the city or state, the delivery may not be authorized. In this case, the biometric authentication, the recent location of the recipient, and the present location of the recipient may be considered when authorizing the delivery.
According to some embodiments, timestamps may be used for various activities within the sale of an item or service. Various timestamps may be associated with the time of sale, the time of the recipient entering or leaving the delivery location, and/or the time of delivery. These timestamps may be compared to determine if delivery is authorized. For example, delivery of a perishable item such as milk may need to occur within a specific amount of time before the perishable item spoils. If the delivery representative arrives after the time window for delivery, the delivery may not be authorized and thus canceled. In some cases, the timestamps may be compared to provide a waiting period between purchase and delivery of the item. For example, many states have laws that require a waiting period before obtaining possession of a firearm. In this case, the timestamp at the time of purchase may be compared with the timestamp at the time of arrival of the delivery representative at the delivery location. If the delivery timestamp indicates that a sufficient amount of time has elapsed, then the item may be authorized for delivery. In some embodiments, the timestamps may be used to determine a price, bonus, or tip amount. For example, if the timestamp associated with the delivery is within a specific time period from the timestamp of the order being placed, the delivery may trigger payment of a bonus or a larger tip.
The timestamps and biometric authentications of the user may also be used in conjunction with the location at the purchase point and the location at delivery to determine if the same user traveled from one jurisdiction to another, thereby entitling them to a duty-free purchase. The server may also track the purchases of the user and limit or restrict the amounts of purchases allowed. For example, a particular user may be restricted from buying certain items due to age, or may be restricted to purchase of a limited amount of an item such as alcohol or marijuana. The biometric authentication at the purchase point may be used to track purchases by a particular user at a server, such that these limitations may be imposed on purchases and/or on deliveries.
Public safety or government agencies may be able to place restrictions on certain persons based on their biometric authentication. For example, purchase and/or delivery of particular items may be restricted on particular days or times based on the user profile and/or biometric data. For example, a user listed as a felon may not be allowed to take delivery of firearms but may be able to obtain other restricted items such as alcohol.
According to some embodiments, the order transaction or purchase are tied to authenticating a specific person, and thus the ability to receive the delivery is tied to the same physical person. The same person may need to be present for the purchase of the item or service and may also need to be present to receive delivery.
Some embodiments of the present inventive concepts may be applied to the healthcare industry, such as for a person receiving medications or vaccinations. A user may receive a vaccination, medication, or treatment at a healthcare provider. Biometric authentication at the point of medical service may validate that the given user indeed received the vaccination or other treatment, particularly when verification of vaccination is needed if they travel to another location. The user may be validated at the clinic as a particular user. A certificate of vaccination or treatment may be stored along with the biometric information of the user captured at the healthcare facility location. The certificate of vaccination may be stored on the user's mobile device and/or at a remote server. Location information may also be stored, in addition to the certificate and biometric information. The location where the biometric information is collected may be used to validate that the vaccination and/or related certificate were obtained at a valid healthcare facility location. When traveling, the user may be required to show proof of vaccination. Biometric information may be collected at the airport or at the travel destination and be used to validate that the particular traveler has indeed been vaccinated. The biometric information collected at the airport or travel destination may be compared with the biometric information captured at the healthcare facility to ensure that the same user had obtained the vaccination.
Similar concepts may be applied to provide authentication for the receipt or transport of medications. When a user is examined at a healthcare facility and obtains a prescription, they may be authenticated. Biometric information of the user, along with prescription information, may be stored at a server. The user may then go to a pharmacy or other medical dispensary at a location that is separate from the healthcare facility. The prescription record may be retrieved from the server. The user may then be biometrically authenticated to ensure that the same person that was seen in the healthcare facility and received the prescription is the one trying to obtain the medication. Similarly, a person in possession of a medicine may be traveling to a location that restricts the transport and use of that medicine. Upon arrival at the new location, the person may be authenticated by a device to verify against information stored at a server that the same person in possession of the medication has traveled. The biometric information of the person and the medication may be compared with the biometric information and prescription stored in the server.
Still referring to
According to some embodiments, a time associated with the delivery may be established when the transaction occurs in the first location. The time associated with the delivery may be a time window during which the delivery should occur. The time may be the latest time threshold before which the delivery needs to be completed. For example, some items such as milk or produce may spoil after a particular amount of time so the delivery needs to be completed before expiration of a time window. The time may be the earliest possible time that the delivery may occur. For example, a person ordering an item may be out of town and want the delivery only after they plan to return.
According to some embodiments, delivery of the item may be authorized if the second location of the second user is within a predetermined proximity of a delivery location established at a time of the transaction. For example, if the second user is in a nearby building as the delivery address (i.e., within a predetermined distance), then delivery of the item may be authorized such that the delivery representative may leave the package near the building. In some embodiments, the delivery of the item may be authorized for a specific time window, such as during the business day.
The wireless electronic device 1600 may be configured to perform operations described herein related to the mobile device and/or terminal. Some embodiments of the present inventive concepts may be directed to a computer program product that includes a non-transitory computer readable storage medium including computer readable program code therein that when executed by a processor causes the processor to perform operations described herein.
Still referring to
A server that is remote from the wireless electronic device 1600 may include a one or more processors configured to perform operations including verifying that the first biometric information of the user at the first location corresponds to the second biometric information of the user at the second location, and authorizing access to the item at the second location, responsive to verifying that first biometric information corresponds to the second biometric information. In some embodiments, the verification and the authorization of access to the item may be performed by the wireless electronic device 1600.
According to some embodiments, a system may include a server, a first wireless electronic device that includes a first processor configured to collect first biometric information of a user located at a first location for a transaction associated with an item, and a first transceiver configured to transmit the first biometric information from the wireless electronic device to the server. The system may include a second wireless electronic device that includes a second processor configured to collect second biometric information of the user located at a second location that is different from the first location, and a second transceiver configured to transmit the second biometric information from the wireless electronic device to the server. The server in the system may be configured to perform operations such as verifying that the first biometric information of the user at the first location corresponds to the second biometric information of the user at the second location, and authorizing access to the item at the second location, responsive to verifying that first biometric information corresponds to the second biometric information.
In the above-description of various embodiments of the present disclosure, it is to be understood that the terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. Unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this disclosure belongs. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of this specification and the relevant art, and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
When an element is referred to as being “connected”, “coupled”, “responsive”, or variants thereof to another element, it can be directly connected, coupled, or responsive to the other element or intervening elements may be present. In contrast, when an element is referred to as being “directly connected”, “directly coupled”, “directly responsive”, or variants thereof to another element, there are no intervening elements present. Like numbers refer to like elements throughout. Furthermore, “coupled”, “connected”, “responsive”, or variants thereof as used herein may include wirelessly coupled, connected, or responsive. As used herein, the singular forms “a”, “an” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. Well-known functions or constructions may not be described in detail for brevity and/or clarity. The term “and/or” includes any and all combinations of one or more of the associated listed items.
It will be understood that, although the terms first, second, third, etc. may be used herein to describe various elements, and elements should not be limited by these terms; rather, these terms are only used to distinguish one element from another element. Thus, a first element discussed could be termed a second element without departing from the scope of the present inventive concepts.
As used herein, the terms “comprise”, “comprising”, “comprises”, “include”, “including”, “includes”, “have”, “has”, “having”, or variants thereof are open-ended, and include one or more stated features, integers, elements, steps, components or functions but does not preclude the presence or addition of one or more other features, integers, elements, steps, components, functions or groups thereof.
Example embodiments are described herein with reference to block diagrams and/or flowchart illustrations of computer-implemented methods, apparatus (systems and/or devices) and/or computer program products. It is understood that a block of the block diagrams and/or flowchart illustrations, and combinations of blocks in the block diagrams and/or flowchart illustrations, can be implemented by computer program instructions that are performed by one or more computer circuits. These computer program instructions may be provided to a processor circuit of a general purpose computer circuit, special purpose computer circuit, and/or other programmable data processing circuit to produce a machine, such that the instructions, which execute via the processor of the computer and/or other programmable data processing apparatus, transform and control transistors, values stored in memory locations, and other hardware components within such circuitry to implement the functions/acts specified in the block diagrams and/or flowchart block or blocks, and thereby create means (functionality) and/or structure for implementing the functions/acts specified in the block diagrams and/or flowchart block(s).
These computer program instructions may also be stored in a tangible computer-readable medium that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable medium produce an article of manufacture including instructions which implement the functions/acts specified in the block diagrams and/or flowchart block or blocks.
A tangible, non-transitory computer-readable medium may include an electronic, magnetic, optical, electromagnetic, or semiconductor data storage system, apparatus, or device. More specific examples of the computer-readable medium would include the following: a portable computer diskette, a random access memory (RAM) circuit, a read-only memory (ROM) circuit, an erasable programmable read-only memory (EPROM or Flash memory) circuit, a portable compact disc read-only memory (CD-ROM), and a portable digital video disc read-only memory (DVD/Blu-ray).
The computer program instructions may also be loaded onto a computer and/or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer and/or other programmable apparatus to produce a computer-implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions/acts specified in the block diagrams and/or flowchart block or blocks. Accordingly, embodiments of the present disclosure may be embodied in hardware and/or in software (including firmware, resident software, micro-code, etc.) that runs on a processor such as a digital signal processor, which may collectively be referred to as “circuitry,” “a module” or variants thereof.
Aspects of the present disclosure are described herein with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the disclosure. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable instruction execution apparatus, create a mechanism for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer readable medium that when executed can direct a computer, other programmable data processing apparatus, or other devices to function in a particular manner, such that the instructions when stored in the computer readable medium produce an article of manufacture including instructions which when executed, cause a computer to implement the function/act specified in the flowchart and/or block diagram block or blocks. The computer program instructions may also be loaded onto a computer, other programmable instruction execution apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatuses or other devices to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide processes for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods, and computer program products according to various aspects of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems that perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
It should also be noted that in some alternate implementations, the functions/acts noted in the blocks may occur out of the order noted in the flowcharts. For example, two blocks shown in succession may in fact be executed substantially concurrently or the blocks may sometimes be executed in the reverse order, depending upon the functionality/acts involved. Moreover, the functionality of a given block of the flowcharts and/or block diagrams may be separated into multiple blocks and/or the functionality of two or more blocks of the flowcharts and/or block diagrams may be at least partially integrated. Finally, other blocks may be added/inserted between the blocks that are illustrated. Moreover, although some of the diagrams include arrows on communication paths to show a primary direction of communication, it is to be understood that communication may occur in the opposite direction to the depicted arrows.
Many different embodiments have been disclosed herein, in connection with the above description and the drawings. It will be understood that it would be unduly repetitious and obfuscating to literally describe and illustrate every combination and subcombination of these embodiments. Accordingly, the present specification, including the drawings, shall be construed to constitute a complete written description of various example combinations and subcombinations of embodiments and of the manner and process of making and using them, and shall support claims to any such combination or subcombination. Many variations and modifications can be made to the embodiments without substantially departing from the principles described herein. All such variations and modifications are intended to be included herein within the scope.
Number | Name | Date | Kind |
---|---|---|---|
5243652 | Teare et al. | Sep 1993 | A |
5351293 | Michener et al. | Sep 1994 | A |
6119096 | Mann et al. | Sep 2000 | A |
6985588 | Glick et al. | Jan 2006 | B1 |
7120254 | Glick et al. | Oct 2006 | B2 |
7143289 | Denning et al. | Nov 2006 | B2 |
7194273 | Vaudreuil | Mar 2007 | B2 |
7500607 | Williams | Mar 2009 | B2 |
7512989 | Scott | Mar 2009 | B2 |
7660418 | Glick et al. | Feb 2010 | B2 |
7866544 | Block et al. | Jan 2011 | B1 |
8064378 | Karabinis | Nov 2011 | B2 |
8254902 | Bell et al. | Aug 2012 | B2 |
8280787 | Gandhi | Oct 2012 | B1 |
8328094 | Proud et al. | Dec 2012 | B2 |
8438066 | Yuen et al. | May 2013 | B1 |
8566233 | Prakash et al. | Oct 2013 | B2 |
8604901 | Hoyos et al. | Dec 2013 | B2 |
8626194 | Busch | Jan 2014 | B2 |
9197414 | Martin et al. | Nov 2015 | B1 |
9203793 | Kandekar et al. | Dec 2015 | B2 |
9239993 | Bergdale et al. | Jan 2016 | B2 |
9501773 | Dai | Nov 2016 | B2 |
9661216 | Tilt et al. | May 2017 | B2 |
9723010 | Kerr | Aug 2017 | B2 |
9749664 | Watson et al. | Aug 2017 | B1 |
10332162 | Brock et al. | Jun 2019 | B1 |
10650621 | King et al. | May 2020 | B1 |
11055800 | Singh | Jul 2021 | B2 |
20010016825 | Pugliese et al. | Aug 2001 | A1 |
20030027551 | Rockwell | Feb 2003 | A1 |
20030169881 | Niedermeyer | Sep 2003 | A1 |
20030174049 | Beigel et al. | Sep 2003 | A1 |
20040142658 | Mckenna et al. | Jul 2004 | A1 |
20040169589 | Lea et al. | Sep 2004 | A1 |
20050039208 | Veeck et al. | Feb 2005 | A1 |
20050256724 | Rasin et al. | Nov 2005 | A1 |
20060046746 | Ranford et al. | Mar 2006 | A1 |
20060055512 | Chew | Mar 2006 | A1 |
20060122729 | Murphy | Jun 2006 | A1 |
20060242027 | Falic | Oct 2006 | A1 |
20060245620 | Roques et al. | Nov 2006 | A1 |
20070046426 | Ishibashi | Mar 2007 | A1 |
20070053306 | Stevens | Mar 2007 | A1 |
20070055672 | Stevens | Mar 2007 | A1 |
20070055785 | Stevens | Mar 2007 | A1 |
20070233615 | Tumminaro | Oct 2007 | A1 |
20080102956 | Burman et al. | May 2008 | A1 |
20080102957 | Burman et al. | May 2008 | A1 |
20080162346 | Aaron et al. | Jul 2008 | A1 |
20080227434 | Nitta et al. | Sep 2008 | A1 |
20080302870 | Berini et al. | Dec 2008 | A1 |
20090042557 | Vardi et al. | Feb 2009 | A1 |
20090098921 | Manning et al. | Apr 2009 | A1 |
20090171842 | Blythe | Jul 2009 | A1 |
20090204457 | Buhrmann et al. | Aug 2009 | A1 |
20090215427 | Hawkins | Aug 2009 | A1 |
20090251282 | Fitzgerald et al. | Oct 2009 | A1 |
20100046553 | Daigle et al. | Feb 2010 | A1 |
20100094693 | Corke | Apr 2010 | A1 |
20100175001 | Lazarus et al. | Jul 2010 | A1 |
20100198728 | Aabye et al. | Aug 2010 | A1 |
20100308108 | Choi et al. | Dec 2010 | A1 |
20110022517 | Hammad | Jan 2011 | A1 |
20110066513 | Fournier et al. | Mar 2011 | A1 |
20110091092 | Nepomriiachtchi et al. | Apr 2011 | A1 |
20110130885 | Bowen et al. | Jun 2011 | A1 |
20110137804 | Peterson | Jun 2011 | A1 |
20110177831 | Huang | Jul 2011 | A1 |
20110179064 | Russo | Jul 2011 | A1 |
20110288768 | Stefani et al. | Nov 2011 | A1 |
20110313930 | Bailey | Dec 2011 | A1 |
20120015622 | Kuz et al. | Jan 2012 | A1 |
20120052787 | Zecha et al. | Mar 2012 | A1 |
20120144458 | Mechaley | Jun 2012 | A1 |
20120150686 | Aldomar et al. | Jun 2012 | A1 |
20120166257 | Shiragami et al. | Jun 2012 | A1 |
20120181333 | Krawczewicz et al. | Jul 2012 | A1 |
20120203665 | Morgan et al. | Aug 2012 | A1 |
20120330787 | Hanson et al. | Dec 2012 | A1 |
20120330788 | Hanson et al. | Dec 2012 | A1 |
20130079001 | Edara | Mar 2013 | A1 |
20130091452 | Sorden et al. | Apr 2013 | A1 |
20130117109 | Busch | May 2013 | A1 |
20130160087 | Davis et al. | Jun 2013 | A1 |
20130166340 | Salame | Jun 2013 | A1 |
20130305059 | Gormley et al. | Nov 2013 | A1 |
20130346310 | Burger et al. | Dec 2013 | A1 |
20140018111 | Farley et al. | Jan 2014 | A1 |
20140032346 | Hong et al. | Jan 2014 | A1 |
20140156318 | Behun et al. | Jun 2014 | A1 |
20140181927 | Sarkissian | Jun 2014 | A1 |
20140244411 | Kim et al. | Aug 2014 | A1 |
20140254693 | Mitchell et al. | Sep 2014 | A1 |
20140278220 | Yuen | Sep 2014 | A1 |
20140297067 | Malay | Oct 2014 | A1 |
20140344011 | Dogin et al. | Nov 2014 | A1 |
20140380501 | Niss | Dec 2014 | A1 |
20150057925 | Schreiber | Feb 2015 | A1 |
20150066797 | Outwater | Mar 2015 | A1 |
20150088619 | Larson et al. | Mar 2015 | A1 |
20150096813 | Aumente | Apr 2015 | A1 |
20150109428 | Mechaley | Apr 2015 | A1 |
20150127536 | Van Den Broeck et al. | May 2015 | A1 |
20150142612 | Hanna et al. | May 2015 | A1 |
20150193764 | Haggerty et al. | Jul 2015 | A1 |
20150242832 | Corritori et al. | Aug 2015 | A1 |
20150296450 | Koo et al. | Oct 2015 | A1 |
20150302409 | Malek et al. | Oct 2015 | A1 |
20150373121 | Secilmis | Dec 2015 | A1 |
20150380501 | Koshi et al. | Dec 2015 | A1 |
20160048796 | Todasco | Feb 2016 | A1 |
20160050203 | Hefetz | Feb 2016 | A1 |
20160078397 | Barton | Mar 2016 | A1 |
20160099905 | Kandekar et al. | Apr 2016 | A1 |
20160148449 | God et al. | May 2016 | A1 |
20160189096 | Tang et al. | Jun 2016 | A1 |
20160286258 | Rajagopal et al. | Sep 2016 | A1 |
20160343187 | Trani | Nov 2016 | A1 |
20160352412 | Di Costanzo et al. | Dec 2016 | A1 |
20160364559 | Bali et al. | Dec 2016 | A1 |
20160368456 | Outwater et al. | Dec 2016 | A1 |
20170063549 | Zwart et al. | Mar 2017 | A1 |
20170068930 | Attar | Mar 2017 | A1 |
20170161716 | Hurley et al. | Jun 2017 | A1 |
20170180036 | Schaupmann et al. | Jun 2017 | A1 |
20170193419 | Haparnas et al. | Jul 2017 | A1 |
20170206345 | Lacous et al. | Jul 2017 | A1 |
20170233098 | Gerard | Aug 2017 | A1 |
20170262798 | Kosseifi | Sep 2017 | A1 |
20170278156 | Parekh | Sep 2017 | A1 |
20170302711 | Velayudhan et al. | Oct 2017 | A1 |
20170372541 | Attar | Dec 2017 | A1 |
20180007137 | Watson et al. | Jan 2018 | A1 |
20180027037 | Watson et al. | Jan 2018 | A1 |
20180027070 | Jhanji et al. | Jan 2018 | A1 |
20180049250 | Perng et al. | Feb 2018 | A1 |
20180098227 | Carnelli et al. | Apr 2018 | A1 |
20180211527 | Ishihara et al. | Jul 2018 | A1 |
20180234707 | Pujia et al. | Aug 2018 | A1 |
20190035042 | Attar | Jan 2019 | A1 |
20190095942 | Lee et al. | Mar 2019 | A1 |
20190108690 | Mølmann et al. | Apr 2019 | A1 |
20190148025 | Stone et al. | May 2019 | A1 |
20190230212 | Spracklin et al. | Jul 2019 | A1 |
20190356741 | Watson et al. | Nov 2019 | A1 |
20200042812 | Sakaguchi et al. | Feb 2020 | A1 |
20200210951 | Perez | Jul 2020 | A1 |
20200265373 | Koh | Aug 2020 | A1 |
20210166257 | Roeding et al. | Jun 2021 | A1 |
20210192656 | Singh | Jun 2021 | A1 |
Number | Date | Country |
---|---|---|
106796710 | May 2017 | CN |
1470717 | Oct 2004 | EP |
2002304376 | Oct 2002 | JP |
2002335350 | Nov 2002 | JP |
2004240725 | Aug 2004 | JP |
2005122700 | May 2005 | JP |
2007058469 | Mar 2007 | JP |
2007088514 | Apr 2007 | JP |
2008085977 | Apr 2008 | JP |
2010212906 | Sep 2010 | JP |
2012151735 | Aug 2012 | JP |
2012531689 | Dec 2012 | JP |
2716517 | Mar 2020 | RU |
0035216 | Jun 2000 | WO |
2012052787 | Apr 2012 | WO |
2013163326 | Oct 2013 | WO |
2017167568 | Oct 2017 | WO |
2019112894 | Jun 2019 | WO |
Entry |
---|
“Mobile Passport Control” published by Flysfo.com, 1 page (Jul. 18, 2015). |
Pozzebon, Alessandro “The PITAGORA project: Near field communication to improve passenger experience in airports” 2017 IEEE International Conference on RFID Technology & Application (RFID-TA) (pp. 63-68) (2017). |
Rogers, Jason Lee “Authenticating airline passengers” IEEE Potentials 22(1):33-35 (Feb-Mar. 2003). |
““Features” MamaBear App ©2012 Retrieved from URL: http://mamabearapp.com/features/ (2 pages) (retrieved Mar. 12, 2014)”. |
““Frequently Asked Questions” Textecution ©2014 Retrieved from URL: http://www.textecution.com/faqs.php (2 pages) (retrieved Mar. 12, 2014)”. |
“DUNCAN, Geoff “The Future of Digital Payments: Square Care Case, Google Wallet, and More” Digital Trends (3 pages) (Nov. 2, 2011)”. |
“LEE, Amy “Footprints iPhone App Lets You Track Your Kids, Spouse, Friends (PICTURES)” The Huffington Post (2 pages) (May 5, 2011)”. |
“Abstract—End-to-end passenger travel assistance from airport to airport with wearable device”, Oct. 23, 2014, 1 p. |
“Abstract—Notification and Communication System for Boarding Airlines using Passenger Real-Time Status and Location Telecommunication Services”, Jun. 20, 2008, 1 p. |
Bernal, Esteban , et al., “Onboard Condition Monitoring Sensors Systems and Techniques for Freight Railway Vehicles: A Review”, IEEE Sensors Journal, vol. 19, No. 1, Jan. 1, 2019, pp. 4-24. |
Groza, Bogdan , et al., “PRESTvO: PRivacy Enabled Smartphone based access To vehicle On-board units”, IEEE Access, vol. 8, Jun. 19, 2020, 18 pp. |
Herdiyanto, Dedy Wahyu, et al., “Passenger Authentication and Payment System Using RFID Based On-Board Unit for Surabaya Mass Rapid Transportation”, 2016 International Seminar on Intelligent Technology and Its Applications (ISITIA), Jul. 28-30, 2016, Lombok, Indonesia, Jan. 20, 2017, pp. 305-310. |
Li, Lin , et al., “Airborne Operation of Portable Electronic Devices”, IEEE Antenna's and Propagation Magazine, vol. 44, No. 4, Aug. 2002, pp. 30-39. |
Narzt, Wolfgang , et al., “Be-In/Be-Out with Bluetooth Low Energy: Implicit Ticketing for Public Transportation Systems”, 2015 IEEE 18th International Conference on Intelligent Transportation Systems, Proceedings, ITSC, Sep. 15-18, 2015, Gran Canaria, Spain, Oct. 30, 2015, pp. 1551-1556. |
Restrepo-Calle, Felipe , et al., “A Vehicle Tracking Device With Built-in Safety Features for Public Transportation Systems”, 2019 2nd Latin American Conference on Intelligent Transportation Systems (ITS LATAM), Mar. 19-20, 2019, Bogota Colombia, Mar. 19, 2019, 6 pp. |
Sampigethaya, Krishna, et al., “Aviation Cyber-Physical Systems: Foundations for Future Aircraft and Air Transport”, Proceedings of the IEEE, vol. 101, No. 8, Aug. 2013, pp. 1834-1855. |
Sampigethaya, Krishna, et al., “Secure Operation, Control, and Maintenance of Future E-Enabled Airplanes”, Proceedings of the IEEE, vol. 96, No. 12, Dec. 2008, pp. 1992-2007. |
Shaikh, Farooq , et al., “A Review of Recent Advances and Security Challenges in Emerging E-Enabled Aircraft Systems”, IEEE Access, vol. 7, May 2019, pp. 63164-63180. |
STIC , “EIC 3600 Search Report”, dated Jul. 13, 2021, 12 pp. |
STIC , “EIC Search Report”, dated Sep. 15, 2021, 20 pp. |
Strauss, Bill , et al., “Unsafe at Any Airspeed?”, IEEE Spectrum, vol. 43, Issue 3, Mar. 2006, pp. 44-49. |
Zimmerman, Thomas , et al., “Travel Card: Airport Self-Check In Using a Wireless PDA”, 2001 IEEE Intelligent Transportation Systems Conference Proceedings, Aug. 25-29, 2001, Oakland, CA, Oct. 22, 2001, pp. 1224-1228. |