Authors:
Guek Wu Neo, Cheng Hwee Chua, Danny Leow
Abstract:
Authentication based on specified sequence of travel event linked locations on a specific date. To achieve a finer authentication from User’s sequence of location(s) and check into date generated out of his/her travel habit or routine
Background:
In today's world unfortunately our identities and financial data is stolen and used to make un authorized purchases. Adding additional authentication methods would improve financial security. To achieve a finer authentication from User’s sequence of location(s) generated out of his/her travel habit or routine. Authentication based on specified sequence of event linked locations with a specified check in times and date. There are habits or routines that we follow when traveling. This could be used to provide extra security or used as a mean to denote the identity of the user. This disclosure is proposing using a sequence of event linked locations and check in to dates as a ‘pass’ or ‘permission to authenticate’.
Description:
This disclosure is to use ‘sequence of event linked locations as a check into 'date’ as a ‘pass’ or ‘permission to authenticate’. Below is illustration of using it as an authentication to have a cup of coffee.
Example ‘Pass’ for payment of Coffee( Kopi)
- Travelled to point A and B that is off 100KM
- Check in time approx. 8-805am
- Once could provide the verification for it, will be granted the payment.
- Verification could be generated through GPS travelled to route/roads/location check in
Eg.
- I set the passcode for Kopi at Shop Atlas is travelled through High School A, Company D, temple Z within the time range and valid time is morning coffee only
- During the travel, i am actually formulation/preparing the chain of authentication(verification code) that I need. Reach one location, the information is captured.
- To obtain a Kopi at Shop Atlas in the morning time, all I need to do is to furnish the proof that I have travelled to these named locations within the time range and I am granted the permission to have the coffee.
- The verification code could be generated via an app
Claims:
- To achieve a finer authentication from User’s sequence of location(s) check-in generated out of his/her travel habits or routine. With the use of such formulation out from User’s sequence of location(s) check-in for use as Authentication, it increases the difficulty level and increase the time required to falsify your identity.
Related Art:
Location Based Authentication https://core.ac.uk/download/pdf/303942823.pdf
Using trusted devices to augment location-based account protection https://patents.google.com/patent/US9449156
Systems and Methods for Providing Location-Based Application Authentication Using a Location Token Service https://patents.google.com/patent/US20110092185
Location based authentication https://patents.google.com/patent/US8321913
TGCS Reference 2953