Share
Linked In Facebook X (Twitter) Copy
Publication

Authentication Based on Stated Sequence of Locations

Share
Linked In
Facebook
Twitter
Copy
Share
banner image

Authors: 
Guek Wu Neo, Cheng Hwee Chua, Danny Leow

Abstract:
Authentication based on specified sequence of travel event linked locations on a specific date. To achieve a finer authentication from User’s sequence of location(s) and check into date generated out of his/her travel habit or routine

 Background:
In today's world unfortunately our identities and financial data is stolen and used to make un authorized purchases. Adding additional authentication methods would improve financial security. To achieve a finer authentication from User’s sequence of location(s) generated out of his/her travel habit or routine. Authentication based on specified sequence of event linked locations with a specified check in times and date. There are habits or routines that we follow when traveling. This could be used to provide extra security or used as a mean to denote the identity of the user. This disclosure is proposing using a sequence of event linked locations and check in to dates  as a ‘pass’ or ‘permission to authenticate’.

Description:
This disclosure is to use ‘sequence of event linked locations as a check into 'date’ as a ‘pass’ or ‘permission to authenticate’. Below is illustration of using it as an authentication to have a cup of coffee.

Example ‘Pass’ for payment of Coffee( Kopi)

  •  Travelled to point A and B that is off 100KM
  •  Check in time approx. 8-805am
  •  Once could provide the verification for it, will be granted the payment.
  •  Verification could be generated through GPS travelled to route/roads/location check in

Eg.

  1. I set the passcode for Kopi at Shop Atlas is travelled through High School A, Company D, temple Z within the time range and valid time is morning coffee only
  2. During the travel, i am actually formulation/preparing the chain of authentication(verification code) that I need. Reach one location, the information is captured.
  3. To obtain a Kopi at Shop Atlas in the morning time, all I need to do is to furnish the proof that I have travelled to these named locations within the time range and I am granted the permission to have the coffee.
  4. The verification code could be generated via an app

Claims:

  • To achieve a finer authentication from User’s sequence of location(s) check-in generated out of his/her travel habits or routine. With the use of such formulation out from User’s sequence of location(s) check-in for use as Authentication, it increases the difficulty level and increase the time required to falsify your identity.

 

Related Art:

Location Based Authentication https://core.ac.uk/download/pdf/303942823.pdf

Using trusted devices to augment location-based account protection https://patents.google.com/patent/US9449156

Systems and Methods for Providing Location-Based Application Authentication Using a Location Token Service https://patents.google.com/patent/US20110092185

Location based authentication https://patents.google.com/patent/US8321913

 

TGCS Reference 2953

Contact Intellectual Property department for more information