CPC G06Q 50/265 (2013.01) [G06F 3/0482 (2013.01); G06F 3/0483 (2013.01); G06F 16/29 (2019.01); G06F 16/9538 (2019.01); G06Q 50/30 (2013.01); G07C 9/32 (2020.01); G07C 9/38 (2020.01); G06Q 2240/00 (2013.01)] | 20 Claims |
1. A method of verifying that a user is authorized to access a secured area via an entry point, wherein the method comprises:
receiving at a first computer and from a remote user device that is associated with the user, information relating to a check-in request;
wherein the information relating to the check-in request comprises an event time for an event;
generating a time stamp for the receipt of the information relating to the check-in request;
verifying, using the information relating to the check-in request and the first computer, that the user is authorized to enter the secured area;
wherein verifying that the user is authorized to enter the secured area comprises:
verifying that the event is associated with the secured area; and
verifying that the time stamp is within a window of time relative to the event time; and
sending, in response to the verification that the user is authorized to enter the secured area and from the first computer, confirmation of remote check-in of the user to at least one of: the remote user device or a second computer positioned near the entry point.
|