US 12,273,340 B2
Secure verification of an individual using wireless broadcasts
Frank Gorgenyi, Bremerton, WA (US); Matthew Thomas Beaver, Seattle, WA (US); Aidan George Purdy-Say, Seattle, WA (US); Bartosz Henryk Paliswiat, Kirkland, WA (US); Jared Enoch Henderson, Maple Valley, WA (US); Brian Andrew Bowman, Seattle, WA (US); Peter Dawoud Shenouda Dawoud, Bothell, WA (US); and Arvind Muthukrishnan, Redmond, WA (US)
Assigned to Microsoft Technology Licensing, LLC, Redmond, WA (US)
Filed by Microsoft Technology Licensing, LLC, Redmond, WA (US)
Filed on Jun. 6, 2023, as Appl. No. 18/330,181.
Application 18/330,181 is a continuation of application No. 17/393,273, filed on Aug. 3, 2021, granted, now 11,716,329.
Application 17/393,273 is a continuation of application No. 16/384,799, filed on Apr. 15, 2019, granted, now 11,089,015, issued on Aug. 10, 2021.
Prior Publication US 2024/0007467 A1, Jan. 4, 2024
This patent is subject to a terminal disclaimer.
Int. Cl. H04L 9/40 (2022.01); G07C 9/25 (2020.01); H04L 67/306 (2022.01); H04W 4/21 (2018.01); H04W 12/02 (2009.01); H04W 12/47 (2021.01); H04W 12/63 (2021.01); H04W 12/64 (2021.01); H04W 12/71 (2021.01); H04W 60/00 (2009.01)
CPC H04L 63/0861 (2013.01) [G07C 9/257 (2020.01); H04L 63/0428 (2013.01); H04L 63/0853 (2013.01); H04L 67/306 (2013.01); H04W 12/63 (2021.01); H04W 12/71 (2021.01); H04W 60/00 (2013.01); H04W 12/64 (2021.01)] 20 Claims
OG exemplary drawing
 
1. A method, comprising:
receiving, at a first computing device, registration information including a device identifier associated with a second computing device and decryption information, the first computing device having access to a collection of entries including device identifiers associated with a plurality of devices;
transmitting, from the first computing device, a beacon signal;
receiving, at the first computing device, one or more signals generated and broadcast by a second computing device in response to receiving the beacon signal from the first computing device, the one or more signals including a value associated with the second computing device;
detecting a trigger condition associated with proximity and direction of movement of the second computing device relative to the first computing device based on the one or more signals transmitted by the second computing device; and
based on detecting the trigger condition, decrypting the value from the one or more signals using the decryption information.