A Digital, Personal and Secure Electronic Access Permission
20220382854 · 2022-12-01
Inventors
Cpc classification
G06F2221/03
PHYSICS
H04L63/10
ELECTRICITY
G06F21/6218
PHYSICS
G06F21/604
PHYSICS
G06F21/46
PHYSICS
G06F21/10
PHYSICS
G06F21/50
PHYSICS
G06Q20/3274
PHYSICS
International classification
Abstract
The present invention puts forward a personal electronic access permission (Figure B, 31) that can both check on the customer's identity (Figure A, step 2) and right to access an event/venue in one scanning event, and address the unwanted secondary market, still enabling a customer (Figure D, 5) to sell back an electronic access permission to the system (Figure D, I) in case the customer is not able to attend the event.
Claims
1. A method for generating a personal electronic access permission (31), in an environment comprising a system (1) including server(s), database(s) and application(s) and further the environment comprises a mobile communication device (2), an electronic ID service (3) that is accepted for identification by government authorities, a scanning device (4), internet and/or wireless communication networks (6) and a customer (5), addressing the unwanted secondary market and ensuring an efficient entrance process validating both a customer's identity and customer's permission to access an event or venue in one scanning event comprising the steps of: a downloading an application to the mobile communication device (2), b registering, using the mobile communication device (2), the customer (5) on the system (1), using the electronic ID service (3) wherein customer's identity data (10) is sent to the system (1) from the electronic ID service (3) and thereby register the verified identity of the customer, c storing the customer's identity data (10) in the system (1) and pairing (step 3) the customer's identity data (10) with a unique ID number (11), d storing the unique ID number (11) in the system (1), e transmitting from the system (1) and storing the unique ID number (11) in the mobile communication device (2) after which the customer (5) is f purchasing an electronic access permission (31) to an event through an interaction between the system (1) and the customer (5), using the mobile communication device (2), via internet and/or wireless communication networks (6), whereby g the system (1) is storing and pairing a unique customer/event number (12) with the unique ID number (11), and h the system (1) transmitting the unique customer/event number (12) to the mobile communication device (2), i generating the electronic access permission (31) in the mobile communication device (2), by first, authenticating the identity of the customer (5) by using the electronic ID service (3) (step 9), which is transmitting the identity, the customer identity data (10), to the system (1), wherein the authorization is successful if the identity of the customer (5), stored in the system (1), is the same as the transmitted identity from the electronic ID service (3) to the system (1) and combining, at least, the unique ID number (11), associated and paired with the customer's identity data (10), and the unique customer/event number (12) by using an algorithm (30) generating the electronic access permission (31) in the mobile communication device (2), where the electronic access permission (31) is accessible for a predefined period of time in the mobile communication device (2), requiring the customer (5) to generate a valid electronic access permission (31), on the mobile communication device (2), just before the scanning process at the event, and j transmitting the generated electronic access permission (31) from the mobile telecommunication device (2) to the system (1), k storing the generated electronic access permission (31) in the system (1), l scanning of the generated electronic access permission (31) in the mobile communication device (2) with the scanning device (4) and transmitting (step 21) the scanned electronic access permission (31) to the system (1), m the system (1) comparing the scanned electronic access permission (31) generated in the mobile communication device (2) with the electronic access permission stored (31) in the system, and n the system (1) checking on transactions on the electronic access permission (31) registered, and hereby o the system (1) validating both the customer's identity data (10) and the customer's (5) permission to access the event or venue in one scanning event, and p registering the scanning transaction on the electronic access permission (31) in the system (1) and transmitting the result of the validation to the scanning device (4) from the system (1) and displaying the result of the validation on the scanning device (4).
2. The method of claim 1, wherein step i is accomplished by creating a series of, minimum two, unique numbers separated in time representing the electronic access permission (31) or by creating a value, which is varying with time, representing the electronic access permission (31).
3. The method according to claim 1, wherein the predefined period of time can be in the range of 1 s to 72 h, depending on the security level the promoter chooses to set and the lower limit can be any one of 1 s, 10 s, 20 s, 30 s, 40 s, 50 s, 60 s, 2 min, 10 min, 30 min and the maximum limit can be any one of 72 h, 24 h, 2 h, 30 min, 10 min, 1 min, 30 s, 10 s.
4. The method according to claim 1, wherein the electronic access permission (31) is generated, upon request, just before the scanning process at the event.
5. The method according to claim 1, further comprising: selling back the electronic access permission (31) to the system (1) through an interaction between the system (1) and the customer (5), whereby the electronic access permission (31) is marked as invalid in the system (1) and a new unique electronic access permission (31) can be issued.
6. The method according to claim 1, further comprising: validating the customer's (5) right to sell back the electronic access permission (31) by confirming the identity of the customer (5) using the electronic ID service (3) that is accepted for identification by government authorities and verifying, in the system, that the customer (5) is the rightful owner of the electronic access permission (31) by checking the data stored for the customer (5) in the mobile communication device (2) and in the system (1).
7. The method of claim 1, wherein step I is accomplished by using the algorithm (30) which is stored in the mobile communication device (2).
8. The method according to claim 1, further comprising: encrypting all transmitted and stored data including numbers and algorithms.
9. The method according to claim 1, further comprising: checking the integrity of the stored data, numbers and algorithms, in the mobile communication device (2) and in the system (1), and if the integrity of the checked data is lost, the electronic access permission (31) becomes invalid.
10. The method according to claim 1, further comprising: upon request, making the electronic access permission (31) invalid in the system (1).
11. The method of claim 1 wherein step o is accomplished by validating, at least the customer's (5) name, age and customer's (5) right to enter the event or the venue.
12. The method according to claim 1, further comprising: tracking, authorizing and storing all transactions on the electronic access permission (31) in the system (1).
13. The method according to claim 1, further comprising: controlling, by the system (1), how many electronic access permissions (31) the customer (5) can purchase.
14. The method of claim 1, wherein step l is accomplished by authenticating the individuals that can use the scanning device (4), the authentication of an individual is done through the electronic ID service (3), and if the electronic ID service (3) is transmitting the same identity of the individual as being stored on a list of granted individuals in the system (1), the individual using the electronic ID service (3) for authentication is granted. access to the scanning application.
15. The method according to claim 1, further comprising: validating the customer's (5) identity by comparing the data received from the electronic ID service (3) with the stored data in the system (1).
16. The method according to claim 1, further comprising: a person purchasing tickets for the person's friends, registered on the system (1), and the system (1) is transmitting the unique customer/event numbers to the friends, after the person successfully has paid for both the person's ticket and for the person's friends' tickets, whereafter the person and the person's friends can generate their personal electronic access permissions.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0055] Figure A shows the communication between the mobile communication device and the system when the customer is registering on the system, purchasing an electronic access and generating an electronic access permission according to one example of the invention
[0056] Figure B is a schematic sketch over a generation of the electronic access permission according used in step 11 in Figure A. A unique ID Number (Figure A, 11) and a unique customer/event number (Figure A, 12) are used as input into the algorithm
[0057] Figure C shows a scanning process according to one example of the invention
[0058] Figure D shows an example of a system, on which the invention can be implemented
DETAILED SOLUTION DESCRIPTION
[0059] The Environment
[0060] A system comprises of server(s), database(s) and application(s) (Figure D, 1). The system is connected to an electronic ID Service (Figure D, 3) through internet and wireless communication networks (Figure D, 6). For example, BankID is an electronic ID service in Swedish. The output from an electronic ID service to the system is called customer's identity data. The system further communicates with mobile communication devices (Figure D, 2) and its applications (which are downloaded from, for example, apple store) through wireless communication networks and internet. A customer (Figure D, 5) uses the mobile communication device. In the scanning process a scanning device (Figure D, 4) can communicate with the system as well as the mobile communication device through a visual link (camera or video), through internet or through a wireless communication link/network
[0061] Connecting the Individual to the Electronic Access Permission
[0062] A personal electronic access permission needs to be associated to a customer's identity. One preferred option to authorize the identity of a customer is to use authentication credentials together with an electronic ID service that is accepted for identification by government authorities (for example BankID is an electronic ID service in Sweden). As there can only be one customer per electronic ID this is a much better authentication method compared to, for example, email with a password or SIM card or a mobile device, where the owner can be anonymous. One customer can also have several email addresses, apple IDs, phone numbers, SIM-cards, credit cards etc. which makes it difficult to control how many electronic access permissions one customer can purchase. The use of an electronic ID service will hereby reduce the risk of bots, as well as real persons, buying more electronic access permissions than policies allow, compared to for example using email addresses with password as an identifier of the customer's identity.
[0063] After downloading an application to the mobile communication device (Figure A, step 1) and when a customer's identity has been validated by an electric ID service the customer can register (Figure A, step 2), using the customer's identity data (Figure A, 10) sent to the system from the electric ID service whereby a unique ID number (Figure A, 11) is associated and paired with the customer's identity data (Figure A, step 3). The unique ID number (Figure A, 11) is then stored in the system, whereafter the unique ID number (Figure A, 11) is transmitted to, and stored in, the mobile communication device (Figure A, step 4). The unique ID number (Figure A, 11) is transmitted on an encrypted link between the system and the mobile communication device.
[0064] When the customer has purchased an electronic access permission through an interaction with the system (Figure A, step 5) a unique number per person associated with an event, called a unique customer/event number (Figure A, 12), is created, stored in the system and paired with the unique ID number (Figure A, step 6). Before the unique customer/event number (Figure A, 12) is transmitted the integrity of the unique ID number (Figure A, 11) in the mobile is checked by the system (Figure A, step 7). The validation is then stored in the system.
[0065] If the unique ID number (Figure A, 11) in the mobile communication device is the same as in the system, the unique customer/event number (Figure A, 12) is transmitted to the mobile communication device, where it is stored (Figure A, step 8). The unique customer/event number (Figure A, 12) is also paired with the unique customer ID (Figure A, 11) in the mobile communication device.
[0066] A person can purchase tickets for the person's friends, if they are registered on the system, and the system is transmitting the unique customer/event numbers to the friends, after the person successfully has paid for both the person's ticket and for the person's friends' ticket. Then the person and the person's friends can generate their personal electronic access permissions
[0067] Customer's consents are given before storing any personal data according to applicable regulations and laws
[0068] Generation of the Digital, Personal and Secure Electronic Access Permission
[0069] The downloaded application includes an algorithm that can generate an electronic access permission. With the unique ID number (Figure A, 11) and the unique customer/event number (Figure A, 12) as input to the algorithm (Figure B, 30), it can generate a series of, minimum two, unique numbers representing the electronic access permission (Figure B, 31). Another option to generate an electronic access permission is that the algorithm in the mobile communication device is generating a value which is varying, for example with time, so that the value of the electronic access permission will differ over time.
[0070] To instruct the algorithm to start the generation of the electronic access permission, at any time, the preferred solution is that the customer needs to, successfully, authenticate its identity with an electronic ID service (Figure A, step 9). The authentication is successful if the identity of the customer, stored in the system, is the same as the transmitted identity from the electronic ID service to the system. If the authentication is not successful, the electronic access permission is marked invalid in the system, which will be recognized in the scanning process later on. Before the generation of the electronic access permission the integrity of the data in the mobile communication device and in the system is checked upon (Figure A, step 10).
[0071] The electronic access permission is then generated in the mobile communication device (Figure A, step 11) and transmitted (Figure A, step 12), on an encrypted link, to the system where it is stored (Figure A, step 13). The algorithm is designed so that each customer has purchased a unique electronic access permission.
[0072] The electronic access permission can be stored in the mobile communication device until it is requested to be deleted, but the preferred solution, for security reasons, is that the electronic access permission is automatically deleted in the mobile communication device after a defined period of time. This requires the customer to generate a valid electronic access permission just before the scanning process at the event. The electronic access permission, in the mobile communication device, can automatically be deleted after a defined period of time, which can be in the range of 1 s to 72 h, depending on the security level the promoter chooses to set. The lower limit can be any one of 1 s, 10 s, 20 s, 30 s, 40 s, 50 s, 60 s, 2 min, 10 min, 30 min. The maximum limit can be any one of 72 h, 24 h, 2 h, 30 min, 10 min, 1 min, 30 s, 10 s. The electronic access permission can be generated upon request making sure that the holder of the mobile device is the rightful owner of the electronic access permission. Obviously, an valid electronic access permission can be generated, even if an electronic access permission previously been has deleted in the mobile communication device after a defined period of time, with a valid unique ID number (Figure A, 11) and a valid unique customer/event number (Figure A, 12), stored in the mobile communication device, as input to the algorithm (Figure B, 30) and be shown within the defined period of time as described above. The validation and comparison of the scanned electronic access permission and the electronic access permission stored in the system, is done in the scanning process.
[0073] Secure Scanning and a Flawless Entry Process
[0074] A scanning application is downloaded to a scanning device (Figure D, 4). If the electronic access permission would be represented by a static single number and, for example by a QR code, a picture could be sent to an unauthorized person, who could use the copied picture of the electronic access permission to be granted access to the event/venue.
[0075] In order to prevent the scenario, the present invention suggests an electronic access permission represented by a series of, minimum two, unique numbers that are transmitted in a certain order and in pre-defined time slots from the mobile communication device to the scanning device (Figure C, Step 20). As the scanning device knows how many unique numbers that are representing the electronic access permission and the time between each unique number transmitted, the scanning device can collect all numbers representing the electronic access permission in the scanning process. After the scanning device has received the electronic access permission it will transmit it to the system (Figure C, Step 21). The system is then comparing the electronic access permission from the mobile communication device with electronic access permission from the system (Figure C, Step 22). If they are equal the customer is granted access to the event/venue. The system is also checking if the electronic access permission is marked invalid in the system, and if so, the customer is not granted access to the event/venue. Obviously, the electronic access permission stored in the system is linked to the customer through the, in the system, stored unique ID number (Figure A, 11) and the unique customer/event number (Figure A, 12). The scanning transaction is registered in the system (Figure C, Step 23). A message is transmitted back to the scanning device with the result of the validation of the electronic access permission (Figure C, Step 24). The result of the validation is displayed on the scanning device (Figure C, Step 25) and the scanning event is further stored in the system
[0076] As mentioned above, one alternative to make it hard to copy an electronic access permission could be that the algorithm in the mobile communication device is generating a value which is varying, for example with time, so that the value of the electronic access permission will differ over time. In this alternative the system and the mobile communication device will need to generate matching electronic access permissions in the system and in the mobile communication device at all times. The method of the scanning process is the same as in Figure C for this alternative.
[0077] As the electronic access permission can be generated in the mobile communication device upon request, the scanning process relieves, both the identity of the customer and the customer's right to access the event/venue in one scanning event and thereby save a lot of time when entering an event/venue.
[0078] If the customer don't bring the mobile communication device to the event, one option is to scan the customer's physical ID, such as for example driving license or passport, with scanning device and compare the customer's identity data stored in the system with the customer's identity data stored on the physical ID. If they match, the customer is granted access to the event/venue, after checking if the electronic access permission is valid in the system.
[0079] The individuals authorized to use the scanning device is listed on the system before usage. The authentication of an individual is done through an electronic ID service. If the electronic ID service is transmitting the same identity as being stored on the list in the system, the individual using the electronic ID service for authentication is granted access to the scanning application
[0080] Preventing the Unwanted Secondary Market—No Money Transfer Outside the System
[0081] The unwanted secondary market is possible if one person can sell an access permission to another known person and that the purchased access permission can be delivered to the person who purchased the access permission. As the seller and purchaser are known to each other the purchaser can compensate the seller for delivering the access permission on top of the face value.
[0082] The present invention suggests that the seller will never know the identity of the purchaser. In case the owner can't attend the event, to which he or she has purchased an electronic access permission, it is possible to sell back the electronic access permission to the system through an interaction between the customer and the system. The electronic access permission is then marked invalid in the system, which is also notified to the customer (by for example a push message). The system can hereby sell a new electronic access permission to a registered customer without involvement from the customer who sold back his electronic access permission to the system.
[0083] The electronic access permission can't be delivered directly from one person to another person as the electronic access permission is personal and integrated with a customer's identity.
[0084] Security
[0085] All numbers, and links used in the above processes are preferably encrypted. To ensure the integrity of the data before it is being used in a process, the integrity of the data is checked. The preferable option is to use a blockchain solution for integrity checks in the system as well as in the mobile communication device, as the data stored in a blockchain is immutable. With a blockchain solution, the integrity of data not stored on the blockchain can be checked with hash technology. As the data's integrity is checked upon, the data cannot be manipulated without being discovered. If the data has been manipulated the electronic access permission is marked invalid.
[0086] Counterfeits
[0087] As the electronic access permission suggested by the invention is personal it is difficult to create a credible counterfeit or copy without stealing a person's electronic ID. A valid electronic access permission can't be generated without a successful authentication of the customer's identity. Further, a valid electronic access permission can't be delivered from one mobile communication device to another mobile communication device. Thus, it is easy to recognize a valid electronic access permission and separate it from a counterfeit.
[0088] Transactions with Electronic Access Permission
[0089] As the system and the mobile communication device are connected all the transactions on the electronic access permission can be tracked, authorized and are stored on the solution. In the system it can be defined what transactions are allowed and when they are allowed to happen. Examples of transactions on an electronic access permission can be, but not limited to, marking an electronic access permission ‘invalid’, marking an electronic access permission as ‘scanned’, registering when a specific customer is transmitting the electronic access permission to the system or marking that an electronic access permission is sold.
BRIEF DESCRIPTION OF THE DRAWINGS
[0090] Figure A shows the communication between the mobile communication device and the system when the customer is registering on the system, purchasing an electronic access and generating an electronic access permission according to one example of the invention
[0091] Figure B is a schematic sketch over a generation of the electronic access permission according used in step 11 in Figure A. A unique ID Number (Figure A, 11) and a unique customer/event number (Figure A, 12) are used as input into the algorithm
[0092] Figure C shows a scanning process according to one example of the invention
[0093] Figure D shows an example of a system, on which the invention can be implemented