US20130317991A1 - Methods and systems for conducting payment transactions - Google Patents

Methods and systems for conducting payment transactions Download PDF

Info

Publication number
US20130317991A1
US20130317991A1 US13/956,716 US201313956716A US2013317991A1 US 20130317991 A1 US20130317991 A1 US 20130317991A1 US 201313956716 A US201313956716 A US 201313956716A US 2013317991 A1 US2013317991 A1 US 2013317991A1
Authority
US
United States
Prior art keywords
communications device
user
payment transaction
authentication data
accordance
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US13/956,716
Inventor
Michael John GROAT
Conor Robert White
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to US13/956,716 priority Critical patent/US20130317991A1/en
Publication of US20130317991A1 publication Critical patent/US20130317991A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/20Point-of-sale [POS] network systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing

Definitions

  • This invention relates generally to methods and systems for conducting payment transactions, and more particularly, to methods and systems for conducting network-based electronic payment transactions in a retail establishment upon authentication of a shopper conducting the electronic payment transaction.
  • POS terminals are electronic cash registers used for conducting payment transactions and generating receipts for the transactions.
  • shoppers are required to spend an undesirable amount of time waiting in long lines before purchasing goods at a POS terminal.
  • Such long lines have been known to discourage shoppers from repeatedly visiting retail establishments and to discourage new shoppers from visiting retail establishments.
  • long waiting times have been known to negatively affect commerce at retail establishments.
  • Retail establishments have been known to purchase several POS terminals for conducting many simultaneous payment transactions in an effort to facilitate reducing the time spent waiting before conducting payment transactions.
  • POS terminals are known to include expensive hardware and software, and typically are operated by a sales person
  • retail establishments have been known to incur substantial costs in buying, maintaining, and operating such POS terminals.
  • Some retail establishments have also been known to provide scanning devices such that while shopping, the shoppers themselves are able to scan bar codes on goods as they are collected. After collecting and scanning the goods desired for purchase, shoppers generally spend less time at a POS terminal purchasing the goods because the goods have already been scanned. However, such shoppers still must suffer the inconvenience of waiting in line before purchasing the goods in a payment transaction.
  • long lines invariably develop at POS terminals that inconvenience shoppers who are required to wait for prolonged periods of time prior to conducting a payment transaction.
  • a method of eliminating the need to wait in line to conduct a payment transaction in a retail establishment includes initiating a network-based electronic payment transaction with a communications device in a retail establishment.
  • a shopper initiates the network-based electronic payment transaction.
  • the method includes entering a machine readable code from at least one good with the communications device, determining a price of the at least one good and a total payment transaction cost, and displaying the total payment transaction cost on a screen of the communications device.
  • the method includes determining whether to approve payment for the electronic payment transaction, authenticating the shopper, completing the electronic payment transaction in the retail establishment, and transmitting a transaction complete message to the communications device when the shopper is authenticated.
  • a system for eliminating the need to wait in line to conduct a payment transaction in a retail establishment includes a computer configured as a server.
  • the server includes at least a database and is configured to at least store within the database a first configurable policy and to determine a resultant level of risk associated with a network-based electronic payment transaction.
  • the system includes a communications device associated with a shopper in the retail establishment. The communications device is configured to communicate with at least the server, to initiate the network-based electronic payment transaction in the retail establishment, to capture biometric authentication data from the shopper in the retail establishment, and to generate a receipt for each network-based electronic payment transaction.
  • the system also includes an authentication system including an authentication system database.
  • the authentication system is configured to communicate with at least the server and the communications device, to store within the authentication system database biometric authentication data for each of a plurality of authorized shoppers, and to conduct a biometric authentication process while the shopper is in the retail establishment.
  • the system includes a merchant system configured to communicate with at least the server, the communications device, and the authentication system.
  • the merchant system is further configured to generate and transmit messages and to complete network-based electronic payment transactions.
  • the communications device is further configured to communicate with the authentication system and the merchant system. After the communications device generates a receipt for the network-based electronic payment transaction, an employee of the retail establishment scans the receipt as the shopper leaves the retail establishment and permits the shopper to leave the retail establishment when the shopper has only the goods purchased.
  • a computer-readable recording medium on which a program is recorded causes the computer to execute at least initiating a network-based electronic payment transaction with a communications device in a retail establishment.
  • a shopper initiates the electronic payment transaction.
  • the computer program causes the computer to execute determining a price of at least one good and a total payment transaction cost, displaying the total payment transaction cost on a screen of the communications device, and determining whether to approve payment for the electronic payment transaction.
  • the computer program causes the computer to execute authenticating the shopper, completing the electronic payment transaction in the retail establishment, and transmitting a transaction complete message to the communications device when the shopper is authenticated.
  • FIG. 1 is a block diagram of an exemplary embodiment of a payment transaction computer system for conducting network-based electronic transactions in a retail establishment;
  • FIG. 2 is a diagram illustrating a first exemplary configurable policy for associating network-based electronic payment transaction risk factors with corresponding levels of risk;
  • FIG. 3 is a diagram illustrating a second exemplary configurable policy for associating network-based electronic payment transaction risk factors with corresponding levels of risk
  • FIG. 4 is a diagram illustrating an exemplary authentication policy associating each of the levels of risk illustrated in FIGS. 2 and 3 with a corresponding authentication data requirement;
  • FIG. 5 is a flowchart illustrating an exemplary network-based electronic payment transaction process for eliminating the need to wait in line before conducting payment transactions.
  • FIG. 6 is a flowchart illustrating an alternative exemplary authentication process for eliminating the need to wait in line before conducting payment transactions.
  • FIG. 1 is an expanded block diagram of an exemplary embodiment of a system architecture of a Payment Transaction Computer (PTC) System 10 for conducting network-based electronic payment transactions in a retail establishment with a portable communications device.
  • the PTC system 10 includes a Merchant Server (MS) System 12 , a Service Provider Computer (SPC) System 14 , a Biometric Authentication Computer (BAC) System 16 and a portable communications device 18 .
  • the MS system 12 , the SPC system 14 , and the BAC system 16 each include components such as, but not limited to, a web server, a database server, an application server, a directory server and a disk storage unit.
  • the disk storage unit may be used to store any kind of data.
  • the BAC system 16 may also include a database management server and an authentication server.
  • the database management server may be used to facilitate transferring data to and from the disk storage device.
  • the authentication server is configured to perform matching of any feature or information associated with individuals to authenticate the identity of individuals as described herein.
  • the MS system 12 also includes a point-of-sales (POS) terminal 20 typically operated by a sales person.
  • POS point-of-sales
  • the exemplary embodiment includes a single POS terminal 20 , in other embodiments the MS system 12 may include any number of POS terminals 20 .
  • the MS system 12 is configured to communicate with a user of the communications device 18 over a communications network 22 .
  • the communications network 22 is a 3G communications network.
  • the communications network 22 may be any wireless network that facilitates authentication as described herein, such as, but not limited to, WiFi, Global System for Mobile (GSM) and Enhanced Data for GSM Evolution (EDGE).
  • GSM Global System for Mobile
  • EDGE Enhanced Data for GSM Evolution
  • the network 22 may include any combination of such wireless networks, local area networks, wide area networks, and the Internet.
  • the network 22 may be used by devices such as the communications device 18 to conduct long range wireless communications such as cellular telephone calls and wirelessly accessing the Internet.
  • the MS system 12 is configured to at least generate and transmit payment transaction requests, as well as generate authentication requests and transmit the authentication requests to the BAC system 16 .
  • the MS system 12 is configured to complete an electronic payment transaction with the communications device in a retail establishment.
  • the MS system 12 may also be configured to store policies that determine levels of risk and policies that determine authentication data requirements for the levels of risk.
  • the MS system 12 is a computer system of a retail establishment that requires authenticating a shopper prior to completing a network-based electronic payment transaction.
  • the SPC system 14 is a computer system of a financial institution service provider used to store and manage financial data for a plurality of authorized users. Although the exemplary embodiment is described as including one SPC system 14 corresponding to a financial institution service provider, it should be appreciated that in other embodiments a plurality of SPC systems 14 may be provided such that each of the plurality of SPC systems 14 is associated with a different service provider.
  • the SPC system 14 and the MS system 12 are associated with different entities in the exemplary embodiment. However, in other embodiments the SPC system 14 and MS system 12 may be associated with the same entity.
  • the SPC system 14 is typically configured to communicate with the communications device 18 , the MS system 12 , and the BAC system 16 over the network 22 .
  • the SPC system 14 is configured to store therein a different service provider user identifier for each authorized user such that each service provider user identifier is associated with the financial data of a respective authorized user.
  • the SPC system 14 is also configured to store therein biographic data for each authorized user such that the biographic data is associated with the service provider user identifier of a respective authorized user.
  • the SPC system 14 is configured to store therein a service provider identifier of the service provider operating the SPC system 14 , and to generate and transmit electronic payment transaction authorizations to the MS system 12 .
  • the SPC system 14 is configured to store therein at least one configurable policy for associating network-based electronic payment transaction risk factors with levels of risk.
  • the BAC system 16 is configured to communicate with the MS system 12 , the SPC system 14 , and the communications device 18 over the communications network 22 .
  • the BAC system 16 communicates with a single SPC system 14 in the exemplary embodiment, it should be appreciated that in other embodiments the BAC system 16 may be configured to communicate with a plurality of SPC systems 14 .
  • the BAC system 16 is also configured to facilitate authenticating the identity of a user associated with the communications device 18 who requests conducting a network-based electronic payment transaction. Moreover, the BAC system 16 is configured to store at least authentication data in an enrollment data record for each of a plurality of authorized users.
  • the authentication data is biometric data that corresponds to any biometric type desired to be used as the basis of authenticating the identity of a user associated with the communications device 18 .
  • biometric types include, but are not limited to, face, fingerprint, iris, voice, vascular patterns and hand signatures.
  • the biometric data may take any form such as, but not limited to, images, photographs, templates and electronic data representations.
  • the user associated with the communications device 18 in the exemplary embodiment is a shopper in a retail establishment.
  • the BAC system 16 is configured to store biometric authentication data and is configured to use the biometric authentication data to authenticate identities of shoppers desiring to conduct network-based electronic payment transactions in retail establishments. Using biometrics as the basis for authenticating shopper identities facilitates enhancing trust in authentication results and in the integrity of network-based electronic payment transactions conducted by shoppers in retail establishments based upon such authentication results.
  • the enrollment data record of each authorized user may include at least biographic data and a unique user identifier of the respective authorized user.
  • the unique user identifier may also be stored in the SPC system 14 .
  • the service provider identifier and the unique user identifier may be alphanumeric character strings of any length.
  • the BAC system 16 is also configured to store at least one configurable authentication policy that indicates the authentication data required to be captured for each of a plurality of levels of risk. By indicating the authentication data requirement for each of the levels of risk, the at least one configurable authentication policy may be used to facilitate determining an authentication data requirement associated with an electronic payment transaction. Furthermore, the BAC system 16 is configured to generate and transmit authentication data capture requests to at least the communications device 18 . It should be understood that an authentication data capture request includes at least an authentication data requirement, determined by the BAC system 16 , that is to be captured from the shopper attempting to conduct a network-based electronic payment transaction in a retail establishment with a designated portable communications device 18 .
  • biographic data includes any demographic information regarding a user including, but not limited to, the user's name, age, date of birth, address, citizenship and marital status.
  • Contact information including devices associated with authorized users and methods for contacting the authorized user may also be collected from the user.
  • users designate a particular communications device and provide information regarding the designated communications device that facilitates validating the designated communications device as known, facilitates communicating with the authorized user, and facilitates authenticating the identity of the authorized user.
  • Such information includes, but is not limited to, a communications device identifier of the designated communications device, a telephone number associated with the designated communications device, an e-mail address that can be accessed using the designated communications device, an instant messaging user identifier that can be accessed, and an identifier that facilitates sending short message service (SMS) messages to the designated communications device.
  • SMS short message service
  • the information regarding the designated communications device is included in the enrollment data record of the authorized user of the designated communications device 18 .
  • the communications device identifier is associated with the unique user identifier of the authorized user.
  • the portable communications device 18 is the designated communications device.
  • a state of the communications device 18 may be included in the enrollment data record of the user and thus associate the state of the device 18 with the designated communications device information.
  • the SPC system 14 may also store therein the communications device identifier such that the communications device identifier is associated with the service provider user identifier of the authorized user in the SPC system 14 .
  • authentication data is described as biometric data in the exemplary embodiment, it should be appreciated that in other embodiments any other type of authentication data, or combinations of different types of authentication data, may be used that facilitates authenticating the identity of a user.
  • Such other types of authentication data include, but are not limited to, Global Positioning System (GPS) coordinates, unique pass-phrases, a combination of biometric data with GPS coordinates, a combination of biometric data with a unique pass-phrase, a combination of GPS coordinates with a unique pass-phrase, and a combination of biometric data with GPS coordinates and a unique pass-phrase.
  • GPS Global Positioning System
  • GPS coordinates may be determined for any GPS enabled device used by an authorized user to communicate with the BAC system 16 .
  • GPS coordinate data may be determined for a retail establishment such that an area of the retail establishment computed from the GPS coordinate data is stored in the BAC system 16 .
  • GPS coordinates of the designated communications device 18 are determined to be located within the retail establishment area, the user may conduct an electronic payment transaction with the retail establishment as long as the user is authenticated and the transaction is authorized. Otherwise, when the designated communications device 18 is determined to be outside of the retail establishment area, the user is not permitted to conduct an electronic payment transaction with the retail establishment.
  • Unique pass-phrases may also be established for each authorized user and stored in the BAC system 16 such that a user desiring to conduct a network-based electronic payment transaction in a retail establishment with the designated communications device 18 , provides the unique pass-phrase for authentication.
  • Unique pass-phrases are alphanumeric character strings that may be manually input or spoken into the communications device 18 .
  • the communications device 18 is configured to conduct long range wireless communications including, but not limited to, cellular telephone calls and wirelessly accessing the Internet over the network 22 . Moreover, the communications device 18 is configured to communicate with at least the MS system 12 , the SPC system 14 , and the BAC system 16 over the network 22 . Additionally, in the exemplary embodiment, the communications device 18 is configured to capture authentication data from users desiring to conduct a network-based electronic payment transaction while in a retail establishment.
  • the communications device 18 includes a front face 24 and a back face (not shown).
  • the front face 24 includes at least one of buttons and icons 26 configured to at least enter commands, enter data such as unique pass-phrases, and invoke applications stored in the device 18 .
  • Applications stored in the communications device 18 include at least a security application and a retail purchasing application.
  • the front face 24 includes a display screen 28 such as, but not limited to, a Liquid Crystal Display (LCD).
  • the communications device 18 is configured to at least display at least one of text and images on the display screen 28 .
  • the communications device 18 is a portable cellular phone configured to at least display at least one of text and images, capture authentication data from a user, and transmit the captured authentication data to the BAC system 16 .
  • the communications device 18 is configured to store a plurality of service provider user identifiers and corresponding service provider identifiers for use in electronic payment transactions conducted in a retail establishment.
  • the service provider user identifier is a credit card number of a credit card a shopper desires to use for purchasing goods.
  • the service provider user identifier may be any alphanumeric character string such as, but not limited to, a debit card number or an e-mail address associated with the shopper that is capable of facilitating completing the electronic payment transaction.
  • the communications device 18 may store a credit card number issued by a first bank with the corresponding service provider identifier of the first bank, and a debit card number issued by a second bank with the corresponding service provider identifier of the second bank.
  • the user may designate a service provider user identifier as a default service provider user identifier for each service provider.
  • the communications device 18 may display a list of service provider user identifiers on the screen 28 that a user may select from for conducting a network-based electronic payment transaction.
  • the communications device 18 is a portable cellular phone in the exemplary embodiment, it should be appreciated that in other embodiments the communications device 18 may be any portable communications device capable of at least displaying at least one of text and images, and capturing and transmitting data.
  • Such other communications devices 18 include, but are not limited to, a smart phone, a tablet computer, a laptop computer, and any type of portable communications device having wireless capabilities such as a personal digital assistant (PDA).
  • PDA personal digital assistant
  • Authentication data captured during authentication of a user is captured from the user with the designated communications device 18 .
  • the captured biometric data is not stored in the communications device 18 due to security concerns that the biometric data may be discovered should the device 18 be lost or stolen. Instead, the communications device 18 transmits the captured biometric data to the BAC system 16 for storage therein.
  • the captured biometric data may be stored in the device 18 .
  • the MS system 12 , the SPC system 14 , the BAC system 16 , and the communications device 18 each include a processor (not shown) and a memory (not shown).
  • processor is not limited to just those integrated circuits referred to in the art as a processor, but broadly refers to a computer, an application specific integrated circuit, and any other programmable circuit.
  • the processors execute instructions, or computer programs, stored in the respective memories (not shown) of the MS system 12 , the SPC system 14 , the BAC system 16 and the communications device 18 .
  • the above examples are exemplary only, and are thus not intended to limit in any way the definition and/or meaning of the term “processor.”
  • the respective memories (not shown) in the MS system 12 , the SPC system 14 , the BAC system 16 , and the communications device 18 can be implemented using any appropriate combination of alterable, volatile or non-volatile memory or non-alterable, or fixed, memory.
  • the alterable memory whether volatile or non-volatile, can be implemented using any one or more of static or dynamic RAM (Random Access Memory), a floppy disc and disc drive, a writeable or re-writeable optical disc and disc drive, a hard drive, flash memory or the like.
  • non-alterable or fixed memory can be implemented using any one or more of ROM (Read-Only Memory), PROM (Programmable Read-Only Memory), EPROM (Erasable Programmable Read-Only Memory), EEPROM (Electrically Erasable Programmable Read-Only Memory), an optical ROM disc, such as a CD-ROM or DVD-ROM disc, and disc drive or the like.
  • ROM Read-Only Memory
  • PROM PROM
  • PROM Program Memory
  • EPROM Erasable Programmable Read-Only Memory
  • EEPROM Electrical Erasable Programmable Read-Only Memory
  • an optical ROM disc such as a CD-ROM or DVD-ROM disc, and disc drive or the like.
  • Each of the memories can be a computer-readable recording medium used to store data, respectively, in the MS system 12 , the SPC system 14 , the BAC system 16 , and the communications device 18 .
  • each of the respective memories can be a computer-readable recording medium used to store computer programs or executable instructions that are executed, respectively, by the merchant server system 12 , the SPC system 14 , the BAC system 16 , and the communications device 18 .
  • the memories may include smart cards, SIMs or any other medium from which a computing device can read computer programs or executable instructions.
  • computer program is intended to encompass an executable program that exists permanently or temporarily on any computer-readable recordable medium that causes the computer or computer processor to execute the program. It should be understood that as described herein, applications are computer programs. Thus, the security and the retail purchasing applications described herein are computer programs.
  • the MS system 12 , the network 22 , the SPC system 14 , and the BAC system 16 together constitute a first communications channel.
  • the communications device 18 and a part of the network 22 between the communications device 18 and the BAC system 16 together constitute a second communications channel separate and distinct from the first communications channel.
  • Attackers that are able to monitor communications and phish for user names and passwords over the first communications channel are typically not aware of the second communications channel, and thus are not motivated to monitor communications and phish over the second channel.
  • security of network-based electronic payment transactions conducted by shoppers in a retail establishment with the designated communications device 18 is facilitated to be increased and ease of integration with existing legacy systems is facilitated to be enhanced.
  • a service provider user identifier and biographic data of the user are obtained and stored in the SPC system 14 such that the biographic data is associated with a corresponding service provider user identifier.
  • the communications device 18 is also required to be enrolled in the BAC system 16 prior to conducting a network-based electronic payment transaction. Specifically, a communications device identifier obtained from the communications device 18 is included in the enrollment data record of the user of the designated communications device 18 .
  • the service provider user identifier and a service provider identifier that identifies the financial institution service provider are included in the enrollment data record of the user such that the service provider user identifier and the service provider identifier are associated with the communications device identifier and the unique user identifier.
  • the designated communications device 18 is enrolled in the BAC system 16 .
  • the service provider identifier is obtained from the user during enrollment in the BAC system 16 in the exemplary embodiment, it should be appreciated that in other embodiments the identities of a plurality of different service providers may be obtained and associated with the unique user identifier in the BAC system 16 . That is, the user may provide the service provider identifiers of a plurality of different service providers and associated service provider user identifiers that are to be stored in the BAC system 16 and associated with the unique user identifier in the BAC system 16 . It should be appreciated that each different service provider has a corresponding SPC system 14 that stores therein at least service provider user identifiers that uniquely identify the user to the corresponding SPC system 14 .
  • the BAC system 16 may be associated with each of the corresponding SPC systems 14 such that the BAC system 16 is able to determine the SPC systems 14 to communicate with for each user.
  • the communications device identifier and the service provider user identifier of each authorized user are stored in the enrollment data record of the authorized user.
  • the service provider identifier is associated with all other data included in the enrollment data record. It should be understood that by virtue of associating the service provider user identifier with the financial data of a respective authorized user in the SPC system 14 , and including the service provider user identifier in the enrollment data record of the authorized user, the service provider user identifier functions to map data stored in the SPC system 14 associated therewith to data stored in the BAC system 16 associated with the same service provider user identifier.
  • information stored in the SPC system 14 facilitates mapping between data stored in the SPC system 14 and data stored in the BAC system 16 .
  • FIG. 2 is a diagram illustrating a first exemplary configurable policy 30 that is stored in the SPC system 14 and is for associating each of a plurality of network-based electronic payment transaction risk factors 32 with a corresponding level of risk 34 .
  • the levels of risk 34 define categories of risk associated with network-based electronic payment transactions that vary from a highest to a lowest level of risk.
  • the policy 30 includes a plurality of electronic payment transaction risk factors 32 and associates each risk factor 32 with a corresponding level of risk 34 .
  • risk factors 32 may include, but are not limited to, the amount or value of the payment transaction, the type of retail establishment, the amount of credit available to a shopper, the time of day the payment transaction is made, and the duration since a previous payment transaction.
  • each of the electronic payment transaction risk factors 32 is divided into subcategories such that each subcategory is associated with a corresponding level of risk 34 .
  • the value of a purchase may be divided into subcategories according to value, such as $0-100, $100-500, and greater than $500.
  • Each subcategory is assigned a corresponding level of risk 34 . Consequently, an electronic payment transaction worth less than $100 may be associated with a lowest level of risk 34 , an electronic payment transaction worth between $100 and $500 may be associated with a high level of risk 34 , and an electronic payment transaction worth greater than $500 may be associated with a highest level of risk 34 .
  • the type of retail establishment risk factor 32 may be divided into subcategories according to a level of trust associated with each retail establishment such as trustworthy, generally trustworthy, and untrustworthy.
  • a retail establishment may be considered trustworthy because electronic payment transaction problems have not been encountered with the retail establishment.
  • a retail establishment may be considered generally trustworthy because at least some electronic payment transaction problems have been encountered with the retail establishment.
  • a retail establishment may be considered untrustworthy because significant electronic payment transaction problems have been encountered with the retail establishment. Consequently, a trustworthy retail establishment may be associated with a low level of risk 34 , a generally trustworthy retail establishment may be associated with a high level of risk 34 , and an untrustworthy retail establishment may be associated with the highest level of risk 34 .
  • the electronic payment transaction risk factors 32 and the associated levels of risk 34 may be defined in any desirable manner that facilitates authenticating the identity of a user as an authorized user of a designated communications device 18 . Moreover, the definitions of the transaction risk factors 32 and the levels of risk 34 may be changed.
  • any network-based electronic payment transaction may involve a plurality of the electronic payment transaction risk factors 32 , and that a resultant level of risk may be determined using the levels of risk 34 associated with each of the involved electronic payment transaction risk factors 32 .
  • the SPC system 14 compares the levels of risk 34 associated with each of the involved electronic payment transaction risk factors 32 and determines which risk factor 32 has the greatest level of risk 34 .
  • the greatest level of risk 34 is determined to be the resultant level of risk and is used as the basis for authenticating the user. For example, when an electronic payment transaction for less than $100 is conducted with an untrustworthy retail establishment, the level of risk associated with each of the involved electronic payment transaction risks 32 is determined as lowest and highest, respectively, by the SPC system 14 .
  • the resultant level of risk is the level of risk 34 associated with the untrustworthy retail establishment.
  • the greatest level of risk 34 associated with the payment transaction risk factors is determined to be the resultant level of risk in the exemplary embodiment, it should be appreciated that in other embodiments any other known technique may be used to combine a plurality of the risk factors 32 to obtain an optimal overall risk rating, or optimal resultant level of risk.
  • FIG. 3 The information shown in FIG. 3 is the same information shown in FIG. 2 as described in more detail below. As such, information included in FIG. 3 that is identical to information included in FIG. 2 , is identified using the same reference numerals used in FIG. 2 .
  • FIG. 3 is a diagram illustrating a second exemplary configurable policy 36 that is stored in the MS system 12 and is for associating each of a plurality of network-based electronic payment transaction risk factors 32 with a corresponding level of risk 34 .
  • the second configurable policy 36 does not include the transaction risk factors 32 relating to the type of retail establishment, the credit limit, and the duration since a previous transaction.
  • the second configurable policy 36 includes the transaction risk factors 32 relating amount/value of the payment transaction and the time of day, it should be appreciated that in other embodiments any type of electronic payment transaction risk factor 32 may be included that facilitates conducting the electronic payment transaction as described herein.
  • the electronic payment transaction risk factors 32 and the associated levels of risk 34 may be defined in any desirable manner that facilitates authenticating the identity of a user as an authorized user of a designated communications device 18 . Moreover, the definitions of the transaction risk factors 32 and the levels of risk 34 may be changed.
  • policies 30 , 36 for determining the levels of risk 34 are used to determine the resultant level of risk in the exemplary embodiment, it should be understood that other embodiments may not include such policies.
  • a default level of risk may be established for all network-based electronic payment transactions. The default level of risk may require using a personal identification number (PIN) to authenticate the shopper.
  • PIN personal identification number
  • FIG. 4 is a diagram illustrating an exemplary configurable authentication policy 38 that is stored in the BAC system 16 , and is for associating each of the levels of risk 34 with a corresponding authentication data requirement 40 .
  • the authentication policy 38 includes the same level of risk 34 categories established in the first configurable policy 30 , and further includes a level of risk 34 designated as low.
  • the authentication policy 38 includes an authentication data requirement 40 for use in authenticating a user of a designated communications device 18 while conducting an electronic payment transaction with the designated communications device 18 .
  • the authentication data requirement 40 is the authentication data required to be captured and used for authentication of the user.
  • the authentication data requirement 40 may be a requirement for any other type of authentication data including, but not limited to, Global Positioning System (GPS) coordinates, unique pass-phrases, a combination of biometric data with GPS coordinates, a combination of biometric data with a unique pass-phrase, a combination of GPS coordinates with a unique pass-phrase, and a combination of biometric data with GPS coordinates and a unique pass-phrase.
  • GPS Global Positioning System
  • the authentication policy 38 is generated by associating an authentication data requirement 40 with each level of risk 34 .
  • the authentication data requirements 40 indicate at least one biometric type that is to be captured from a user while authenticating the identity of the user as an authorized user of the designated communications device 18 .
  • the biometric types that are to be captured and used for authentication are determined by the level of risk 34 . It should be appreciated that the higher the level of risk 34 the more demanding the authentication data requirement 40 .
  • an electronic payment transaction having a low level of risk 34 requires biometric data of a single biometric type such as voice biometric data.
  • An electronic payment transaction having a high level of risk 34 requires biometric data of a plurality of different biometric types such as face and iris biometric data.
  • the authentication data requirement 40 for a level of risk 34 may be a combination of the authentication data requirements 40 appropriate for lesser levels of risk 34 .
  • the authentication data requirement 40 for the highest level of risk 34 may be a combination of the authentication data requirements 40 of the high and low levels of risk 34 .
  • the authentication policy 38 may be reconfigured by defining the authentication data requirements 40 and the levels of risk 34 in any desirable manner that facilitates authenticating the identity of a user as an authorized user of the designated communications device 18 .
  • the policy 38 may be reconfigured by changing the definitions of the authentication data requirements 40 and the levels of risk 34 .
  • the authentication data requirement 40 for a high level risk 34 may be reconfigured such that the appropriate authentication data requirement 40 stipulates authenticating the user with face, iris and fingerprint biometric data, instead of face and iris biometric data.
  • the exemplary embodiment includes one authentication policy 38 stored in the BAC system 16 , it should be appreciated that in other embodiments any number of authentication policies 38 may be generated and stored in the BAC system 16 . It should be understood that changes in levels of risk 34 are to be coordinated between the first policy 30 , the second policy 36 , and the authentication policy 38 .
  • FIG. 5 is a flowchart 42 illustrating an exemplary network-based electronic payment transaction process used by the PTC system 10 for eliminating the need to wait in line to conduct payment transactions at a point-of-sale (POS) terminal in a retail establishment.
  • the process starts 44 when a shopper in a retail establishment decides to purchase the goods without going through the POS terminal.
  • the shopper continues by identifying 46 the MS system 12 that is to be used for conducting a network-based electronic payment transaction to purchase the goods. More specifically, the shopper continues by obtaining 46 the communications device 18 and invoking a retail purchasing application stored therein by activating one of the buttons or icons 26 .
  • the purchasing application causes the communications device 18 to display a list of retail establishments on the screen 28 .
  • the shopper identifies the MS system 12 to be used for the transaction by selecting the retail establishment from which he would like to purchase the goods.
  • the communications device 18 continues processing by initiating 46 the electronic payment transaction by transmitting an initiation message to the MS system 12 of the selected retail establishment.
  • the MS system 12 transmits a message to the communications device 18 requesting the shopper to conduct the electronic payment transaction.
  • the communications device 18 continues processing by automatically selecting the service provider user identifier associated with the selected retail establishment as the service provider user identifier to be used for conducting the electronic payment transaction.
  • the shopper continues by entering a machine readable code from each good with the communications device 18 . Specifically, the shopper continues by photographing the machine readable code of each good with the communications device 18 .
  • the machine readable code includes, but is not limited to, a bar code, a Quality Response (RS) code, and a Data Matrix code.
  • the communications device 18 After photographing the machine readable code of a good, the communications device 18 continues by processing the photograph to determine the Universal Product Code (UPC) of the good and transmitting the UPC to the MS system 12 . In response, the MS system 12 continues by transmitting the price of the good to the communications device 18 . The communications device 18 displays the price of the good on the screen 28 for the shopper to see and stores the price therein. After determining the price of all the goods, processing continues by determining the total payment transaction cost 46 and displaying the total payment transaction cost on the screen 28 for the shopper to see. Although a photograph of each bar code is taken to determine the UPC and price of each good in the exemplary embodiment, in other embodiments the price of each good may be determined in any manner using the communications device 18 .
  • UPC Universal Product Code
  • processing continues by generating a payment transaction request at the communications device 18 and transmitting the payment transaction request from the device 18 to the MS system 12 .
  • the payment transaction request includes at least the UPC of each good to be purchased and the service provider user identifier to be used for conducting the transaction.
  • the MS system 12 continues by generating a merchant payment transaction request and transmitting the merchant payment transaction request to the SPC system 14 .
  • the merchant payment transaction request includes at least the UPC of each good to be purchased and the service provider user identifier.
  • the SPC system 14 After receiving the merchant payment transaction request, the SPC system 14 continues by determining whether or not the service provider user identifier received in the merchant payment transaction request is known 48 by comparing the received service provider user identifier against the service provider user identifiers stored therein. When the received service provider user identifier does not match a service provider user identifier stored therein, the received service provider user identifier is not known. The SPC system 14 generates a notification message indicating that the received service provider user identifier is not known and transmits the notification to the MS system 12 . Next, processing ends 50 . However, when the received service provider user identifier matches a service provider user identifier stored therein, the received service provider user identifier is determined to be known 48 .
  • the SPC system 14 After determining that the received service provider user identifier is known 48 , the SPC system 14 continues processing by determining whether to approve 52 payment for the electronic payment transaction based on standard credit card practices. When the electronic payment transaction is not approved 52 , processing ends 50 . However, when payment for the electronic payment transaction is approved 52 , the SPC system 14 continues processing by generating a payment transaction authorization message and transmitting the payment transaction authorization message to the MS system 12 .
  • processing continues by determining whether the communications device 18 is enrolled 54 in the BAC system 16 .
  • the MS system 12 continues processing by transmitting the service provider user identifier to the BAC system 16 .
  • the BAC system 16 continues by comparing the received service provider user identifier against service provider user identifiers stored therein. Upon determining a match between the received service provider user identifier and one of the service provider user identifiers stored therein, the BAC system 16 continues processing by determining the communications device identifier associated with the one matching service provider user identifier and determining a state of the associated communications device identifier. When the state of the associated communications device identifier is enrolled, the communications device 18 is considered to be enrolled in the BAC system 16 . When the state of the associated communications device identifier is not enrolled 54 , processing ends 50 .
  • the BAC system 16 continues by notifying the MS system 12 that the communications device 18 associated with the service provider user identifier is enrolled therein.
  • the MS system 12 continues processing by determining 56 the risk factors 32 associated with the electronic payment transaction and determining 56 the resultant level of risk for the electronic payment transaction.
  • processing continues by determining 56 the authentication data requirement for the electronic payment transaction. Specifically, processing continues by generating an authentication request at the MS system 12 and transmitting the authentication request to the BAC system 16 over the first communications channel.
  • the authentication request contains at least the resultant level of risk.
  • the BAC system 16 After receiving the authentication request, the BAC system 16 continues processing by extracting the resultant level of risk from the authentication request and consulting the authentication policy 38 to determine the authentication data requirement 40 that corresponds to the resultant level of risk. Specifically, the BAC system 16 continues by comparing the resultant level of risk against the levels of risk 34 to determine the corresponding authentication data requirement 40 . The authentication data requirement 40 is determined to be the authentication data requirement 40 that corresponds to the level of risk 34 that matches the resultant level of risk.
  • the exemplary embodiment uses the authentication policy 38 to determine the authentication data requirement 40 , it should be appreciated that in other embodiments an authentication policy may not be available. In such other embodiments, all available data may be collected from the shopper regardless of the risk factors 32 , the data collected may be determined by the shopper, the shopper may be repeatedly prompted for authentication data until sufficient authentication data is obtained, or the BAC system 16 may determine to end processing 50 . Moreover, it should be appreciated that in other embodiments the BAC system 16 may determine the resultant level of risk associated with the electronic payment transaction.
  • the BAC system 16 After determining 56 the authentication data requirement, the BAC system 16 continues by transmitting a message to the communications device 18 to invoke the security application stored therein. After transmitting the message, the BAC system 16 continues processing by generating and transmitting an authentication data capture request to the communications device 18 over the second communications channel.
  • the authentication data capture request includes at least the authentication data requirement 40 .
  • the security application causes the communications device 18 to continue processing by obtaining the communications device identifier of the communications device 18 , and by initiating communications with the BAC system 16 by transmitting the communications device identifier to the BAC system 16 over the second communications channel.
  • the BAC system 16 validates 58 the communications device 18 by determining whether the communications device 18 is known. Specifically, the BAC system 18 continues by comparing the received communications device identifier against the communications device identifiers stored therein, and determining that the communications device 18 is known, and thus validated, when the received communications device identifier matches one of the communications device identifiers stored therein. Otherwise, when the received communication device identifier does not match one of the communications device identifiers stored in the BAC system 16 , the communications device 18 is not validated 58 and processing ends 50 .
  • the communications device 18 Upon receiving the authentication data capture request transmission, the communications device 18 continues by verifying 60 that the authentication data capture request was transmitted from the BAC system 16 . After verifying that the authentication data capture request was transmitted from the BAC system 16 , the security application causes the communications device 18 to display the authentication data capture request on the screen 28 . Next, the shopper continues processing by reading the authentication data capture request from the screen 28 and capturing biometric authentication data 62 in accordance with the authentication data requirement included in the authentication data capture request. When the authentication data capture request cannot be verified as being transmitted from the BAC system 16 , processing ends 50 .
  • the authorized shopper associated with the inputted service provider user identifier is in possession of the communications device 18 in the exemplary embodiment, and can be contacted using the communications device 18 .
  • the authentication data capture request is considered to be transmitted to the authorized shopper associated with the inputted service provider user identifier.
  • the shopper continues processing by capturing biometric authentication data 62 in accordance with the authentication data capture request with the communications device 18 .
  • processing continues by transmitting the captured biometric data from the communications device 18 to the BAC system 16 over the second communications channel, and evaluating the captured biometric data at the BAC system 16 to verify that the captured biometric data is of sufficient quality 64 .
  • processing continues by authenticating the identity of the shopper.
  • processing continues by again capturing the requested biometric authentication data 66 .
  • biometric authentication data corresponding to the requested biometric authentication data may be captured six times. When acceptable biometric authentication data is not obtained after six attempts, processing ends 50 . However, it should be appreciated that in other embodiments biometric data may be obtained any number of times.
  • processing continues by authenticating the identity of the shopper 68 by comparing the captured biometric data against the authentication data included in the enrollment data record of the authorized shopper associated with the one matching communications device identifier in the BAC system 16 .
  • identity of the shopper is not authenticated, processing ends 50 .
  • the captured biometric data matches the authentication data included in the enrollment data record, the identity of the shopper is considered to be authenticated 68 .
  • the BAC system 16 After authenticating the identity of the shopper 68 , the BAC system 16 continues by generating and transmitting an authentication result message to the MS system 12 .
  • the MS system 12 continues processing by completing the desired electronic payment transaction 70 with the service provider user identifier and transmitting a transaction complete message to the communications device 18 notifying the shopper that the transaction was completed.
  • the communications device 18 continues by displaying the transaction complete message on the screen 28 for the shopper to see.
  • the communications device 18 continues processing by generating an electronic receipt for the electronic payment transaction.
  • the electronic receipt includes at least a machine readable code that indicates the details of the completed electronic payment transaction including, but not limited to, the goods purchased.
  • the machine readable code includes, but is not limited to, a two-dimensional code.
  • the electronic receipt is displayed on the screen 28 upon generation. After displaying the electronic receipt on the screen 28 , an employee of the retail establishment continues by scanning the machine readable code from the electronic receipt as the shopper leaves the retail establishment to determine the goods purchased and verify that the shopper is leaving with only the goods purchased.
  • a photograph of the shopper may be presented to the employee on a display to facilitate verifying that an imposter did not purchase the goods.
  • the employee continues by permitting the shopper to leave the retail establishment when the shopper is leaving with only the goods purchased.
  • processing ends 50 .
  • processing continues by calculating the GPS coordinates of the communications device 18 and comparing the GPS coordinates of the communications device 18 against an area of the retail establishment determined from GPS coordinate data. When the GPS coordinates of the communications device 18 are located within the area of the retail establishment, processing continues by entering the machine readable codes of the goods. Otherwise, when the GPS coordinates of the communications device 18 are not located within the retail establishment, processing continues by deactivating the retail purchasing application such that processing ends 50 .
  • the MS system 12 that is to be used for conducting the electronic transaction is identified and selected by the shopper from a list displayed on the screen 28 , in other embodiments any other method may be used to identify the MS system 12 that is to be used for conducting the electronic payment transaction.
  • the shopper may photograph a machine readable code posted in the retail establishment with the device 18 .
  • the machine readable code includes, but is not limited to, a Quick Response (QR) code and a Data Matrix code.
  • the machine readable code indicates at least the MS system 12 of the retail establishment to be used for conducting the transaction.
  • the communications device 18 identifies the MS system 12 to communicate with for conducting the transaction.
  • the communications device 18 may automatically receive a radio frequency (RF) signal broadcast by the retail establishment upon entering the retail establishment that identifies the MS system 12 to be used for conducting the transaction.
  • RF radio frequency
  • the GPS coordinates of the communications device 18 may be compared against the GPS coordinates of a retail establishment.
  • the communications device 18 is configured to communicate with the MS system 12 of the retail establishment.
  • the shopper may enter the name of the retail establishment into the communications device 18 .
  • FIG. 6 The information shown in FIG. 6 is the same information shown in FIG. 5 as described in more detail below. As such, operations illustrated in FIG. 6 that are identical to operations illustrated in FIG. 5 , are identified using the same reference numerals used in FIG. 5 .
  • FIG. 6 is a flowchart 72 illustrating an alternative exemplary authentication process used by the PTC system 10 for eliminating the need to wait in line to conduct payment transactions at a POS terminal in a retail establishment.
  • This alternative embodiment is similar to that shown in FIG. 5 .
  • the SPC system 14 generates the payment transaction authorization message after the identity of the shopper is successfully authenticated.
  • the payment transaction authorization message is generated after authenticating the shopper 68 .
  • the SPC system 14 communicates directly with the BAC system 16 to facilitate conducting operations 54 to 70 , instead of the MS system 12 as in the exemplary embodiment.
  • processing continues by determining whether the communications device 18 is enrolled in the BAC system 16 . Specifically, the SPC system 14 continues by generating a notification message and transmitting the notification message to the MS system 12 . The notification message indicates that the service provider user identifier is known. After receiving the notification message, the MS system 12 continues processing by transmitting the service provider user identifier to the BAC system 16 . After receiving the service provider user identifier, the BAC system 16 continues by comparing the received service provider user identifier against service provider user identifiers stored therein.
  • the BAC system 16 Upon determining a match between the received service provider user identifier and one of the service provider user identifiers stored therein, the BAC system 16 continues processing by determining the communications device identifier associated with the one matching service provider user identifier and determining a state of the associated communications device identifier. When the state of the associated communications device identifier is enrolled 54 , the communications device 18 is considered to be enrolled in the BAC system 16 . When the state of the associated communications device identifier is not enrolled 54 , processing ends 50 .
  • the BAC system 16 continues by notifying the SPC system 14 that the communications device 18 associated with the service provider user identifier is enrolled therein. In response, the SPC system 14 continues processing by determining the risk factors 32 associated with the electronic payment transaction and determining 56 the resultant level of risk for the electronic payment transaction.
  • processing continues by determining 56 the authentication data requirement for the electronic payment transaction. Specifically, processing continues by generating an authentication request at the SPC system 14 and transmitting the authentication request to the BAC system 16 over the first communications channel. The authentication request contains at least the resultant level of risk. Next, processing continues by conducting operations 58 to 68 as described with regard to the exemplary embodiment.
  • the BAC system 16 continues processing by generating and transmitting an authentication result message to the SPC system 14 .
  • the authentication result message indicates that the identity of the shopper was successfully authenticated.
  • the SPC system 14 continues by generating a payment transaction authorization message and transmitting the payment transaction authorization message to the MS system 12 .
  • the payment authorization message indicates that the SPC system 14 has approved payment for the electronic payment transaction.
  • the MS system 12 continues processing by completing the desired electronic payment transaction 70 and transmitting a transaction complete message to the communications device 18 indicating that the transaction was completed.
  • the communications device 18 continues by notifying the shopper by displaying the transaction complete message on the screen 28 for the shopper to see.
  • the communications device 18 continues processing by generating the electronic receipt for the electronic payment transaction.
  • an employee of the retail establishment continues by scanning the machine readable code from the electronic receipt as the shopper leaves the retail establishment to determine the goods purchased and verify that the shopper is leaving with only the goods purchased. The employee continues by permitting the shopper to leave the retail establishment when the shopper is leaving with only the goods purchased.
  • processing ends 50 ends 50 .
  • the embodiments described herein do not include a one-time pass-phrase (OTPP), it should be appreciated that in other embodiments an OTPP may be included.
  • the BAC system 16 after authenticating the shopper 68 , the BAC system 16 generates an OTPP, stores the generated OTPP therein, and transmits the OTPP to the communications device 18 .
  • the communications device displays the OTPP on the screen 28 for the shopper to see and prompts the shopper to then enter the OTPP into the communications device 18 .
  • the shopper activates a button or icon 26 which causes the communications device to transmit the OTPP to the SPC system 14 .
  • the SPC system 14 transmits the OTPP to the BAC system 16 which compares the received OTPP against the OTPP stored therein. If the received OTPP matches the stored OTPP, the shopper is authenticated and is permitted to complete the payment transaction 70 . Otherwise, processing ends 50 .
  • the shopper may make a typographical error when entering the OTPP into the communications device 18 .
  • the OTPP may be automatically transmitted to the SPC system 14 when the shopper activates a button or icon 26 in response to a prompt to automatically transmit the OTPP, or the OTPP may be automatically transmitted to the SPC system 14 without pressing an icon or button 26 .
  • the communications device 18 may prompt the shopper to select between manually entering the OTPP in the communications device 18 or automatically transmitting the OTPP to the SPC system 14 .
  • the shopper may enter an input indicating which to choose by pressing an appropriate icon or button 26 .
  • MS system 12 may be configured to communicate in any manner, and in any order, to authenticate shoppers as authorized shoppers and thus reduce the time spent waiting to conduct payment transactions in retail establishments.
  • the BAC system 16 determines the authentication requirement by comparing an extracted level of risk against levels of risk 34 included in authentication policies stored therein in the exemplary embodiment, it should be appreciated that in other embodiments the communications device 18 may determine the authentication requirement by comparing the extracted level of risk against levels of risk 34 included in authentication policies stored therein.
  • biometrically authenticating identities facilitates increasing the level of trust that a shopper attempting to conduct a network-based electronic payment transaction in a retail establishment with a communications device 18 is an authorized shopper.
  • an additional level of security is provided which also facilitates increasing trust in authentication results that indicate a shopper is an authorized shopper.
  • the processes and systems described herein facilitate increasing the security of network-based electronic payment transactions conducted in a retail establishment using the communications device 18 .
  • the processes and systems described herein facilitate increasing the level of trust in network-based electronic payment transactions conducted in a retail establishment with a portable communications device, and thus facilitate reducing risks that such network-based electronic payment transactions will be conducted fraudulently. Moreover, the processes and systems described herein facilitate reducing the time shoppers spend in retail establishments conducting payment transactions. Furthermore, as a result of the processes and systems described herein, retail establishments should require fewer POS terminals which in turn facilitates reducing retail establishment operating costs. Providing a quick, easy, reliable, and convenient process of purchasing goods also facilitates attracting new customers to retail establishments and facilitates encouraging increased visits by existing customers and thereby facilitates enhancing revenue. The processes and systems described herein are believed to be applicable to many different businesses for reducing risks that network-based transactions associated with these different businesses will be conducted fraudulently.
  • a shopper in a retail establishment uses his portable communications device to purchase goods instead of purchasing the goods at a POS terminal. After initiating a network-based electronic payment transaction on the communications device, biometric data corresponding to a level of risk is determined and captured from the shopper with the communications device, and used for biometrically authenticating the shopper. Upon biometrically authenticating the shopper, the electronic payment transaction is conducted and an electronic receipt including a machine readable code is generated.

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Finance (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

A method of eliminating the need to wait in line to conduct a payment transaction in a retail establishment includes initiating a network-based electronic payment transaction with a communications device in a retail establishment. A shopper initiates the network-based electronic payment transaction. Moreover, the method includes entering a machine readable code from at least one good with the communications device, determining a price of the at least one good and a total payment transaction cost, and displaying the total payment transaction cost on a screen of the communications device. Furthermore, the method includes determining whether to approve payment for the electronic payment transaction, authenticating the shopper, completing the electronic payment transaction in the retail establishment, and transmitting a transaction complete message to the communications device when the shopper is authenticated.

Description

    BACKGROUND OF THE INVENTION
  • This invention relates generally to methods and systems for conducting payment transactions, and more particularly, to methods and systems for conducting network-based electronic payment transactions in a retail establishment upon authentication of a shopper conducting the electronic payment transaction.
  • Known methods of shopping in retail establishments typically include collecting goods for purchase and conducting a payment transaction at a point-of-sale (POS) terminal to purchase the goods. POS terminals are electronic cash registers used for conducting payment transactions and generating receipts for the transactions. Frequently, shoppers are required to spend an undesirable amount of time waiting in long lines before purchasing goods at a POS terminal. Such long lines have been known to discourage shoppers from repeatedly visiting retail establishments and to discourage new shoppers from visiting retail establishments. Thus, long waiting times have been known to negatively affect commerce at retail establishments.
  • Retail establishments have been known to purchase several POS terminals for conducting many simultaneous payment transactions in an effort to facilitate reducing the time spent waiting before conducting payment transactions. However, because POS terminals are known to include expensive hardware and software, and typically are operated by a sales person, retail establishments have been known to incur substantial costs in buying, maintaining, and operating such POS terminals. Some retail establishments have also been known to provide scanning devices such that while shopping, the shoppers themselves are able to scan bar codes on goods as they are collected. After collecting and scanning the goods desired for purchase, shoppers generally spend less time at a POS terminal purchasing the goods because the goods have already been scanned. However, such shoppers still must suffer the inconvenience of waiting in line before purchasing the goods in a payment transaction. Moreover, during periods of heavy shopper traffic, long lines invariably develop at POS terminals that inconvenience shoppers who are required to wait for prolonged periods of time prior to conducting a payment transaction.
  • BRIEF DESCRIPTION OF THE INVENTION
  • In one aspect, a method of eliminating the need to wait in line to conduct a payment transaction in a retail establishment includes initiating a network-based electronic payment transaction with a communications device in a retail establishment. A shopper initiates the network-based electronic payment transaction. Moreover, the method includes entering a machine readable code from at least one good with the communications device, determining a price of the at least one good and a total payment transaction cost, and displaying the total payment transaction cost on a screen of the communications device. Furthermore, the method includes determining whether to approve payment for the electronic payment transaction, authenticating the shopper, completing the electronic payment transaction in the retail establishment, and transmitting a transaction complete message to the communications device when the shopper is authenticated.
  • In another aspect, a system for eliminating the need to wait in line to conduct a payment transaction in a retail establishment is provided that includes a computer configured as a server. The server includes at least a database and is configured to at least store within the database a first configurable policy and to determine a resultant level of risk associated with a network-based electronic payment transaction. Moreover, the system includes a communications device associated with a shopper in the retail establishment. The communications device is configured to communicate with at least the server, to initiate the network-based electronic payment transaction in the retail establishment, to capture biometric authentication data from the shopper in the retail establishment, and to generate a receipt for each network-based electronic payment transaction. The system also includes an authentication system including an authentication system database.
  • The authentication system is configured to communicate with at least the server and the communications device, to store within the authentication system database biometric authentication data for each of a plurality of authorized shoppers, and to conduct a biometric authentication process while the shopper is in the retail establishment. Furthermore, the system includes a merchant system configured to communicate with at least the server, the communications device, and the authentication system. The merchant system is further configured to generate and transmit messages and to complete network-based electronic payment transactions. The communications device is further configured to communicate with the authentication system and the merchant system. After the communications device generates a receipt for the network-based electronic payment transaction, an employee of the retail establishment scans the receipt as the shopper leaves the retail establishment and permits the shopper to leave the retail establishment when the shopper has only the goods purchased.
  • In yet another aspect, a computer-readable recording medium on which a program is recorded is provided. The computer program causes the computer to execute at least initiating a network-based electronic payment transaction with a communications device in a retail establishment. A shopper initiates the electronic payment transaction. Moreover, the computer program causes the computer to execute determining a price of at least one good and a total payment transaction cost, displaying the total payment transaction cost on a screen of the communications device, and determining whether to approve payment for the electronic payment transaction. Furthermore, the computer program causes the computer to execute authenticating the shopper, completing the electronic payment transaction in the retail establishment, and transmitting a transaction complete message to the communications device when the shopper is authenticated.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a block diagram of an exemplary embodiment of a payment transaction computer system for conducting network-based electronic transactions in a retail establishment;
  • FIG. 2 is a diagram illustrating a first exemplary configurable policy for associating network-based electronic payment transaction risk factors with corresponding levels of risk;
  • FIG. 3 is a diagram illustrating a second exemplary configurable policy for associating network-based electronic payment transaction risk factors with corresponding levels of risk;
  • FIG. 4 is a diagram illustrating an exemplary authentication policy associating each of the levels of risk illustrated in FIGS. 2 and 3 with a corresponding authentication data requirement;
  • FIG. 5 is a flowchart illustrating an exemplary network-based electronic payment transaction process for eliminating the need to wait in line before conducting payment transactions; and
  • FIG. 6 is a flowchart illustrating an alternative exemplary authentication process for eliminating the need to wait in line before conducting payment transactions.
  • DETAILED DESCRIPTION OF THE INVENTION
  • FIG. 1 is an expanded block diagram of an exemplary embodiment of a system architecture of a Payment Transaction Computer (PTC) System 10 for conducting network-based electronic payment transactions in a retail establishment with a portable communications device. More specifically, the PTC system 10 includes a Merchant Server (MS) System 12, a Service Provider Computer (SPC) System 14, a Biometric Authentication Computer (BAC) System 16 and a portable communications device 18. The MS system 12, the SPC system 14, and the BAC system 16 each include components such as, but not limited to, a web server, a database server, an application server, a directory server and a disk storage unit. The disk storage unit may be used to store any kind of data. The BAC system 16 may also include a database management server and an authentication server. The database management server may be used to facilitate transferring data to and from the disk storage device. The authentication server is configured to perform matching of any feature or information associated with individuals to authenticate the identity of individuals as described herein.
  • The MS system 12 also includes a point-of-sales (POS) terminal 20 typically operated by a sales person. Although the exemplary embodiment includes a single POS terminal 20, in other embodiments the MS system 12 may include any number of POS terminals 20.
  • The MS system 12 is configured to communicate with a user of the communications device 18 over a communications network 22. In the exemplary embodiment, the communications network 22 is a 3G communications network. However, it should be appreciated that in other embodiments the communications network 22 may be any wireless network that facilitates authentication as described herein, such as, but not limited to, WiFi, Global System for Mobile (GSM) and Enhanced Data for GSM Evolution (EDGE). Moreover, in yet other embodiments the network 22 may include any combination of such wireless networks, local area networks, wide area networks, and the Internet. The network 22 may be used by devices such as the communications device 18 to conduct long range wireless communications such as cellular telephone calls and wirelessly accessing the Internet. The MS system 12 is configured to at least generate and transmit payment transaction requests, as well as generate authentication requests and transmit the authentication requests to the BAC system 16. When the identity of the user of the communications device 18 is authenticated, the MS system 12 is configured to complete an electronic payment transaction with the communications device in a retail establishment. The MS system 12 may also be configured to store policies that determine levels of risk and policies that determine authentication data requirements for the levels of risk. Thus, the MS system 12 is a computer system of a retail establishment that requires authenticating a shopper prior to completing a network-based electronic payment transaction.
  • The SPC system 14 is a computer system of a financial institution service provider used to store and manage financial data for a plurality of authorized users. Although the exemplary embodiment is described as including one SPC system 14 corresponding to a financial institution service provider, it should be appreciated that in other embodiments a plurality of SPC systems 14 may be provided such that each of the plurality of SPC systems 14 is associated with a different service provider. The SPC system 14 and the MS system 12 are associated with different entities in the exemplary embodiment. However, in other embodiments the SPC system 14 and MS system 12 may be associated with the same entity.
  • The SPC system 14 is typically configured to communicate with the communications device 18, the MS system 12, and the BAC system 16 over the network 22. The SPC system 14 is configured to store therein a different service provider user identifier for each authorized user such that each service provider user identifier is associated with the financial data of a respective authorized user. The SPC system 14 is also configured to store therein biographic data for each authorized user such that the biographic data is associated with the service provider user identifier of a respective authorized user. Moreover, the SPC system 14 is configured to store therein a service provider identifier of the service provider operating the SPC system 14, and to generate and transmit electronic payment transaction authorizations to the MS system 12. In other embodiments, the SPC system 14 is configured to store therein at least one configurable policy for associating network-based electronic payment transaction risk factors with levels of risk.
  • The BAC system 16 is configured to communicate with the MS system 12, the SPC system 14, and the communications device 18 over the communications network 22. Although the BAC system 16 communicates with a single SPC system 14 in the exemplary embodiment, it should be appreciated that in other embodiments the BAC system 16 may be configured to communicate with a plurality of SPC systems 14.
  • The BAC system 16 is also configured to facilitate authenticating the identity of a user associated with the communications device 18 who requests conducting a network-based electronic payment transaction. Moreover, the BAC system 16 is configured to store at least authentication data in an enrollment data record for each of a plurality of authorized users. In the exemplary embodiment, the authentication data is biometric data that corresponds to any biometric type desired to be used as the basis of authenticating the identity of a user associated with the communications device 18. Such biometric types include, but are not limited to, face, fingerprint, iris, voice, vascular patterns and hand signatures. Moreover, the biometric data may take any form such as, but not limited to, images, photographs, templates and electronic data representations. The user associated with the communications device 18 in the exemplary embodiment is a shopper in a retail establishment. Thus, the BAC system 16 is configured to store biometric authentication data and is configured to use the biometric authentication data to authenticate identities of shoppers desiring to conduct network-based electronic payment transactions in retail establishments. Using biometrics as the basis for authenticating shopper identities facilitates enhancing trust in authentication results and in the integrity of network-based electronic payment transactions conducted by shoppers in retail establishments based upon such authentication results. Furthermore, the enrollment data record of each authorized user may include at least biographic data and a unique user identifier of the respective authorized user. The unique user identifier may also be stored in the SPC system 14. The service provider identifier and the unique user identifier may be alphanumeric character strings of any length.
  • The BAC system 16 is also configured to store at least one configurable authentication policy that indicates the authentication data required to be captured for each of a plurality of levels of risk. By indicating the authentication data requirement for each of the levels of risk, the at least one configurable authentication policy may be used to facilitate determining an authentication data requirement associated with an electronic payment transaction. Furthermore, the BAC system 16 is configured to generate and transmit authentication data capture requests to at least the communications device 18. It should be understood that an authentication data capture request includes at least an authentication data requirement, determined by the BAC system 16, that is to be captured from the shopper attempting to conduct a network-based electronic payment transaction in a retail establishment with a designated portable communications device 18.
  • The term “biographic data” as used herein includes any demographic information regarding a user including, but not limited to, the user's name, age, date of birth, address, citizenship and marital status. Contact information including devices associated with authorized users and methods for contacting the authorized user may also be collected from the user. In the exemplary embodiment, users designate a particular communications device and provide information regarding the designated communications device that facilitates validating the designated communications device as known, facilitates communicating with the authorized user, and facilitates authenticating the identity of the authorized user. Such information includes, but is not limited to, a communications device identifier of the designated communications device, a telephone number associated with the designated communications device, an e-mail address that can be accessed using the designated communications device, an instant messaging user identifier that can be accessed, and an identifier that facilitates sending short message service (SMS) messages to the designated communications device.
  • The information regarding the designated communications device is included in the enrollment data record of the authorized user of the designated communications device 18. By virtue of including the communications device identifier in the enrollment data record, the communications device identifier is associated with the unique user identifier of the authorized user. In the exemplary embodiment the portable communications device 18 is the designated communications device. Additionally, a state of the communications device 18 may be included in the enrollment data record of the user and thus associate the state of the device 18 with the designated communications device information. It should be appreciated that the SPC system 14 may also store therein the communications device identifier such that the communications device identifier is associated with the service provider user identifier of the authorized user in the SPC system 14.
  • Although the authentication data is described as biometric data in the exemplary embodiment, it should be appreciated that in other embodiments any other type of authentication data, or combinations of different types of authentication data, may be used that facilitates authenticating the identity of a user. Such other types of authentication data include, but are not limited to, Global Positioning System (GPS) coordinates, unique pass-phrases, a combination of biometric data with GPS coordinates, a combination of biometric data with a unique pass-phrase, a combination of GPS coordinates with a unique pass-phrase, and a combination of biometric data with GPS coordinates and a unique pass-phrase.
  • GPS coordinates may be determined for any GPS enabled device used by an authorized user to communicate with the BAC system 16. For example, GPS coordinate data may be determined for a retail establishment such that an area of the retail establishment computed from the GPS coordinate data is stored in the BAC system 16. When GPS coordinates of the designated communications device 18 are determined to be located within the retail establishment area, the user may conduct an electronic payment transaction with the retail establishment as long as the user is authenticated and the transaction is authorized. Otherwise, when the designated communications device 18 is determined to be outside of the retail establishment area, the user is not permitted to conduct an electronic payment transaction with the retail establishment.
  • Unique pass-phrases may also be established for each authorized user and stored in the BAC system 16 such that a user desiring to conduct a network-based electronic payment transaction in a retail establishment with the designated communications device 18, provides the unique pass-phrase for authentication. Unique pass-phrases are alphanumeric character strings that may be manually input or spoken into the communications device 18.
  • The communications device 18 is configured to conduct long range wireless communications including, but not limited to, cellular telephone calls and wirelessly accessing the Internet over the network 22. Moreover, the communications device 18 is configured to communicate with at least the MS system 12, the SPC system 14, and the BAC system 16 over the network 22. Additionally, in the exemplary embodiment, the communications device 18 is configured to capture authentication data from users desiring to conduct a network-based electronic payment transaction while in a retail establishment. The communications device 18 includes a front face 24 and a back face (not shown). The front face 24 includes at least one of buttons and icons 26 configured to at least enter commands, enter data such as unique pass-phrases, and invoke applications stored in the device 18. Applications stored in the communications device 18 include at least a security application and a retail purchasing application. Furthermore, the front face 24 includes a display screen 28 such as, but not limited to, a Liquid Crystal Display (LCD). The communications device 18 is configured to at least display at least one of text and images on the display screen 28. In the exemplary embodiment, the communications device 18 is a portable cellular phone configured to at least display at least one of text and images, capture authentication data from a user, and transmit the captured authentication data to the BAC system 16.
  • Additionally, the communications device 18 is configured to store a plurality of service provider user identifiers and corresponding service provider identifiers for use in electronic payment transactions conducted in a retail establishment. In the exemplary embodiment, the service provider user identifier is a credit card number of a credit card a shopper desires to use for purchasing goods. In other embodiments, the service provider user identifier may be any alphanumeric character string such as, but not limited to, a debit card number or an e-mail address associated with the shopper that is capable of facilitating completing the electronic payment transaction. Thus, for example, the communications device 18 may store a credit card number issued by a first bank with the corresponding service provider identifier of the first bank, and a debit card number issued by a second bank with the corresponding service provider identifier of the second bank.
  • The user may designate a service provider user identifier as a default service provider user identifier for each service provider. Alternatively, the communications device 18 may display a list of service provider user identifiers on the screen 28 that a user may select from for conducting a network-based electronic payment transaction.
  • Although the communications device 18 is a portable cellular phone in the exemplary embodiment, it should be appreciated that in other embodiments the communications device 18 may be any portable communications device capable of at least displaying at least one of text and images, and capturing and transmitting data. Such other communications devices 18 include, but are not limited to, a smart phone, a tablet computer, a laptop computer, and any type of portable communications device having wireless capabilities such as a personal digital assistant (PDA). Authentication data captured during authentication of a user is captured from the user with the designated communications device 18. However, in the exemplary embodiment the captured biometric data is not stored in the communications device 18 due to security concerns that the biometric data may be discovered should the device 18 be lost or stolen. Instead, the communications device 18 transmits the captured biometric data to the BAC system 16 for storage therein. However, in other embodiments with lesser security concerns, the captured biometric data may be stored in the device 18.
  • The MS system 12, the SPC system 14, the BAC system 16, and the communications device 18, respectively, each include a processor (not shown) and a memory (not shown). It should be understood that, as used herein, the term processor is not limited to just those integrated circuits referred to in the art as a processor, but broadly refers to a computer, an application specific integrated circuit, and any other programmable circuit. It should be understood that the processors execute instructions, or computer programs, stored in the respective memories (not shown) of the MS system 12, the SPC system 14, the BAC system 16 and the communications device 18. The above examples are exemplary only, and are thus not intended to limit in any way the definition and/or meaning of the term “processor.”
  • The respective memories (not shown) in the MS system 12, the SPC system 14, the BAC system 16, and the communications device 18, can be implemented using any appropriate combination of alterable, volatile or non-volatile memory or non-alterable, or fixed, memory. The alterable memory, whether volatile or non-volatile, can be implemented using any one or more of static or dynamic RAM (Random Access Memory), a floppy disc and disc drive, a writeable or re-writeable optical disc and disc drive, a hard drive, flash memory or the like. Similarly, the non-alterable or fixed memory can be implemented using any one or more of ROM (Read-Only Memory), PROM (Programmable Read-Only Memory), EPROM (Erasable Programmable Read-Only Memory), EEPROM (Electrically Erasable Programmable Read-Only Memory), an optical ROM disc, such as a CD-ROM or DVD-ROM disc, and disc drive or the like.
  • Each of the memories (not shown) can be a computer-readable recording medium used to store data, respectively, in the MS system 12, the SPC system 14, the BAC system 16, and the communications device 18. Moreover, each of the respective memories (not shown) can be a computer-readable recording medium used to store computer programs or executable instructions that are executed, respectively, by the merchant server system 12, the SPC system 14, the BAC system 16, and the communications device 18. Moreover, the memories (not shown) may include smart cards, SIMs or any other medium from which a computing device can read computer programs or executable instructions. As used herein, the term “computer program” is intended to encompass an executable program that exists permanently or temporarily on any computer-readable recordable medium that causes the computer or computer processor to execute the program. It should be understood that as described herein, applications are computer programs. Thus, the security and the retail purchasing applications described herein are computer programs.
  • It should be appreciated that the MS system 12, the network 22, the SPC system 14, and the BAC system 16, together constitute a first communications channel. Moreover, it should be appreciated that the communications device 18 and a part of the network 22 between the communications device 18 and the BAC system 16, together constitute a second communications channel separate and distinct from the first communications channel. Attackers that are able to monitor communications and phish for user names and passwords over the first communications channel are typically not aware of the second communications channel, and thus are not motivated to monitor communications and phish over the second channel. As a result, security of network-based electronic payment transactions conducted by shoppers in a retail establishment with the designated communications device 18 is facilitated to be increased and ease of integration with existing legacy systems is facilitated to be enhanced.
  • Users are required to enroll in the SPC system 14 prior to using the designated communications device 18 for conducting network-based electronic payment transactions. During enrollment in the SPC system 14, a service provider user identifier and biographic data of the user are obtained and stored in the SPC system 14 such that the biographic data is associated with a corresponding service provider user identifier. The communications device 18 is also required to be enrolled in the BAC system 16 prior to conducting a network-based electronic payment transaction. Specifically, a communications device identifier obtained from the communications device 18 is included in the enrollment data record of the user of the designated communications device 18. The service provider user identifier and a service provider identifier that identifies the financial institution service provider are included in the enrollment data record of the user such that the service provider user identifier and the service provider identifier are associated with the communications device identifier and the unique user identifier. By thus associating the service provider user identifier with the communications device identifier, the designated communications device 18 is enrolled in the BAC system 16.
  • Although the service provider identifier is obtained from the user during enrollment in the BAC system 16 in the exemplary embodiment, it should be appreciated that in other embodiments the identities of a plurality of different service providers may be obtained and associated with the unique user identifier in the BAC system 16. That is, the user may provide the service provider identifiers of a plurality of different service providers and associated service provider user identifiers that are to be stored in the BAC system 16 and associated with the unique user identifier in the BAC system 16. It should be appreciated that each different service provider has a corresponding SPC system 14 that stores therein at least service provider user identifiers that uniquely identify the user to the corresponding SPC system 14. Thus, it should be understood that in other embodiments by virtue of the service provider user identifier being associated with each of the different service provider identities, the BAC system 16 may be associated with each of the corresponding SPC systems 14 such that the BAC system 16 is able to determine the SPC systems 14 to communicate with for each user.
  • In the exemplary embodiment, the communications device identifier and the service provider user identifier of each authorized user are stored in the enrollment data record of the authorized user. Thus, the service provider identifier is associated with all other data included in the enrollment data record. It should be understood that by virtue of associating the service provider user identifier with the financial data of a respective authorized user in the SPC system 14, and including the service provider user identifier in the enrollment data record of the authorized user, the service provider user identifier functions to map data stored in the SPC system 14 associated therewith to data stored in the BAC system 16 associated with the same service provider user identifier. Thus, it should be appreciated that in the exemplary embodiment information stored in the SPC system 14 facilitates mapping between data stored in the SPC system 14 and data stored in the BAC system 16.
  • FIG. 2 is a diagram illustrating a first exemplary configurable policy 30 that is stored in the SPC system 14 and is for associating each of a plurality of network-based electronic payment transaction risk factors 32 with a corresponding level of risk 34. The levels of risk 34 define categories of risk associated with network-based electronic payment transactions that vary from a highest to a lowest level of risk. Specifically, the policy 30 includes a plurality of electronic payment transaction risk factors 32 and associates each risk factor 32 with a corresponding level of risk 34. Such risk factors 32 may include, but are not limited to, the amount or value of the payment transaction, the type of retail establishment, the amount of credit available to a shopper, the time of day the payment transaction is made, and the duration since a previous payment transaction. Moreover, each of the electronic payment transaction risk factors 32 is divided into subcategories such that each subcategory is associated with a corresponding level of risk 34. For example, the value of a purchase may be divided into subcategories according to value, such as $0-100, $100-500, and greater than $500. Each subcategory is assigned a corresponding level of risk 34. Consequently, an electronic payment transaction worth less than $100 may be associated with a lowest level of risk 34, an electronic payment transaction worth between $100 and $500 may be associated with a high level of risk 34, and an electronic payment transaction worth greater than $500 may be associated with a highest level of risk 34.
  • Similarly, the type of retail establishment risk factor 32 may be divided into subcategories according to a level of trust associated with each retail establishment such as trustworthy, generally trustworthy, and untrustworthy. A retail establishment may be considered trustworthy because electronic payment transaction problems have not been encountered with the retail establishment. A retail establishment may be considered generally trustworthy because at least some electronic payment transaction problems have been encountered with the retail establishment. A retail establishment may be considered untrustworthy because significant electronic payment transaction problems have been encountered with the retail establishment. Consequently, a trustworthy retail establishment may be associated with a low level of risk 34, a generally trustworthy retail establishment may be associated with a high level of risk 34, and an untrustworthy retail establishment may be associated with the highest level of risk 34.
  • It should be understood that the electronic payment transaction risk factors 32 and the associated levels of risk 34 may be defined in any desirable manner that facilitates authenticating the identity of a user as an authorized user of a designated communications device 18. Moreover, the definitions of the transaction risk factors 32 and the levels of risk 34 may be changed.
  • It should be appreciated that any network-based electronic payment transaction may involve a plurality of the electronic payment transaction risk factors 32, and that a resultant level of risk may be determined using the levels of risk 34 associated with each of the involved electronic payment transaction risk factors 32. The SPC system 14 compares the levels of risk 34 associated with each of the involved electronic payment transaction risk factors 32 and determines which risk factor 32 has the greatest level of risk 34. The greatest level of risk 34 is determined to be the resultant level of risk and is used as the basis for authenticating the user. For example, when an electronic payment transaction for less than $100 is conducted with an untrustworthy retail establishment, the level of risk associated with each of the involved electronic payment transaction risks 32 is determined as lowest and highest, respectively, by the SPC system 14. Because the level of risk 34 associated with an untrustworthy retail establishment is greater than the level of risk 34 associated with an electronic payment transaction worth less than $100, the resultant level of risk is the level of risk 34 associated with the untrustworthy retail establishment. Although the greatest level of risk 34 associated with the payment transaction risk factors is determined to be the resultant level of risk in the exemplary embodiment, it should be appreciated that in other embodiments any other known technique may be used to combine a plurality of the risk factors 32 to obtain an optimal overall risk rating, or optimal resultant level of risk.
  • The information shown in FIG. 3 is the same information shown in FIG. 2 as described in more detail below. As such, information included in FIG. 3 that is identical to information included in FIG. 2, is identified using the same reference numerals used in FIG. 2.
  • FIG. 3 is a diagram illustrating a second exemplary configurable policy 36 that is stored in the MS system 12 and is for associating each of a plurality of network-based electronic payment transaction risk factors 32 with a corresponding level of risk 34. This embodiment is similar to that shown in FIG. 2. However, the second configurable policy 36 does not include the transaction risk factors 32 relating to the type of retail establishment, the credit limit, and the duration since a previous transaction. Although in this embodiment the second configurable policy 36 includes the transaction risk factors 32 relating amount/value of the payment transaction and the time of day, it should be appreciated that in other embodiments any type of electronic payment transaction risk factor 32 may be included that facilitates conducting the electronic payment transaction as described herein.
  • The electronic payment transaction risk factors 32 and the associated levels of risk 34 may be defined in any desirable manner that facilitates authenticating the identity of a user as an authorized user of a designated communications device 18. Moreover, the definitions of the transaction risk factors 32 and the levels of risk 34 may be changed.
  • Although policies 30, 36 for determining the levels of risk 34 are used to determine the resultant level of risk in the exemplary embodiment, it should be understood that other embodiments may not include such policies. In such other embodiments a default level of risk may be established for all network-based electronic payment transactions. The default level of risk may require using a personal identification number (PIN) to authenticate the shopper.
  • FIG. 4 is a diagram illustrating an exemplary configurable authentication policy 38 that is stored in the BAC system 16, and is for associating each of the levels of risk 34 with a corresponding authentication data requirement 40. Specifically, the authentication policy 38 includes the same level of risk 34 categories established in the first configurable policy 30, and further includes a level of risk 34 designated as low. Moreover, the authentication policy 38 includes an authentication data requirement 40 for use in authenticating a user of a designated communications device 18 while conducting an electronic payment transaction with the designated communications device 18. In the exemplary embodiment the authentication data requirement 40 is the authentication data required to be captured and used for authentication of the user. It should be appreciated that in other embodiments the authentication data requirement 40 may be a requirement for any other type of authentication data including, but not limited to, Global Positioning System (GPS) coordinates, unique pass-phrases, a combination of biometric data with GPS coordinates, a combination of biometric data with a unique pass-phrase, a combination of GPS coordinates with a unique pass-phrase, and a combination of biometric data with GPS coordinates and a unique pass-phrase.
  • The authentication policy 38 is generated by associating an authentication data requirement 40 with each level of risk 34. It should be appreciated that the authentication data requirements 40 indicate at least one biometric type that is to be captured from a user while authenticating the identity of the user as an authorized user of the designated communications device 18. The biometric types that are to be captured and used for authentication are determined by the level of risk 34. It should be appreciated that the higher the level of risk 34 the more demanding the authentication data requirement 40.
  • In order to facilitate enhancing increased trust in the authentication results, as the level of risk 34 associated with the electronic payment transaction increases the number of different biometric types required for authentication also increases. For example, an electronic payment transaction having a low level of risk 34 requires biometric data of a single biometric type such as voice biometric data. An electronic payment transaction having a high level of risk 34 requires biometric data of a plurality of different biometric types such as face and iris biometric data. It should be appreciated that the authentication data requirement 40 for a level of risk 34 may be a combination of the authentication data requirements 40 appropriate for lesser levels of risk 34. For example, the authentication data requirement 40 for the highest level of risk 34 may be a combination of the authentication data requirements 40 of the high and low levels of risk 34.
  • It should be understood that the authentication policy 38 may be reconfigured by defining the authentication data requirements 40 and the levels of risk 34 in any desirable manner that facilitates authenticating the identity of a user as an authorized user of the designated communications device 18. Moreover, the policy 38 may be reconfigured by changing the definitions of the authentication data requirements 40 and the levels of risk 34. For example, the authentication data requirement 40 for a high level risk 34 may be reconfigured such that the appropriate authentication data requirement 40 stipulates authenticating the user with face, iris and fingerprint biometric data, instead of face and iris biometric data. Although the exemplary embodiment includes one authentication policy 38 stored in the BAC system 16, it should be appreciated that in other embodiments any number of authentication policies 38 may be generated and stored in the BAC system 16. It should be understood that changes in levels of risk 34 are to be coordinated between the first policy 30, the second policy 36, and the authentication policy 38.
  • FIG. 5 is a flowchart 42 illustrating an exemplary network-based electronic payment transaction process used by the PTC system 10 for eliminating the need to wait in line to conduct payment transactions at a point-of-sale (POS) terminal in a retail establishment. For PTC system 10 the process starts 44 when a shopper in a retail establishment decides to purchase the goods without going through the POS terminal. The shopper continues by identifying 46 the MS system 12 that is to be used for conducting a network-based electronic payment transaction to purchase the goods. More specifically, the shopper continues by obtaining 46 the communications device 18 and invoking a retail purchasing application stored therein by activating one of the buttons or icons 26. The purchasing application causes the communications device 18 to display a list of retail establishments on the screen 28. The shopper identifies the MS system 12 to be used for the transaction by selecting the retail establishment from which he would like to purchase the goods.
  • Next, the communications device 18 continues processing by initiating 46 the electronic payment transaction by transmitting an initiation message to the MS system 12 of the selected retail establishment. In response, the MS system 12 transmits a message to the communications device 18 requesting the shopper to conduct the electronic payment transaction. After receiving the response from the MS system 12, the communications device 18 continues processing by automatically selecting the service provider user identifier associated with the selected retail establishment as the service provider user identifier to be used for conducting the electronic payment transaction. Next, the shopper continues by entering a machine readable code from each good with the communications device 18. Specifically, the shopper continues by photographing the machine readable code of each good with the communications device 18. The machine readable code includes, but is not limited to, a bar code, a Quality Response (RS) code, and a Data Matrix code.
  • After photographing the machine readable code of a good, the communications device 18 continues by processing the photograph to determine the Universal Product Code (UPC) of the good and transmitting the UPC to the MS system 12. In response, the MS system 12 continues by transmitting the price of the good to the communications device 18. The communications device 18 displays the price of the good on the screen 28 for the shopper to see and stores the price therein. After determining the price of all the goods, processing continues by determining the total payment transaction cost 46 and displaying the total payment transaction cost on the screen 28 for the shopper to see. Although a photograph of each bar code is taken to determine the UPC and price of each good in the exemplary embodiment, in other embodiments the price of each good may be determined in any manner using the communications device 18.
  • After reading the total payment transaction cost from the screen 28, the shopper continues by activating one of the buttons or icons 26 to purchase the goods. Next, processing continues by generating a payment transaction request at the communications device 18 and transmitting the payment transaction request from the device 18 to the MS system 12. The payment transaction request includes at least the UPC of each good to be purchased and the service provider user identifier to be used for conducting the transaction. After receiving the payment transaction request, the MS system 12 continues by generating a merchant payment transaction request and transmitting the merchant payment transaction request to the SPC system 14. The merchant payment transaction request includes at least the UPC of each good to be purchased and the service provider user identifier.
  • After receiving the merchant payment transaction request, the SPC system 14 continues by determining whether or not the service provider user identifier received in the merchant payment transaction request is known 48 by comparing the received service provider user identifier against the service provider user identifiers stored therein. When the received service provider user identifier does not match a service provider user identifier stored therein, the received service provider user identifier is not known. The SPC system 14 generates a notification message indicating that the received service provider user identifier is not known and transmits the notification to the MS system 12. Next, processing ends 50. However, when the received service provider user identifier matches a service provider user identifier stored therein, the received service provider user identifier is determined to be known 48.
  • After determining that the received service provider user identifier is known 48, the SPC system 14 continues processing by determining whether to approve 52 payment for the electronic payment transaction based on standard credit card practices. When the electronic payment transaction is not approved 52, processing ends 50. However, when payment for the electronic payment transaction is approved 52, the SPC system 14 continues processing by generating a payment transaction authorization message and transmitting the payment transaction authorization message to the MS system 12.
  • Next, processing continues by determining whether the communications device 18 is enrolled 54 in the BAC system 16. After receiving the payment transaction authorization message, the MS system 12 continues processing by transmitting the service provider user identifier to the BAC system 16. After receiving the service provider user identifier, the BAC system 16 continues by comparing the received service provider user identifier against service provider user identifiers stored therein. Upon determining a match between the received service provider user identifier and one of the service provider user identifiers stored therein, the BAC system 16 continues processing by determining the communications device identifier associated with the one matching service provider user identifier and determining a state of the associated communications device identifier. When the state of the associated communications device identifier is enrolled, the communications device 18 is considered to be enrolled in the BAC system 16. When the state of the associated communications device identifier is not enrolled 54, processing ends 50.
  • After determining that the communications device 18 is enrolled 54, the BAC system 16 continues by notifying the MS system 12 that the communications device 18 associated with the service provider user identifier is enrolled therein. In response, the MS system 12 continues processing by determining 56 the risk factors 32 associated with the electronic payment transaction and determining 56 the resultant level of risk for the electronic payment transaction.
  • After determining 56 the resultant level of risk, processing continues by determining 56 the authentication data requirement for the electronic payment transaction. Specifically, processing continues by generating an authentication request at the MS system 12 and transmitting the authentication request to the BAC system 16 over the first communications channel. The authentication request contains at least the resultant level of risk.
  • After receiving the authentication request, the BAC system 16 continues processing by extracting the resultant level of risk from the authentication request and consulting the authentication policy 38 to determine the authentication data requirement 40 that corresponds to the resultant level of risk. Specifically, the BAC system 16 continues by comparing the resultant level of risk against the levels of risk 34 to determine the corresponding authentication data requirement 40. The authentication data requirement 40 is determined to be the authentication data requirement 40 that corresponds to the level of risk 34 that matches the resultant level of risk.
  • Although the exemplary embodiment uses the authentication policy 38 to determine the authentication data requirement 40, it should be appreciated that in other embodiments an authentication policy may not be available. In such other embodiments, all available data may be collected from the shopper regardless of the risk factors 32, the data collected may be determined by the shopper, the shopper may be repeatedly prompted for authentication data until sufficient authentication data is obtained, or the BAC system 16 may determine to end processing 50. Moreover, it should be appreciated that in other embodiments the BAC system 16 may determine the resultant level of risk associated with the electronic payment transaction.
  • After determining 56 the authentication data requirement, the BAC system 16 continues by transmitting a message to the communications device 18 to invoke the security application stored therein. After transmitting the message, the BAC system 16 continues processing by generating and transmitting an authentication data capture request to the communications device 18 over the second communications channel. In the exemplary embodiment, the authentication data capture request includes at least the authentication data requirement 40.
  • After invoking 56 the security application, the security application causes the communications device 18 to continue processing by obtaining the communications device identifier of the communications device 18, and by initiating communications with the BAC system 16 by transmitting the communications device identifier to the BAC system 16 over the second communications channel. After receiving the communications device identifier, the BAC system 16 validates 58 the communications device 18 by determining whether the communications device 18 is known. Specifically, the BAC system 18 continues by comparing the received communications device identifier against the communications device identifiers stored therein, and determining that the communications device 18 is known, and thus validated, when the received communications device identifier matches one of the communications device identifiers stored therein. Otherwise, when the received communication device identifier does not match one of the communications device identifiers stored in the BAC system 16, the communications device 18 is not validated 58 and processing ends 50.
  • Upon receiving the authentication data capture request transmission, the communications device 18 continues by verifying 60 that the authentication data capture request was transmitted from the BAC system 16. After verifying that the authentication data capture request was transmitted from the BAC system 16, the security application causes the communications device 18 to display the authentication data capture request on the screen 28. Next, the shopper continues processing by reading the authentication data capture request from the screen 28 and capturing biometric authentication data 62 in accordance with the authentication data requirement included in the authentication data capture request. When the authentication data capture request cannot be verified as being transmitted from the BAC system 16, processing ends 50.
  • It is assumed that the authorized shopper associated with the inputted service provider user identifier is in possession of the communications device 18 in the exemplary embodiment, and can be contacted using the communications device 18. Thus, by virtue of validating the communications device 18 and transmitting the authentication data capture request to the communications device 18, the authentication data capture request is considered to be transmitted to the authorized shopper associated with the inputted service provider user identifier. After reading the authentication data capture request transmission from the screen 28, the shopper continues processing by capturing biometric authentication data 62 in accordance with the authentication data capture request with the communications device 18. Next, processing continues by transmitting the captured biometric data from the communications device 18 to the BAC system 16 over the second communications channel, and evaluating the captured biometric data at the BAC system 16 to verify that the captured biometric data is of sufficient quality 64. When the captured biometric data is of sufficient quality 64, processing continues by authenticating the identity of the shopper. However, when the quality of the captured biometric data is insufficient 64, processing continues by again capturing the requested biometric authentication data 66.
  • In the exemplary embodiment, biometric authentication data corresponding to the requested biometric authentication data may be captured six times. When acceptable biometric authentication data is not obtained after six attempts, processing ends 50. However, it should be appreciated that in other embodiments biometric data may be obtained any number of times.
  • After capturing biometric data of sufficient quality 64, processing continues by authenticating the identity of the shopper 68 by comparing the captured biometric data against the authentication data included in the enrollment data record of the authorized shopper associated with the one matching communications device identifier in the BAC system 16. When the identity of the shopper is not authenticated, processing ends 50. However, when the captured biometric data matches the authentication data included in the enrollment data record, the identity of the shopper is considered to be authenticated 68.
  • After authenticating the identity of the shopper 68, the BAC system 16 continues by generating and transmitting an authentication result message to the MS system 12. Next, the MS system 12 continues processing by completing the desired electronic payment transaction 70 with the service provider user identifier and transmitting a transaction complete message to the communications device 18 notifying the shopper that the transaction was completed. The communications device 18 continues by displaying the transaction complete message on the screen 28 for the shopper to see.
  • After receiving the transaction complete message, the communications device 18 continues processing by generating an electronic receipt for the electronic payment transaction. The electronic receipt includes at least a machine readable code that indicates the details of the completed electronic payment transaction including, but not limited to, the goods purchased. The machine readable code includes, but is not limited to, a two-dimensional code. Moreover, the electronic receipt is displayed on the screen 28 upon generation. After displaying the electronic receipt on the screen 28, an employee of the retail establishment continues by scanning the machine readable code from the electronic receipt as the shopper leaves the retail establishment to determine the goods purchased and verify that the shopper is leaving with only the goods purchased. In other embodiments after scanning the machine readable code, a photograph of the shopper may be presented to the employee on a display to facilitate verifying that an imposter did not purchase the goods. The employee continues by permitting the shopper to leave the retail establishment when the shopper is leaving with only the goods purchased. Next, processing ends 50.
  • It should be understood that in other embodiments after invoking the retail purchasing application 46 and prior to entering the machine readable codes on the goods, processing continues by calculating the GPS coordinates of the communications device 18 and comparing the GPS coordinates of the communications device 18 against an area of the retail establishment determined from GPS coordinate data. When the GPS coordinates of the communications device 18 are located within the area of the retail establishment, processing continues by entering the machine readable codes of the goods. Otherwise, when the GPS coordinates of the communications device 18 are not located within the retail establishment, processing continues by deactivating the retail purchasing application such that processing ends 50.
  • Although the MS system 12 that is to be used for conducting the electronic transaction is identified and selected by the shopper from a list displayed on the screen 28, in other embodiments any other method may be used to identify the MS system 12 that is to be used for conducting the electronic payment transaction. In such other embodiments the shopper may photograph a machine readable code posted in the retail establishment with the device 18. The machine readable code includes, but is not limited to, a Quick Response (QR) code and a Data Matrix code. The machine readable code indicates at least the MS system 12 of the retail establishment to be used for conducting the transaction. Upon processing the machine readable code, the communications device 18 identifies the MS system 12 to communicate with for conducting the transaction.
  • Moreover, in such other embodiments the communications device 18 may automatically receive a radio frequency (RF) signal broadcast by the retail establishment upon entering the retail establishment that identifies the MS system 12 to be used for conducting the transaction. Furthermore, in such other embodiments the GPS coordinates of the communications device 18 may be compared against the GPS coordinates of a retail establishment. When the communications device 18 is located within the retail establishment the communications device 18 is configured to communicate with the MS system 12 of the retail establishment. Additionally, in such other embodiments the shopper may enter the name of the retail establishment into the communications device 18.
  • The information shown in FIG. 6 is the same information shown in FIG. 5 as described in more detail below. As such, operations illustrated in FIG. 6 that are identical to operations illustrated in FIG. 5, are identified using the same reference numerals used in FIG. 5.
  • FIG. 6 is a flowchart 72 illustrating an alternative exemplary authentication process used by the PTC system 10 for eliminating the need to wait in line to conduct payment transactions at a POS terminal in a retail establishment. This alternative embodiment is similar to that shown in FIG. 5. However, the SPC system 14 generates the payment transaction authorization message after the identity of the shopper is successfully authenticated. Thus, the payment transaction authorization message is generated after authenticating the shopper 68. Moreover, the SPC system 14 communicates directly with the BAC system 16 to facilitate conducting operations 54 to 70, instead of the MS system 12 as in the exemplary embodiment.
  • After determining that the service provider user identifier is known 48, processing continues by determining whether the communications device 18 is enrolled in the BAC system 16. Specifically, the SPC system 14 continues by generating a notification message and transmitting the notification message to the MS system 12. The notification message indicates that the service provider user identifier is known. After receiving the notification message, the MS system 12 continues processing by transmitting the service provider user identifier to the BAC system 16. After receiving the service provider user identifier, the BAC system 16 continues by comparing the received service provider user identifier against service provider user identifiers stored therein. Upon determining a match between the received service provider user identifier and one of the service provider user identifiers stored therein, the BAC system 16 continues processing by determining the communications device identifier associated with the one matching service provider user identifier and determining a state of the associated communications device identifier. When the state of the associated communications device identifier is enrolled 54, the communications device 18 is considered to be enrolled in the BAC system 16. When the state of the associated communications device identifier is not enrolled 54, processing ends 50.
  • After determining that the communications device 18 is enrolled 54, the BAC system 16 continues by notifying the SPC system 14 that the communications device 18 associated with the service provider user identifier is enrolled therein. In response, the SPC system 14 continues processing by determining the risk factors 32 associated with the electronic payment transaction and determining 56 the resultant level of risk for the electronic payment transaction.
  • After determining 56 the resultant level of risk, processing continues by determining 56 the authentication data requirement for the electronic payment transaction. Specifically, processing continues by generating an authentication request at the SPC system 14 and transmitting the authentication request to the BAC system 16 over the first communications channel. The authentication request contains at least the resultant level of risk. Next, processing continues by conducting operations 58 to 68 as described with regard to the exemplary embodiment.
  • After authenticating the shopper 68, the BAC system 16 continues processing by generating and transmitting an authentication result message to the SPC system 14. The authentication result message indicates that the identity of the shopper was successfully authenticated. In response to receiving the authentication result message, the SPC system 14 continues by generating a payment transaction authorization message and transmitting the payment transaction authorization message to the MS system 12. The payment authorization message indicates that the SPC system 14 has approved payment for the electronic payment transaction. Next, the MS system 12 continues processing by completing the desired electronic payment transaction 70 and transmitting a transaction complete message to the communications device 18 indicating that the transaction was completed. The communications device 18 continues by notifying the shopper by displaying the transaction complete message on the screen 28 for the shopper to see.
  • After receiving the transaction complete message, the communications device 18 continues processing by generating the electronic receipt for the electronic payment transaction. After displaying the electronic receipt on the screen 28, an employee of the retail establishment continues by scanning the machine readable code from the electronic receipt as the shopper leaves the retail establishment to determine the goods purchased and verify that the shopper is leaving with only the goods purchased. The employee continues by permitting the shopper to leave the retail establishment when the shopper is leaving with only the goods purchased. Next, processing ends 50.
  • Although the embodiments described herein do not include a one-time pass-phrase (OTPP), it should be appreciated that in other embodiments an OTPP may be included. In such other embodiments after authenticating the shopper 68, the BAC system 16 generates an OTPP, stores the generated OTPP therein, and transmits the OTPP to the communications device 18. The communications device displays the OTPP on the screen 28 for the shopper to see and prompts the shopper to then enter the OTPP into the communications device 18. After entering the OTPP into the communications device 18, the shopper activates a button or icon 26 which causes the communications device to transmit the OTPP to the SPC system 14. Next, the SPC system 14 transmits the OTPP to the BAC system 16 which compares the received OTPP against the OTPP stored therein. If the received OTPP matches the stored OTPP, the shopper is authenticated and is permitted to complete the payment transaction 70. Otherwise, processing ends 50.
  • The shopper may make a typographical error when entering the OTPP into the communications device 18. Thus, in other embodiments the OTPP may be automatically transmitted to the SPC system 14 when the shopper activates a button or icon 26 in response to a prompt to automatically transmit the OTPP, or the OTPP may be automatically transmitted to the SPC system 14 without pressing an icon or button 26. It should be understood that upon receiving the OTPP, the communications device 18 may prompt the shopper to select between manually entering the OTPP in the communications device 18 or automatically transmitting the OTPP to the SPC system 14. The shopper may enter an input indicating which to choose by pressing an appropriate icon or button 26.
  • It should be understood that the MS system 12, SPC system 14, BAC system 16 and communications device 18 may be configured to communicate in any manner, and in any order, to authenticate shoppers as authorized shoppers and thus reduce the time spent waiting to conduct payment transactions in retail establishments.
  • Although the BAC system 16 determines the authentication requirement by comparing an extracted level of risk against levels of risk 34 included in authentication policies stored therein in the exemplary embodiment, it should be appreciated that in other embodiments the communications device 18 may determine the authentication requirement by comparing the extracted level of risk against levels of risk 34 included in authentication policies stored therein.
  • It should be appreciated that biometrically authenticating identities facilitates increasing the level of trust that a shopper attempting to conduct a network-based electronic payment transaction in a retail establishment with a communications device 18 is an authorized shopper. Furthermore, it should be understood that by virtue of communicating over the first and second communications channels to facilitate capturing and transmitting biometric data, an additional level of security is provided which also facilitates increasing trust in authentication results that indicate a shopper is an authorized shopper. By implementing a higher authentication standard, it is more difficult for an unauthorized shopper to be authenticated as an authorized shopper. Thus, by virtue of facilitating an increase in trust in an authentication result that indicates a shopper is an authorized shopper, the processes and systems described herein facilitate increasing the security of network-based electronic payment transactions conducted in a retail establishment using the communications device 18.
  • The processes and systems described herein facilitate increasing the level of trust in network-based electronic payment transactions conducted in a retail establishment with a portable communications device, and thus facilitate reducing risks that such network-based electronic payment transactions will be conducted fraudulently. Moreover, the processes and systems described herein facilitate reducing the time shoppers spend in retail establishments conducting payment transactions. Furthermore, as a result of the processes and systems described herein, retail establishments should require fewer POS terminals which in turn facilitates reducing retail establishment operating costs. Providing a quick, easy, reliable, and convenient process of purchasing goods also facilitates attracting new customers to retail establishments and facilitates encouraging increased visits by existing customers and thereby facilitates enhancing revenue. The processes and systems described herein are believed to be applicable to many different businesses for reducing risks that network-based transactions associated with these different businesses will be conducted fraudulently.
  • In each embodiment, the above-described processes eliminate the need to wait in line to conduct payment transactions in a retail establishment. Moreover, the above described processes simultaneously facilitate enhancing revenue and reducing operating costs of retail establishments. In exemplary embodiments described herein, a shopper in a retail establishment uses his portable communications device to purchase goods instead of purchasing the goods at a POS terminal. After initiating a network-based electronic payment transaction on the communications device, biometric data corresponding to a level of risk is determined and captured from the shopper with the communications device, and used for biometrically authenticating the shopper. Upon biometrically authenticating the shopper, the electronic payment transaction is conducted and an electronic receipt including a machine readable code is generated.
  • Exemplary embodiments of authentication processes and systems that eliminate the need to wait in line to conduct payment transactions in retail establishments, and simultaneously facilitate enhancing revenue and reducing operating costs of retail establishments are described above in detail. The processes are not limited to use with the specific computer system embodiments described herein, but rather, the processes can be utilized independently and separately from other processes described herein. Moreover, the invention is not limited to the embodiments of the processes and systems described above in detail. Rather, other variations of the processes may be utilized within the spirit and scope of the claims.
  • While the invention has been described in terms of various specific embodiments, those skilled in the art will recognize that the invention can be practiced with modification within the spirit and scope of the claims.

Claims (19)

What is claimed is:
1. A method for determining authentication data comprising:
determining, by a portable communications device, a risk level corresponding to a transaction desired to be conducted by a user; and
determining a biometric authentication data requirement corresponding to the determined risk level with the device.
2. A method in accordance with claim 1 further comprising:
capturing data from the user with, and storing the captured data in, the device, the captured data corresponding to the authentication data requirement; and
authenticating the user with the captured data.
3. A method in accordance with claim 1, further comprising determining whether a unique user identifier matches a user identifier and when there is a match conducting said determining a risk level step.
4. A method in accordance with claim 1, said determining the authentication data requirement step comprising determining different biometric types as the authentication data requirement as the risk level increases.
5. A method in accordance with claim 2, said authenticating step comprising comparing the captured data against user biometric data with the device, wherein the captured and user biometric data correspond to the authentication data requirement.
6. A method in accordance with claim 2, further comprising conducting the transaction after successfully authenticating the user.
7. A method in accordance with claim 1, said determining an authentication data requirement step comprising comparing the determined risk level against an authentication policy to determine a matching risk level, the authentication data requirement corresponding to the matching risk level.
8. A method in accordance with claim 1, further comprising:
displaying a list of service provider user identifiers on the device; and
selecting a service provider from the list for conducting the transaction.
9. A method in accordance with claim 1, further comprising:
photographing a machine readable code of a good with the device; and
displaying a price of the good on the device.
10. A handset comprising:
a processor; and
a memory configured to store policies and user authentication data, said processor being programmed to:
determine a risk level corresponding to a transaction desired to be conducted by a user;
determine an authentication data requirement corresponding to the risk level; and
authenticate the user with data corresponding to the authentication data requirement.
11. A handset in accordance with claim 10, said processor being further programmed to determine the risk level is a default risk level requiring a biometric authentication data requirement.
12. A handset in accordance with claim 10, said processor being further programmed to determine a different risk level for different transactions.
13. A handset in accordance with claim 10, said processor being further programmed to determine more demanding biometric authentication data requirements as the risk level increases.
14. A handset in accordance with claim 10 being:
a portable cellular phone;
a smart phone;
a tablet computer;
a laptop computer; or
a personal digital assistant.
15. A handset in accordance with claim 10, said processor being further programmed to receive a radio frequency signal broadcast by a retail establishment that identifies a system to be used for conducting the transaction.
16. A handset in accordance with claim 10, said processor being further programmed to display a list of different retail establishments.
17. A handset in accordance with claim 16, said processor being further programmed to select a service provider user identifier associated with a retail establishment selected from the list.
18. A method for authenticating users comprising authenticating, by a processor, a user with biometric data captured from the user, the captured biometric data corresponding to a risk level for a transaction desired to be conducted by the user.
19. A method in accordance with claim 18 further comprising conducting the transaction after successfully authenticating the user.
US13/956,716 2011-04-29 2013-08-01 Methods and systems for conducting payment transactions Abandoned US20130317991A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US13/956,716 US20130317991A1 (en) 2011-04-29 2013-08-01 Methods and systems for conducting payment transactions

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US13/097,135 US8527360B2 (en) 2011-04-29 2011-04-29 Methods and systems for conducting payment transactions
US13/956,716 US20130317991A1 (en) 2011-04-29 2013-08-01 Methods and systems for conducting payment transactions

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US13/097,135 Continuation US8527360B2 (en) 2011-04-29 2011-04-29 Methods and systems for conducting payment transactions

Publications (1)

Publication Number Publication Date
US20130317991A1 true US20130317991A1 (en) 2013-11-28

Family

ID=45954535

Family Applications (2)

Application Number Title Priority Date Filing Date
US13/097,135 Active 2031-10-14 US8527360B2 (en) 2011-04-29 2011-04-29 Methods and systems for conducting payment transactions
US13/956,716 Abandoned US20130317991A1 (en) 2011-04-29 2013-08-01 Methods and systems for conducting payment transactions

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US13/097,135 Active 2031-10-14 US8527360B2 (en) 2011-04-29 2011-04-29 Methods and systems for conducting payment transactions

Country Status (4)

Country Link
US (2) US8527360B2 (en)
EP (2) EP2629259A1 (en)
AU (1) AU2012202260B2 (en)
CA (1) CA2775184A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10791461B1 (en) * 2018-06-25 2020-09-29 Sprint Communications Company L.P. Mobile communication device user authenticator
US10902425B2 (en) 2017-12-29 2021-01-26 Walmart Apollo, Llc System and method for biometric credit based on blockchain
US20220342972A1 (en) * 2017-09-11 2022-10-27 Apple Inc. Implementation of biometric authentication

Families Citing this family (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120209664A1 (en) * 2009-09-30 2012-08-16 Wesley Enterprises Pty Ltd Systems and methods for processing transactional data
US20110145082A1 (en) 2009-12-16 2011-06-16 Ayman Hammad Merchant alerts incorporating receipt data
US8429048B2 (en) 2009-12-28 2013-04-23 Visa International Service Association System and method for processing payment transaction receipts
US10586227B2 (en) * 2011-02-16 2020-03-10 Visa International Service Association Snap mobile payment apparatuses, methods and systems
WO2012112822A2 (en) 2011-02-16 2012-08-23 Visa International Service Association Snap mobile payment apparatuses, methods and systems
SG193510A1 (en) 2011-02-22 2013-10-30 Visa Int Service Ass Universal electronic payment apparatuses, methods and systems
WO2013006725A2 (en) 2011-07-05 2013-01-10 Visa International Service Association Electronic wallet checkout platform apparatuses, methods and systems
US10825001B2 (en) 2011-08-18 2020-11-03 Visa International Service Association Multi-directional wallet connector apparatuses, methods and systems
US9710807B2 (en) 2011-08-18 2017-07-18 Visa International Service Association Third-party value added wallet features and interfaces apparatuses, methods and systems
US10242358B2 (en) 2011-08-18 2019-03-26 Visa International Service Association Remote decoupled application persistent state apparatuses, methods and systems
US10223730B2 (en) 2011-09-23 2019-03-05 Visa International Service Association E-wallet store injection search apparatuses, methods and systems
US8819794B2 (en) * 2012-01-19 2014-08-26 Microsoft Corporation Integrating server applications with multiple authentication providers
AU2013214801B2 (en) 2012-02-02 2018-06-21 Visa International Service Association Multi-source, multi-dimensional, cross-entity, multimedia database platform apparatuses, methods and systems
US8856044B1 (en) 2013-03-23 2014-10-07 Jeffrey Drazan Segmented access of remotely stored biographical data to a client device
US10032008B2 (en) 2014-02-23 2018-07-24 Qualcomm Incorporated Trust broker authentication method for mobile devices
CN107194683A (en) * 2016-03-14 2017-09-22 阿里巴巴集团控股有限公司 On-line payment method and apparatus
US10552836B2 (en) 2016-10-11 2020-02-04 Mastercard International Incorporated Method and system for identification of shared devices for fraud modeling
CN107507003B (en) * 2017-06-26 2020-04-24 创新先进技术有限公司 Service processing method, device and system
US10078839B1 (en) * 2017-08-30 2018-09-18 Square, Inc. Centralized system for data retrieval
JP7157654B2 (en) * 2018-12-25 2022-10-20 株式会社日本総合研究所 card transaction system

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080086759A1 (en) * 2006-10-10 2008-04-10 Colson Christen J Verification and authentication systems and methods
US20090271287A1 (en) * 2008-04-24 2009-10-29 KIBOO LICENSING, LLC a Delaware limited liability company Financial lifestyle navigator and banking system
US7669760B1 (en) * 2006-10-31 2010-03-02 United Services Automobile Association (Usaa) GPS validation for transactions
US20110035788A1 (en) * 2009-08-05 2011-02-10 Conor Robert White Methods and systems for authenticating users
US20110208589A1 (en) * 2010-02-24 2011-08-25 Research In Motion Limited System and method for displaying an advertisement on a mobile device
US20120185306A1 (en) * 2011-01-18 2012-07-19 Fang Cheng Electronic Transaction Record Distribution System
US20120254960A1 (en) * 2011-03-31 2012-10-04 Victor Lortz Connecting mobile devices, internet-connected vehicles, and cloud services
US20120267432A1 (en) * 2010-11-12 2012-10-25 Kuttuva Avinash Secure payments with global mobile virtual wallet
US20130080289A1 (en) * 2011-09-28 2013-03-28 Rupessh Ranen Roy Retail shopping
US20140211017A1 (en) * 2013-01-31 2014-07-31 Wal-Mart Stores, Inc. Linking an electronic receipt to a consumer in a retail store

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7403922B1 (en) * 1997-07-28 2008-07-22 Cybersource Corporation Method and apparatus for evaluating fraud risk in an electronic commerce transaction
US6577861B2 (en) * 1998-12-14 2003-06-10 Fujitsu Limited Electronic shopping system utilizing a program downloadable wireless telephone
US20020046045A1 (en) * 2000-06-30 2002-04-18 Attila Narin Architecture for an electronic shopping service integratable with a software application
WO2003007538A1 (en) * 2001-07-12 2003-01-23 Icontrol Transactions, Inc. Operating model for mobile wireless network based transaction authentication and non-repudiation
US20030101348A1 (en) 2001-07-12 2003-05-29 Russo Anthony P. Method and system for determining confidence in a digital transaction
US7493284B2 (en) 2002-12-19 2009-02-17 International Business Machines Corporation Using visual images transferred from wireless computing device display screens
US8270578B2 (en) * 2003-04-07 2012-09-18 Paul Poniatowski Mobile payment system
EP1756995A4 (en) * 2004-05-21 2012-05-30 Emc Corp System and method of fraud reduction
US20090157560A1 (en) 2007-12-14 2009-06-18 Bank Of America Corporation Information banking and monetization of personal information
US8560448B2 (en) * 2008-12-30 2013-10-15 Municipay, Llc System and method to initiate funding of multiple merchant accounts
GB0901407D0 (en) 2009-01-28 2009-03-11 Validsoft Uk Ltd Card false-positive prevention
CA2814615A1 (en) * 2009-10-13 2011-04-21 Ezsav Inc. Apparatuses, methods, and computer program products enabling association of related product data and execution of transaction
US20110238512A1 (en) * 2010-03-26 2011-09-29 Eric Hapaki Doty Method and Apparatus for Showroom Sales
US8380177B2 (en) * 2010-04-09 2013-02-19 Paydiant, Inc. Mobile phone payment processing methods and systems

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080086759A1 (en) * 2006-10-10 2008-04-10 Colson Christen J Verification and authentication systems and methods
US7669760B1 (en) * 2006-10-31 2010-03-02 United Services Automobile Association (Usaa) GPS validation for transactions
US20090271287A1 (en) * 2008-04-24 2009-10-29 KIBOO LICENSING, LLC a Delaware limited liability company Financial lifestyle navigator and banking system
US20110035788A1 (en) * 2009-08-05 2011-02-10 Conor Robert White Methods and systems for authenticating users
US20110208589A1 (en) * 2010-02-24 2011-08-25 Research In Motion Limited System and method for displaying an advertisement on a mobile device
US20120267432A1 (en) * 2010-11-12 2012-10-25 Kuttuva Avinash Secure payments with global mobile virtual wallet
US20120185306A1 (en) * 2011-01-18 2012-07-19 Fang Cheng Electronic Transaction Record Distribution System
US20120254960A1 (en) * 2011-03-31 2012-10-04 Victor Lortz Connecting mobile devices, internet-connected vehicles, and cloud services
US20130080289A1 (en) * 2011-09-28 2013-03-28 Rupessh Ranen Roy Retail shopping
US20140211017A1 (en) * 2013-01-31 2014-07-31 Wal-Mart Stores, Inc. Linking an electronic receipt to a consumer in a retail store

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20220342972A1 (en) * 2017-09-11 2022-10-27 Apple Inc. Implementation of biometric authentication
US10902425B2 (en) 2017-12-29 2021-01-26 Walmart Apollo, Llc System and method for biometric credit based on blockchain
US10791461B1 (en) * 2018-06-25 2020-09-29 Sprint Communications Company L.P. Mobile communication device user authenticator

Also Published As

Publication number Publication date
CA2775184A1 (en) 2012-10-29
US20120278193A1 (en) 2012-11-01
AU2012202260B2 (en) 2017-11-02
US8527360B2 (en) 2013-09-03
EP2518672A1 (en) 2012-10-31
AU2012202260A1 (en) 2012-11-15
EP2629259A1 (en) 2013-08-21

Similar Documents

Publication Publication Date Title
US8527360B2 (en) Methods and systems for conducting payment transactions
US10861012B2 (en) System and method for secure transactions at a mobile device
AU2016222498B2 (en) Methods and Systems for Authenticating Users
US11470079B1 (en) User-level token for user authentication via a user device
US11954670B1 (en) Systems and methods for digital account activation
US20140229388A1 (en) System and Method for Data and Identity Verification and Authentication
US20110035788A1 (en) Methods and systems for authenticating users
US20140297538A1 (en) System and Method for Data and Identity Verification and Authentication
CN112823368B (en) Tokenized contactless transactions through cloud biometric identification and authentication
US20170243224A1 (en) Methods and systems for browser-based mobile device and user authentication
US20190303602A1 (en) Untethered resource distribution and management
US20210166215A1 (en) Method for performing a contactless payment transaction
US20160328717A1 (en) BioWallet Biometrics Platform
US20210049568A1 (en) Method and System for Large Transfer Authentication
US12008544B2 (en) Method for performing a contactless payment transaction
US20230129991A1 (en) Systems and methods for use in biometric-enabled network interactions
US11783315B2 (en) Transaction system architecture and methods

Legal Events

Date Code Title Description
STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION