US20130317991A1 - Methods and systems for conducting payment transactions - Google Patents
Methods and systems for conducting payment transactions Download PDFInfo
- Publication number
- US20130317991A1 US20130317991A1 US13/956,716 US201313956716A US2013317991A1 US 20130317991 A1 US20130317991 A1 US 20130317991A1 US 201313956716 A US201313956716 A US 201313956716A US 2013317991 A1 US2013317991 A1 US 2013317991A1
- Authority
- US
- United States
- Prior art keywords
- communications device
- user
- payment transaction
- authentication data
- accordance
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
- G06Q20/40145—Biometric identity checks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/20—Point-of-sale [POS] network systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
Definitions
- This invention relates generally to methods and systems for conducting payment transactions, and more particularly, to methods and systems for conducting network-based electronic payment transactions in a retail establishment upon authentication of a shopper conducting the electronic payment transaction.
- POS terminals are electronic cash registers used for conducting payment transactions and generating receipts for the transactions.
- shoppers are required to spend an undesirable amount of time waiting in long lines before purchasing goods at a POS terminal.
- Such long lines have been known to discourage shoppers from repeatedly visiting retail establishments and to discourage new shoppers from visiting retail establishments.
- long waiting times have been known to negatively affect commerce at retail establishments.
- Retail establishments have been known to purchase several POS terminals for conducting many simultaneous payment transactions in an effort to facilitate reducing the time spent waiting before conducting payment transactions.
- POS terminals are known to include expensive hardware and software, and typically are operated by a sales person
- retail establishments have been known to incur substantial costs in buying, maintaining, and operating such POS terminals.
- Some retail establishments have also been known to provide scanning devices such that while shopping, the shoppers themselves are able to scan bar codes on goods as they are collected. After collecting and scanning the goods desired for purchase, shoppers generally spend less time at a POS terminal purchasing the goods because the goods have already been scanned. However, such shoppers still must suffer the inconvenience of waiting in line before purchasing the goods in a payment transaction.
- long lines invariably develop at POS terminals that inconvenience shoppers who are required to wait for prolonged periods of time prior to conducting a payment transaction.
- a method of eliminating the need to wait in line to conduct a payment transaction in a retail establishment includes initiating a network-based electronic payment transaction with a communications device in a retail establishment.
- a shopper initiates the network-based electronic payment transaction.
- the method includes entering a machine readable code from at least one good with the communications device, determining a price of the at least one good and a total payment transaction cost, and displaying the total payment transaction cost on a screen of the communications device.
- the method includes determining whether to approve payment for the electronic payment transaction, authenticating the shopper, completing the electronic payment transaction in the retail establishment, and transmitting a transaction complete message to the communications device when the shopper is authenticated.
- a system for eliminating the need to wait in line to conduct a payment transaction in a retail establishment includes a computer configured as a server.
- the server includes at least a database and is configured to at least store within the database a first configurable policy and to determine a resultant level of risk associated with a network-based electronic payment transaction.
- the system includes a communications device associated with a shopper in the retail establishment. The communications device is configured to communicate with at least the server, to initiate the network-based electronic payment transaction in the retail establishment, to capture biometric authentication data from the shopper in the retail establishment, and to generate a receipt for each network-based electronic payment transaction.
- the system also includes an authentication system including an authentication system database.
- the authentication system is configured to communicate with at least the server and the communications device, to store within the authentication system database biometric authentication data for each of a plurality of authorized shoppers, and to conduct a biometric authentication process while the shopper is in the retail establishment.
- the system includes a merchant system configured to communicate with at least the server, the communications device, and the authentication system.
- the merchant system is further configured to generate and transmit messages and to complete network-based electronic payment transactions.
- the communications device is further configured to communicate with the authentication system and the merchant system. After the communications device generates a receipt for the network-based electronic payment transaction, an employee of the retail establishment scans the receipt as the shopper leaves the retail establishment and permits the shopper to leave the retail establishment when the shopper has only the goods purchased.
- a computer-readable recording medium on which a program is recorded causes the computer to execute at least initiating a network-based electronic payment transaction with a communications device in a retail establishment.
- a shopper initiates the electronic payment transaction.
- the computer program causes the computer to execute determining a price of at least one good and a total payment transaction cost, displaying the total payment transaction cost on a screen of the communications device, and determining whether to approve payment for the electronic payment transaction.
- the computer program causes the computer to execute authenticating the shopper, completing the electronic payment transaction in the retail establishment, and transmitting a transaction complete message to the communications device when the shopper is authenticated.
- FIG. 1 is a block diagram of an exemplary embodiment of a payment transaction computer system for conducting network-based electronic transactions in a retail establishment;
- FIG. 2 is a diagram illustrating a first exemplary configurable policy for associating network-based electronic payment transaction risk factors with corresponding levels of risk;
- FIG. 3 is a diagram illustrating a second exemplary configurable policy for associating network-based electronic payment transaction risk factors with corresponding levels of risk
- FIG. 4 is a diagram illustrating an exemplary authentication policy associating each of the levels of risk illustrated in FIGS. 2 and 3 with a corresponding authentication data requirement;
- FIG. 5 is a flowchart illustrating an exemplary network-based electronic payment transaction process for eliminating the need to wait in line before conducting payment transactions.
- FIG. 6 is a flowchart illustrating an alternative exemplary authentication process for eliminating the need to wait in line before conducting payment transactions.
- FIG. 1 is an expanded block diagram of an exemplary embodiment of a system architecture of a Payment Transaction Computer (PTC) System 10 for conducting network-based electronic payment transactions in a retail establishment with a portable communications device.
- the PTC system 10 includes a Merchant Server (MS) System 12 , a Service Provider Computer (SPC) System 14 , a Biometric Authentication Computer (BAC) System 16 and a portable communications device 18 .
- the MS system 12 , the SPC system 14 , and the BAC system 16 each include components such as, but not limited to, a web server, a database server, an application server, a directory server and a disk storage unit.
- the disk storage unit may be used to store any kind of data.
- the BAC system 16 may also include a database management server and an authentication server.
- the database management server may be used to facilitate transferring data to and from the disk storage device.
- the authentication server is configured to perform matching of any feature or information associated with individuals to authenticate the identity of individuals as described herein.
- the MS system 12 also includes a point-of-sales (POS) terminal 20 typically operated by a sales person.
- POS point-of-sales
- the exemplary embodiment includes a single POS terminal 20 , in other embodiments the MS system 12 may include any number of POS terminals 20 .
- the MS system 12 is configured to communicate with a user of the communications device 18 over a communications network 22 .
- the communications network 22 is a 3G communications network.
- the communications network 22 may be any wireless network that facilitates authentication as described herein, such as, but not limited to, WiFi, Global System for Mobile (GSM) and Enhanced Data for GSM Evolution (EDGE).
- GSM Global System for Mobile
- EDGE Enhanced Data for GSM Evolution
- the network 22 may include any combination of such wireless networks, local area networks, wide area networks, and the Internet.
- the network 22 may be used by devices such as the communications device 18 to conduct long range wireless communications such as cellular telephone calls and wirelessly accessing the Internet.
- the MS system 12 is configured to at least generate and transmit payment transaction requests, as well as generate authentication requests and transmit the authentication requests to the BAC system 16 .
- the MS system 12 is configured to complete an electronic payment transaction with the communications device in a retail establishment.
- the MS system 12 may also be configured to store policies that determine levels of risk and policies that determine authentication data requirements for the levels of risk.
- the MS system 12 is a computer system of a retail establishment that requires authenticating a shopper prior to completing a network-based electronic payment transaction.
- the SPC system 14 is a computer system of a financial institution service provider used to store and manage financial data for a plurality of authorized users. Although the exemplary embodiment is described as including one SPC system 14 corresponding to a financial institution service provider, it should be appreciated that in other embodiments a plurality of SPC systems 14 may be provided such that each of the plurality of SPC systems 14 is associated with a different service provider.
- the SPC system 14 and the MS system 12 are associated with different entities in the exemplary embodiment. However, in other embodiments the SPC system 14 and MS system 12 may be associated with the same entity.
- the SPC system 14 is typically configured to communicate with the communications device 18 , the MS system 12 , and the BAC system 16 over the network 22 .
- the SPC system 14 is configured to store therein a different service provider user identifier for each authorized user such that each service provider user identifier is associated with the financial data of a respective authorized user.
- the SPC system 14 is also configured to store therein biographic data for each authorized user such that the biographic data is associated with the service provider user identifier of a respective authorized user.
- the SPC system 14 is configured to store therein a service provider identifier of the service provider operating the SPC system 14 , and to generate and transmit electronic payment transaction authorizations to the MS system 12 .
- the SPC system 14 is configured to store therein at least one configurable policy for associating network-based electronic payment transaction risk factors with levels of risk.
- the BAC system 16 is configured to communicate with the MS system 12 , the SPC system 14 , and the communications device 18 over the communications network 22 .
- the BAC system 16 communicates with a single SPC system 14 in the exemplary embodiment, it should be appreciated that in other embodiments the BAC system 16 may be configured to communicate with a plurality of SPC systems 14 .
- the BAC system 16 is also configured to facilitate authenticating the identity of a user associated with the communications device 18 who requests conducting a network-based electronic payment transaction. Moreover, the BAC system 16 is configured to store at least authentication data in an enrollment data record for each of a plurality of authorized users.
- the authentication data is biometric data that corresponds to any biometric type desired to be used as the basis of authenticating the identity of a user associated with the communications device 18 .
- biometric types include, but are not limited to, face, fingerprint, iris, voice, vascular patterns and hand signatures.
- the biometric data may take any form such as, but not limited to, images, photographs, templates and electronic data representations.
- the user associated with the communications device 18 in the exemplary embodiment is a shopper in a retail establishment.
- the BAC system 16 is configured to store biometric authentication data and is configured to use the biometric authentication data to authenticate identities of shoppers desiring to conduct network-based electronic payment transactions in retail establishments. Using biometrics as the basis for authenticating shopper identities facilitates enhancing trust in authentication results and in the integrity of network-based electronic payment transactions conducted by shoppers in retail establishments based upon such authentication results.
- the enrollment data record of each authorized user may include at least biographic data and a unique user identifier of the respective authorized user.
- the unique user identifier may also be stored in the SPC system 14 .
- the service provider identifier and the unique user identifier may be alphanumeric character strings of any length.
- the BAC system 16 is also configured to store at least one configurable authentication policy that indicates the authentication data required to be captured for each of a plurality of levels of risk. By indicating the authentication data requirement for each of the levels of risk, the at least one configurable authentication policy may be used to facilitate determining an authentication data requirement associated with an electronic payment transaction. Furthermore, the BAC system 16 is configured to generate and transmit authentication data capture requests to at least the communications device 18 . It should be understood that an authentication data capture request includes at least an authentication data requirement, determined by the BAC system 16 , that is to be captured from the shopper attempting to conduct a network-based electronic payment transaction in a retail establishment with a designated portable communications device 18 .
- biographic data includes any demographic information regarding a user including, but not limited to, the user's name, age, date of birth, address, citizenship and marital status.
- Contact information including devices associated with authorized users and methods for contacting the authorized user may also be collected from the user.
- users designate a particular communications device and provide information regarding the designated communications device that facilitates validating the designated communications device as known, facilitates communicating with the authorized user, and facilitates authenticating the identity of the authorized user.
- Such information includes, but is not limited to, a communications device identifier of the designated communications device, a telephone number associated with the designated communications device, an e-mail address that can be accessed using the designated communications device, an instant messaging user identifier that can be accessed, and an identifier that facilitates sending short message service (SMS) messages to the designated communications device.
- SMS short message service
- the information regarding the designated communications device is included in the enrollment data record of the authorized user of the designated communications device 18 .
- the communications device identifier is associated with the unique user identifier of the authorized user.
- the portable communications device 18 is the designated communications device.
- a state of the communications device 18 may be included in the enrollment data record of the user and thus associate the state of the device 18 with the designated communications device information.
- the SPC system 14 may also store therein the communications device identifier such that the communications device identifier is associated with the service provider user identifier of the authorized user in the SPC system 14 .
- authentication data is described as biometric data in the exemplary embodiment, it should be appreciated that in other embodiments any other type of authentication data, or combinations of different types of authentication data, may be used that facilitates authenticating the identity of a user.
- Such other types of authentication data include, but are not limited to, Global Positioning System (GPS) coordinates, unique pass-phrases, a combination of biometric data with GPS coordinates, a combination of biometric data with a unique pass-phrase, a combination of GPS coordinates with a unique pass-phrase, and a combination of biometric data with GPS coordinates and a unique pass-phrase.
- GPS Global Positioning System
- GPS coordinates may be determined for any GPS enabled device used by an authorized user to communicate with the BAC system 16 .
- GPS coordinate data may be determined for a retail establishment such that an area of the retail establishment computed from the GPS coordinate data is stored in the BAC system 16 .
- GPS coordinates of the designated communications device 18 are determined to be located within the retail establishment area, the user may conduct an electronic payment transaction with the retail establishment as long as the user is authenticated and the transaction is authorized. Otherwise, when the designated communications device 18 is determined to be outside of the retail establishment area, the user is not permitted to conduct an electronic payment transaction with the retail establishment.
- Unique pass-phrases may also be established for each authorized user and stored in the BAC system 16 such that a user desiring to conduct a network-based electronic payment transaction in a retail establishment with the designated communications device 18 , provides the unique pass-phrase for authentication.
- Unique pass-phrases are alphanumeric character strings that may be manually input or spoken into the communications device 18 .
- the communications device 18 is configured to conduct long range wireless communications including, but not limited to, cellular telephone calls and wirelessly accessing the Internet over the network 22 . Moreover, the communications device 18 is configured to communicate with at least the MS system 12 , the SPC system 14 , and the BAC system 16 over the network 22 . Additionally, in the exemplary embodiment, the communications device 18 is configured to capture authentication data from users desiring to conduct a network-based electronic payment transaction while in a retail establishment.
- the communications device 18 includes a front face 24 and a back face (not shown).
- the front face 24 includes at least one of buttons and icons 26 configured to at least enter commands, enter data such as unique pass-phrases, and invoke applications stored in the device 18 .
- Applications stored in the communications device 18 include at least a security application and a retail purchasing application.
- the front face 24 includes a display screen 28 such as, but not limited to, a Liquid Crystal Display (LCD).
- the communications device 18 is configured to at least display at least one of text and images on the display screen 28 .
- the communications device 18 is a portable cellular phone configured to at least display at least one of text and images, capture authentication data from a user, and transmit the captured authentication data to the BAC system 16 .
- the communications device 18 is configured to store a plurality of service provider user identifiers and corresponding service provider identifiers for use in electronic payment transactions conducted in a retail establishment.
- the service provider user identifier is a credit card number of a credit card a shopper desires to use for purchasing goods.
- the service provider user identifier may be any alphanumeric character string such as, but not limited to, a debit card number or an e-mail address associated with the shopper that is capable of facilitating completing the electronic payment transaction.
- the communications device 18 may store a credit card number issued by a first bank with the corresponding service provider identifier of the first bank, and a debit card number issued by a second bank with the corresponding service provider identifier of the second bank.
- the user may designate a service provider user identifier as a default service provider user identifier for each service provider.
- the communications device 18 may display a list of service provider user identifiers on the screen 28 that a user may select from for conducting a network-based electronic payment transaction.
- the communications device 18 is a portable cellular phone in the exemplary embodiment, it should be appreciated that in other embodiments the communications device 18 may be any portable communications device capable of at least displaying at least one of text and images, and capturing and transmitting data.
- Such other communications devices 18 include, but are not limited to, a smart phone, a tablet computer, a laptop computer, and any type of portable communications device having wireless capabilities such as a personal digital assistant (PDA).
- PDA personal digital assistant
- Authentication data captured during authentication of a user is captured from the user with the designated communications device 18 .
- the captured biometric data is not stored in the communications device 18 due to security concerns that the biometric data may be discovered should the device 18 be lost or stolen. Instead, the communications device 18 transmits the captured biometric data to the BAC system 16 for storage therein.
- the captured biometric data may be stored in the device 18 .
- the MS system 12 , the SPC system 14 , the BAC system 16 , and the communications device 18 each include a processor (not shown) and a memory (not shown).
- processor is not limited to just those integrated circuits referred to in the art as a processor, but broadly refers to a computer, an application specific integrated circuit, and any other programmable circuit.
- the processors execute instructions, or computer programs, stored in the respective memories (not shown) of the MS system 12 , the SPC system 14 , the BAC system 16 and the communications device 18 .
- the above examples are exemplary only, and are thus not intended to limit in any way the definition and/or meaning of the term “processor.”
- the respective memories (not shown) in the MS system 12 , the SPC system 14 , the BAC system 16 , and the communications device 18 can be implemented using any appropriate combination of alterable, volatile or non-volatile memory or non-alterable, or fixed, memory.
- the alterable memory whether volatile or non-volatile, can be implemented using any one or more of static or dynamic RAM (Random Access Memory), a floppy disc and disc drive, a writeable or re-writeable optical disc and disc drive, a hard drive, flash memory or the like.
- non-alterable or fixed memory can be implemented using any one or more of ROM (Read-Only Memory), PROM (Programmable Read-Only Memory), EPROM (Erasable Programmable Read-Only Memory), EEPROM (Electrically Erasable Programmable Read-Only Memory), an optical ROM disc, such as a CD-ROM or DVD-ROM disc, and disc drive or the like.
- ROM Read-Only Memory
- PROM PROM
- PROM Program Memory
- EPROM Erasable Programmable Read-Only Memory
- EEPROM Electrical Erasable Programmable Read-Only Memory
- an optical ROM disc such as a CD-ROM or DVD-ROM disc, and disc drive or the like.
- Each of the memories can be a computer-readable recording medium used to store data, respectively, in the MS system 12 , the SPC system 14 , the BAC system 16 , and the communications device 18 .
- each of the respective memories can be a computer-readable recording medium used to store computer programs or executable instructions that are executed, respectively, by the merchant server system 12 , the SPC system 14 , the BAC system 16 , and the communications device 18 .
- the memories may include smart cards, SIMs or any other medium from which a computing device can read computer programs or executable instructions.
- computer program is intended to encompass an executable program that exists permanently or temporarily on any computer-readable recordable medium that causes the computer or computer processor to execute the program. It should be understood that as described herein, applications are computer programs. Thus, the security and the retail purchasing applications described herein are computer programs.
- the MS system 12 , the network 22 , the SPC system 14 , and the BAC system 16 together constitute a first communications channel.
- the communications device 18 and a part of the network 22 between the communications device 18 and the BAC system 16 together constitute a second communications channel separate and distinct from the first communications channel.
- Attackers that are able to monitor communications and phish for user names and passwords over the first communications channel are typically not aware of the second communications channel, and thus are not motivated to monitor communications and phish over the second channel.
- security of network-based electronic payment transactions conducted by shoppers in a retail establishment with the designated communications device 18 is facilitated to be increased and ease of integration with existing legacy systems is facilitated to be enhanced.
- a service provider user identifier and biographic data of the user are obtained and stored in the SPC system 14 such that the biographic data is associated with a corresponding service provider user identifier.
- the communications device 18 is also required to be enrolled in the BAC system 16 prior to conducting a network-based electronic payment transaction. Specifically, a communications device identifier obtained from the communications device 18 is included in the enrollment data record of the user of the designated communications device 18 .
- the service provider user identifier and a service provider identifier that identifies the financial institution service provider are included in the enrollment data record of the user such that the service provider user identifier and the service provider identifier are associated with the communications device identifier and the unique user identifier.
- the designated communications device 18 is enrolled in the BAC system 16 .
- the service provider identifier is obtained from the user during enrollment in the BAC system 16 in the exemplary embodiment, it should be appreciated that in other embodiments the identities of a plurality of different service providers may be obtained and associated with the unique user identifier in the BAC system 16 . That is, the user may provide the service provider identifiers of a plurality of different service providers and associated service provider user identifiers that are to be stored in the BAC system 16 and associated with the unique user identifier in the BAC system 16 . It should be appreciated that each different service provider has a corresponding SPC system 14 that stores therein at least service provider user identifiers that uniquely identify the user to the corresponding SPC system 14 .
- the BAC system 16 may be associated with each of the corresponding SPC systems 14 such that the BAC system 16 is able to determine the SPC systems 14 to communicate with for each user.
- the communications device identifier and the service provider user identifier of each authorized user are stored in the enrollment data record of the authorized user.
- the service provider identifier is associated with all other data included in the enrollment data record. It should be understood that by virtue of associating the service provider user identifier with the financial data of a respective authorized user in the SPC system 14 , and including the service provider user identifier in the enrollment data record of the authorized user, the service provider user identifier functions to map data stored in the SPC system 14 associated therewith to data stored in the BAC system 16 associated with the same service provider user identifier.
- information stored in the SPC system 14 facilitates mapping between data stored in the SPC system 14 and data stored in the BAC system 16 .
- FIG. 2 is a diagram illustrating a first exemplary configurable policy 30 that is stored in the SPC system 14 and is for associating each of a plurality of network-based electronic payment transaction risk factors 32 with a corresponding level of risk 34 .
- the levels of risk 34 define categories of risk associated with network-based electronic payment transactions that vary from a highest to a lowest level of risk.
- the policy 30 includes a plurality of electronic payment transaction risk factors 32 and associates each risk factor 32 with a corresponding level of risk 34 .
- risk factors 32 may include, but are not limited to, the amount or value of the payment transaction, the type of retail establishment, the amount of credit available to a shopper, the time of day the payment transaction is made, and the duration since a previous payment transaction.
- each of the electronic payment transaction risk factors 32 is divided into subcategories such that each subcategory is associated with a corresponding level of risk 34 .
- the value of a purchase may be divided into subcategories according to value, such as $0-100, $100-500, and greater than $500.
- Each subcategory is assigned a corresponding level of risk 34 . Consequently, an electronic payment transaction worth less than $100 may be associated with a lowest level of risk 34 , an electronic payment transaction worth between $100 and $500 may be associated with a high level of risk 34 , and an electronic payment transaction worth greater than $500 may be associated with a highest level of risk 34 .
- the type of retail establishment risk factor 32 may be divided into subcategories according to a level of trust associated with each retail establishment such as trustworthy, generally trustworthy, and untrustworthy.
- a retail establishment may be considered trustworthy because electronic payment transaction problems have not been encountered with the retail establishment.
- a retail establishment may be considered generally trustworthy because at least some electronic payment transaction problems have been encountered with the retail establishment.
- a retail establishment may be considered untrustworthy because significant electronic payment transaction problems have been encountered with the retail establishment. Consequently, a trustworthy retail establishment may be associated with a low level of risk 34 , a generally trustworthy retail establishment may be associated with a high level of risk 34 , and an untrustworthy retail establishment may be associated with the highest level of risk 34 .
- the electronic payment transaction risk factors 32 and the associated levels of risk 34 may be defined in any desirable manner that facilitates authenticating the identity of a user as an authorized user of a designated communications device 18 . Moreover, the definitions of the transaction risk factors 32 and the levels of risk 34 may be changed.
- any network-based electronic payment transaction may involve a plurality of the electronic payment transaction risk factors 32 , and that a resultant level of risk may be determined using the levels of risk 34 associated with each of the involved electronic payment transaction risk factors 32 .
- the SPC system 14 compares the levels of risk 34 associated with each of the involved electronic payment transaction risk factors 32 and determines which risk factor 32 has the greatest level of risk 34 .
- the greatest level of risk 34 is determined to be the resultant level of risk and is used as the basis for authenticating the user. For example, when an electronic payment transaction for less than $100 is conducted with an untrustworthy retail establishment, the level of risk associated with each of the involved electronic payment transaction risks 32 is determined as lowest and highest, respectively, by the SPC system 14 .
- the resultant level of risk is the level of risk 34 associated with the untrustworthy retail establishment.
- the greatest level of risk 34 associated with the payment transaction risk factors is determined to be the resultant level of risk in the exemplary embodiment, it should be appreciated that in other embodiments any other known technique may be used to combine a plurality of the risk factors 32 to obtain an optimal overall risk rating, or optimal resultant level of risk.
- FIG. 3 The information shown in FIG. 3 is the same information shown in FIG. 2 as described in more detail below. As such, information included in FIG. 3 that is identical to information included in FIG. 2 , is identified using the same reference numerals used in FIG. 2 .
- FIG. 3 is a diagram illustrating a second exemplary configurable policy 36 that is stored in the MS system 12 and is for associating each of a plurality of network-based electronic payment transaction risk factors 32 with a corresponding level of risk 34 .
- the second configurable policy 36 does not include the transaction risk factors 32 relating to the type of retail establishment, the credit limit, and the duration since a previous transaction.
- the second configurable policy 36 includes the transaction risk factors 32 relating amount/value of the payment transaction and the time of day, it should be appreciated that in other embodiments any type of electronic payment transaction risk factor 32 may be included that facilitates conducting the electronic payment transaction as described herein.
- the electronic payment transaction risk factors 32 and the associated levels of risk 34 may be defined in any desirable manner that facilitates authenticating the identity of a user as an authorized user of a designated communications device 18 . Moreover, the definitions of the transaction risk factors 32 and the levels of risk 34 may be changed.
- policies 30 , 36 for determining the levels of risk 34 are used to determine the resultant level of risk in the exemplary embodiment, it should be understood that other embodiments may not include such policies.
- a default level of risk may be established for all network-based electronic payment transactions. The default level of risk may require using a personal identification number (PIN) to authenticate the shopper.
- PIN personal identification number
- FIG. 4 is a diagram illustrating an exemplary configurable authentication policy 38 that is stored in the BAC system 16 , and is for associating each of the levels of risk 34 with a corresponding authentication data requirement 40 .
- the authentication policy 38 includes the same level of risk 34 categories established in the first configurable policy 30 , and further includes a level of risk 34 designated as low.
- the authentication policy 38 includes an authentication data requirement 40 for use in authenticating a user of a designated communications device 18 while conducting an electronic payment transaction with the designated communications device 18 .
- the authentication data requirement 40 is the authentication data required to be captured and used for authentication of the user.
- the authentication data requirement 40 may be a requirement for any other type of authentication data including, but not limited to, Global Positioning System (GPS) coordinates, unique pass-phrases, a combination of biometric data with GPS coordinates, a combination of biometric data with a unique pass-phrase, a combination of GPS coordinates with a unique pass-phrase, and a combination of biometric data with GPS coordinates and a unique pass-phrase.
- GPS Global Positioning System
- the authentication policy 38 is generated by associating an authentication data requirement 40 with each level of risk 34 .
- the authentication data requirements 40 indicate at least one biometric type that is to be captured from a user while authenticating the identity of the user as an authorized user of the designated communications device 18 .
- the biometric types that are to be captured and used for authentication are determined by the level of risk 34 . It should be appreciated that the higher the level of risk 34 the more demanding the authentication data requirement 40 .
- an electronic payment transaction having a low level of risk 34 requires biometric data of a single biometric type such as voice biometric data.
- An electronic payment transaction having a high level of risk 34 requires biometric data of a plurality of different biometric types such as face and iris biometric data.
- the authentication data requirement 40 for a level of risk 34 may be a combination of the authentication data requirements 40 appropriate for lesser levels of risk 34 .
- the authentication data requirement 40 for the highest level of risk 34 may be a combination of the authentication data requirements 40 of the high and low levels of risk 34 .
- the authentication policy 38 may be reconfigured by defining the authentication data requirements 40 and the levels of risk 34 in any desirable manner that facilitates authenticating the identity of a user as an authorized user of the designated communications device 18 .
- the policy 38 may be reconfigured by changing the definitions of the authentication data requirements 40 and the levels of risk 34 .
- the authentication data requirement 40 for a high level risk 34 may be reconfigured such that the appropriate authentication data requirement 40 stipulates authenticating the user with face, iris and fingerprint biometric data, instead of face and iris biometric data.
- the exemplary embodiment includes one authentication policy 38 stored in the BAC system 16 , it should be appreciated that in other embodiments any number of authentication policies 38 may be generated and stored in the BAC system 16 . It should be understood that changes in levels of risk 34 are to be coordinated between the first policy 30 , the second policy 36 , and the authentication policy 38 .
- FIG. 5 is a flowchart 42 illustrating an exemplary network-based electronic payment transaction process used by the PTC system 10 for eliminating the need to wait in line to conduct payment transactions at a point-of-sale (POS) terminal in a retail establishment.
- the process starts 44 when a shopper in a retail establishment decides to purchase the goods without going through the POS terminal.
- the shopper continues by identifying 46 the MS system 12 that is to be used for conducting a network-based electronic payment transaction to purchase the goods. More specifically, the shopper continues by obtaining 46 the communications device 18 and invoking a retail purchasing application stored therein by activating one of the buttons or icons 26 .
- the purchasing application causes the communications device 18 to display a list of retail establishments on the screen 28 .
- the shopper identifies the MS system 12 to be used for the transaction by selecting the retail establishment from which he would like to purchase the goods.
- the communications device 18 continues processing by initiating 46 the electronic payment transaction by transmitting an initiation message to the MS system 12 of the selected retail establishment.
- the MS system 12 transmits a message to the communications device 18 requesting the shopper to conduct the electronic payment transaction.
- the communications device 18 continues processing by automatically selecting the service provider user identifier associated with the selected retail establishment as the service provider user identifier to be used for conducting the electronic payment transaction.
- the shopper continues by entering a machine readable code from each good with the communications device 18 . Specifically, the shopper continues by photographing the machine readable code of each good with the communications device 18 .
- the machine readable code includes, but is not limited to, a bar code, a Quality Response (RS) code, and a Data Matrix code.
- the communications device 18 After photographing the machine readable code of a good, the communications device 18 continues by processing the photograph to determine the Universal Product Code (UPC) of the good and transmitting the UPC to the MS system 12 . In response, the MS system 12 continues by transmitting the price of the good to the communications device 18 . The communications device 18 displays the price of the good on the screen 28 for the shopper to see and stores the price therein. After determining the price of all the goods, processing continues by determining the total payment transaction cost 46 and displaying the total payment transaction cost on the screen 28 for the shopper to see. Although a photograph of each bar code is taken to determine the UPC and price of each good in the exemplary embodiment, in other embodiments the price of each good may be determined in any manner using the communications device 18 .
- UPC Universal Product Code
- processing continues by generating a payment transaction request at the communications device 18 and transmitting the payment transaction request from the device 18 to the MS system 12 .
- the payment transaction request includes at least the UPC of each good to be purchased and the service provider user identifier to be used for conducting the transaction.
- the MS system 12 continues by generating a merchant payment transaction request and transmitting the merchant payment transaction request to the SPC system 14 .
- the merchant payment transaction request includes at least the UPC of each good to be purchased and the service provider user identifier.
- the SPC system 14 After receiving the merchant payment transaction request, the SPC system 14 continues by determining whether or not the service provider user identifier received in the merchant payment transaction request is known 48 by comparing the received service provider user identifier against the service provider user identifiers stored therein. When the received service provider user identifier does not match a service provider user identifier stored therein, the received service provider user identifier is not known. The SPC system 14 generates a notification message indicating that the received service provider user identifier is not known and transmits the notification to the MS system 12 . Next, processing ends 50 . However, when the received service provider user identifier matches a service provider user identifier stored therein, the received service provider user identifier is determined to be known 48 .
- the SPC system 14 After determining that the received service provider user identifier is known 48 , the SPC system 14 continues processing by determining whether to approve 52 payment for the electronic payment transaction based on standard credit card practices. When the electronic payment transaction is not approved 52 , processing ends 50 . However, when payment for the electronic payment transaction is approved 52 , the SPC system 14 continues processing by generating a payment transaction authorization message and transmitting the payment transaction authorization message to the MS system 12 .
- processing continues by determining whether the communications device 18 is enrolled 54 in the BAC system 16 .
- the MS system 12 continues processing by transmitting the service provider user identifier to the BAC system 16 .
- the BAC system 16 continues by comparing the received service provider user identifier against service provider user identifiers stored therein. Upon determining a match between the received service provider user identifier and one of the service provider user identifiers stored therein, the BAC system 16 continues processing by determining the communications device identifier associated with the one matching service provider user identifier and determining a state of the associated communications device identifier. When the state of the associated communications device identifier is enrolled, the communications device 18 is considered to be enrolled in the BAC system 16 . When the state of the associated communications device identifier is not enrolled 54 , processing ends 50 .
- the BAC system 16 continues by notifying the MS system 12 that the communications device 18 associated with the service provider user identifier is enrolled therein.
- the MS system 12 continues processing by determining 56 the risk factors 32 associated with the electronic payment transaction and determining 56 the resultant level of risk for the electronic payment transaction.
- processing continues by determining 56 the authentication data requirement for the electronic payment transaction. Specifically, processing continues by generating an authentication request at the MS system 12 and transmitting the authentication request to the BAC system 16 over the first communications channel.
- the authentication request contains at least the resultant level of risk.
- the BAC system 16 After receiving the authentication request, the BAC system 16 continues processing by extracting the resultant level of risk from the authentication request and consulting the authentication policy 38 to determine the authentication data requirement 40 that corresponds to the resultant level of risk. Specifically, the BAC system 16 continues by comparing the resultant level of risk against the levels of risk 34 to determine the corresponding authentication data requirement 40 . The authentication data requirement 40 is determined to be the authentication data requirement 40 that corresponds to the level of risk 34 that matches the resultant level of risk.
- the exemplary embodiment uses the authentication policy 38 to determine the authentication data requirement 40 , it should be appreciated that in other embodiments an authentication policy may not be available. In such other embodiments, all available data may be collected from the shopper regardless of the risk factors 32 , the data collected may be determined by the shopper, the shopper may be repeatedly prompted for authentication data until sufficient authentication data is obtained, or the BAC system 16 may determine to end processing 50 . Moreover, it should be appreciated that in other embodiments the BAC system 16 may determine the resultant level of risk associated with the electronic payment transaction.
- the BAC system 16 After determining 56 the authentication data requirement, the BAC system 16 continues by transmitting a message to the communications device 18 to invoke the security application stored therein. After transmitting the message, the BAC system 16 continues processing by generating and transmitting an authentication data capture request to the communications device 18 over the second communications channel.
- the authentication data capture request includes at least the authentication data requirement 40 .
- the security application causes the communications device 18 to continue processing by obtaining the communications device identifier of the communications device 18 , and by initiating communications with the BAC system 16 by transmitting the communications device identifier to the BAC system 16 over the second communications channel.
- the BAC system 16 validates 58 the communications device 18 by determining whether the communications device 18 is known. Specifically, the BAC system 18 continues by comparing the received communications device identifier against the communications device identifiers stored therein, and determining that the communications device 18 is known, and thus validated, when the received communications device identifier matches one of the communications device identifiers stored therein. Otherwise, when the received communication device identifier does not match one of the communications device identifiers stored in the BAC system 16 , the communications device 18 is not validated 58 and processing ends 50 .
- the communications device 18 Upon receiving the authentication data capture request transmission, the communications device 18 continues by verifying 60 that the authentication data capture request was transmitted from the BAC system 16 . After verifying that the authentication data capture request was transmitted from the BAC system 16 , the security application causes the communications device 18 to display the authentication data capture request on the screen 28 . Next, the shopper continues processing by reading the authentication data capture request from the screen 28 and capturing biometric authentication data 62 in accordance with the authentication data requirement included in the authentication data capture request. When the authentication data capture request cannot be verified as being transmitted from the BAC system 16 , processing ends 50 .
- the authorized shopper associated with the inputted service provider user identifier is in possession of the communications device 18 in the exemplary embodiment, and can be contacted using the communications device 18 .
- the authentication data capture request is considered to be transmitted to the authorized shopper associated with the inputted service provider user identifier.
- the shopper continues processing by capturing biometric authentication data 62 in accordance with the authentication data capture request with the communications device 18 .
- processing continues by transmitting the captured biometric data from the communications device 18 to the BAC system 16 over the second communications channel, and evaluating the captured biometric data at the BAC system 16 to verify that the captured biometric data is of sufficient quality 64 .
- processing continues by authenticating the identity of the shopper.
- processing continues by again capturing the requested biometric authentication data 66 .
- biometric authentication data corresponding to the requested biometric authentication data may be captured six times. When acceptable biometric authentication data is not obtained after six attempts, processing ends 50 . However, it should be appreciated that in other embodiments biometric data may be obtained any number of times.
- processing continues by authenticating the identity of the shopper 68 by comparing the captured biometric data against the authentication data included in the enrollment data record of the authorized shopper associated with the one matching communications device identifier in the BAC system 16 .
- identity of the shopper is not authenticated, processing ends 50 .
- the captured biometric data matches the authentication data included in the enrollment data record, the identity of the shopper is considered to be authenticated 68 .
- the BAC system 16 After authenticating the identity of the shopper 68 , the BAC system 16 continues by generating and transmitting an authentication result message to the MS system 12 .
- the MS system 12 continues processing by completing the desired electronic payment transaction 70 with the service provider user identifier and transmitting a transaction complete message to the communications device 18 notifying the shopper that the transaction was completed.
- the communications device 18 continues by displaying the transaction complete message on the screen 28 for the shopper to see.
- the communications device 18 continues processing by generating an electronic receipt for the electronic payment transaction.
- the electronic receipt includes at least a machine readable code that indicates the details of the completed electronic payment transaction including, but not limited to, the goods purchased.
- the machine readable code includes, but is not limited to, a two-dimensional code.
- the electronic receipt is displayed on the screen 28 upon generation. After displaying the electronic receipt on the screen 28 , an employee of the retail establishment continues by scanning the machine readable code from the electronic receipt as the shopper leaves the retail establishment to determine the goods purchased and verify that the shopper is leaving with only the goods purchased.
- a photograph of the shopper may be presented to the employee on a display to facilitate verifying that an imposter did not purchase the goods.
- the employee continues by permitting the shopper to leave the retail establishment when the shopper is leaving with only the goods purchased.
- processing ends 50 .
- processing continues by calculating the GPS coordinates of the communications device 18 and comparing the GPS coordinates of the communications device 18 against an area of the retail establishment determined from GPS coordinate data. When the GPS coordinates of the communications device 18 are located within the area of the retail establishment, processing continues by entering the machine readable codes of the goods. Otherwise, when the GPS coordinates of the communications device 18 are not located within the retail establishment, processing continues by deactivating the retail purchasing application such that processing ends 50 .
- the MS system 12 that is to be used for conducting the electronic transaction is identified and selected by the shopper from a list displayed on the screen 28 , in other embodiments any other method may be used to identify the MS system 12 that is to be used for conducting the electronic payment transaction.
- the shopper may photograph a machine readable code posted in the retail establishment with the device 18 .
- the machine readable code includes, but is not limited to, a Quick Response (QR) code and a Data Matrix code.
- the machine readable code indicates at least the MS system 12 of the retail establishment to be used for conducting the transaction.
- the communications device 18 identifies the MS system 12 to communicate with for conducting the transaction.
- the communications device 18 may automatically receive a radio frequency (RF) signal broadcast by the retail establishment upon entering the retail establishment that identifies the MS system 12 to be used for conducting the transaction.
- RF radio frequency
- the GPS coordinates of the communications device 18 may be compared against the GPS coordinates of a retail establishment.
- the communications device 18 is configured to communicate with the MS system 12 of the retail establishment.
- the shopper may enter the name of the retail establishment into the communications device 18 .
- FIG. 6 The information shown in FIG. 6 is the same information shown in FIG. 5 as described in more detail below. As such, operations illustrated in FIG. 6 that are identical to operations illustrated in FIG. 5 , are identified using the same reference numerals used in FIG. 5 .
- FIG. 6 is a flowchart 72 illustrating an alternative exemplary authentication process used by the PTC system 10 for eliminating the need to wait in line to conduct payment transactions at a POS terminal in a retail establishment.
- This alternative embodiment is similar to that shown in FIG. 5 .
- the SPC system 14 generates the payment transaction authorization message after the identity of the shopper is successfully authenticated.
- the payment transaction authorization message is generated after authenticating the shopper 68 .
- the SPC system 14 communicates directly with the BAC system 16 to facilitate conducting operations 54 to 70 , instead of the MS system 12 as in the exemplary embodiment.
- processing continues by determining whether the communications device 18 is enrolled in the BAC system 16 . Specifically, the SPC system 14 continues by generating a notification message and transmitting the notification message to the MS system 12 . The notification message indicates that the service provider user identifier is known. After receiving the notification message, the MS system 12 continues processing by transmitting the service provider user identifier to the BAC system 16 . After receiving the service provider user identifier, the BAC system 16 continues by comparing the received service provider user identifier against service provider user identifiers stored therein.
- the BAC system 16 Upon determining a match between the received service provider user identifier and one of the service provider user identifiers stored therein, the BAC system 16 continues processing by determining the communications device identifier associated with the one matching service provider user identifier and determining a state of the associated communications device identifier. When the state of the associated communications device identifier is enrolled 54 , the communications device 18 is considered to be enrolled in the BAC system 16 . When the state of the associated communications device identifier is not enrolled 54 , processing ends 50 .
- the BAC system 16 continues by notifying the SPC system 14 that the communications device 18 associated with the service provider user identifier is enrolled therein. In response, the SPC system 14 continues processing by determining the risk factors 32 associated with the electronic payment transaction and determining 56 the resultant level of risk for the electronic payment transaction.
- processing continues by determining 56 the authentication data requirement for the electronic payment transaction. Specifically, processing continues by generating an authentication request at the SPC system 14 and transmitting the authentication request to the BAC system 16 over the first communications channel. The authentication request contains at least the resultant level of risk. Next, processing continues by conducting operations 58 to 68 as described with regard to the exemplary embodiment.
- the BAC system 16 continues processing by generating and transmitting an authentication result message to the SPC system 14 .
- the authentication result message indicates that the identity of the shopper was successfully authenticated.
- the SPC system 14 continues by generating a payment transaction authorization message and transmitting the payment transaction authorization message to the MS system 12 .
- the payment authorization message indicates that the SPC system 14 has approved payment for the electronic payment transaction.
- the MS system 12 continues processing by completing the desired electronic payment transaction 70 and transmitting a transaction complete message to the communications device 18 indicating that the transaction was completed.
- the communications device 18 continues by notifying the shopper by displaying the transaction complete message on the screen 28 for the shopper to see.
- the communications device 18 continues processing by generating the electronic receipt for the electronic payment transaction.
- an employee of the retail establishment continues by scanning the machine readable code from the electronic receipt as the shopper leaves the retail establishment to determine the goods purchased and verify that the shopper is leaving with only the goods purchased. The employee continues by permitting the shopper to leave the retail establishment when the shopper is leaving with only the goods purchased.
- processing ends 50 ends 50 .
- the embodiments described herein do not include a one-time pass-phrase (OTPP), it should be appreciated that in other embodiments an OTPP may be included.
- the BAC system 16 after authenticating the shopper 68 , the BAC system 16 generates an OTPP, stores the generated OTPP therein, and transmits the OTPP to the communications device 18 .
- the communications device displays the OTPP on the screen 28 for the shopper to see and prompts the shopper to then enter the OTPP into the communications device 18 .
- the shopper activates a button or icon 26 which causes the communications device to transmit the OTPP to the SPC system 14 .
- the SPC system 14 transmits the OTPP to the BAC system 16 which compares the received OTPP against the OTPP stored therein. If the received OTPP matches the stored OTPP, the shopper is authenticated and is permitted to complete the payment transaction 70 . Otherwise, processing ends 50 .
- the shopper may make a typographical error when entering the OTPP into the communications device 18 .
- the OTPP may be automatically transmitted to the SPC system 14 when the shopper activates a button or icon 26 in response to a prompt to automatically transmit the OTPP, or the OTPP may be automatically transmitted to the SPC system 14 without pressing an icon or button 26 .
- the communications device 18 may prompt the shopper to select between manually entering the OTPP in the communications device 18 or automatically transmitting the OTPP to the SPC system 14 .
- the shopper may enter an input indicating which to choose by pressing an appropriate icon or button 26 .
- MS system 12 may be configured to communicate in any manner, and in any order, to authenticate shoppers as authorized shoppers and thus reduce the time spent waiting to conduct payment transactions in retail establishments.
- the BAC system 16 determines the authentication requirement by comparing an extracted level of risk against levels of risk 34 included in authentication policies stored therein in the exemplary embodiment, it should be appreciated that in other embodiments the communications device 18 may determine the authentication requirement by comparing the extracted level of risk against levels of risk 34 included in authentication policies stored therein.
- biometrically authenticating identities facilitates increasing the level of trust that a shopper attempting to conduct a network-based electronic payment transaction in a retail establishment with a communications device 18 is an authorized shopper.
- an additional level of security is provided which also facilitates increasing trust in authentication results that indicate a shopper is an authorized shopper.
- the processes and systems described herein facilitate increasing the security of network-based electronic payment transactions conducted in a retail establishment using the communications device 18 .
- the processes and systems described herein facilitate increasing the level of trust in network-based electronic payment transactions conducted in a retail establishment with a portable communications device, and thus facilitate reducing risks that such network-based electronic payment transactions will be conducted fraudulently. Moreover, the processes and systems described herein facilitate reducing the time shoppers spend in retail establishments conducting payment transactions. Furthermore, as a result of the processes and systems described herein, retail establishments should require fewer POS terminals which in turn facilitates reducing retail establishment operating costs. Providing a quick, easy, reliable, and convenient process of purchasing goods also facilitates attracting new customers to retail establishments and facilitates encouraging increased visits by existing customers and thereby facilitates enhancing revenue. The processes and systems described herein are believed to be applicable to many different businesses for reducing risks that network-based transactions associated with these different businesses will be conducted fraudulently.
- a shopper in a retail establishment uses his portable communications device to purchase goods instead of purchasing the goods at a POS terminal. After initiating a network-based electronic payment transaction on the communications device, biometric data corresponding to a level of risk is determined and captured from the shopper with the communications device, and used for biometrically authenticating the shopper. Upon biometrically authenticating the shopper, the electronic payment transaction is conducted and an electronic receipt including a machine readable code is generated.
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Finance (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
A method of eliminating the need to wait in line to conduct a payment transaction in a retail establishment includes initiating a network-based electronic payment transaction with a communications device in a retail establishment. A shopper initiates the network-based electronic payment transaction. Moreover, the method includes entering a machine readable code from at least one good with the communications device, determining a price of the at least one good and a total payment transaction cost, and displaying the total payment transaction cost on a screen of the communications device. Furthermore, the method includes determining whether to approve payment for the electronic payment transaction, authenticating the shopper, completing the electronic payment transaction in the retail establishment, and transmitting a transaction complete message to the communications device when the shopper is authenticated.
Description
- This invention relates generally to methods and systems for conducting payment transactions, and more particularly, to methods and systems for conducting network-based electronic payment transactions in a retail establishment upon authentication of a shopper conducting the electronic payment transaction.
- Known methods of shopping in retail establishments typically include collecting goods for purchase and conducting a payment transaction at a point-of-sale (POS) terminal to purchase the goods. POS terminals are electronic cash registers used for conducting payment transactions and generating receipts for the transactions. Frequently, shoppers are required to spend an undesirable amount of time waiting in long lines before purchasing goods at a POS terminal. Such long lines have been known to discourage shoppers from repeatedly visiting retail establishments and to discourage new shoppers from visiting retail establishments. Thus, long waiting times have been known to negatively affect commerce at retail establishments.
- Retail establishments have been known to purchase several POS terminals for conducting many simultaneous payment transactions in an effort to facilitate reducing the time spent waiting before conducting payment transactions. However, because POS terminals are known to include expensive hardware and software, and typically are operated by a sales person, retail establishments have been known to incur substantial costs in buying, maintaining, and operating such POS terminals. Some retail establishments have also been known to provide scanning devices such that while shopping, the shoppers themselves are able to scan bar codes on goods as they are collected. After collecting and scanning the goods desired for purchase, shoppers generally spend less time at a POS terminal purchasing the goods because the goods have already been scanned. However, such shoppers still must suffer the inconvenience of waiting in line before purchasing the goods in a payment transaction. Moreover, during periods of heavy shopper traffic, long lines invariably develop at POS terminals that inconvenience shoppers who are required to wait for prolonged periods of time prior to conducting a payment transaction.
- In one aspect, a method of eliminating the need to wait in line to conduct a payment transaction in a retail establishment includes initiating a network-based electronic payment transaction with a communications device in a retail establishment. A shopper initiates the network-based electronic payment transaction. Moreover, the method includes entering a machine readable code from at least one good with the communications device, determining a price of the at least one good and a total payment transaction cost, and displaying the total payment transaction cost on a screen of the communications device. Furthermore, the method includes determining whether to approve payment for the electronic payment transaction, authenticating the shopper, completing the electronic payment transaction in the retail establishment, and transmitting a transaction complete message to the communications device when the shopper is authenticated.
- In another aspect, a system for eliminating the need to wait in line to conduct a payment transaction in a retail establishment is provided that includes a computer configured as a server. The server includes at least a database and is configured to at least store within the database a first configurable policy and to determine a resultant level of risk associated with a network-based electronic payment transaction. Moreover, the system includes a communications device associated with a shopper in the retail establishment. The communications device is configured to communicate with at least the server, to initiate the network-based electronic payment transaction in the retail establishment, to capture biometric authentication data from the shopper in the retail establishment, and to generate a receipt for each network-based electronic payment transaction. The system also includes an authentication system including an authentication system database.
- The authentication system is configured to communicate with at least the server and the communications device, to store within the authentication system database biometric authentication data for each of a plurality of authorized shoppers, and to conduct a biometric authentication process while the shopper is in the retail establishment. Furthermore, the system includes a merchant system configured to communicate with at least the server, the communications device, and the authentication system. The merchant system is further configured to generate and transmit messages and to complete network-based electronic payment transactions. The communications device is further configured to communicate with the authentication system and the merchant system. After the communications device generates a receipt for the network-based electronic payment transaction, an employee of the retail establishment scans the receipt as the shopper leaves the retail establishment and permits the shopper to leave the retail establishment when the shopper has only the goods purchased.
- In yet another aspect, a computer-readable recording medium on which a program is recorded is provided. The computer program causes the computer to execute at least initiating a network-based electronic payment transaction with a communications device in a retail establishment. A shopper initiates the electronic payment transaction. Moreover, the computer program causes the computer to execute determining a price of at least one good and a total payment transaction cost, displaying the total payment transaction cost on a screen of the communications device, and determining whether to approve payment for the electronic payment transaction. Furthermore, the computer program causes the computer to execute authenticating the shopper, completing the electronic payment transaction in the retail establishment, and transmitting a transaction complete message to the communications device when the shopper is authenticated.
-
FIG. 1 is a block diagram of an exemplary embodiment of a payment transaction computer system for conducting network-based electronic transactions in a retail establishment; -
FIG. 2 is a diagram illustrating a first exemplary configurable policy for associating network-based electronic payment transaction risk factors with corresponding levels of risk; -
FIG. 3 is a diagram illustrating a second exemplary configurable policy for associating network-based electronic payment transaction risk factors with corresponding levels of risk; -
FIG. 4 is a diagram illustrating an exemplary authentication policy associating each of the levels of risk illustrated inFIGS. 2 and 3 with a corresponding authentication data requirement; -
FIG. 5 is a flowchart illustrating an exemplary network-based electronic payment transaction process for eliminating the need to wait in line before conducting payment transactions; and -
FIG. 6 is a flowchart illustrating an alternative exemplary authentication process for eliminating the need to wait in line before conducting payment transactions. -
FIG. 1 is an expanded block diagram of an exemplary embodiment of a system architecture of a Payment Transaction Computer (PTC)System 10 for conducting network-based electronic payment transactions in a retail establishment with a portable communications device. More specifically, thePTC system 10 includes a Merchant Server (MS)System 12, a Service Provider Computer (SPC)System 14, a Biometric Authentication Computer (BAC)System 16 and aportable communications device 18. TheMS system 12, theSPC system 14, and theBAC system 16 each include components such as, but not limited to, a web server, a database server, an application server, a directory server and a disk storage unit. The disk storage unit may be used to store any kind of data. TheBAC system 16 may also include a database management server and an authentication server. The database management server may be used to facilitate transferring data to and from the disk storage device. The authentication server is configured to perform matching of any feature or information associated with individuals to authenticate the identity of individuals as described herein. - The
MS system 12 also includes a point-of-sales (POS)terminal 20 typically operated by a sales person. Although the exemplary embodiment includes asingle POS terminal 20, in other embodiments theMS system 12 may include any number ofPOS terminals 20. - The MS
system 12 is configured to communicate with a user of thecommunications device 18 over acommunications network 22. In the exemplary embodiment, thecommunications network 22 is a 3G communications network. However, it should be appreciated that in other embodiments thecommunications network 22 may be any wireless network that facilitates authentication as described herein, such as, but not limited to, WiFi, Global System for Mobile (GSM) and Enhanced Data for GSM Evolution (EDGE). Moreover, in yet other embodiments thenetwork 22 may include any combination of such wireless networks, local area networks, wide area networks, and the Internet. Thenetwork 22 may be used by devices such as thecommunications device 18 to conduct long range wireless communications such as cellular telephone calls and wirelessly accessing the Internet. TheMS system 12 is configured to at least generate and transmit payment transaction requests, as well as generate authentication requests and transmit the authentication requests to theBAC system 16. When the identity of the user of thecommunications device 18 is authenticated, the MSsystem 12 is configured to complete an electronic payment transaction with the communications device in a retail establishment. The MSsystem 12 may also be configured to store policies that determine levels of risk and policies that determine authentication data requirements for the levels of risk. Thus, the MSsystem 12 is a computer system of a retail establishment that requires authenticating a shopper prior to completing a network-based electronic payment transaction. - The SPC
system 14 is a computer system of a financial institution service provider used to store and manage financial data for a plurality of authorized users. Although the exemplary embodiment is described as including oneSPC system 14 corresponding to a financial institution service provider, it should be appreciated that in other embodiments a plurality ofSPC systems 14 may be provided such that each of the plurality ofSPC systems 14 is associated with a different service provider. TheSPC system 14 and theMS system 12 are associated with different entities in the exemplary embodiment. However, in other embodiments theSPC system 14 andMS system 12 may be associated with the same entity. - The
SPC system 14 is typically configured to communicate with thecommunications device 18, theMS system 12, and theBAC system 16 over thenetwork 22. TheSPC system 14 is configured to store therein a different service provider user identifier for each authorized user such that each service provider user identifier is associated with the financial data of a respective authorized user. TheSPC system 14 is also configured to store therein biographic data for each authorized user such that the biographic data is associated with the service provider user identifier of a respective authorized user. Moreover, theSPC system 14 is configured to store therein a service provider identifier of the service provider operating theSPC system 14, and to generate and transmit electronic payment transaction authorizations to theMS system 12. In other embodiments, theSPC system 14 is configured to store therein at least one configurable policy for associating network-based electronic payment transaction risk factors with levels of risk. - The
BAC system 16 is configured to communicate with theMS system 12, theSPC system 14, and thecommunications device 18 over thecommunications network 22. Although theBAC system 16 communicates with asingle SPC system 14 in the exemplary embodiment, it should be appreciated that in other embodiments theBAC system 16 may be configured to communicate with a plurality ofSPC systems 14. - The
BAC system 16 is also configured to facilitate authenticating the identity of a user associated with thecommunications device 18 who requests conducting a network-based electronic payment transaction. Moreover, theBAC system 16 is configured to store at least authentication data in an enrollment data record for each of a plurality of authorized users. In the exemplary embodiment, the authentication data is biometric data that corresponds to any biometric type desired to be used as the basis of authenticating the identity of a user associated with thecommunications device 18. Such biometric types include, but are not limited to, face, fingerprint, iris, voice, vascular patterns and hand signatures. Moreover, the biometric data may take any form such as, but not limited to, images, photographs, templates and electronic data representations. The user associated with thecommunications device 18 in the exemplary embodiment is a shopper in a retail establishment. Thus, theBAC system 16 is configured to store biometric authentication data and is configured to use the biometric authentication data to authenticate identities of shoppers desiring to conduct network-based electronic payment transactions in retail establishments. Using biometrics as the basis for authenticating shopper identities facilitates enhancing trust in authentication results and in the integrity of network-based electronic payment transactions conducted by shoppers in retail establishments based upon such authentication results. Furthermore, the enrollment data record of each authorized user may include at least biographic data and a unique user identifier of the respective authorized user. The unique user identifier may also be stored in theSPC system 14. The service provider identifier and the unique user identifier may be alphanumeric character strings of any length. - The
BAC system 16 is also configured to store at least one configurable authentication policy that indicates the authentication data required to be captured for each of a plurality of levels of risk. By indicating the authentication data requirement for each of the levels of risk, the at least one configurable authentication policy may be used to facilitate determining an authentication data requirement associated with an electronic payment transaction. Furthermore, theBAC system 16 is configured to generate and transmit authentication data capture requests to at least thecommunications device 18. It should be understood that an authentication data capture request includes at least an authentication data requirement, determined by theBAC system 16, that is to be captured from the shopper attempting to conduct a network-based electronic payment transaction in a retail establishment with a designatedportable communications device 18. - The term “biographic data” as used herein includes any demographic information regarding a user including, but not limited to, the user's name, age, date of birth, address, citizenship and marital status. Contact information including devices associated with authorized users and methods for contacting the authorized user may also be collected from the user. In the exemplary embodiment, users designate a particular communications device and provide information regarding the designated communications device that facilitates validating the designated communications device as known, facilitates communicating with the authorized user, and facilitates authenticating the identity of the authorized user. Such information includes, but is not limited to, a communications device identifier of the designated communications device, a telephone number associated with the designated communications device, an e-mail address that can be accessed using the designated communications device, an instant messaging user identifier that can be accessed, and an identifier that facilitates sending short message service (SMS) messages to the designated communications device.
- The information regarding the designated communications device is included in the enrollment data record of the authorized user of the designated
communications device 18. By virtue of including the communications device identifier in the enrollment data record, the communications device identifier is associated with the unique user identifier of the authorized user. In the exemplary embodiment theportable communications device 18 is the designated communications device. Additionally, a state of thecommunications device 18 may be included in the enrollment data record of the user and thus associate the state of thedevice 18 with the designated communications device information. It should be appreciated that theSPC system 14 may also store therein the communications device identifier such that the communications device identifier is associated with the service provider user identifier of the authorized user in theSPC system 14. - Although the authentication data is described as biometric data in the exemplary embodiment, it should be appreciated that in other embodiments any other type of authentication data, or combinations of different types of authentication data, may be used that facilitates authenticating the identity of a user. Such other types of authentication data include, but are not limited to, Global Positioning System (GPS) coordinates, unique pass-phrases, a combination of biometric data with GPS coordinates, a combination of biometric data with a unique pass-phrase, a combination of GPS coordinates with a unique pass-phrase, and a combination of biometric data with GPS coordinates and a unique pass-phrase.
- GPS coordinates may be determined for any GPS enabled device used by an authorized user to communicate with the
BAC system 16. For example, GPS coordinate data may be determined for a retail establishment such that an area of the retail establishment computed from the GPS coordinate data is stored in theBAC system 16. When GPS coordinates of the designatedcommunications device 18 are determined to be located within the retail establishment area, the user may conduct an electronic payment transaction with the retail establishment as long as the user is authenticated and the transaction is authorized. Otherwise, when the designatedcommunications device 18 is determined to be outside of the retail establishment area, the user is not permitted to conduct an electronic payment transaction with the retail establishment. - Unique pass-phrases may also be established for each authorized user and stored in the
BAC system 16 such that a user desiring to conduct a network-based electronic payment transaction in a retail establishment with the designatedcommunications device 18, provides the unique pass-phrase for authentication. Unique pass-phrases are alphanumeric character strings that may be manually input or spoken into thecommunications device 18. - The
communications device 18 is configured to conduct long range wireless communications including, but not limited to, cellular telephone calls and wirelessly accessing the Internet over thenetwork 22. Moreover, thecommunications device 18 is configured to communicate with at least theMS system 12, theSPC system 14, and theBAC system 16 over thenetwork 22. Additionally, in the exemplary embodiment, thecommunications device 18 is configured to capture authentication data from users desiring to conduct a network-based electronic payment transaction while in a retail establishment. Thecommunications device 18 includes afront face 24 and a back face (not shown). Thefront face 24 includes at least one of buttons andicons 26 configured to at least enter commands, enter data such as unique pass-phrases, and invoke applications stored in thedevice 18. Applications stored in thecommunications device 18 include at least a security application and a retail purchasing application. Furthermore, thefront face 24 includes adisplay screen 28 such as, but not limited to, a Liquid Crystal Display (LCD). Thecommunications device 18 is configured to at least display at least one of text and images on thedisplay screen 28. In the exemplary embodiment, thecommunications device 18 is a portable cellular phone configured to at least display at least one of text and images, capture authentication data from a user, and transmit the captured authentication data to theBAC system 16. - Additionally, the
communications device 18 is configured to store a plurality of service provider user identifiers and corresponding service provider identifiers for use in electronic payment transactions conducted in a retail establishment. In the exemplary embodiment, the service provider user identifier is a credit card number of a credit card a shopper desires to use for purchasing goods. In other embodiments, the service provider user identifier may be any alphanumeric character string such as, but not limited to, a debit card number or an e-mail address associated with the shopper that is capable of facilitating completing the electronic payment transaction. Thus, for example, thecommunications device 18 may store a credit card number issued by a first bank with the corresponding service provider identifier of the first bank, and a debit card number issued by a second bank with the corresponding service provider identifier of the second bank. - The user may designate a service provider user identifier as a default service provider user identifier for each service provider. Alternatively, the
communications device 18 may display a list of service provider user identifiers on thescreen 28 that a user may select from for conducting a network-based electronic payment transaction. - Although the
communications device 18 is a portable cellular phone in the exemplary embodiment, it should be appreciated that in other embodiments thecommunications device 18 may be any portable communications device capable of at least displaying at least one of text and images, and capturing and transmitting data. Suchother communications devices 18 include, but are not limited to, a smart phone, a tablet computer, a laptop computer, and any type of portable communications device having wireless capabilities such as a personal digital assistant (PDA). Authentication data captured during authentication of a user is captured from the user with the designatedcommunications device 18. However, in the exemplary embodiment the captured biometric data is not stored in thecommunications device 18 due to security concerns that the biometric data may be discovered should thedevice 18 be lost or stolen. Instead, thecommunications device 18 transmits the captured biometric data to theBAC system 16 for storage therein. However, in other embodiments with lesser security concerns, the captured biometric data may be stored in thedevice 18. - The
MS system 12, theSPC system 14, theBAC system 16, and thecommunications device 18, respectively, each include a processor (not shown) and a memory (not shown). It should be understood that, as used herein, the term processor is not limited to just those integrated circuits referred to in the art as a processor, but broadly refers to a computer, an application specific integrated circuit, and any other programmable circuit. It should be understood that the processors execute instructions, or computer programs, stored in the respective memories (not shown) of theMS system 12, theSPC system 14, theBAC system 16 and thecommunications device 18. The above examples are exemplary only, and are thus not intended to limit in any way the definition and/or meaning of the term “processor.” - The respective memories (not shown) in the
MS system 12, theSPC system 14, theBAC system 16, and thecommunications device 18, can be implemented using any appropriate combination of alterable, volatile or non-volatile memory or non-alterable, or fixed, memory. The alterable memory, whether volatile or non-volatile, can be implemented using any one or more of static or dynamic RAM (Random Access Memory), a floppy disc and disc drive, a writeable or re-writeable optical disc and disc drive, a hard drive, flash memory or the like. Similarly, the non-alterable or fixed memory can be implemented using any one or more of ROM (Read-Only Memory), PROM (Programmable Read-Only Memory), EPROM (Erasable Programmable Read-Only Memory), EEPROM (Electrically Erasable Programmable Read-Only Memory), an optical ROM disc, such as a CD-ROM or DVD-ROM disc, and disc drive or the like. - Each of the memories (not shown) can be a computer-readable recording medium used to store data, respectively, in the
MS system 12, theSPC system 14, theBAC system 16, and thecommunications device 18. Moreover, each of the respective memories (not shown) can be a computer-readable recording medium used to store computer programs or executable instructions that are executed, respectively, by themerchant server system 12, theSPC system 14, theBAC system 16, and thecommunications device 18. Moreover, the memories (not shown) may include smart cards, SIMs or any other medium from which a computing device can read computer programs or executable instructions. As used herein, the term “computer program” is intended to encompass an executable program that exists permanently or temporarily on any computer-readable recordable medium that causes the computer or computer processor to execute the program. It should be understood that as described herein, applications are computer programs. Thus, the security and the retail purchasing applications described herein are computer programs. - It should be appreciated that the
MS system 12, thenetwork 22, theSPC system 14, and theBAC system 16, together constitute a first communications channel. Moreover, it should be appreciated that thecommunications device 18 and a part of thenetwork 22 between thecommunications device 18 and theBAC system 16, together constitute a second communications channel separate and distinct from the first communications channel. Attackers that are able to monitor communications and phish for user names and passwords over the first communications channel are typically not aware of the second communications channel, and thus are not motivated to monitor communications and phish over the second channel. As a result, security of network-based electronic payment transactions conducted by shoppers in a retail establishment with the designatedcommunications device 18 is facilitated to be increased and ease of integration with existing legacy systems is facilitated to be enhanced. - Users are required to enroll in the
SPC system 14 prior to using the designatedcommunications device 18 for conducting network-based electronic payment transactions. During enrollment in theSPC system 14, a service provider user identifier and biographic data of the user are obtained and stored in theSPC system 14 such that the biographic data is associated with a corresponding service provider user identifier. Thecommunications device 18 is also required to be enrolled in theBAC system 16 prior to conducting a network-based electronic payment transaction. Specifically, a communications device identifier obtained from thecommunications device 18 is included in the enrollment data record of the user of the designatedcommunications device 18. The service provider user identifier and a service provider identifier that identifies the financial institution service provider are included in the enrollment data record of the user such that the service provider user identifier and the service provider identifier are associated with the communications device identifier and the unique user identifier. By thus associating the service provider user identifier with the communications device identifier, the designatedcommunications device 18 is enrolled in theBAC system 16. - Although the service provider identifier is obtained from the user during enrollment in the
BAC system 16 in the exemplary embodiment, it should be appreciated that in other embodiments the identities of a plurality of different service providers may be obtained and associated with the unique user identifier in theBAC system 16. That is, the user may provide the service provider identifiers of a plurality of different service providers and associated service provider user identifiers that are to be stored in theBAC system 16 and associated with the unique user identifier in theBAC system 16. It should be appreciated that each different service provider has acorresponding SPC system 14 that stores therein at least service provider user identifiers that uniquely identify the user to thecorresponding SPC system 14. Thus, it should be understood that in other embodiments by virtue of the service provider user identifier being associated with each of the different service provider identities, theBAC system 16 may be associated with each of thecorresponding SPC systems 14 such that theBAC system 16 is able to determine theSPC systems 14 to communicate with for each user. - In the exemplary embodiment, the communications device identifier and the service provider user identifier of each authorized user are stored in the enrollment data record of the authorized user. Thus, the service provider identifier is associated with all other data included in the enrollment data record. It should be understood that by virtue of associating the service provider user identifier with the financial data of a respective authorized user in the
SPC system 14, and including the service provider user identifier in the enrollment data record of the authorized user, the service provider user identifier functions to map data stored in theSPC system 14 associated therewith to data stored in theBAC system 16 associated with the same service provider user identifier. Thus, it should be appreciated that in the exemplary embodiment information stored in theSPC system 14 facilitates mapping between data stored in theSPC system 14 and data stored in theBAC system 16. -
FIG. 2 is a diagram illustrating a first exemplaryconfigurable policy 30 that is stored in theSPC system 14 and is for associating each of a plurality of network-based electronic payment transaction risk factors 32 with a corresponding level ofrisk 34. The levels ofrisk 34 define categories of risk associated with network-based electronic payment transactions that vary from a highest to a lowest level of risk. Specifically, thepolicy 30 includes a plurality of electronic payment transaction risk factors 32 and associates eachrisk factor 32 with a corresponding level ofrisk 34. Such risk factors 32 may include, but are not limited to, the amount or value of the payment transaction, the type of retail establishment, the amount of credit available to a shopper, the time of day the payment transaction is made, and the duration since a previous payment transaction. Moreover, each of the electronic payment transaction risk factors 32 is divided into subcategories such that each subcategory is associated with a corresponding level ofrisk 34. For example, the value of a purchase may be divided into subcategories according to value, such as $0-100, $100-500, and greater than $500. Each subcategory is assigned a corresponding level ofrisk 34. Consequently, an electronic payment transaction worth less than $100 may be associated with a lowest level ofrisk 34, an electronic payment transaction worth between $100 and $500 may be associated with a high level ofrisk 34, and an electronic payment transaction worth greater than $500 may be associated with a highest level ofrisk 34. - Similarly, the type of retail
establishment risk factor 32 may be divided into subcategories according to a level of trust associated with each retail establishment such as trustworthy, generally trustworthy, and untrustworthy. A retail establishment may be considered trustworthy because electronic payment transaction problems have not been encountered with the retail establishment. A retail establishment may be considered generally trustworthy because at least some electronic payment transaction problems have been encountered with the retail establishment. A retail establishment may be considered untrustworthy because significant electronic payment transaction problems have been encountered with the retail establishment. Consequently, a trustworthy retail establishment may be associated with a low level ofrisk 34, a generally trustworthy retail establishment may be associated with a high level ofrisk 34, and an untrustworthy retail establishment may be associated with the highest level ofrisk 34. - It should be understood that the electronic payment transaction risk factors 32 and the associated levels of
risk 34 may be defined in any desirable manner that facilitates authenticating the identity of a user as an authorized user of a designatedcommunications device 18. Moreover, the definitions of the transaction risk factors 32 and the levels ofrisk 34 may be changed. - It should be appreciated that any network-based electronic payment transaction may involve a plurality of the electronic payment transaction risk factors 32, and that a resultant level of risk may be determined using the levels of
risk 34 associated with each of the involved electronic payment transaction risk factors 32. TheSPC system 14 compares the levels ofrisk 34 associated with each of the involved electronic payment transaction risk factors 32 and determines whichrisk factor 32 has the greatest level ofrisk 34. The greatest level ofrisk 34 is determined to be the resultant level of risk and is used as the basis for authenticating the user. For example, when an electronic payment transaction for less than $100 is conducted with an untrustworthy retail establishment, the level of risk associated with each of the involved electronic payment transaction risks 32 is determined as lowest and highest, respectively, by theSPC system 14. Because the level ofrisk 34 associated with an untrustworthy retail establishment is greater than the level ofrisk 34 associated with an electronic payment transaction worth less than $100, the resultant level of risk is the level ofrisk 34 associated with the untrustworthy retail establishment. Although the greatest level ofrisk 34 associated with the payment transaction risk factors is determined to be the resultant level of risk in the exemplary embodiment, it should be appreciated that in other embodiments any other known technique may be used to combine a plurality of the risk factors 32 to obtain an optimal overall risk rating, or optimal resultant level of risk. - The information shown in
FIG. 3 is the same information shown inFIG. 2 as described in more detail below. As such, information included inFIG. 3 that is identical to information included inFIG. 2 , is identified using the same reference numerals used inFIG. 2 . -
FIG. 3 is a diagram illustrating a second exemplaryconfigurable policy 36 that is stored in theMS system 12 and is for associating each of a plurality of network-based electronic payment transaction risk factors 32 with a corresponding level ofrisk 34. This embodiment is similar to that shown inFIG. 2 . However, the secondconfigurable policy 36 does not include the transaction risk factors 32 relating to the type of retail establishment, the credit limit, and the duration since a previous transaction. Although in this embodiment the secondconfigurable policy 36 includes the transaction risk factors 32 relating amount/value of the payment transaction and the time of day, it should be appreciated that in other embodiments any type of electronic paymenttransaction risk factor 32 may be included that facilitates conducting the electronic payment transaction as described herein. - The electronic payment transaction risk factors 32 and the associated levels of
risk 34 may be defined in any desirable manner that facilitates authenticating the identity of a user as an authorized user of a designatedcommunications device 18. Moreover, the definitions of the transaction risk factors 32 and the levels ofrisk 34 may be changed. - Although
policies risk 34 are used to determine the resultant level of risk in the exemplary embodiment, it should be understood that other embodiments may not include such policies. In such other embodiments a default level of risk may be established for all network-based electronic payment transactions. The default level of risk may require using a personal identification number (PIN) to authenticate the shopper. -
FIG. 4 is a diagram illustrating an exemplaryconfigurable authentication policy 38 that is stored in theBAC system 16, and is for associating each of the levels ofrisk 34 with a correspondingauthentication data requirement 40. Specifically, theauthentication policy 38 includes the same level ofrisk 34 categories established in the firstconfigurable policy 30, and further includes a level ofrisk 34 designated as low. Moreover, theauthentication policy 38 includes anauthentication data requirement 40 for use in authenticating a user of a designatedcommunications device 18 while conducting an electronic payment transaction with the designatedcommunications device 18. In the exemplary embodiment theauthentication data requirement 40 is the authentication data required to be captured and used for authentication of the user. It should be appreciated that in other embodiments theauthentication data requirement 40 may be a requirement for any other type of authentication data including, but not limited to, Global Positioning System (GPS) coordinates, unique pass-phrases, a combination of biometric data with GPS coordinates, a combination of biometric data with a unique pass-phrase, a combination of GPS coordinates with a unique pass-phrase, and a combination of biometric data with GPS coordinates and a unique pass-phrase. - The
authentication policy 38 is generated by associating anauthentication data requirement 40 with each level ofrisk 34. It should be appreciated that theauthentication data requirements 40 indicate at least one biometric type that is to be captured from a user while authenticating the identity of the user as an authorized user of the designatedcommunications device 18. The biometric types that are to be captured and used for authentication are determined by the level ofrisk 34. It should be appreciated that the higher the level ofrisk 34 the more demanding theauthentication data requirement 40. - In order to facilitate enhancing increased trust in the authentication results, as the level of
risk 34 associated with the electronic payment transaction increases the number of different biometric types required for authentication also increases. For example, an electronic payment transaction having a low level ofrisk 34 requires biometric data of a single biometric type such as voice biometric data. An electronic payment transaction having a high level ofrisk 34 requires biometric data of a plurality of different biometric types such as face and iris biometric data. It should be appreciated that theauthentication data requirement 40 for a level ofrisk 34 may be a combination of theauthentication data requirements 40 appropriate for lesser levels ofrisk 34. For example, theauthentication data requirement 40 for the highest level ofrisk 34 may be a combination of theauthentication data requirements 40 of the high and low levels ofrisk 34. - It should be understood that the
authentication policy 38 may be reconfigured by defining theauthentication data requirements 40 and the levels ofrisk 34 in any desirable manner that facilitates authenticating the identity of a user as an authorized user of the designatedcommunications device 18. Moreover, thepolicy 38 may be reconfigured by changing the definitions of theauthentication data requirements 40 and the levels ofrisk 34. For example, theauthentication data requirement 40 for ahigh level risk 34 may be reconfigured such that the appropriateauthentication data requirement 40 stipulates authenticating the user with face, iris and fingerprint biometric data, instead of face and iris biometric data. Although the exemplary embodiment includes oneauthentication policy 38 stored in theBAC system 16, it should be appreciated that in other embodiments any number ofauthentication policies 38 may be generated and stored in theBAC system 16. It should be understood that changes in levels ofrisk 34 are to be coordinated between thefirst policy 30, thesecond policy 36, and theauthentication policy 38. -
FIG. 5 is aflowchart 42 illustrating an exemplary network-based electronic payment transaction process used by thePTC system 10 for eliminating the need to wait in line to conduct payment transactions at a point-of-sale (POS) terminal in a retail establishment. ForPTC system 10 the process starts 44 when a shopper in a retail establishment decides to purchase the goods without going through the POS terminal. The shopper continues by identifying 46 theMS system 12 that is to be used for conducting a network-based electronic payment transaction to purchase the goods. More specifically, the shopper continues by obtaining 46 thecommunications device 18 and invoking a retail purchasing application stored therein by activating one of the buttons oricons 26. The purchasing application causes thecommunications device 18 to display a list of retail establishments on thescreen 28. The shopper identifies theMS system 12 to be used for the transaction by selecting the retail establishment from which he would like to purchase the goods. - Next, the
communications device 18 continues processing by initiating 46 the electronic payment transaction by transmitting an initiation message to theMS system 12 of the selected retail establishment. In response, theMS system 12 transmits a message to thecommunications device 18 requesting the shopper to conduct the electronic payment transaction. After receiving the response from theMS system 12, thecommunications device 18 continues processing by automatically selecting the service provider user identifier associated with the selected retail establishment as the service provider user identifier to be used for conducting the electronic payment transaction. Next, the shopper continues by entering a machine readable code from each good with thecommunications device 18. Specifically, the shopper continues by photographing the machine readable code of each good with thecommunications device 18. The machine readable code includes, but is not limited to, a bar code, a Quality Response (RS) code, and a Data Matrix code. - After photographing the machine readable code of a good, the
communications device 18 continues by processing the photograph to determine the Universal Product Code (UPC) of the good and transmitting the UPC to theMS system 12. In response, theMS system 12 continues by transmitting the price of the good to thecommunications device 18. Thecommunications device 18 displays the price of the good on thescreen 28 for the shopper to see and stores the price therein. After determining the price of all the goods, processing continues by determining the total payment transaction cost 46 and displaying the total payment transaction cost on thescreen 28 for the shopper to see. Although a photograph of each bar code is taken to determine the UPC and price of each good in the exemplary embodiment, in other embodiments the price of each good may be determined in any manner using thecommunications device 18. - After reading the total payment transaction cost from the
screen 28, the shopper continues by activating one of the buttons oricons 26 to purchase the goods. Next, processing continues by generating a payment transaction request at thecommunications device 18 and transmitting the payment transaction request from thedevice 18 to theMS system 12. The payment transaction request includes at least the UPC of each good to be purchased and the service provider user identifier to be used for conducting the transaction. After receiving the payment transaction request, theMS system 12 continues by generating a merchant payment transaction request and transmitting the merchant payment transaction request to theSPC system 14. The merchant payment transaction request includes at least the UPC of each good to be purchased and the service provider user identifier. - After receiving the merchant payment transaction request, the
SPC system 14 continues by determining whether or not the service provider user identifier received in the merchant payment transaction request is known 48 by comparing the received service provider user identifier against the service provider user identifiers stored therein. When the received service provider user identifier does not match a service provider user identifier stored therein, the received service provider user identifier is not known. TheSPC system 14 generates a notification message indicating that the received service provider user identifier is not known and transmits the notification to theMS system 12. Next, processing ends 50. However, when the received service provider user identifier matches a service provider user identifier stored therein, the received service provider user identifier is determined to be known 48. - After determining that the received service provider user identifier is known 48, the
SPC system 14 continues processing by determining whether to approve 52 payment for the electronic payment transaction based on standard credit card practices. When the electronic payment transaction is not approved 52, processing ends 50. However, when payment for the electronic payment transaction is approved 52, theSPC system 14 continues processing by generating a payment transaction authorization message and transmitting the payment transaction authorization message to theMS system 12. - Next, processing continues by determining whether the
communications device 18 is enrolled 54 in theBAC system 16. After receiving the payment transaction authorization message, theMS system 12 continues processing by transmitting the service provider user identifier to theBAC system 16. After receiving the service provider user identifier, theBAC system 16 continues by comparing the received service provider user identifier against service provider user identifiers stored therein. Upon determining a match between the received service provider user identifier and one of the service provider user identifiers stored therein, theBAC system 16 continues processing by determining the communications device identifier associated with the one matching service provider user identifier and determining a state of the associated communications device identifier. When the state of the associated communications device identifier is enrolled, thecommunications device 18 is considered to be enrolled in theBAC system 16. When the state of the associated communications device identifier is not enrolled 54, processing ends 50. - After determining that the
communications device 18 is enrolled 54, theBAC system 16 continues by notifying theMS system 12 that thecommunications device 18 associated with the service provider user identifier is enrolled therein. In response, theMS system 12 continues processing by determining 56 the risk factors 32 associated with the electronic payment transaction and determining 56 the resultant level of risk for the electronic payment transaction. - After determining 56 the resultant level of risk, processing continues by determining 56 the authentication data requirement for the electronic payment transaction. Specifically, processing continues by generating an authentication request at the
MS system 12 and transmitting the authentication request to theBAC system 16 over the first communications channel. The authentication request contains at least the resultant level of risk. - After receiving the authentication request, the
BAC system 16 continues processing by extracting the resultant level of risk from the authentication request and consulting theauthentication policy 38 to determine theauthentication data requirement 40 that corresponds to the resultant level of risk. Specifically, theBAC system 16 continues by comparing the resultant level of risk against the levels ofrisk 34 to determine the correspondingauthentication data requirement 40. Theauthentication data requirement 40 is determined to be theauthentication data requirement 40 that corresponds to the level ofrisk 34 that matches the resultant level of risk. - Although the exemplary embodiment uses the
authentication policy 38 to determine theauthentication data requirement 40, it should be appreciated that in other embodiments an authentication policy may not be available. In such other embodiments, all available data may be collected from the shopper regardless of the risk factors 32, the data collected may be determined by the shopper, the shopper may be repeatedly prompted for authentication data until sufficient authentication data is obtained, or theBAC system 16 may determine to endprocessing 50. Moreover, it should be appreciated that in other embodiments theBAC system 16 may determine the resultant level of risk associated with the electronic payment transaction. - After determining 56 the authentication data requirement, the
BAC system 16 continues by transmitting a message to thecommunications device 18 to invoke the security application stored therein. After transmitting the message, theBAC system 16 continues processing by generating and transmitting an authentication data capture request to thecommunications device 18 over the second communications channel. In the exemplary embodiment, the authentication data capture request includes at least theauthentication data requirement 40. - After invoking 56 the security application, the security application causes the
communications device 18 to continue processing by obtaining the communications device identifier of thecommunications device 18, and by initiating communications with theBAC system 16 by transmitting the communications device identifier to theBAC system 16 over the second communications channel. After receiving the communications device identifier, theBAC system 16 validates 58 thecommunications device 18 by determining whether thecommunications device 18 is known. Specifically, theBAC system 18 continues by comparing the received communications device identifier against the communications device identifiers stored therein, and determining that thecommunications device 18 is known, and thus validated, when the received communications device identifier matches one of the communications device identifiers stored therein. Otherwise, when the received communication device identifier does not match one of the communications device identifiers stored in theBAC system 16, thecommunications device 18 is not validated 58 and processing ends 50. - Upon receiving the authentication data capture request transmission, the
communications device 18 continues by verifying 60 that the authentication data capture request was transmitted from theBAC system 16. After verifying that the authentication data capture request was transmitted from theBAC system 16, the security application causes thecommunications device 18 to display the authentication data capture request on thescreen 28. Next, the shopper continues processing by reading the authentication data capture request from thescreen 28 and capturingbiometric authentication data 62 in accordance with the authentication data requirement included in the authentication data capture request. When the authentication data capture request cannot be verified as being transmitted from theBAC system 16, processing ends 50. - It is assumed that the authorized shopper associated with the inputted service provider user identifier is in possession of the
communications device 18 in the exemplary embodiment, and can be contacted using thecommunications device 18. Thus, by virtue of validating thecommunications device 18 and transmitting the authentication data capture request to thecommunications device 18, the authentication data capture request is considered to be transmitted to the authorized shopper associated with the inputted service provider user identifier. After reading the authentication data capture request transmission from thescreen 28, the shopper continues processing by capturingbiometric authentication data 62 in accordance with the authentication data capture request with thecommunications device 18. Next, processing continues by transmitting the captured biometric data from thecommunications device 18 to theBAC system 16 over the second communications channel, and evaluating the captured biometric data at theBAC system 16 to verify that the captured biometric data is ofsufficient quality 64. When the captured biometric data is ofsufficient quality 64, processing continues by authenticating the identity of the shopper. However, when the quality of the captured biometric data is insufficient 64, processing continues by again capturing the requestedbiometric authentication data 66. - In the exemplary embodiment, biometric authentication data corresponding to the requested biometric authentication data may be captured six times. When acceptable biometric authentication data is not obtained after six attempts, processing ends 50. However, it should be appreciated that in other embodiments biometric data may be obtained any number of times.
- After capturing biometric data of
sufficient quality 64, processing continues by authenticating the identity of theshopper 68 by comparing the captured biometric data against the authentication data included in the enrollment data record of the authorized shopper associated with the one matching communications device identifier in theBAC system 16. When the identity of the shopper is not authenticated, processing ends 50. However, when the captured biometric data matches the authentication data included in the enrollment data record, the identity of the shopper is considered to be authenticated 68. - After authenticating the identity of the
shopper 68, theBAC system 16 continues by generating and transmitting an authentication result message to theMS system 12. Next, theMS system 12 continues processing by completing the desiredelectronic payment transaction 70 with the service provider user identifier and transmitting a transaction complete message to thecommunications device 18 notifying the shopper that the transaction was completed. Thecommunications device 18 continues by displaying the transaction complete message on thescreen 28 for the shopper to see. - After receiving the transaction complete message, the
communications device 18 continues processing by generating an electronic receipt for the electronic payment transaction. The electronic receipt includes at least a machine readable code that indicates the details of the completed electronic payment transaction including, but not limited to, the goods purchased. The machine readable code includes, but is not limited to, a two-dimensional code. Moreover, the electronic receipt is displayed on thescreen 28 upon generation. After displaying the electronic receipt on thescreen 28, an employee of the retail establishment continues by scanning the machine readable code from the electronic receipt as the shopper leaves the retail establishment to determine the goods purchased and verify that the shopper is leaving with only the goods purchased. In other embodiments after scanning the machine readable code, a photograph of the shopper may be presented to the employee on a display to facilitate verifying that an imposter did not purchase the goods. The employee continues by permitting the shopper to leave the retail establishment when the shopper is leaving with only the goods purchased. Next, processing ends 50. - It should be understood that in other embodiments after invoking the
retail purchasing application 46 and prior to entering the machine readable codes on the goods, processing continues by calculating the GPS coordinates of thecommunications device 18 and comparing the GPS coordinates of thecommunications device 18 against an area of the retail establishment determined from GPS coordinate data. When the GPS coordinates of thecommunications device 18 are located within the area of the retail establishment, processing continues by entering the machine readable codes of the goods. Otherwise, when the GPS coordinates of thecommunications device 18 are not located within the retail establishment, processing continues by deactivating the retail purchasing application such that processing ends 50. - Although the
MS system 12 that is to be used for conducting the electronic transaction is identified and selected by the shopper from a list displayed on thescreen 28, in other embodiments any other method may be used to identify theMS system 12 that is to be used for conducting the electronic payment transaction. In such other embodiments the shopper may photograph a machine readable code posted in the retail establishment with thedevice 18. The machine readable code includes, but is not limited to, a Quick Response (QR) code and a Data Matrix code. The machine readable code indicates at least theMS system 12 of the retail establishment to be used for conducting the transaction. Upon processing the machine readable code, thecommunications device 18 identifies theMS system 12 to communicate with for conducting the transaction. - Moreover, in such other embodiments the
communications device 18 may automatically receive a radio frequency (RF) signal broadcast by the retail establishment upon entering the retail establishment that identifies theMS system 12 to be used for conducting the transaction. Furthermore, in such other embodiments the GPS coordinates of thecommunications device 18 may be compared against the GPS coordinates of a retail establishment. When thecommunications device 18 is located within the retail establishment thecommunications device 18 is configured to communicate with theMS system 12 of the retail establishment. Additionally, in such other embodiments the shopper may enter the name of the retail establishment into thecommunications device 18. - The information shown in
FIG. 6 is the same information shown inFIG. 5 as described in more detail below. As such, operations illustrated inFIG. 6 that are identical to operations illustrated inFIG. 5 , are identified using the same reference numerals used inFIG. 5 . -
FIG. 6 is aflowchart 72 illustrating an alternative exemplary authentication process used by thePTC system 10 for eliminating the need to wait in line to conduct payment transactions at a POS terminal in a retail establishment. This alternative embodiment is similar to that shown inFIG. 5 . However, theSPC system 14 generates the payment transaction authorization message after the identity of the shopper is successfully authenticated. Thus, the payment transaction authorization message is generated after authenticating theshopper 68. Moreover, theSPC system 14 communicates directly with theBAC system 16 to facilitate conductingoperations 54 to 70, instead of theMS system 12 as in the exemplary embodiment. - After determining that the service provider user identifier is known 48, processing continues by determining whether the
communications device 18 is enrolled in theBAC system 16. Specifically, theSPC system 14 continues by generating a notification message and transmitting the notification message to theMS system 12. The notification message indicates that the service provider user identifier is known. After receiving the notification message, theMS system 12 continues processing by transmitting the service provider user identifier to theBAC system 16. After receiving the service provider user identifier, theBAC system 16 continues by comparing the received service provider user identifier against service provider user identifiers stored therein. Upon determining a match between the received service provider user identifier and one of the service provider user identifiers stored therein, theBAC system 16 continues processing by determining the communications device identifier associated with the one matching service provider user identifier and determining a state of the associated communications device identifier. When the state of the associated communications device identifier is enrolled 54, thecommunications device 18 is considered to be enrolled in theBAC system 16. When the state of the associated communications device identifier is not enrolled 54, processing ends 50. - After determining that the
communications device 18 is enrolled 54, theBAC system 16 continues by notifying theSPC system 14 that thecommunications device 18 associated with the service provider user identifier is enrolled therein. In response, theSPC system 14 continues processing by determining the risk factors 32 associated with the electronic payment transaction and determining 56 the resultant level of risk for the electronic payment transaction. - After determining 56 the resultant level of risk, processing continues by determining 56 the authentication data requirement for the electronic payment transaction. Specifically, processing continues by generating an authentication request at the
SPC system 14 and transmitting the authentication request to theBAC system 16 over the first communications channel. The authentication request contains at least the resultant level of risk. Next, processing continues by conductingoperations 58 to 68 as described with regard to the exemplary embodiment. - After authenticating the
shopper 68, theBAC system 16 continues processing by generating and transmitting an authentication result message to theSPC system 14. The authentication result message indicates that the identity of the shopper was successfully authenticated. In response to receiving the authentication result message, theSPC system 14 continues by generating a payment transaction authorization message and transmitting the payment transaction authorization message to theMS system 12. The payment authorization message indicates that theSPC system 14 has approved payment for the electronic payment transaction. Next, theMS system 12 continues processing by completing the desiredelectronic payment transaction 70 and transmitting a transaction complete message to thecommunications device 18 indicating that the transaction was completed. Thecommunications device 18 continues by notifying the shopper by displaying the transaction complete message on thescreen 28 for the shopper to see. - After receiving the transaction complete message, the
communications device 18 continues processing by generating the electronic receipt for the electronic payment transaction. After displaying the electronic receipt on thescreen 28, an employee of the retail establishment continues by scanning the machine readable code from the electronic receipt as the shopper leaves the retail establishment to determine the goods purchased and verify that the shopper is leaving with only the goods purchased. The employee continues by permitting the shopper to leave the retail establishment when the shopper is leaving with only the goods purchased. Next, processing ends 50. - Although the embodiments described herein do not include a one-time pass-phrase (OTPP), it should be appreciated that in other embodiments an OTPP may be included. In such other embodiments after authenticating the
shopper 68, theBAC system 16 generates an OTPP, stores the generated OTPP therein, and transmits the OTPP to thecommunications device 18. The communications device displays the OTPP on thescreen 28 for the shopper to see and prompts the shopper to then enter the OTPP into thecommunications device 18. After entering the OTPP into thecommunications device 18, the shopper activates a button oricon 26 which causes the communications device to transmit the OTPP to theSPC system 14. Next, theSPC system 14 transmits the OTPP to theBAC system 16 which compares the received OTPP against the OTPP stored therein. If the received OTPP matches the stored OTPP, the shopper is authenticated and is permitted to complete thepayment transaction 70. Otherwise, processing ends 50. - The shopper may make a typographical error when entering the OTPP into the
communications device 18. Thus, in other embodiments the OTPP may be automatically transmitted to theSPC system 14 when the shopper activates a button oricon 26 in response to a prompt to automatically transmit the OTPP, or the OTPP may be automatically transmitted to theSPC system 14 without pressing an icon orbutton 26. It should be understood that upon receiving the OTPP, thecommunications device 18 may prompt the shopper to select between manually entering the OTPP in thecommunications device 18 or automatically transmitting the OTPP to theSPC system 14. The shopper may enter an input indicating which to choose by pressing an appropriate icon orbutton 26. - It should be understood that the
MS system 12,SPC system 14,BAC system 16 andcommunications device 18 may be configured to communicate in any manner, and in any order, to authenticate shoppers as authorized shoppers and thus reduce the time spent waiting to conduct payment transactions in retail establishments. - Although the
BAC system 16 determines the authentication requirement by comparing an extracted level of risk against levels ofrisk 34 included in authentication policies stored therein in the exemplary embodiment, it should be appreciated that in other embodiments thecommunications device 18 may determine the authentication requirement by comparing the extracted level of risk against levels ofrisk 34 included in authentication policies stored therein. - It should be appreciated that biometrically authenticating identities facilitates increasing the level of trust that a shopper attempting to conduct a network-based electronic payment transaction in a retail establishment with a
communications device 18 is an authorized shopper. Furthermore, it should be understood that by virtue of communicating over the first and second communications channels to facilitate capturing and transmitting biometric data, an additional level of security is provided which also facilitates increasing trust in authentication results that indicate a shopper is an authorized shopper. By implementing a higher authentication standard, it is more difficult for an unauthorized shopper to be authenticated as an authorized shopper. Thus, by virtue of facilitating an increase in trust in an authentication result that indicates a shopper is an authorized shopper, the processes and systems described herein facilitate increasing the security of network-based electronic payment transactions conducted in a retail establishment using thecommunications device 18. - The processes and systems described herein facilitate increasing the level of trust in network-based electronic payment transactions conducted in a retail establishment with a portable communications device, and thus facilitate reducing risks that such network-based electronic payment transactions will be conducted fraudulently. Moreover, the processes and systems described herein facilitate reducing the time shoppers spend in retail establishments conducting payment transactions. Furthermore, as a result of the processes and systems described herein, retail establishments should require fewer POS terminals which in turn facilitates reducing retail establishment operating costs. Providing a quick, easy, reliable, and convenient process of purchasing goods also facilitates attracting new customers to retail establishments and facilitates encouraging increased visits by existing customers and thereby facilitates enhancing revenue. The processes and systems described herein are believed to be applicable to many different businesses for reducing risks that network-based transactions associated with these different businesses will be conducted fraudulently.
- In each embodiment, the above-described processes eliminate the need to wait in line to conduct payment transactions in a retail establishment. Moreover, the above described processes simultaneously facilitate enhancing revenue and reducing operating costs of retail establishments. In exemplary embodiments described herein, a shopper in a retail establishment uses his portable communications device to purchase goods instead of purchasing the goods at a POS terminal. After initiating a network-based electronic payment transaction on the communications device, biometric data corresponding to a level of risk is determined and captured from the shopper with the communications device, and used for biometrically authenticating the shopper. Upon biometrically authenticating the shopper, the electronic payment transaction is conducted and an electronic receipt including a machine readable code is generated.
- Exemplary embodiments of authentication processes and systems that eliminate the need to wait in line to conduct payment transactions in retail establishments, and simultaneously facilitate enhancing revenue and reducing operating costs of retail establishments are described above in detail. The processes are not limited to use with the specific computer system embodiments described herein, but rather, the processes can be utilized independently and separately from other processes described herein. Moreover, the invention is not limited to the embodiments of the processes and systems described above in detail. Rather, other variations of the processes may be utilized within the spirit and scope of the claims.
- While the invention has been described in terms of various specific embodiments, those skilled in the art will recognize that the invention can be practiced with modification within the spirit and scope of the claims.
Claims (19)
1. A method for determining authentication data comprising:
determining, by a portable communications device, a risk level corresponding to a transaction desired to be conducted by a user; and
determining a biometric authentication data requirement corresponding to the determined risk level with the device.
2. A method in accordance with claim 1 further comprising:
capturing data from the user with, and storing the captured data in, the device, the captured data corresponding to the authentication data requirement; and
authenticating the user with the captured data.
3. A method in accordance with claim 1 , further comprising determining whether a unique user identifier matches a user identifier and when there is a match conducting said determining a risk level step.
4. A method in accordance with claim 1 , said determining the authentication data requirement step comprising determining different biometric types as the authentication data requirement as the risk level increases.
5. A method in accordance with claim 2 , said authenticating step comprising comparing the captured data against user biometric data with the device, wherein the captured and user biometric data correspond to the authentication data requirement.
6. A method in accordance with claim 2 , further comprising conducting the transaction after successfully authenticating the user.
7. A method in accordance with claim 1 , said determining an authentication data requirement step comprising comparing the determined risk level against an authentication policy to determine a matching risk level, the authentication data requirement corresponding to the matching risk level.
8. A method in accordance with claim 1 , further comprising:
displaying a list of service provider user identifiers on the device; and
selecting a service provider from the list for conducting the transaction.
9. A method in accordance with claim 1 , further comprising:
photographing a machine readable code of a good with the device; and
displaying a price of the good on the device.
10. A handset comprising:
a processor; and
a memory configured to store policies and user authentication data, said processor being programmed to:
determine a risk level corresponding to a transaction desired to be conducted by a user;
determine an authentication data requirement corresponding to the risk level; and
authenticate the user with data corresponding to the authentication data requirement.
11. A handset in accordance with claim 10 , said processor being further programmed to determine the risk level is a default risk level requiring a biometric authentication data requirement.
12. A handset in accordance with claim 10 , said processor being further programmed to determine a different risk level for different transactions.
13. A handset in accordance with claim 10 , said processor being further programmed to determine more demanding biometric authentication data requirements as the risk level increases.
14. A handset in accordance with claim 10 being:
a portable cellular phone;
a smart phone;
a tablet computer;
a laptop computer; or
a personal digital assistant.
15. A handset in accordance with claim 10 , said processor being further programmed to receive a radio frequency signal broadcast by a retail establishment that identifies a system to be used for conducting the transaction.
16. A handset in accordance with claim 10 , said processor being further programmed to display a list of different retail establishments.
17. A handset in accordance with claim 16 , said processor being further programmed to select a service provider user identifier associated with a retail establishment selected from the list.
18. A method for authenticating users comprising authenticating, by a processor, a user with biometric data captured from the user, the captured biometric data corresponding to a risk level for a transaction desired to be conducted by the user.
19. A method in accordance with claim 18 further comprising conducting the transaction after successfully authenticating the user.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/956,716 US20130317991A1 (en) | 2011-04-29 | 2013-08-01 | Methods and systems for conducting payment transactions |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/097,135 US8527360B2 (en) | 2011-04-29 | 2011-04-29 | Methods and systems for conducting payment transactions |
US13/956,716 US20130317991A1 (en) | 2011-04-29 | 2013-08-01 | Methods and systems for conducting payment transactions |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/097,135 Continuation US8527360B2 (en) | 2011-04-29 | 2011-04-29 | Methods and systems for conducting payment transactions |
Publications (1)
Publication Number | Publication Date |
---|---|
US20130317991A1 true US20130317991A1 (en) | 2013-11-28 |
Family
ID=45954535
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/097,135 Active 2031-10-14 US8527360B2 (en) | 2011-04-29 | 2011-04-29 | Methods and systems for conducting payment transactions |
US13/956,716 Abandoned US20130317991A1 (en) | 2011-04-29 | 2013-08-01 | Methods and systems for conducting payment transactions |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/097,135 Active 2031-10-14 US8527360B2 (en) | 2011-04-29 | 2011-04-29 | Methods and systems for conducting payment transactions |
Country Status (4)
Country | Link |
---|---|
US (2) | US8527360B2 (en) |
EP (2) | EP2629259A1 (en) |
AU (1) | AU2012202260B2 (en) |
CA (1) | CA2775184A1 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10791461B1 (en) * | 2018-06-25 | 2020-09-29 | Sprint Communications Company L.P. | Mobile communication device user authenticator |
US10902425B2 (en) | 2017-12-29 | 2021-01-26 | Walmart Apollo, Llc | System and method for biometric credit based on blockchain |
US20220342972A1 (en) * | 2017-09-11 | 2022-10-27 | Apple Inc. | Implementation of biometric authentication |
Families Citing this family (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120209664A1 (en) * | 2009-09-30 | 2012-08-16 | Wesley Enterprises Pty Ltd | Systems and methods for processing transactional data |
US20110145082A1 (en) | 2009-12-16 | 2011-06-16 | Ayman Hammad | Merchant alerts incorporating receipt data |
US8429048B2 (en) | 2009-12-28 | 2013-04-23 | Visa International Service Association | System and method for processing payment transaction receipts |
US10586227B2 (en) * | 2011-02-16 | 2020-03-10 | Visa International Service Association | Snap mobile payment apparatuses, methods and systems |
WO2012112822A2 (en) | 2011-02-16 | 2012-08-23 | Visa International Service Association | Snap mobile payment apparatuses, methods and systems |
SG193510A1 (en) | 2011-02-22 | 2013-10-30 | Visa Int Service Ass | Universal electronic payment apparatuses, methods and systems |
WO2013006725A2 (en) | 2011-07-05 | 2013-01-10 | Visa International Service Association | Electronic wallet checkout platform apparatuses, methods and systems |
US10825001B2 (en) | 2011-08-18 | 2020-11-03 | Visa International Service Association | Multi-directional wallet connector apparatuses, methods and systems |
US9710807B2 (en) | 2011-08-18 | 2017-07-18 | Visa International Service Association | Third-party value added wallet features and interfaces apparatuses, methods and systems |
US10242358B2 (en) | 2011-08-18 | 2019-03-26 | Visa International Service Association | Remote decoupled application persistent state apparatuses, methods and systems |
US10223730B2 (en) | 2011-09-23 | 2019-03-05 | Visa International Service Association | E-wallet store injection search apparatuses, methods and systems |
US8819794B2 (en) * | 2012-01-19 | 2014-08-26 | Microsoft Corporation | Integrating server applications with multiple authentication providers |
AU2013214801B2 (en) | 2012-02-02 | 2018-06-21 | Visa International Service Association | Multi-source, multi-dimensional, cross-entity, multimedia database platform apparatuses, methods and systems |
US8856044B1 (en) | 2013-03-23 | 2014-10-07 | Jeffrey Drazan | Segmented access of remotely stored biographical data to a client device |
US10032008B2 (en) | 2014-02-23 | 2018-07-24 | Qualcomm Incorporated | Trust broker authentication method for mobile devices |
CN107194683A (en) * | 2016-03-14 | 2017-09-22 | 阿里巴巴集团控股有限公司 | On-line payment method and apparatus |
US10552836B2 (en) | 2016-10-11 | 2020-02-04 | Mastercard International Incorporated | Method and system for identification of shared devices for fraud modeling |
CN107507003B (en) * | 2017-06-26 | 2020-04-24 | 创新先进技术有限公司 | Service processing method, device and system |
US10078839B1 (en) * | 2017-08-30 | 2018-09-18 | Square, Inc. | Centralized system for data retrieval |
JP7157654B2 (en) * | 2018-12-25 | 2022-10-20 | 株式会社日本総合研究所 | card transaction system |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080086759A1 (en) * | 2006-10-10 | 2008-04-10 | Colson Christen J | Verification and authentication systems and methods |
US20090271287A1 (en) * | 2008-04-24 | 2009-10-29 | KIBOO LICENSING, LLC a Delaware limited liability company | Financial lifestyle navigator and banking system |
US7669760B1 (en) * | 2006-10-31 | 2010-03-02 | United Services Automobile Association (Usaa) | GPS validation for transactions |
US20110035788A1 (en) * | 2009-08-05 | 2011-02-10 | Conor Robert White | Methods and systems for authenticating users |
US20110208589A1 (en) * | 2010-02-24 | 2011-08-25 | Research In Motion Limited | System and method for displaying an advertisement on a mobile device |
US20120185306A1 (en) * | 2011-01-18 | 2012-07-19 | Fang Cheng | Electronic Transaction Record Distribution System |
US20120254960A1 (en) * | 2011-03-31 | 2012-10-04 | Victor Lortz | Connecting mobile devices, internet-connected vehicles, and cloud services |
US20120267432A1 (en) * | 2010-11-12 | 2012-10-25 | Kuttuva Avinash | Secure payments with global mobile virtual wallet |
US20130080289A1 (en) * | 2011-09-28 | 2013-03-28 | Rupessh Ranen Roy | Retail shopping |
US20140211017A1 (en) * | 2013-01-31 | 2014-07-31 | Wal-Mart Stores, Inc. | Linking an electronic receipt to a consumer in a retail store |
Family Cites Families (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7403922B1 (en) * | 1997-07-28 | 2008-07-22 | Cybersource Corporation | Method and apparatus for evaluating fraud risk in an electronic commerce transaction |
US6577861B2 (en) * | 1998-12-14 | 2003-06-10 | Fujitsu Limited | Electronic shopping system utilizing a program downloadable wireless telephone |
US20020046045A1 (en) * | 2000-06-30 | 2002-04-18 | Attila Narin | Architecture for an electronic shopping service integratable with a software application |
WO2003007538A1 (en) * | 2001-07-12 | 2003-01-23 | Icontrol Transactions, Inc. | Operating model for mobile wireless network based transaction authentication and non-repudiation |
US20030101348A1 (en) | 2001-07-12 | 2003-05-29 | Russo Anthony P. | Method and system for determining confidence in a digital transaction |
US7493284B2 (en) | 2002-12-19 | 2009-02-17 | International Business Machines Corporation | Using visual images transferred from wireless computing device display screens |
US8270578B2 (en) * | 2003-04-07 | 2012-09-18 | Paul Poniatowski | Mobile payment system |
EP1756995A4 (en) * | 2004-05-21 | 2012-05-30 | Emc Corp | System and method of fraud reduction |
US20090157560A1 (en) | 2007-12-14 | 2009-06-18 | Bank Of America Corporation | Information banking and monetization of personal information |
US8560448B2 (en) * | 2008-12-30 | 2013-10-15 | Municipay, Llc | System and method to initiate funding of multiple merchant accounts |
GB0901407D0 (en) | 2009-01-28 | 2009-03-11 | Validsoft Uk Ltd | Card false-positive prevention |
CA2814615A1 (en) * | 2009-10-13 | 2011-04-21 | Ezsav Inc. | Apparatuses, methods, and computer program products enabling association of related product data and execution of transaction |
US20110238512A1 (en) * | 2010-03-26 | 2011-09-29 | Eric Hapaki Doty | Method and Apparatus for Showroom Sales |
US8380177B2 (en) * | 2010-04-09 | 2013-02-19 | Paydiant, Inc. | Mobile phone payment processing methods and systems |
-
2011
- 2011-04-29 US US13/097,135 patent/US8527360B2/en active Active
-
2012
- 2012-04-18 AU AU2012202260A patent/AU2012202260B2/en not_active Ceased
- 2012-04-20 CA CA2775184A patent/CA2775184A1/en not_active Abandoned
- 2012-04-20 EP EP13166022.7A patent/EP2629259A1/en not_active Ceased
- 2012-04-20 EP EP12165044A patent/EP2518672A1/en not_active Withdrawn
-
2013
- 2013-08-01 US US13/956,716 patent/US20130317991A1/en not_active Abandoned
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080086759A1 (en) * | 2006-10-10 | 2008-04-10 | Colson Christen J | Verification and authentication systems and methods |
US7669760B1 (en) * | 2006-10-31 | 2010-03-02 | United Services Automobile Association (Usaa) | GPS validation for transactions |
US20090271287A1 (en) * | 2008-04-24 | 2009-10-29 | KIBOO LICENSING, LLC a Delaware limited liability company | Financial lifestyle navigator and banking system |
US20110035788A1 (en) * | 2009-08-05 | 2011-02-10 | Conor Robert White | Methods and systems for authenticating users |
US20110208589A1 (en) * | 2010-02-24 | 2011-08-25 | Research In Motion Limited | System and method for displaying an advertisement on a mobile device |
US20120267432A1 (en) * | 2010-11-12 | 2012-10-25 | Kuttuva Avinash | Secure payments with global mobile virtual wallet |
US20120185306A1 (en) * | 2011-01-18 | 2012-07-19 | Fang Cheng | Electronic Transaction Record Distribution System |
US20120254960A1 (en) * | 2011-03-31 | 2012-10-04 | Victor Lortz | Connecting mobile devices, internet-connected vehicles, and cloud services |
US20130080289A1 (en) * | 2011-09-28 | 2013-03-28 | Rupessh Ranen Roy | Retail shopping |
US20140211017A1 (en) * | 2013-01-31 | 2014-07-31 | Wal-Mart Stores, Inc. | Linking an electronic receipt to a consumer in a retail store |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20220342972A1 (en) * | 2017-09-11 | 2022-10-27 | Apple Inc. | Implementation of biometric authentication |
US10902425B2 (en) | 2017-12-29 | 2021-01-26 | Walmart Apollo, Llc | System and method for biometric credit based on blockchain |
US10791461B1 (en) * | 2018-06-25 | 2020-09-29 | Sprint Communications Company L.P. | Mobile communication device user authenticator |
Also Published As
Publication number | Publication date |
---|---|
CA2775184A1 (en) | 2012-10-29 |
US20120278193A1 (en) | 2012-11-01 |
AU2012202260B2 (en) | 2017-11-02 |
US8527360B2 (en) | 2013-09-03 |
EP2518672A1 (en) | 2012-10-31 |
AU2012202260A1 (en) | 2012-11-15 |
EP2629259A1 (en) | 2013-08-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8527360B2 (en) | Methods and systems for conducting payment transactions | |
US10861012B2 (en) | System and method for secure transactions at a mobile device | |
AU2016222498B2 (en) | Methods and Systems for Authenticating Users | |
US11470079B1 (en) | User-level token for user authentication via a user device | |
US11954670B1 (en) | Systems and methods for digital account activation | |
US20140229388A1 (en) | System and Method for Data and Identity Verification and Authentication | |
US20110035788A1 (en) | Methods and systems for authenticating users | |
US20140297538A1 (en) | System and Method for Data and Identity Verification and Authentication | |
CN112823368B (en) | Tokenized contactless transactions through cloud biometric identification and authentication | |
US20170243224A1 (en) | Methods and systems for browser-based mobile device and user authentication | |
US20190303602A1 (en) | Untethered resource distribution and management | |
US20210166215A1 (en) | Method for performing a contactless payment transaction | |
US20160328717A1 (en) | BioWallet Biometrics Platform | |
US20210049568A1 (en) | Method and System for Large Transfer Authentication | |
US12008544B2 (en) | Method for performing a contactless payment transaction | |
US20230129991A1 (en) | Systems and methods for use in biometric-enabled network interactions | |
US11783315B2 (en) | Transaction system architecture and methods |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |