The present disclosure is related to near-field contactless transactions utilizing short range communication technology, and in particular relates to contactless transactions on larger screens.
Many Point of Sale (POS) terminals now include the ability to receive a contactless or “tap” transaction, which is enabled through near field communications (NFC) technology. During such a transaction, the customer can bring a payment mechanism, such as a credit card, debit card, mobile device, wearable such as a watch or the watch band, jewelry, among other options, into proximity with the NFC reader on the POS terminal. In passive NFC mode, this will energize the antenna and chip within the payment mechanism and allow the POS terminal to receive information about the payment mechanism, as well as a response to a challenge. In active NFC mode, the payment mechanism can generate its own radio frequency (RF) field to provide a response to the challenge.
As NFC tap payments move away from dedicated spots on payment terminals and move behind larger touch surfaces such as tablets, countertop terminals, digital storefronts, kiosks, vending machines, subway or mall posters or billboards, among others, there is a new complexity for users on where they should perform the tap transaction. This can lead to buyer frustration in looking for a tap pad or location to tap the payment mechanism, potentially losing the sale or wasting precious sales associate time.
In some cases, a customer may not know where to perform a tap transaction, especially when the customer is interacting with a larger screen. For example, on a large kiosk screen the user may not know where the tap transaction should be focused. While this may be solved by providing directions to a particular tap location, for example through user interface elements, a better solution would be to allow the customer to tap on multiple areas or anywhere on the screen.
The subject-matter of the present application relates to embodiments in which a tap transaction can be recognized at multiple points or at any point on a screen.
In one aspect, a computer system may include a processor; at least one sensor for detecting and determining a location of a short-range communications attempt between a computing device and a short-range communications target; and a plurality of initiators for completing short-range communications attempts, wherein the processor may be configured to enable one of the initiators to allow the computing device to complete the short-range communication transaction based on the determined location of the short-range communications attempt.
In some embodiments, the short-range communications attempt may be a near field communications attempt.
In some embodiments, the sensor for determining the location may be an image detection sensor associated with the computer system.
In some embodiments, the sensor for determining the location may use an array of initiators associated with the computer system.
In some embodiments, one or more initiators from the array of short-range sensors may be energized in a pattern to determine the location.
In some embodiments, a non-energized initiator may be configured to listen for signals from the short-range communications target.
In some embodiments, the processor may be configured to enable by moving the one of the initiators into proximity with the short-range communications target.
In some embodiments, the processor may be configured to enable by angling the one of the initiators towards the short-range communications target.
In some embodiments, the plurality of initiators may form an array of initiators, and wherein the processor may be configured to enable by choosing an initiator from the array of initiators based on the determined location of the short-range communication target.
In a further aspect, a method at a computing device for targeting a short-range communications transaction may be provided, the method including detecting a short-range communications transaction attempt between the computing device and a short-range communications target; determining a location for the short-range communications transaction attempt; and based on the determined location, enabling an initiator for the computing device to complete the short-range communication transaction.
In some embodiments, the short-range communications transaction may be a near field communications transaction.
In some embodiments, the determining the location may be performed using an image detection sensor associated with the computing device.
In some embodiments, the determining the location may be performed using an array of initiators associated with the computing device.
In some embodiments, one or more initiators from the array of short-range sensors may be energized in a pattern to determine the location.
In some embodiments, a non-energized initiator may listen for signals from the short-range communications target.
In some embodiments, the enabling may comprise moving the initiator into proximity with the short-range communications target.
In some embodiments, the enabling may comprise angling the initiator towards the short-range communications target.
In some embodiments, the initiator may be part of an array of initiators, and wherein the enabling may comprise choosing the initiator from the array of initiators based on the determined location of the short-range communication target.
In still a further aspect, a non-transitory computer readable medium for storing instruction code, which, when executed by a processor of a computer system configured for targeting a short-range communications transaction, may cause the computer system to: detect a short-range communications transaction attempt between the computing device and a short-range communications target; determine a location for the short-range communications transaction attempt; and based on the determined location, enable an initiator for the computing device to complete the short-range communication transaction.
The present disclosure will be better understood with reference to the drawings, in which:
The present disclosure will now be described in detail by describing various illustrative, non-limiting embodiments thereof with reference to the accompanying drawings and exhibits. The disclosure may, however, be embodied in many different forms and should not be construed as being limited to the illustrative embodiments set forth herein. Rather, the embodiments are provided so that this disclosure will be thorough and will fully convey the concept of the disclosure to those skilled in the art.
In accordance with the embodiments of the present disclosure, a method to facilitate a short-range wireless communications transaction is provided. While the embodiments of the present disclosure are described below with regards to NFC, other short-range communication technologies such as radio frequency identification (RFID), Bluetooth™, Infrared Data Association (IrDA) communications, among others, may potentially be used with embodiments described herein. The embodiments below describing NFC are therefore provided for illustration purposes only.
In accordance with the NFC standards, an initiator is the computing device initiating a transaction. It may also be referred to as an NFC reader. The initiator is the device which may start a transaction by energizing an NFC antenna and may use a single device discovery (SDD) protocol to locate and communicate with a target.
A target, as used herein, is any device which may provide a response to an initiator. For example, the target in a payment transaction may be a passive target such as a credit card or jewelry, where the NFC antenna on the credit card requires the field generated by the initiator to power a chip on the card to provide data to the initiator. In other cases, the target may be an active target which may be capable of generating its own RF field. Examples may include mobile devices, wearables such as smart watches, fobs, among others. The embodiments of the present disclosure are equally applicable to passive and active targets.
As screen sizes get larger, finding the location of an NFC reader (initiator) becomes more problematic. If the reader is on the edge of the screen, it may not be immediately obvious to a user where such reader is. The reader further may not be accessible to all users, such as those in wheelchairs, if placed too high or too far from the edge of a counter.
If the reader is at a location behind the screen, the user may not be able to find such reader easily. Further, such location may limit choices when creating graphical interfaces for such screen.
Therefore, in accordance with the embodiments of the present disclosure, a more flexible short-range communication system is provided which allows interaction between an initiator and a target from a plurality of locations, and in some cases anywhere on the screen. This is done by detecting that a short-range transaction is taking place, locating the position of the short-range transaction attempt, and then enabling the short-range transaction. Each is described below.
Computer System
Short-range communication modules may have additional sensors associated with such a module/with a device within which they are all integrated. For example, an initiator may be part of a reference computing device such as a mobile platform, which has access to sensors such as a camera, a positional sensor such as an IR sensor, an accelerometer, among other options.
In other cases, the short-range communication module may be associated with a computing device such as a tablet, kiosk screen, countertop screen, among others. For example, one or more initiators may be behind or around the periphery of a touch screen. In this case, other sensors may further be associated with the computing device in some cases, such as a camera, a positional sensor such as an IR sensor, an accelerometer, among other options. However, in some cases no other sensors besides one or more initiators may be present.
Therefore, reference is now made to
Processor 112 is a hardware processor configured to execute programmable logic, which may be stored, along with data, on computing device 110 and shown in the example of
Alternatively, or in addition to memory 130, computing device 110 may access data or programmable logic from an external storage medium, for example through communications subsystem 120.
Communications subsystem 120 allows computing device 110 to communicate with other devices or network elements and the design of communications subsystem 120 may be based on various types of communications being performed. Further, communications subsystem 120 may comprise a plurality of communication technologies, including any wired or wireless communication technology.
In the embodiment of
Further, other sensors may be associated with the computing device 110. Such sensors may be internal sensors, shown as sensors 140 in the embodiment of
If present, sensors 140 or 142 may consist of various sensors that can be used to analyse whether a transaction attempt has been initiated, and find, or assist in finding, the location of such transaction attempt. For example, in some cases, the sensors may comprise cameras or other image capture modules. In other cases, sensors may include proximity modules such as an IR detector, RADAR, LIDAR, among others. In still other situations, the sensors may include motion sensors such as passive infrared (PIR), microwave, ultrasonic, tomographic motion detectors, gesture detectors, among other options. In other cases, the sensors can include bump sensors such as accelerometers, pressure sensors, among others. In various circumstances, a plurality of sensors may exist and be associated with the computing system. Thus, a combination of the various types of sensors may be available within the computing system.
In the embodiment of
In some embodiments, user interface 150 can further include any auditory, visual or a haptic feedback mechanism to provide a user with information. For example, user interface 150 could include any of lights, speakers, vibration mechanisms, among other options.
Communications between the various modules within a computing device can be done in a variety of ways. In the example of
As described below, in operation, a transaction device 170 may be brought into proximity with a display screen of user interface 150 in order to have information stored on, or derived by, transaction device 170 transmitted to the short-range communications module 130. For example, transaction device 170 may be any payment token such as a credit card with a near field communications antenna thereon. The short-range communications module 132 may be an NFC reader. In this case, when the transaction device 170 is brought into proximity of the short-range communications module 132, energy from the short-range communications module 132 will energize the NFC antenna on the transaction device 170. In this case, the transaction device 170 will provide information back to the short-range communications module, including information on the device, as well as potentially a response to a challenge that is issued by the short-range communications module 132.
In other embodiments, transaction device 170 may be a different type of fob. For example, the transaction device 170 may be a watch, watchband, mobile device such as a smart phone, jewelry, among other such devices as may be equipped with short-range communications hardware (e.g., an NFC transceiver).
While the embodiments described herein refer to initiators in NFC transactions, in other cases, short range communications module 132 may be an RFID reader and the transaction device may be a card or fob with the corresponding RFID technology. For example, the display may be a kiosk display associated with a building directory, which further has the ability to summon an elevator for those with the correct security badge. In this case, the short-range communications module 132 may issue a challenge to the transaction device 170 which will then be responded to from the transaction device 170. The short-range communications module 132 can then compare the results from the challenge with the expected results in order to determine whether to accept the transaction or not.
In still further cases, transaction device 170 can be any short-range communications device capable of interacting with the short-range communications module 132.
While the embodiment of
Display Configurations
Various display configurations could be utilized with the embodiments of the present disclosure. Such display configurations would be utilized with the computing system of
One example is shown with regard to
In some cases, display system 210 may include other sensors such as pressure sensors, bump sensors, among other such sensors.
The embodiment of
Further, in the example of
Other sensors could also be associated with kiosk 310.
Referring to
In still further embodiments, the initiators could be distributed around the periphery of the screen. Reference is now made to
In still further embodiments, an evenly distributed array may be placed behind a screen. Reference is now made to
While the embodiments of
Enabling A Short-Range Transaction
Utilizing a computer system such as that described above with regard to
In the embodiment of
In a simplest form, user interaction with a user interface such as a touch screen, can be used to detect that a short-range transaction is occurring. For example, at a menu board for ordering food, once the user indicates that he or she wants to pay, this may provide an indication that a short-range transaction is occurring.
In other cases, sensors such as a camera may provide an indication that a short-range transaction is occurring. For example, sensors 140 or 142 from the computer system 100 of
In further cases, secondary short-range communications may be used to detect a transaction is occurring. For example, a Bluetooth detector can detect the presence of a customer in front of a large touchscreen by detecting the customer's mobile device. In some cases, if the device does not move for more than a threshold period of time, this could mean that the customer has stopped in front of the screen and is not merely walking by.
In still further cases, a display may have one or more initiators associated therewith. For example, in some cases, a display may have a plurality of initiators around the periphery of such display, as shown with regard to
For example, initiators may be energized and provide a Polling Request Frame in accordance with ISO/IEC 18093:2013, “Information technology—Telecommunications and information exchange between systems—Near Field Communication—Interface and Protocol (NFCIP-1)”, the contents of which are incorporated herein by reference. The same initiators or other initiators may then listen for a Polling Response Frame.
In other cases, if the screen is only used as a payment terminal, then the determining that a transaction is occurring may always be true.
From
Once a short-range communications transaction attempt is detected, the process proceeds from block 720 to block 730. At block 730, the location of the transaction attempt on the display screen is determined. Specifically, once a transaction attempt has been detected, in accordance with the embodiments of the present disclosure, a location for the transaction attempt is determined. This may be done in various ways. Example manners of determining a location for the transaction attempt will now be discussed.
In a first example, one or more sensors associated with the computing device of the screen can be used to find the location of the transaction. For example, a camera and image processing may be used to find a tap location on the screen. Specifically, referring to
If a plurality of cameras exists, the location determination may involve a cross-reference between the images from the two cameras to pinpoint the location of the tap.
In another example, a light curtain, pressure sensor, RADAR, LIDAR, short range communications module, or other similar sensor can be used to find the location of the tap. Such additional sensors can be used instead of, or in addition to, a camera. Therefore, in some cases, a combination of sensors can be used to find the location of the transaction attempt.
In yet another, an array of initiators can be used to find the location of the transaction attempt. For example, one or more initiators within the array of initiators can be used to generate an RF field. In some cases, such RF field may be generated using a Single Device Detection (SDD) algorithm as described in the NFC standards to find the target. Specifically, as provided for by ISO/IEC 18092:2013, the initiator could first listen for a signal on an RF frequency, and if no signal is detected then the initiator could initiate a signal. After a certain amount of time, a Polling Request Frame may be sent and a Polling Response Frame may be listened for at the initiator.
In some cases, the sending of the Polling Request Frame and receiving of the Polling Response Frame could be done a plurality of times without initiating a transaction in order to determine the location of the target.
Specifically, the one or more initiators could be used to find the location of the transaction attempt in various ways. For example, in one case, initiators that will not interfere with each other may be simultaneously powered and responses from a target may be listened for. The listening may be performed from the same initiators that sent the signal in some cases. In other cases, the listening may also include initiators in the array that were not powered.
For example, referring to
One or more initiators that would not interfere with each other could be simultaneously powered up, as shown with initiators 840. Such initiators 840 would then listen for a response from a target. Additionally, in the example of
Further, in some cases, signal strength indicators could be used to find the location of the target. For example, if a plurality of initiators 840 and listeners 850 are listening for a response, the signal strength of the response at each of the initiators may provide information regarding the location of the target. This may for example use triangulation to find the location of the target.
The triangulation may be used to make a determination of the location of the target in some cases. In other cases, the triangulation may be used to refine a further search for the target. In particular, if the triangulation indicates that that the target is in a particular quadrant, sector or area of the screen, then the search could be narrowed to the quadrant, sector or area of the screen by powering initiators and repeating the search process in that quadrant, sector or area of the screen.
In other cases, a pattern may be used to power the plurality of initiators in the array. For example, the first initiator may be powered, and at a subsequent time a second initiator may be powered, thus allowing a search for the target to take place. The pattern may provide a linear sweep of the surface of the screen, may work from the center outwards, from the corners inwards, among other options.
The pattern may power an equal number of initiators at each step or may power different numbers of initiators at each step depending on interference potential. For example, when working from the corners inwards, the pattern may power the corners first, but then may power fewer initiators as the pattern approaches the center of the screen and the initiators being powered become closer to each other.
In some cases, two or more initiators may synchronize with each other and be powered simultaneously, regardless of interference potential.
In some cases, the array of initiators may be located behind the screen. In other cases, the array of initiators may be located around the periphery of the screen. For example, referring to
The search for the location in the examples of
Further, in some cases, the detection must occur for a threshold period of time. For example, while the location of the target may be found, the target may in this case still be moving towards the screen and the location of the target may change. Therefore, in one embodiment the location of the target may need to be stable for a threshold time before the determination of the location can be verified.
The use of the array of initiators may, in some cases, be combined with other sensors to identify the location of the transaction attempt.
Referring again to
In a first embodiment, an initiator may be moved into proximity with the determined location. This may, for example, comprise using motors to physically move an initiator close to a target. For example, in the embodiment of
In the case where there are one or more initiators behind the screen, this may involve moving the closest initiator to the location of the tap or transaction attempt.
In the case where there are one or more initiators at the periphery of the screen, it may involve moving the closest initiator to a location adjacent to or near to the tap or transaction attempt. For example, using a mechanism 242 such as that in
In other embodiments, the transaction may be enabled by angling an initiator to facilitate the RF transaction. For example, the antenna on the initiator may be angled to provide for the strongest signal reception.
Reference is now made to
Once the location of target 1030 is found, then one or more initiators may be angled to obtain better reception at the antenna of such initiator based on the location of the target. In the embodiment of
In other embodiments, the initiator may be both moved and angled to facilitate the transaction.
In other cases, when an array of initiators exists, such as with the embodiment of
Once such initiator is enabled, a payment cycle in a monetary transaction can be carried out. For example, if the transaction is a payment transaction, the credit card information, along with the challenge response, can be processed and a communications path established between the computer system and a transaction clearinghouse to determine whether the funds will be transferred. For an RFID transaction, the response to a challenge can be compared with the expected response and if the two match, an action may occur such as an elevator being summoned. In other cases, other types of transactions utilizing short range communications could be enabled based on whether the standard validation for such transaction exists.
In
The use of the above embodiments allows for the transaction to take place in multiple locations on a screen. This then allows for a customer to be able to perform the transaction without frustration or intervention of a sales clerk. On larger screens, the above embodiments facilitate accessibility as the height of a transaction does not matter, and therefore a customer in a wheelchair or with limited mobility can equally interact with the screen.
Further, on very large screens, a plurality of transactions could take place simultaneously using the above embodiments, where each transaction could enable an initiator from a subset of the initiators. The embodiments described above are therefore scalable and do not rely on particular screen sizes.
Based on the above, a computer system can use sensors to detect a transaction attempt. Based on such detection, the computer system can then detect/identify a location of the transaction attempt and enable the transaction at that location. The enabling the location may involve moving, angling and/or powering one or more short-range communications modules based on the location. This facilitates the transaction occurring at least at a plurality of locations, and in some cases anywhere, on a large display surface and thereby provides for increased usability by customers, increased accessibility, increased options for the design of the user interface, among other benefits.
While the embodiments above describe a short-range communications module and secondary sensors as being distinct, in some embodiments the short-range communications module and secondary sensors may be part of the same physical component. Further, the embodiments describe at least one short-range communications module which could be configured behind a screen, around the periphery of a screen, or both. The short-range communications modules could be distributed or placed in various locations, and in some cases be configured in an array or pattern. One or more of the short-range communications modules could be movable or capable of being angled. However, in some cases systems could exist where some short-range communications modules are stationary and others are movable or capable of being angled. The present disclosure is thus not limited to any particular configuration for the short-range communication modules and/or the secondary sensors.
The elements described and depicted herein, including in flow charts and block diagrams throughout the figures, imply logical boundaries between the elements. However, according to software or hardware engineering practices, the depicted elements and the functions thereof may be implemented on machines through computer executable media having a processor capable of executing program instructions stored thereon as a monolithic software structure, as standalone software modules, or as modules that employ external routines, code, services, and so forth, or any combination of these, and all such implementations may be within the scope of the present disclosure. Examples of such machines may include, but may not be limited to, personal digital assistants, laptops, personal computers, mobile phones, other handheld computing devices, medical equipment, wired or wireless communication devices, transducers, chips, calculators, satellites, tablet PCs, electronic books, gadgets, electronic devices, devices having artificial intelligence, computing devices, networking equipment, servers, routers and the like. Furthermore, the elements depicted in the flow chart and block diagrams or any other logical component may be implemented on a machine capable of executing program instructions. Thus, while the foregoing drawings and descriptions set forth functional aspects of the disclosed systems, no particular arrangement of software for implementing these functional aspects should be inferred from these descriptions unless explicitly stated or otherwise clear from the context. Similarly, it will be appreciated that the various steps identified and described above may be varied, and that the order of steps may be adapted to particular applications of the techniques disclosed herein. All such variations and modifications are intended to fall within the scope of this disclosure. As such, the depiction and/or description of an order for various steps should not be understood to require a particular order of execution for those steps, unless required by a particular application, or explicitly stated or otherwise clear from the context.
The methods and/or processes described above, and steps thereof, may be realized in hardware, software or any combination of hardware and software suitable for a particular application. The hardware may include a general-purpose computer and/or dedicated computing device or specific computing device or particular aspect or component of a specific computing device. The processes may be realized in one or more microprocessors, microcontrollers, embedded microcontrollers, programmable digital signal processors or other programmable device, along with internal and/or external memory. The processes may also, or instead, be embodied in an application specific integrated circuit, a programmable gate array, programmable array logic, or any other device or combination of devices that may be configured to process electronic signals. It will further be appreciated that one or more of the processes may be realized as a computer executable code capable of being executed on a machine readable medium.
The computer executable code may be created using a structured programming language such as C, an object oriented programming language such as C++, or any other high-level or low-level programming language (including assembly languages, hardware description languages, and database programming languages and technologies) that may be stored, compiled or interpreted to run on one of the above devices, as well as heterogeneous combinations of processors, processor architectures, or combinations of different hardware and software, or any other machine capable of executing program instructions.
Thus, in one aspect, each method described above, and combinations thereof may be embodied in computer executable code that, when executing on one or more computing devices, performs the steps thereof. In another aspect, the methods may be embodied in systems that perform the steps thereof and may be distributed across devices in a number of ways, or all of the functionality may be integrated into a dedicated, standalone device or other hardware. In another aspect, the means for performing the steps associated with the processes described above may include any of the hardware and/or software described above. All such permutations and combinations are intended to fall within the scope of the present disclosure.