Companies that have a service component are often looking for ways to improve the experience that customers have when interacting with the company or its representatives, associates, and the like. Given the hectic schedules of people these days, it is important to provide efficient and effective customer service or assistance. Accordingly, any aspects of customer service processes or transactions that can be handled in advance (e.g., prior to the user initiating the transaction) or automatically, may simplify the transactions or streamline various processes.
Aspects of the disclosure relate to various systems, methods, apparatuses, and computer-readable media configured to use proximity positioning systems to determine a location of a user, identify the user and provide additional services and/or functionality based on the determined location and/or identity. In some examples, a signal may be received or detected. The signal may be a low-power radio signal detectable within a predefined proximity and emitted from a location beacon. The signal may, in some examples, be detected by a personal computing device of a user. The location of the beacon, and the device detecting the signal, may be determined (e.g., based on previously stored location information associated with the beacon). The location information, as well as a unique identifier associated with the personal computing device of the user, may be used to identify a user associated with the personal computing device and the location of the user. This information may be used to provide additional services and/or functionality to the user.
For instance, in some arrangements, based on the determined location of a personal computing device and an identity of a user associated with the personal computing device, the system may request authentication information from the user. The authentication information may be used with, for example, the determined location and identity, to authorize (or pre-authorize) a user to conduct one or more transactions or types of transactions. The request for authentication information may be transmitted to the personal computing device and the user may provide the authentication information via the personal computing device. If the received authentication information matches pre-stored authentication information, the user may be authenticated and/or authorized to conduct one or more transactions or types of transactions.
These features, along with many others, are discussed in greater detail below.
The present disclosure is illustrated by way of example and not limited in the accompanying figures in which like reference numerals indicate similar elements and in which:
In the following description of various illustrative embodiments, reference is made to the accompanying drawings, which form a part hereof, and in which is shown, by way of illustration, various embodiments in which aspects of the disclosure may be practiced. It is to be understood that other embodiments may be utilized, and structural and functional modifications may be made, without departing from the scope of the present disclosure.
It is noted that various connections between elements are discussed in the following description. It is noted that these connections are general and, unless specified otherwise, may be direct or indirect, wired or wireless, and that the specification is not intended to be limiting in this respect.
Computing system environment 100 may include computing device 101 having processor 103 for controlling overall operation of computing device 101 and its associated components, including random-access memory (RAM) 105, read-only memory (ROM) 107, communications module 109, and memory 115. Computing device 101 may include a variety of computer readable media. Computer readable media may be any available media that may be accessed by computing device 101, may be non-transitory, and may include volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, object code, data structures, program modules, or other data. Examples of computer readable media may include random access memory (RAM), read only memory (ROM), electronically erasable programmable read only memory (EEPROM), flash memory or other memory technology, compact disk read-only memory (CD-ROM), digital versatile disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to store the desired information and that can be accessed by computing device 101.
Although not required, various aspects described herein may be embodied as a method, a data processing system, or as a computer-readable medium storing computer-executable instructions. For example, a computer-readable medium storing instructions to cause a processor to perform steps of a method in accordance with aspects of the disclosed embodiments is contemplated. For example, aspects of the method steps disclosed herein may be executed on a processor on computing device 101. Such a processor may execute computer-executable instructions stored on a computer-readable medium.
Software may be stored within memory 115 and/or storage to provide instructions to processor 103 for enabling computing device 101 to perform various functions. For example, memory 115 may store software used by computing device 101, such as operating system 117, application programs 119, and associated database 121. Also, some or all of the computer executable instructions for computing device 101 may be embodied in hardware or firmware. Although not shown, RAM 105 may include one or more applications representing the application data stored in RAM 105 while computing device 101 is on and corresponding software applications (e.g., software tasks), are running on computing device 101.
Communications module 109 may include a microphone, keypad, touch screen, and/or stylus through which a user of computing device 101 may provide input, and may also include one or more of a speaker for providing audio output and a video display device for providing textual, audiovisual and/or graphical output. Computing system environment 100 may also include optical scanners (not shown). Exemplary usages include scanning and converting paper documents, e.g., correspondence, receipts, and the like, to digital files.
Computing device 101 may operate in a networked environment supporting connections to one or more remote computing devices, such as computing devices 141, 151, and 161. Computing devices 141, 151, and 161 may be personal computing devices or servers that include any or all of the elements described above relative to computing device 101. Computing device 161 may be a mobile device (e.g., smart phone) communicating over wireless carrier channel 171.
The network connections depicted in
The disclosure is operational with numerous other general purpose or special purpose computing system environments or configurations. Examples of well-known computing systems, environments, and/or configurations that may be suitable for use with the disclosed embodiments include, but are not limited to, personal computers (PCs), server computers, hand-held or laptop devices, smart phones, multiprocessor systems, microprocessor-based systems, set top boxes, programmable consumer electronics, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like.
Computer network 203 may be any suitable computer network including the Internet, an intranet, a wide-area network (WAN), a local-area network (LAN), a wireless network, a digital subscriber line (DSL) network, a frame relay network, an asynchronous transfer mode (ATM) network, a virtual private network (VPN), or any combination of any of the same. Communications links 202 and 205 may be any communications links suitable for communicating between workstations 201 and server 204, such as network links, dial-up links, wireless links, hard-wired links, as well as network types developed in the future, and the like.
Computing environment 300 also may include one or more location beacons, such as location beacon 314, location beacon 316, and location beacon 318. Each location beacon (e.g., location beacon 314, location beacon 316, and location beacon 318) may be configured to transmit one or more radio signals that may be detected and/or received by other devices located in close proximity of and/or otherwise within a predetermined distance of the particular location beacon. In one or more embodiments, any and/or all of the location beacons included in computing environment 300 (e.g., location beacon 314, location beacon 316, and location beacon 318) may implement Bluetooth Low Energy (also referred to as “Bluetooth LE,” “Bluetooth Smart,” or “BLE”) technology to transmit low-power radio signals. The particular signal(s) transmitted by a particular location beacon may include one or more attributes, such as a unique identifier assigned to and/or otherwise associated with the particular location beacon, that may enable the particular location beacon to be identified by a device receiving the particular signal(s) transmitted by the particular location beacon. As illustrated below, by detecting a particular signal transmitted by a location beacon (which may, e.g., be positioned at a specific location) and subsequently identifying the location beacon transmitting the particular signal, a computing device may be able to determine that it is located at and/or near the specific location where the location beacon is positioned.
For example, in one or more arrangements discussed below, the one or more location beacons (e.g., location beacon 314, location beacon 316, and location beacon 318) may be positioned at and/or near banking center 304, and may be specifically positioned at and/or near different areas of banking center 304, such as at a welcome area, at a teller counter or window, at a waiting area, at an external alcove where an automated teller machine (ATM) is located, at an external window where drive-up services are provided, at a parking lot, and/or in one or more other distinct areas of banking center 304. In addition, each location beacon may transmit a radio signal that may be detected and/or received by other devices at banking center 304, such as customer computing device 302, which may enable such devices to determine that they are present at banking center 304 and/or located at and/or near a particular area of banking center 304.
In one or more embodiments, customer computing device 302 may include at least one processor 306, communication interface 308, and/or memory 310. A data bus may interconnect processor 306, communication interface 308, and/or memory 310. Memory 310 may include one or more program modules comprising instructions that when executed by processor 306 cause customer computing device 302 to perform one or more functions described herein. For example, memory 310 may include customer assistance client module 312, which may include instructions that when executed by processor 306 cause customer computing device 302 to perform one or more functions described herein. Communication interface 308 may include one or more wired and/or wireless communication interfaces (e.g., network interfaces, radio interfaces, or the like) that are configured to support communication between customer computing device 302 and one or more other devices and/or networks. In one or more arrangements, communication interface 308 may include at least one network interface that facilitates communication between customer computing device 302 and one or more devices and/or networks that are located remotely from banking center 304, and communication interface 308 may further include at least one radio interface that facilitates communication between and/or enables customer computing device 302 to receive wireless radio signals from one or more location beacons (e.g., location beacon 314, location beacon 316, and location beacon 318) and/or other radio transmitters that may be located at and/or near banking center 304.
Computing environment 300 also may include one or more computing platforms. For example, computing environment 300 may include customer assistance computing platform 324. Customer assistance computing platform 324 may include one or more computing devices configured to perform one or more of the functions described herein. For example, customer assistance computing platform 324 may include one or more computers (e.g., laptop computers, desktop computers, servers, server blades, or the like).
Computing environment 300 also may include one or more networks, which may interconnect customer computing device 302, customer assistance computing platform 324, and/or one or more other computing devices. For example, computing environment 300 may include private network 320 and public network 322. Private network 320 and/or public network 322 may include one or more sub-networks (e.g., LANs, WANs, or the like). Private network 320 may be associated with a particular organization (e.g., a corporation, financial institution, educational institution, governmental institution, or the like) and may interconnect one or more computing devices associated with the organization. For example, customer assistance computing platform 324 may be associated with an organization, such as the financial institution that operates, controls, and/or is otherwise associated with banking center 304, and private network 320 may be operated by and/or otherwise associated with the organization, and may include one or more networks (e.g., LANs, WANs, VPNs, or the like) that interconnect customer assistance computing platform 324 and one or more other computing devices associated with the organization. Public network 322 may connect private network 320 and/or one or more computing devices connected thereto (e.g., customer assistance computing platform 324) with one or more networks and/or computing devices that are not associated with the organization. For example, customer computing device 302 might not be associated with the organization that operates and/or is associated with private network 320, and public network 322 may include one or more networks (e.g., the Internet) that connect customer computing device 302 to private network 320 and/or one or more computing devices connected thereto (e.g., customer assistance computing platform 324).
Customer assistance computing platform 324 may include at least one processor 326, communication interface 328, and/or memory 330. Memory 330 may include one or more program modules comprising instructions that when executed by processor 326 cause customer assistance computing platform 324 to perform one or more functions described herein. For example, memory 330 may include customer assistance server module 332, which may include instructions that when executed by processor 326 cause customer assistance computing platform 324 to perform one or more functions described herein. Communication interface 328 may include one or more wired and/or wireless communication interfaces (e.g., network interfaces, radio interfaces, or the like) that are configured to support communication between customer assistance computing platform 324 and one or more other devices and/or networks. For example, communication interface 328 may include at least one network interface that facilitates communication between customer assistance computing platform 324 and one or more other devices and/or networks (e.g., private network 320, public network 322, customer computing device 302, and/or other devices and networks).
Further, some aspects of the location determination and user identification system 400 may be contained in one or more computing devices, servers, or the like. For instance, the location determination and user identification system 400 may include one or more modules that may be implemented in hardware and/or software configured to perform various functions within the system 400. One or more modules may be contained within the same physical device or may be housed in separate devices. Further, although one or more modules may be shown in
Location determination and user identification system 400 may include a beacon detection module 404. The beacon detection module 404 may be implemented in hardware and/or software and may be configured to perform various functions within the system 400. For instance, the beacon detection module 404 may be configured to detect and/or receive a signal associated with one or more beacons, such as location beacons 314, 316, 318 in
The beacon detection module 404 may receive a signal emitted from one or more location beacons and may determine a location of the beacon and/or a personal computing device associated with a user that is within a predefined proximity of one or more location beacons. For instance, if a personal computing device, such as one of devices 412a-412d is in a location that is within a predefined proximity of one or more location beacons emitting a signal, the personal computing device 412a-412d (e.g., via the beacon detection module 404) may detect the signal and determine, such as from the received signal, a location of the beacon and/or a location of the device. In some examples, an application on the personal computing device 412a-412d may be used to detect the signal from the beacon and/or determine a location of the beacon and/or personal computing device 412a-412d.
The signal received from the beacon and/or data associated with the signal (such as location data) may be transmitted to a device data module 406. The device data module 406 may be implemented in hardware and/or software configured to perform various functions within the system. For instance, the device data module 406 may receive the signal from the beacon or data associated therewith from the beacon detection module 404 and may determine a unique identifier associated with the personal computing device 412a-412d associated with the beacon detection module 404 that detected the beacon. That is, the device data module 406 may determine a unique identifier, such as a phone number associated with a smart phone 412a, an international mobile station equipment identity (IMEI), or other unique identifier associated with the personal computing device within the predefined proximity of the beacon.
The signal from the beacon detection module 404 and/or the device identifier from the device data module 406 may be transmitted to a user data module 404. In some examples, the user data module 408 may be located remotely from the beacon detection module 404 and/or the device data module 406. For instance, the user data module 408 may be located in, for example, a back office of a financial institution. The user data module 408 may be implemented in hardware and/or software configured to perform various functions within the system 400. For instance, the user data module 408 may receive data from the beacon detection module 404 associated with a location of the beacon and/or a location of the personal computing device detecting the beacon signal. The user data module 408 may also receive the unique identifier retrieved from the device data module 406 to determine a user associated with the device and, therefore, a location of the user associated with the device based on the location of the device.
In some arrangements, a user may register with the system 400. Registration with the system 400 may include registering a unique identifier associated with one or more personal computing devices of the user (e.g., via user input, system detection of the personal computing device, or the like). Registration with the system 400 may also include providing identifying information associated with the user. For instance, a name, address, phone number, online or mobile banking user identification, and the like, may be provided in registering with the system. In some examples, the system 400 may obtain registration information directly from the user (e.g., via an online or other direct registration process). Additionally or alternatively, the system 400 may obtain some or all of the registration information from information a user provided to an online banking application, mobile banking application, or the like.
In some arrangements, the registration information may be stored in the user data module 408. Accordingly, upon receiving information associated with a beacon signal and/or a unique identifier associated with a personal computing device, the user data module 408 may determine or identify a user associated with the personal computing device. Thus, the fact that the device associated with the user has detected a beacon signal indicates that the device is (at least likely) within a predefined proximity of the beacon and, thus, the user is also (at least likely) within the same proximity of the beacon. If the beacon is located within a particular location, such as a branch or banking center of a financial institution, this information may be used to determine when a user is within the branch and provide additional services, functionality, etc. to the user based on the identification of the user and determination of the location of the user based on the determined location of the personal computing device associated with the user.
One example of an additional service or functionality that may be provided based on the determined identification and location of the user may be to permit the user to provide additional authenticating information via the personal computing device detecting the beacon signal in order to provide a more efficient experience for the user. For instance, a user may enter a banking center and a signal emitted by a location beacon within the banking center may be detected by the user's personal computing device. Accordingly, the system may identify the user (as discussed herein) and may request authenticating information from the user. The authenticating information may include a personal identification number (PIN) of the user, password, biometric data, response to predefined security questions, or the like. The authentication of the user via the personal computing device may reduce or eliminate the need for the user to provide additional identification or authentication in order to conduct transactions. For instance, if the user was attempting to make a withdrawal, in a conventional system, the user may be required to show photo identification. However, by authenticating the user via the personal computing device associated with the user, the user may complete the withdrawal without providing any additional identification and/or authentication (e.g., photo identification). These and various other examples will be discussed more fully below.
The location determination and user identification system 400 may include an authentication module 410. The authentication module 410 may be implemented in hardware and/or software configured to perform various functions within the system. For instance, the authentication module 410 may receive information (such as from user data module 408, device data module 406, or the like) associated with an identity of a user having a physical presence at a location. For instance, the user may be determined to be at or near a particular location (e.g., based on the user's personal computing device detecting a signal from a location beacon). The information may include the identity of the user and may prompt the authentication module 410 to generate a request for authentication information from the user. The request may be transmitted to the personal computing device 412 detecting the signal from the location beacon. The requested authentication information may include a PIN of the user, password associated with the user, biometric data of the user, such as a fingerprint, thumb print, retinal scan, or the like, response to predefined security questions (e.g., mother's maiden name, what street did you grow up on, or the like), or the like.
In response to the request for authentication information, the user may provide the requested authentication information to the system, e.g., via the personal computing device 412. For instance, the user may input the requested information, such as a PIN, password, response to security question, biometric data, or the like, via the personal computing device 412. The authentication module 410 may then determine whether the received authentication information matches authentication information in the system (e.g., response to predefined security questions matches preset answer, biometric data matches, password or PIN is correct, and the like). If so, the user is authenticated and may be authorized to conduct one or more transactions, or types of transactions, without requiring any additional user identification or authentication.
In some examples, the user may be prompted for authentication information upon or after initiating a transaction. Accordingly, the authentication may be used to authenticate the user for the initiated transaction and, accordingly, if the user is authenticated, the user may be authorized to complete the transaction and, in some examples, may do so without presenting additional identifying or authenticating information.
In other examples, the user may be authenticated (e.g., the request for authentication information may be transmitted to the user) upon the user's personal computing device detecting the beacon signal, the user being identified, or the like. Accordingly, the authentication might not be related to a particular transaction, but generally to a variety of transactions or types of transactions. Accordingly, the system 400 may include a transaction type module 414 that may identify one or more transactions, or types of transactions, that the user may conduct without requiring additional identification or authentication, and/or one or more transactions, or types of transactions, that may still require additional identification or authentication.
For instance, the transaction type module 414 may identify one or more thresholds for transactions, such that if the transaction or type of transaction is at or above the threshold, additional information may be required and, if not, no additional information is required. For example, the transaction type module 414 may determine that any withdrawals greater than $1000 may require additional information. In other examples, the limit may be higher (e.g., $5000, $10,000, or the like).
In some examples, certain types of transactions may be identified by the transaction type module 414 as not requiring additional information, while other types of transactions may require additional information. For instance, some example transactions that might not require additional identification or authentication information may include a deposit, a low dollar amount withdrawal, a payment on a loan or mortgage, requesting a small dollar amount loan (e.g., below a certain threshold), and the like.
Some example transactions that may require or cause a banking associated to request additional identification and/or authentication information may include, requesting an additional credit or debit card associated with an account, requesting a credit increase, opening an account, applying for a loan or mortgage, and the like.
Various other types of transactions may be identified by the transaction type module 414 without departing from the invention.
Accordingly, the transaction type module 414 may, in some examples, identify a first plurality of transactions or types transactions that may be completed or conducted without requiring additional identification or authentication information, as well as a second plurality of transactions or types of transactions that may require, or cause the banking associate to request, additional identification and/or authentication information. In some examples, the first plurality and second plurality may each be a subset of a larger plurality of transactions or types of transactions available to a user. Additionally or alternatively, the first plurality and second plurality together may constitute all transactions available to a user (e.g., each available transaction will be associated with one of the first plurality or second plurality).
In some examples, the threshold or types of transactions associated with each category (e.g., those that may not require additional information vs. those that may require additional information) may be customized based on the user. For instance, if the user has a balance in accounts associated with a financial institution at or above a certain threshold, then the user may be able to conduct additional, greater dollar value, or the like, transactions without requiring additional identification and/or authentication information.
Authentication of the user, as well as the transactions or types of transactions which the user is authorized to conduct without additional identification and/or authentication information, may be transmitted to the user (e.g., via a notification to the personal computing device 412) as well as to the financial institution or banking center (e.g., to a computer terminal of one or more banking associates who may be assisting the user).
The location determination and user identification system 400 may further include a new user module 416. The new user module 416 may be implemented in hardware and/or software and may be configured to perform various functions within the system 400. For instance, the new user module 416 may be used to provide additional functionality to users who have a personal computing device in proximity to a location beacon, and thus detecting a signal from the beacon, but who either are not customers of the entity (e.g., financial institution) at which the location beacon is located, or are not registered with the system and, thus, are not prompted for authentication information.
In some arrangements, the user data module 408 may be unable to identify a user associated with a personal computing device 412 detecting a signal from a location beacon within a predefined proximity of the personal computing device 412. This may indicate that the user associated with the personal computing device 412 has not registered with the system or is not associated with (e.g., not a customer of) the financial institution at which the location beacon is located. Accordingly, this information may be transmitted to the new user module 416 to generate additional offers, and the like, to transmit to the user (e.g., to the personal computing device 412 of the user).
For instance, the new user module 416 may generate an offer to the identified new user to download an application (e.g., to the personal computing device) that may be used to provide additional functionality. In another example, the new user module 416 may generate and transmit an offer to the personal computing device offering to register the user with the location determination and user identification system 400 so that, the next time the user is at that particular location (e.g., based on the personal computing device 412 of the new user detecting the signal from the location beacon) the user may be prompted to submit authentication information and may be authorized to conduct one or more transactions without requiring additional identification or authentication. In some examples, registration with the system may be performed by user who are associated with the financial institution or other entity at which the location beacon is arranged (e.g., customer of the bank) or with users who are not associated with the financial institution (e.g., do not have any accounts there, or the like) but who may conduct one or more transactions at that bank (e.g., use the ATM, cash a check, or the like). Thus, registration with the location determination and user identification system 400 may be performed by users who are customers of the bank, as well as those who are not customers of the bank.
Additionally or alternatively, the new user module 416 may also generate and transmit one or more offers to the personal computing device associated with services provided by the financial institution. For instance, a new user may be unfamiliar with one or more products or services offered so the new user module 416 may generate and transmit an offer to the user to open a new account, transfer a balance, such as a credit card balance, apply for a loan, and the like. Additional advertisements or offers may be provided to the new user without departing from the invention.
These and other arrangements will be discussed more fully below.
Referring to
At step 2, the signal emitted by the location beacon may be detected, such as by a personal computing device 412. As discussed above, the signal emitted by the location beacon may be a low-power radio signal such that detection of the signal might be possible when the personal computing device is within a predefined proximity of the beacon. Accordingly, the personal computing device must be near to the first beacon in order to detect the signal.
Based on the received signal, a location of the location beacon, and, thus, an approximate location of the personal computing device, may be determined in step 3. For instance, in some examples, the personal computing device may include an application configured to communicate with the beacon and/or receive and/or provide information associated with the beacon, location, and the like, to a system associated with an entity, such as a financial institution. Example applications may include online banking applications and/or mobile banking applications. Accordingly, the application may detect the signal associated with the beacon and determine a location of the beacon (and thus an approximate location of the personal computing device). Determining the location of the location beacon may be based on records stored on the personal computing device, or accessible via the online banking application or mobile banking application, identifying locations of beacons. For instance, the location of beacons in each branch of the financial institution may be accessible via the online banking application or mobile banking application.
Although the example above includes identifying the location of the location beacon and/or the personal computing device by the personal computing device (or application associated therewith), in some arrangements, the signal or data associated with the signal, may be transmitted from the personal computing device to another computing device or server in order to identify the location. For instance, the signal or data associated therewith may be transmitted (in some examples, from the personal computing device) to a server at a back office of a financial institution, such as customer assistance computing platform 324 in
At step 4, the determined location of the location beacon may be transmitted, for instance to a device data module 406, to retrieve device identifying information in step 5. As discussed above, device identifying information may include IMEI of the device, and the like.
Referring to
At step 8, the user identification information may be transmitted to an authentication module 410. At step 9, the determined location information may also be transmitted to the authentication module 410. Accordingly, the authentication module 410 may recognize that the user is in a particular location (e.g., has a physical presence at a particular location based on detection of the beacon signal by the personal computing device) and may, in step 10, generate a request for authentication information of the user. As discussed herein, the authentication information may be used to authenticate a user and authorize the user to conduct one or more transactions or types of transactions and may, in some examples, be based on the identified location of the user and identity of the user.
With reference to
In step 15, the user may be authenticated, such as by the authenticating module. With reference to
In step 18, a notification of the authentication and/or the types of transactions available without providing additional identification and/or authentication may be transmitted to the personal computing device 412. In step 19, the transmitted information, or a portion thereof, may be displayed to the user. For instance, the personal computing device may display an indication that the user has been authorized to conduct some transactions or types of transactions. Additionally or alternatively, the display may include some examples of transactions that may be conducted without the user providing additional identification and/or authentication information.
Various additional steps may be provided in this or other event sequences without departing from the invention. For instance, steps associated with identifying the user as a new user, providing a request to register, and the like, as discussed herein, may be provided in this or other event sequences without departing from the invention.
In step 604, a user associated with the personal computing device may be identified. As discussed above, the user may be identified based on the unique identifier associated with the personal computing device, registration records or information, online or mobile banking information provided, or the like.
In step 606, authentication information may be requested from the user. In some examples, the request for authentication information may be automatically transmitted to the user upon determining the location and identity of the user. Accordingly, many types of transaction may be preauthorized if the user is authenticated, thereby providing a more efficient experience for the user (e.g., no need to provide additional information which may streamline transactions and take less time). The request for authentication information may be transmitted to the personal computing device of the user and may include one or more of a PIN of the user, password of the user, biometric data of the user, answer to one or more predefined security questions of the user, and the like. The user may input the requested authentication information and, in step 608, a determination may be made as to whether the received requested authentication information matches pre-stored information associated with the user.
For instance, the received authentication information may be compared to information stored on the system (e.g., via the authentication module 410 in
If, in step 608, the received authentication information matches the stored information, in step 610 a determination may be made as to whether a transaction being conducted is above a transaction threshold. For instance, if the transaction is above a certain dollar amount and/or the type of transaction is one that may require additional information, then, in step 614, additional information may be requested from the user. The additional information may include identification and/or authentication information, such as a photo identification, signature, or the like. In step 616, a determination may be made as to whether the received additional information matches prestored information (e.g., signature matches, photo on identification matches photo in records). If so, the transaction may be authorized in step 612. If not, the process may end and/or the transaction may be denied.
If, in step 610, the transaction is not above the threshold (e.g., is at or below the threshold), then the transaction may be authorized in step 612. For instance, if the transaction is a low dollar amount, is a type that does not require additional information, or the like, the transaction may be authorized without requiring any additional information from the user. That is, the determined location of the user, coupled with the authentication information provided by the user, may be sufficient to authenticate the user.
If, in step 608, the received authentication information does not match the stored records of the user, additional information may be requested from the user in step 614. Similar to the arrangement above, the requested additional information may include a photo identification, signature, or the like. If, in step 616, the received additional information matches records, the transaction may be authorized in step 612. If not, the transaction may be denied and/or the process may end.
In step 704, a user associated with the personal computing device may be identified. As discussed above, the user may be identified based on the unique identifier associated with the personal computing device, registration records or information, online or mobile banking information provided, or the like. In step 706, a determination may be made as to whether the user is associated with the entity. For instance, a determination may be made as to whether the user is a customer of the entity, such as a financial institution, whether the user has one or more accounts at the financial institution, whether the user is registered with the location determination and user identification system, and the like.
If, in step 706, the user is associated with the entity, authenticating information may be requested from the user in step 708. In step 710, a determination may be made as to whether the authenticating information matches records associated with the user. If so, the transaction may be authorized and, if not, the process may end (or additional information may be requested, as discussed above).
If, in step 706, it is determined that the user is not associated with the entity or is not a registered user of the system (e.g., in step 704 no user identity information is found or identified), then in step 714, the user may be identified or flagged as a new user (e.g., a user not registered with the system, a user that is not a customer of the bank, or the like). In step 716, one or more offers may be generated and provided to the user. For instance, the user may be prompted to register with the location determination and user identification system so that, at a subsequent detection of the user within the location, the user may be automatically authorized to conduct various transactions, as discussed herein. In another example, the user may be prompted to download an application, such as a mobile banking application, to provide additional functionality to the user. In still other examples, the user may be provided with offers to open an account, apply for a mortgage (may advertise possible interest rates), apply for a loan, and the like. Various other offers may be generated and provided to the user without departing from the invention.
The interface 800 includes field 802 in which the name of the identified user is provided. Field 804 provides the identified location of the user. For instance, field 804 may provide an identification of the branch or banking center at which the user has been determined to have a physical presence due to the presence of the personal computing device.
The interface 800 further includes a request for authentication information. In field 806, the user may select the type of authentication information to be provided. For instance, the types of authentication information may be provided via a drop down menu, or other selection option. Although interface 800 provides the user with options for the type of authentication information to provide, in some examples, the interface 800 may request a particular type of authentication information. For instance, the interface 800 may ask for the biometric data or PIN. Further, although the interface 800 includes a request for one type of authentication information, in some examples, two or more types of authentication information may be requested.
Field 808 provides an input region in which the user may provide the requested authentication information. For instance, the user may provide a PIN, fingerprint, or the like, in region 808.
Once the authentication information is provided, the system may, in some examples, automatically process the information. In other examples, the user may select “OK” option 810 to process the authentication information provided.
Interface 800 may further include an “OPT OUT” option 812. For instance, the system may automatically request authentication information in order to simplify one or more transactions being conducted by the user. However, in some arrangements, the user may prefer to provide identification and/or authentication information during the transaction, might not be conducting a transaction requiring any identification or authentication information, or the like. Accordingly, in instances in which the user desires to not authenticate via the system, the user may select “OPT OUT” option 812 and the system may cancel the authentication process. In these instances, the user may be asked to provide identification and/or authentication information during any transaction or type of transaction.
In field 908, an image of the user is provided. In some examples, the image may be stored in the system (such as in user data module 408). The image of the user may be captured when the user registers with the system, during another transaction, or at any time. The image may be provided as an additional security measure for the banking associate or teller to confirm the identity of the user, possibly without requesting additional identification and/or authentication information from the user. If the user working with the banking associate or teller is not the person shown in the image, the banking associate may stop the transaction, request additional identification or authentication information, or the like. Interface 900 further includes region 906 providing an indication that, for some transactions or types of transactions, additional identification and/or authentication information may be requested from the user.
Interface 1000 further includes an image of the user in field 1008. The image of the user may provide an additional security measure to the banking associate and may permit the banking associate to confirm the identity of the user. Interface 1000 further includes an indication in region 1006 that additional authentication information (e.g., in addition to identification information) may be requested from the user in order to conduct one or more transactions or types of transactions. For instance, the user may be requested to input a PIN, provide biometric data, provide a signature, or the like, either to or in the presence of the banking associate.
The example user interfaces shown in
Below are various example arrangements in which the location determination and user identification system may be implemented. The arrangements discussed below are merely some example arrangements and should not be viewed as limiting the disclosure in any way. Various other arrangements may be implemented or used without departing from the invention.
As discussed above, the location determination and user identification system may implement proximity positioning systems, or features associated therewith, to identify a user and determine a location of a user in order to authenticate a user. Additional services and/or functionality may then be provided to the user and/or a financial institution or other entity implementing the system, based on this information.
For example, as discussed above, a location and identity of a user may be determined, based on a personal computing device of the user detecting a signal from a location beacon. That information, coupled with received authentication information, may be used to authenticate the user in order to conduct one or more transactions or types of transactions. As discussed above, the authentication information may be requested from the user automatically upon determining the location and identity of the user, or automatically upon the user initiating a transaction. In arrangements in which the authentication information is requested responsive to a user initiating a transaction, the authentication of the user may be for the initiated transaction or, in some examples, for the initiated transaction as well as additional transactions or types of transactions, as discussed herein.
In one arrangement, a user, having a personal device with them, may enter a branch or banking center of a financial institution. Upon entering the banking center, the personal computing device of the user may detect a location beacon arranged at the banking center. Accordingly, the location of the personal device, and the user, may be determined based on the location of the location beacon. The identity of the user may be determined and a request for authentication information may be transmitted to the personal computing device. The user may then input the requested authentication information into the personal computing device and, if the information matches pre-stored authentication information, the user may be authenticated based on the determined location, determined identity, and received authentication information. The user may then be authorized to conduct various transactions or types of transactions without providing additional identification or authentication information. For instance, the user may be able to make a withdrawal from an account without providing photo identification. Instead, the authentication process described herein may be sufficient to confirm the identity of the user.
As discussed above, authentication information may include a PIN, password, biometric data, and the like. In some examples, the user may be authenticated based on detection, by a second personal computing device associated with the user, of the location beacon. For instance, if a user and his or her spouse enter a banking center with a location beacon, the personal computing device of each of the user and the spouse may detect the signal from the beacon and the system may determine the location of each personal computing device and each user associated with the personal computing devices. In some examples, the user information (e.g., stored in user data module 408) may include additional users or people associated with the user (e.g., a spouse, parent, child, or the like) and device identifying information for those people. Accordingly, if the system determines that the location of both devices is the same, and the users are identified as being related or associated with each other, that may be sufficient to authenticate a user (e.g., without requiring additional authenticating information, such as a PIN, biometric data, or the like). For instance, the system may determine that the risk of both, associated personal computing devices detecting the same location beacon without the user being physically present is low and, thus, this may serve to authenticate the user.
Further, the arrangements discussed herein may include detection of a signal by a personal computing device and transmitting the signal, or data associated therewith, to another portion of the system or another device, to determine the location of the beacon and/or device, as well as the identity of the user associated with the device. However, in some arrangements, the personal computing device may be configured to determine the location of the beacon, and thus, the location of the personal computing device, based on the received signal (e.g. by matching a signal that may be unique to the beacon with a stored list of beacons and associated locations). Some or all aspects of this arrangement may be performed by one or more applications associated with the personal computing device, such as an online or mobile banking application. The application may then determine the identity of the user (e.g., with or without accessing other devices) and may transmit user information to another device or component of the system to provide the additional functionality, as discussed herein.
The various arrangements discussed herein aid in improving customer service experiences for a user, as well as providing additional security to an entity and/or a user or customer.
One or more aspects of the disclosure may be embodied in computer-usable data or computer-executable instructions, such as in one or more program modules, executed by one or more computers or other devices to perform the operations described herein. Generally, program modules include routines, programs, objects, components, data structures, and the like that perform particular tasks or implement particular abstract data types when executed by one or more processors in a computer or other data processing device. The computer-executable instructions may be stored on a computer-readable medium such as a hard disk, optical disk, removable storage media, solid-state memory, RAM, and the like. The functionality of the program modules may be combined or distributed as desired in various embodiments. In addition, the functionality may be embodied in whole or in part in firmware or hardware equivalents, such as integrated circuits, application-specific integrated circuits (ASICs), field programmable gate arrays (FPGA), and the like. Particular data structures may be used to more effectively implement one or more aspects of the disclosure, and such data structures are contemplated to be within the scope of computer executable instructions and computer-usable data described herein.
Various aspects described herein may be embodied as a method, an apparatus, or as one or more computer-readable media storing computer-executable instructions. Accordingly, those aspects may take the form of an entirely hardware embodiment, an entirely software embodiment, an entirely firmware embodiment, or an embodiment combining software, hardware, and firmware aspects in any combination. In addition, various signals representing data or events as described herein may be transferred between a source and a destination in the form of light or electromagnetic waves traveling through signal-conducting media such as metal wires, optical fibers, or wireless transmission media (e.g., air or space). In general, the one or more computer-readable media may comprise one or more non-transitory computer-readable media.
As described herein, the various methods and acts may be operative across one or more computing servers and one or more networks. The functionality may be distributed in any manner, or may be located in a single computing device (e.g., a server, a client computer, and the like). For example, in alternative embodiments, one or more of the computing platforms discussed above may be combined into a single computing platform, and the various functions of each computing platform may be performed by the single computing platform. In such arrangements, any and/or all of the above-discussed communications between computing platforms may correspond to data being accessed, moved, modified, updated, and/or otherwise used by the single computing platform. Additionally or alternatively, one or more of the computing platforms discussed above may be implemented in one or more virtual machines that are provided by one or more physical computing devices. In such arrangements, the various functions of each computing platform may be performed by the one or more virtual machines, and any and/or all of the above-discussed communications between computing platforms may correspond to data being accessed, moved, modified, updated, and/or otherwise used by the one or more virtual machines.
Aspects of the disclosure have been described in terms of illustrative embodiments thereof. Numerous other embodiments, modifications, and variations within the scope and spirit of the appended claims will occur to persons of ordinary skill in the art from a review of this disclosure. For example, one or more of the steps depicted in the illustrative figures may be performed in other than the recited order, and one or more depicted steps may be optional in accordance with aspects of the disclosure.
Number | Name | Date | Kind |
---|---|---|---|
3808410 | Schlesinger | Apr 1974 | A |
4700295 | Katsof et al. | Oct 1987 | A |
5581630 | Bonneau, Jr. | Dec 1996 | A |
5991749 | Morrill, Jr. | Nov 1999 | A |
6513015 | Ogasawara | Jan 2003 | B2 |
6563423 | Smith | May 2003 | B2 |
6593856 | Madau | Jul 2003 | B1 |
6624739 | Stobbe | Sep 2003 | B1 |
6738628 | McCall et al. | May 2004 | B1 |
6845361 | Dowling | Jan 2005 | B1 |
7047560 | Fishman et al. | May 2006 | B2 |
7111174 | Hamid | Sep 2006 | B2 |
7149533 | Laird et al. | Dec 2006 | B2 |
7181252 | Komsi | Feb 2007 | B2 |
7466224 | Ward et al. | Dec 2008 | B2 |
7536316 | Ozer et al. | May 2009 | B2 |
7536722 | Saltz et al. | May 2009 | B1 |
7543738 | Saunders et al. | Jun 2009 | B1 |
7552800 | Puskala et al. | Jun 2009 | B2 |
7712657 | Block et al. | May 2010 | B1 |
7774076 | Skowronek | Aug 2010 | B2 |
7778855 | Holliday | Aug 2010 | B2 |
7814016 | Pranger | Oct 2010 | B2 |
7904718 | Giobbi et al. | Mar 2011 | B2 |
7911334 | Busey | Mar 2011 | B2 |
7912843 | Murdock et al. | Mar 2011 | B2 |
7962361 | Ramchandani et al. | Jun 2011 | B2 |
7969285 | Bauchot et al. | Jun 2011 | B2 |
7979899 | Guo et al. | Jul 2011 | B2 |
8009013 | Hirschfeld et al. | Aug 2011 | B1 |
8055551 | Milgramm et al. | Nov 2011 | B2 |
8073460 | Scofield et al. | Dec 2011 | B1 |
8078146 | Jayappa et al. | Dec 2011 | B2 |
8091778 | Block et al. | Jan 2012 | B1 |
8093988 | Takene et al. | Jan 2012 | B2 |
8145649 | Murdock et al. | Mar 2012 | B2 |
8186578 | Block et al. | May 2012 | B1 |
8201729 | Block et al. | Jun 2012 | B1 |
8229787 | Ramchandani et al. | Jul 2012 | B2 |
8232860 | Goel | Jul 2012 | B2 |
8259692 | Bajko | Sep 2012 | B2 |
8260707 | Treadwell et al. | Sep 2012 | B2 |
8295898 | Ashfield et al. | Oct 2012 | B2 |
8332232 | Nickerson et al. | Dec 2012 | B2 |
8350700 | Fast et al. | Jan 2013 | B2 |
8369266 | Jin et al. | Feb 2013 | B2 |
8401897 | Chatterjee | Mar 2013 | B1 |
8413209 | Aldera et al. | Apr 2013 | B2 |
8413891 | Long | Apr 2013 | B2 |
8467768 | Mahaffey et al. | Jun 2013 | B2 |
8527575 | Xiao et al. | Sep 2013 | B2 |
8543828 | Albisu | Sep 2013 | B2 |
8558759 | Prada Gomez et al. | Oct 2013 | B1 |
8583933 | Granbery | Nov 2013 | B2 |
8590028 | Saxena et al. | Nov 2013 | B2 |
8606712 | Choudhuri et al. | Dec 2013 | B2 |
8627422 | Hawkes et al. | Jan 2014 | B2 |
8640946 | Block et al. | Feb 2014 | B1 |
8666821 | Xie et al. | Mar 2014 | B2 |
8666895 | Grigg | Mar 2014 | B2 |
8671001 | Thompson et al. | Mar 2014 | B1 |
8742894 | Seydoux | Jun 2014 | B2 |
9166967 | Berkovitz et al. | Oct 2015 | B2 |
9204251 | Mendelson | Dec 2015 | B1 |
9204257 | Mendelson | Dec 2015 | B1 |
9264151 | Emigh et al. | Feb 2016 | B1 |
9265450 | Giobbi | Feb 2016 | B1 |
9317672 | Carlson | Apr 2016 | B2 |
9365393 | Salmikuukka et al. | Jun 2016 | B2 |
9367978 | Sullivan | Jun 2016 | B2 |
9380417 | Boyle et al. | Jun 2016 | B1 |
9454736 | Reuveni et al. | Sep 2016 | B2 |
9538332 | Mendelson | Jan 2017 | B1 |
20020035541 | Makino et al. | Mar 2002 | A1 |
20020128850 | Chen et al. | Sep 2002 | A1 |
20030200140 | Hars | Oct 2003 | A1 |
20030200489 | Hars | Oct 2003 | A1 |
20040093265 | Ramchandani et al. | May 2004 | A1 |
20040093268 | Ramchandani et al. | May 2004 | A1 |
20060119469 | Hirai et al. | Jun 2006 | A1 |
20060163349 | Neugebauer | Jul 2006 | A1 |
20070042748 | MacArthur | Feb 2007 | A1 |
20070127693 | D'Ambrosio et al. | Jun 2007 | A1 |
20070186258 | Dapper et al. | Aug 2007 | A1 |
20070186261 | Geile et al. | Aug 2007 | A1 |
20070192815 | Geile et al. | Aug 2007 | A1 |
20070195689 | Dapper et al. | Aug 2007 | A1 |
20070195901 | Geile et al. | Aug 2007 | A1 |
20070195902 | Geile et al. | Aug 2007 | A1 |
20070201573 | Geile et al. | Aug 2007 | A1 |
20070206693 | Geile et al. | Sep 2007 | A1 |
20070253595 | Sorensen | Nov 2007 | A1 |
20070262134 | Humphrey | Nov 2007 | A1 |
20080052151 | Xie et al. | Feb 2008 | A1 |
20080067244 | Marks | Mar 2008 | A1 |
20080097769 | Galvin et al. | Apr 2008 | A1 |
20080114697 | Black et al. | May 2008 | A1 |
20080150678 | Giobbi et al. | Jun 2008 | A1 |
20080255929 | Mouton | Oct 2008 | A1 |
20080312998 | Templeton | Dec 2008 | A1 |
20090037306 | Hill | Feb 2009 | A1 |
20090076875 | Lert, Jr. et al. | Mar 2009 | A1 |
20090241175 | Trandal et al. | Sep 2009 | A1 |
20090252318 | Smith et al. | Oct 2009 | A1 |
20090259499 | Bhojwani et al. | Oct 2009 | A1 |
20090325629 | Snyder | Dec 2009 | A1 |
20090328052 | Nguyen et al. | Dec 2009 | A1 |
20090328182 | Malakapalli et al. | Dec 2009 | A1 |
20100017874 | Piccinini et al. | Jan 2010 | A1 |
20100042541 | Kang et al. | Feb 2010 | A1 |
20100161433 | White | Jun 2010 | A1 |
20100191581 | Furin et al. | Jul 2010 | A1 |
20100198725 | Naccache | Aug 2010 | A1 |
20100205063 | Mersky | Aug 2010 | A1 |
20100277276 | Bayne et al. | Nov 2010 | A1 |
20100287250 | Carlson et al. | Nov 2010 | A1 |
20110028160 | Roeding et al. | Feb 2011 | A1 |
20110029359 | Roeding et al. | Feb 2011 | A1 |
20110029370 | Roeding et al. | Feb 2011 | A1 |
20110078279 | Grecco et al. | Mar 2011 | A1 |
20110086646 | Gupta et al. | Apr 2011 | A1 |
20110178862 | Daigle | Jul 2011 | A1 |
20110178863 | Daigle | Jul 2011 | A1 |
20110191242 | Allen | Aug 2011 | A1 |
20110202377 | Maiya et al. | Aug 2011 | A1 |
20110208657 | Rao | Aug 2011 | A1 |
20110213709 | Newman et al. | Sep 2011 | A1 |
20110223895 | Wagda et al. | Sep 2011 | A1 |
20110238499 | Blackhurst et al. | Sep 2011 | A1 |
20110246306 | Blackhurst et al. | Oct 2011 | A1 |
20110270618 | Banerjee et al. | Nov 2011 | A1 |
20110313804 | Camp et al. | Dec 2011 | A1 |
20110321031 | Dournov et al. | Dec 2011 | A1 |
20120004769 | Hallenbeck et al. | Jan 2012 | A1 |
20120047072 | Larkin | Feb 2012 | A1 |
20120070041 | Wang | Mar 2012 | A1 |
20120076183 | Dapper et al. | Mar 2012 | A1 |
20120078673 | Koke et al. | Mar 2012 | A1 |
20120078741 | DeLine | Mar 2012 | A1 |
20120116929 | Gventer et al. | May 2012 | A1 |
20120130840 | Carlier et al. | May 2012 | A1 |
20120136479 | Signorelli et al. | May 2012 | A1 |
20120143755 | Burrell | Jun 2012 | A1 |
20120158297 | Kim et al. | Jun 2012 | A1 |
20120185400 | Eubanks, Jr. et al. | Jul 2012 | A1 |
20120195184 | Dapper et al. | Aug 2012 | A1 |
20120197773 | Grigg et al. | Aug 2012 | A1 |
20120197797 | Grigg et al. | Aug 2012 | A1 |
20120197798 | Grigg et al. | Aug 2012 | A1 |
20120203892 | Pignataro et al. | Aug 2012 | A1 |
20120271692 | Huang et al. | Oct 2012 | A1 |
20120278115 | Acharya et al. | Nov 2012 | A1 |
20120278234 | Dent et al. | Nov 2012 | A1 |
20120320199 | Kundu et al. | Dec 2012 | A1 |
20120320214 | Kundu et al. | Dec 2012 | A1 |
20120321146 | Kundu et al. | Dec 2012 | A1 |
20120323642 | Camp et al. | Dec 2012 | A1 |
20130005253 | Grigg et al. | Jan 2013 | A1 |
20130005443 | Kosta | Jan 2013 | A1 |
20130024300 | Choudhuri et al. | Jan 2013 | A1 |
20130027561 | Lee et al. | Jan 2013 | A1 |
20130030915 | Statler et al. | Jan 2013 | A1 |
20130041797 | Geeslin et al. | Feb 2013 | A1 |
20130045758 | Khorashadi et al. | Feb 2013 | A1 |
20130048724 | Burnside et al. | Feb 2013 | A1 |
20130104214 | Beck et al. | Apr 2013 | A1 |
20130121131 | Dapper et al. | May 2013 | A1 |
20130138497 | Yan et al. | May 2013 | A1 |
20130150006 | Nunally et al. | Jun 2013 | A1 |
20130159195 | Kirillin et al. | Jun 2013 | A1 |
20130165154 | Joshi | Jun 2013 | A1 |
20130173387 | Adelaar | Jul 2013 | A1 |
20130173404 | Scipioni | Jul 2013 | A1 |
20130173492 | Leavenworth et al. | Jul 2013 | A1 |
20130182114 | Zhang et al. | Jul 2013 | A1 |
20130182904 | Zhang et al. | Jul 2013 | A1 |
20130198039 | Sridharan et al. | Aug 2013 | A1 |
20130203383 | Stopel et al. | Aug 2013 | A1 |
20130203439 | Lifshitz et al. | Aug 2013 | A1 |
20130211718 | Yoo et al. | Aug 2013 | A1 |
20130217416 | Matthews, III et al. | Aug 2013 | A1 |
20130238497 | Ramachandran et al. | Sep 2013 | A1 |
20130246301 | Radhakrishnan et al. | Sep 2013 | A1 |
20130253818 | Sanders et al. | Sep 2013 | A1 |
20130261964 | Goldman et al. | Oct 2013 | A1 |
20130268378 | Yovin | Oct 2013 | A1 |
20130275163 | Kaiser | Oct 2013 | A1 |
20130281084 | Batada et al. | Oct 2013 | A1 |
20130282589 | Shoup | Oct 2013 | A1 |
20130282744 | Hartman et al. | Oct 2013 | A1 |
20130297422 | Hunter et al. | Nov 2013 | A1 |
20130300541 | Pesonen et al. | Nov 2013 | A1 |
20130310081 | Chu | Nov 2013 | A1 |
20130317778 | Gupta et al. | Nov 2013 | A1 |
20130325587 | Kothari et al. | Dec 2013 | A1 |
20130328725 | Wuoti et al. | Dec 2013 | A1 |
20130332271 | Hay | Dec 2013 | A1 |
20130332273 | Gu et al. | Dec 2013 | A1 |
20130346189 | Isaacs | Dec 2013 | A1 |
20140006219 | Wouhaybi et al. | Jan 2014 | A1 |
20140020073 | Ronda et al. | Jan 2014 | A1 |
20140032297 | Germann et al. | Jan 2014 | A1 |
20140032345 | Moore | Jan 2014 | A1 |
20140039950 | Appel et al. | Jan 2014 | A1 |
20140039951 | Appel et al. | Feb 2014 | A1 |
20140046718 | Schiller | Feb 2014 | A1 |
20140046830 | Orozco et al. | Feb 2014 | A1 |
20140058914 | Song et al. | Feb 2014 | A1 |
20140068785 | Gventer et al. | Mar 2014 | A1 |
20140074800 | Gventer et al. | Mar 2014 | A1 |
20140081858 | Block | Mar 2014 | A1 |
20140105263 | Geile | Apr 2014 | A1 |
20140110481 | Burnside et al. | Apr 2014 | A1 |
20140114877 | Montano | Apr 2014 | A1 |
20140129441 | Blanco et al. | May 2014 | A1 |
20140149293 | Laracey | May 2014 | A1 |
20140162598 | Villa-Real | Jun 2014 | A1 |
20140188733 | Granbery | Jul 2014 | A1 |
20140201025 | Adoni et al. | Jul 2014 | A1 |
20140222603 | Hay | Aug 2014 | A1 |
20140258028 | Bynum et al. | Sep 2014 | A1 |
20140270108 | Riahi et al. | Sep 2014 | A1 |
20140270109 | Riahi et al. | Sep 2014 | A1 |
20140270146 | Riahi et al. | Sep 2014 | A1 |
20140279009 | Grigg et al. | Sep 2014 | A1 |
20140279450 | Gujral | Sep 2014 | A1 |
20140280316 | Ganick et al. | Sep 2014 | A1 |
20140289032 | Muto et al. | Sep 2014 | A1 |
20140297527 | McLaughlin et al. | Oct 2014 | A1 |
20140309770 | Signorelli et al. | Oct 2014 | A1 |
20140365255 | Burgess et al. | Dec 2014 | A1 |
20140365334 | Hurewitz | Dec 2014 | A1 |
20150018011 | Mendelson | Jan 2015 | A1 |
20150051976 | Brown | Feb 2015 | A1 |
20150058159 | Balram et al. | Feb 2015 | A1 |
20150059002 | Balram et al. | Feb 2015 | A1 |
20150072618 | Granbery | Mar 2015 | A1 |
20150073980 | Griffin et al. | Mar 2015 | A1 |
20150081492 | Brereton et al. | Mar 2015 | A1 |
20150089585 | Novack | Mar 2015 | A1 |
20150126119 | Schulz et al. | May 2015 | A1 |
20150140982 | Postrel | May 2015 | A1 |
20150235161 | Azar et al. | Aug 2015 | A1 |
20150278829 | Lu et al. | Oct 2015 | A1 |
20150278888 | Lu et al. | Oct 2015 | A1 |
20150287014 | Granbery | Oct 2015 | A1 |
20150289111 | Ozkan | Oct 2015 | A1 |
20150302469 | Billou | Oct 2015 | A1 |
20150382137 | Prehn | Dec 2015 | A1 |
20160007157 | Tipton et al. | Jan 2016 | A1 |
20160277560 | Gruberman | Sep 2016 | A1 |
20160335686 | AthuluruTlrumala et al. | Nov 2016 | A1 |
20170039616 | Korra et al. | Feb 2017 | A1 |
Number | Date | Country |
---|---|---|
20090050383 | May 2009 | KR |
Entry |
---|
Co-pending U.S. Appl. No. 14/327,560. |
Co-pending U.S. Appl. No. 14/327,561. |
Co-pending U.S. Appl No. 14/327,565. |
Co-pending U.S. Appl No. 14/327,569. |
Co-pending U.S. Appl No. 14/327,847. |
Co-pending U.S. Appl No. 14/328,079. |
Sep. 19, 2016 U.S. Non-Final Office Action—U.S. Appl. No. 14/327,728. |
Jan. 31, 2017 U.S. Notice of Allowance—U.S. Appl. No. 14/327,728. |
Jun. 7, 2017 U.S. Non-Final Office Action—U.S. Appl. No. 14/327,568. |
May 12, 2017 U.S. Non-Final Office Action—U.S. Appl. No. 14/327,688. |
Swedberg, Claire, “Yes Bank Uses RFID to Personalize Service”, Oct. 13, 2008, RFID Journal, <http://www.rfidjournal.com/articles/view?4381 >, 2 pages. |
“Qmatic Orchestra,” product summary retrieved from <http://www.stech.com.pk/product/qmatic-orchestra/>, 10 pages. |
Qmatic Valuing Time Catalog (Products and Systems for Customer Flow Management, unknown date) Obtained via <http://training.us.qmatic.com/pluginfile.php/385/mod_resource/content!8/Qmatic%20Product%20Catalog.pdf>, 26 pages. |
Husmark, “4 Ways iBeacons Can Revolutionize Customer Service and Experience,” obtained via <http://lp/qmatic.com/blog/4-ways-ibeacons-can-revolut>, 5 pages. |
May 5, 2016 U.S. Non-Final Office Action—U.S. Appl. No. 14/327,767. |
Aug. 4, 2016 U.S. Non-Final Office Action—U.S. Appl. No. 14/327,843. |
Nov. 25, 2016 U.S. Final Office Action—U.S. Appl. No. 14/327,767. |
Oct. 18, 2016 U.S. Non-Final Office Action—U.S. Appl. No. 14/327,967. |
Mar. 23, 2017 U.S. Final Office Action—U.S. Appl. No. 14/327,967. |
Jun. 19, 2017 U.S. Non-Final Office Action—U.S. Appl. No. 14/327,566. |
Sep. 9, 2016 U.S. Non-Final Office Action—U.S. Appl. No. 14/327,570. |
May 8, 2017 U.S. Final Office Action—U.S. Appl. No. 14/327,570. |
May 19, 2017 U.S. Notice of Allowance—U.S. Appl. No. 15/478,586. |
Apr. 28, 2017—U.S. Notice of Allowance—U.S. Appl. No. 14/327,895. |
Nov. 18, 2016—U.S. Non-Final Office Action—U.S. Appl. No. 14/327,895. |
Aug. 5, 2016—U.S. Final Office Action—U.S. Appl. No. 14/327,895. |
May 18, 2017—U.S. Non-Final Office Action—U.S. Appl. No. 14/327,934. |
Jun. 21, 2016—U.S. Non-Final Office Action—U.S. Appl. No. 14/328,147. |
Jan. 12, 2017—U.S. Final Office Action—U.S. Appl. No. 14/328,147. |
Marous, Jim, “10 Ways iBeacon Can Improve Banking Sales & Service”, Mar. 31, 2014, The Financial Brand, retrieved from https://thefinancialbrand.com/38160/ibeacon-bank-branch-mobile-cross-selling/, 4 pages. |
Berry, John, “How to Create an In-Branch Mobile Experience”, Feb. 7, 2014, American Banker, retrieved from https://www.americanbanker.com/opinion/how-to-create-an-in-branch-mobile-experience, 3 pages. |
Howden, Ben, “How banks can innovate using Apple's iBeacon”, Feb. 23, 2014, Lighthouse.io Blog, retrieved from http://blog.lighthouse.io/banks-can-innovate-using-apples-ibeacon/, 3 pages. |
Bender, Adam, “St. George Bank pings branch customers with iBeacon”, May 13, 2014, Computerworld, retrieved from https://www.computerworld.com.au/article/621055/acma-mulls-5g-future-3-6ghz-spectrum, 2 pages. |
Foo, Fran, “St. George getting to know your iface,” May 13, 2014, The Australian, retrieved from http://www.theaustralian.com.au/business/technology/st-george-getting-to-know-your-iface/news-story/eab43c5797329c4fb70a94418416eeca, 3 pages. |
Jul. 27, 2017—U.S. Non-Final Office Action—U.S. Appl. No. 14/327,560. |
Dec. 28, 2017 U.S. Final Office Action—U.S. Appl. No. 14/327,560. |
Jun. 16, 2016 U.S. Notice of Allowance—U.S. Appl. No. 14/327,561. |
Mar. 23, 2017 U.S. Notice of Allowance—U.S. Appl. No. 14/328,079. |
Dec. 28, 2017 U.S. Final Office Action—U.S. Appl. No. 14/327,565. |
Dec. 14, 2017 U.S. Final Office Action—U.S. Appl. No. 14/327,568. |
Dec. 28, 2017—(U.S.) Final Office Action—U.S. Appl. No. 14/327,566. |
Cisco, “iBeacon—Frequently Asked Questions”, Mar. 24, 2014, Cisco Public. |
Charlton, Graham, “Five Examples of How Marketers Are Using iBeacons”, Apr. 7, 2014, Econsultancy. |
Newman, Nic, “Apple iBeacon Technology Briefing”, Jan. 17, 2014, MacMillan Publishers Ltd., Journal of Direct, Data and Marketing Practice (2014) 15, 222-225. doi:10.1057/dddmp.2014.7. |
DMI, “Beacon Technology: What's in It for Retailers”, 2014, DMI Mobile Enterprise Solutions. |
Smith, Paul, “Google Glass and Apple's iBeacon on the Way to a Bank Near You”, Feb. 4, 2014, Financial Review. |
Kar, Ian, “LevelUp Syncs With iBeacon to Connect with Customers Earlier”, Jun. 14, 2014, Bank Innovation. |
Silverman, Adam, “The Emergence of Beacons in Retail”, Mar. 12, 2014, Forrester Research, Inc. |
“iBeacon: You Can Take It to the Bank”, Mar. 1, 2014, Before It's News. |
Clancy, Heather, “Apple's iBeacon Signals Turning Point for Mobile Engagement”, Mar. 1, 2014, Fortune. |
Crosman, Penny, “Q&A with Westpac's Digital Chief on Wearable Computing, iBeacon”, Feb. 19, 2014, American Banker. |
Apple, Inc., “Getting Started with iBeacon” Verson 1.0, Jun. 2, 2014, Apple, Inc. |
Jan. 8, 2018 U.S. Non-Final Office Action—U.S. Appl. No. 14/327,767. |
Nov. 20, 2017—U.S. Final Office Action—U.S. Appl. No. 14/327,934. |
Nov. 30, 2017—U.S. Non-Final Office Action—U.S. Appl. No. 14/328,147. |
Jan. 22, 2018 U.S. Non-Final Office Action—U.S. Appl. No. 14/327,967. |
Zibreg, Christian, “Apple Releases iBeacon Specification”, Feb. 25, 2014, iDB, idownloadblog.com. |
Number | Date | Country | |
---|---|---|---|
20160012412 A1 | Jan 2016 | US |