System and method for user controlled log-in; interacting and log-out
First Claim
1. A system allowing transactional interactions comprising:
- means for determining the identity of a wireless device when said wireless device comes within a boundary determined by a host device; and
means for allowing a user of said identity-determined wireless device to conduct a plurality of transactional interactions pertaining to said host device using said wireless device while said user is within said boundary.
20 Assignments
0 Petitions
Accused Products
Abstract
A system in which a user controls the log-in, transaction, and log-out process with respect to a merchant. The user'"'"'s presence at the merchant'"'"'s facility triggers the log-in process, such that the merchant'"'"'s systems become aware of the user'"'"'s presence. Once the user is registered with the merchant, information and services become available to the user without further action required by the user. Transactions are facilitated, specials are brought to the user'"'"'s attention, personal shopping becomes available while the user remains in the facility. Upon leaving the facility, or after a certain elapsed time with a transaction being consummated, the user is logged-out of the system.
132 Citations
43 Claims
-
1. A system allowing transactional interactions comprising:
-
means for determining the identity of a wireless device when said wireless device comes within a boundary determined by a host device; and
means for allowing a user of said identity-determined wireless device to conduct a plurality of transactional interactions pertaining to said host device using said wireless device while said user is within said boundary. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. An enterprise allowing transactional interactions comprising:
-
means for determining the identity of a wireless device when said wireless device comes within a boundary determined by said enterprise; and
means for allowing a user of said identity-determined wireless device to conduct a plurality of transactional interactions pertaining to said enterprise using said wireless device while said user is within said boundary. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A system comprising:
-
a host device for allowing identified users to conduct a plurality of transactional interactions according to the profile of said user using a wireless device;
a database accessible by both said host device and said user, said database containing said user'"'"'s profile; and
means for notifying said host device that said user'"'"'s wireless device is within a certain boundary allowing said user to conduct a plurality of transactions using said wireless device in accordance with said user'"'"'s profile while said wireless device is within said boundary. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36)
-
-
37. A method comprising:
-
a user entering a predetermined boundary with a wireless device;
identifying said user when said wireless device is detected within said boundary; and
allowing said user to select and conduct at least one transactional interaction from a plurality of transactional interaction options while said wireless device is within said boundary utilizing a profile associated with said detected wireless device. - View Dependent Claims (38, 39, 40, 41, 42, 43)
-
Specification