TECHNIQUES FOR CUSTOMER IDENTIFICATION WITH AUTOMATED TRANSACTIONS
First Claim
1. A processor-implemented method programmed in a non-transitory processor-readable medium and to execute on one or more processors of a server configured to execute the method, comprising:
- receiving, at the server, an app request for a mobile app;
delivering, from the server, the mobile app, the mobile app delivered to a mobile device;
obtaining, at the server, a registration request, the registration request sent from the mobile app on the mobile device;
registering, at the server, a consumer;
generating, at the server, a token that uniquely identifies the consumer and/or the mobile device; and
sending, from the server, the token, the token delivered to the mobile app and retained on the mobile device for delivery to an enterprise terminal device as part of an automated mobile transaction performed with the mobile device.
4 Assignments
0 Petitions
Accused Products
Abstract
Techniques for customer identification with automated transactions are provided. A mobile app is downloaded to a customer'"'"'s mobile device. The mobile app directs the customer to enroll for mobile transaction processing with a remote service. After enrollment, a unique barcode, token, or encoded string is pushed to the device. The mobile app securely retains the barcode, token, or encoded string on the device and when the customer subsequently uses the device to engage in automated transaction processing, the mobile app presents the barcode, token, or encoded string to initially and automatically identify customer and/or the customer'"'"'s device for a transaction.
115 Citations
20 Claims
-
1. A processor-implemented method programmed in a non-transitory processor-readable medium and to execute on one or more processors of a server configured to execute the method, comprising:
-
receiving, at the server, an app request for a mobile app; delivering, from the server, the mobile app, the mobile app delivered to a mobile device; obtaining, at the server, a registration request, the registration request sent from the mobile app on the mobile device; registering, at the server, a consumer; generating, at the server, a token that uniquely identifies the consumer and/or the mobile device; and sending, from the server, the token, the token delivered to the mobile app and retained on the mobile device for delivery to an enterprise terminal device as part of an automated mobile transaction performed with the mobile device. - View Dependent Claims (2, 3, 4, 6, 7, 8, 9, 10)
-
-
5. The method of dam 1, wherein receiving further includes receiving the request from the consumer utilizing an interface of the enterprise terminal device.
-
11. A processor-implemented method programmed in a non-transitory processor-readable medium and to execute on one or more processors of a mobile device configured to execute the method, comprising:
-
requesting, from the mobile device, a registration with an enrollment service when a flag value indicates the registration is incomplete; confirming, at the mobile device, success of the registration; obtaining, at the mobile device, a token from the enrollment service that uniquely identifies a consumer associated with the mobile device when the registration is being processed a first time; securely, at the mobile device, storing the token on the mobile device when the registration is being processed the first time; and delivering, from the mobile device, the token to an enterprise terminal device at a start of an automated mobile transaction to identify the consumer for an enterprise associated with the automated mobile transaction. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. A processor-implemented method programmed in a non-transitory processor-readable medium and to execute on one or more processors of an enterprise terminal device configured to execute the method, comprising:
-
obtaining, via the enterprise terminal device, a token, the token automatically obtained from a mobile device of a consumer, the mobile device communicating with the enterprise terminal device; identifying, at the enterprise terminal device, the consumer via the token; authenticating, at the enterprise terminal device, the consumer based on a policy; accessing, at the enterprise terminal device, consumer information for the consumer based on successful authentication; and transacting, at the enterprise terminal device, with the consumer using the consumer information via the mobile device of the consumer. - View Dependent Claims (18, 19, 20)
-
Specification