SYSTEMS AND METHODS FOR TRANSACTION AUTHENTICATION USING DYNAMIC WIRELESS BEACON DEVICES
First Claim
1. A system, comprising:
- a service provider device, comprising;
a processor; and
memory storing instructions configured to cause the processor in the service provider device to perform a method comprising;
generating and storing a first identifier;
sending, over a network, the first identifier to a wireless beacon device associated with a transaction device, the beacon device configured to broadcast a wireless signal correlated to the first identifier;
receiving, from a user device or the transaction device over the network, a transaction request comprising a proposed identifier and information related to a transaction;
determining whether there is a match between the first identifier and the proposed identifier; and
based on determining that there is a match between the first identifier and the proposed identifier, authorizing the transaction request; and
a wireless beacon device, comprising;
a network adapter;
a processor; and
memory storing a permanent identifier, a temporary identifier, and instructions, the instructions configured to cause the processor in the wireless beacon device to perform a method comprising;
receiving, using the network adapter, an identifier;
overwriting the temporary identifier in memory using the received identifier; and
wirelessly broadcasting the temporary identifier and the permanent identifier stored in the memory,wherein the steps of receiving and broadcasting are performed using two different network adapters.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems, methods, and computer-readable media are provided for authenticating transactions. An example first method includes steps performed by a server, comprising generating and storing a first identifier and sending the first identifier to a wireless beacon device associated with a transaction device over a network, receiving a transaction request comprising a proposed identifier and information related to a transaction, determining whether there is a match between the first identifier and the proposed identifier, and, based on a determination that there is a match, authorizing the transaction. An example second method includes steps performed by a user device, comprising displaying a user interface requesting information related to the transaction and receiving input comprising the information, polling, by the user device, for one or more wireless beacon devices and determining one or more identifiers associated with the wireless beacon devices, transmitting the one or more identifiers to a service provider device, and receiving information authorizing or declining the transaction.
50 Citations
16 Claims
-
1. A system, comprising:
-
a service provider device, comprising; a processor; and memory storing instructions configured to cause the processor in the service provider device to perform a method comprising; generating and storing a first identifier; sending, over a network, the first identifier to a wireless beacon device associated with a transaction device, the beacon device configured to broadcast a wireless signal correlated to the first identifier; receiving, from a user device or the transaction device over the network, a transaction request comprising a proposed identifier and information related to a transaction; determining whether there is a match between the first identifier and the proposed identifier; and based on determining that there is a match between the first identifier and the proposed identifier, authorizing the transaction request; and a wireless beacon device, comprising; a network adapter; a processor; and memory storing a permanent identifier, a temporary identifier, and instructions, the instructions configured to cause the processor in the wireless beacon device to perform a method comprising; receiving, using the network adapter, an identifier; overwriting the temporary identifier in memory using the received identifier; and wirelessly broadcasting the temporary identifier and the permanent identifier stored in the memory, wherein the steps of receiving and broadcasting are performed using two different network adapters. - View Dependent Claims (2, 3, 4)
-
-
5. A method for authenticating a transaction performed at a transaction device, the method comprising steps performed by at least one processor at a server, the method comprising:
-
generating and storing a first identifier; sending, over a network, the first identifier to a wireless beacon device associated with a transaction device, the wireless beacon device configured to broadcast a wireless signal correlated to the first identifier; receiving, from a user device or the transaction device over the network, a transaction request comprising a proposed identifier and information related to a transaction; determining whether there is a match between the first identifier and the proposed identifier; and based on determining that there is a match between the first identifier and the proposed identifier, authorizing the transaction request. - View Dependent Claims (6, 7, 8)
-
-
9. A method for authenticating a transaction performed at a user device and a transaction device, the method comprising steps performed by at least one processor at the user device, the method comprising
displaying a user interface on the user device requesting information related to the transaction; -
receiving input comprising the information related to the transaction; polling for one or more beacon devices in proximity to the user device; determining one or more identifiers emitted by the wireless beacon devices; transmitting the one or more identifiers to a service provider device; and receiving information authorizing or declining the transaction. - View Dependent Claims (10, 11, 12)
-
-
13. A user device, comprising:
-
a display; a processor; and memory storing instructions configured to cause the processor to perform a method comprising; displaying a user interface on the display requesting information related to the transaction; receiving input comprising the information related to the transaction; polling for one or more wireless beacon devices in proximity to the user device; determining one or more identifiers associated with the wireless beacon devices; transmitting the one or more identifiers to a service provider device; and receiving information authorizing or declining the transaction. - View Dependent Claims (14, 15, 16)
-
Specification