TRANSACTION COMPLETION BASED ON GEOLOCATION ARRIVAL
First Claim
1. A computer-implemented method comprising:
- receiving, by one or more computing systems, a request for user access to a secure space that is available from a location associated with an entity, the request initiated remotely from the location and associated with a user profile, the user access to the secure space controlled at least in part by a computing device associated with the entity;
detecting, by at least one of the one or more computing systems, that a mobile device has arrived to the location;
determining, by at least one of the one or more computing systems, an association between the mobile device and the request based at least in part on the detecting that the mobile device has arrived to the location;
accessing, by at least one of the one or more computing systems, the user profile based at least in part on the association between the mobile device and the request;
generating, by at least one of the one or more computing systems, an electronic code for the request, the electronic code allowing the computing device to provide the user access to the secure space, the electronic code generated based at least in part on the user profile; and
providing, by at least one of the one or more computing systems, the electronic code to at least one of;
the mobile device or the computing device, the electronic code provided based at least in part on the association between the mobile device and the request and on the detecting that the mobile device has arrived to the location, the user access to the secure space being authorized based at least in part on the electronic code being provided.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques for providing friction-free transactions using geolocation and user identifiers are described herein. These techniques may ascertain a user'"'"'s location based on a location of a mobile device. A transaction between the user and a merchant may be completed with zero or minimal input from the user based on the geolocation of the mobile device and the user identifiers. In some implementations, a transaction initiated earlier is completed when the mobile device arrives at the merchant. Additionally, a parent-child or similar relationship may be established between multiple devices. Security on the mobile device based may be provided by biometric identification and calculation of variance from regular movement patterns. Advertisements may be sent to the mobile device based on bids from merchants near to the mobile device. Promotions may be sent to the mobile device when more than a threshold number of mobile devices are located at the same merchant.
-
Citations
20 Claims
-
1. A computer-implemented method comprising:
-
receiving, by one or more computing systems, a request for user access to a secure space that is available from a location associated with an entity, the request initiated remotely from the location and associated with a user profile, the user access to the secure space controlled at least in part by a computing device associated with the entity; detecting, by at least one of the one or more computing systems, that a mobile device has arrived to the location; determining, by at least one of the one or more computing systems, an association between the mobile device and the request based at least in part on the detecting that the mobile device has arrived to the location; accessing, by at least one of the one or more computing systems, the user profile based at least in part on the association between the mobile device and the request; generating, by at least one of the one or more computing systems, an electronic code for the request, the electronic code allowing the computing device to provide the user access to the secure space, the electronic code generated based at least in part on the user profile; and providing, by at least one of the one or more computing systems, the electronic code to at least one of;
the mobile device or the computing device, the electronic code provided based at least in part on the association between the mobile device and the request and on the detecting that the mobile device has arrived to the location, the user access to the secure space being authorized based at least in part on the electronic code being provided. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system comprising:
-
one or more processors; and one or more memories coupled with the one or more processors and comprising instructions that, upon execution by at least one of the one or more processors, cause the system to at least; receive a request for user access to a secure location associated with an entity, the request initiated remotely from the secure location, the user access to the secure location controlled at least in part by a computing device associated with the entity; detect that a mobile device has arrived to the secure location; determine an association between the mobile device and the request based at least in part on the detecting that the mobile device has arrived to the secure location; access a user profile based at least in part on the association between the mobile device and the request; generate an electronic code for the request based at least in part on the user profile, the electronic code allowing the computing device to provide the user access to the secure space; and provide the electronic code to at least one of;
the mobile device or the computing device. - View Dependent Claims (13, 14, 15, 16, 17)
-
-
18. One or more non-transitory computer-readable storage media comprising instructions that, upon execution by one or more processors of a computing system, cause the computing system to perform operations comprising:
-
receiving a request for user access to a secure location associated with an entity, the request initiated remotely from the secure location, the user access to the secure location controlled at least in part by a computing device associated with the entity; detecting that a mobile device has arrived to the secure location; determining an association between the mobile device and the request based at least in part on the detecting that the mobile device has arrived to the secure location; accessing a user profile based at least in part on the association between the mobile device and the request; generating an electronic code for the request based at least in part on the user profile, the electronic code allowing the computing device to provide the user access to the secure space; and providing the electronic code to at least one of;
the mobile device or the computing device. - View Dependent Claims (19, 20)
-
Specification