Method and system for product restocking using machine-readable codes
First Claim
1. A system comprising:
- an electronic data store configured to store authentication tickets corresponding to one or more users;
an interactive computing system comprising computer hardware in communication with the electronic data store, the interactive computing system configured to execute specific computer-executable instructions to at least;
access security credentials of a user;
validate the security credentials to determine whether the user is authorized to access a plurality of computing devices within a networked computing environment of an entity, the networked computing environment including the interactive computing system; and
responsive to successful validation of the security credentials;
generate an authentication ticket corresponding to the user, the authentication ticket comprising a substitute for authentication information used to access the plurality of computing devices;
providing the user, via the authentication ticket, with access to computing resources at a plurality of computing devices during a time period corresponding to when the user is scheduled to be within a physical environment associated with the entity, wherein the access to the computing resources at the plurality of computing devices occur without performing a second validation of the security credentials;
store a copy of the authentication ticket at the electronic data store;
encode at least a portion of the authentication ticket to obtain a machine-readable code; and
output a copy of the machine-readable code to the user, enabling the user to access the plurality of computing devices using the machine-readable code without providing the authentication information to the plurality of computing devices,wherein the interactive computing system further comprises a biometric interface that obtains biometric information from the user, and wherein validating the security credentials comprises validating the biometric information enabling each of the plurality of computing devices to use biometric verification to authenticate the user without at least some of the plurality of computing devices including a biometric interface.
0 Assignments
0 Petitions
Accused Products
Abstract
The present disclosure provides a number of systems and associated processes for using machine-readable codes to perform a transaction. Embodiments of the present disclosure provide a system and associated processes for consolidating and replacing various forms of payment (e.g. credit cards, debit cards, and cash) with a single payment system. Further, embodiments of the present disclosure provide a system and associated processes for reordering a product provided by a product provider. Moreover, embodiments of the present disclosure provide a system and associated processes for accepting a gift, or gift transaction, associated with a gift card. In addition, embodiments of the present disclosure provide a system and associated processes for performing an Automatic Teller Machine (ATM) transaction using a machine-readable code.
-
Citations
18 Claims
-
1. A system comprising:
-
an electronic data store configured to store authentication tickets corresponding to one or more users; an interactive computing system comprising computer hardware in communication with the electronic data store, the interactive computing system configured to execute specific computer-executable instructions to at least; access security credentials of a user; validate the security credentials to determine whether the user is authorized to access a plurality of computing devices within a networked computing environment of an entity, the networked computing environment including the interactive computing system; and responsive to successful validation of the security credentials; generate an authentication ticket corresponding to the user, the authentication ticket comprising a substitute for authentication information used to access the plurality of computing devices; providing the user, via the authentication ticket, with access to computing resources at a plurality of computing devices during a time period corresponding to when the user is scheduled to be within a physical environment associated with the entity, wherein the access to the computing resources at the plurality of computing devices occur without performing a second validation of the security credentials; store a copy of the authentication ticket at the electronic data store; encode at least a portion of the authentication ticket to obtain a machine-readable code; and output a copy of the machine-readable code to the user, enabling the user to access the plurality of computing devices using the machine-readable code without providing the authentication information to the plurality of computing devices, wherein the interactive computing system further comprises a biometric interface that obtains biometric information from the user, and wherein validating the security credentials comprises validating the biometric information enabling each of the plurality of computing devices to use biometric verification to authenticate the user without at least some of the plurality of computing devices including a biometric interface. - View Dependent Claims (2, 3, 4)
-
-
5. Non-transitory physical computer storage comprising computer-executable instructions that implement a method of performing network authentication, the method comprising:
-
receiving one or more security credentials of a user at a first time period; generating a security token in response to receiving the one or more security credentials, the security token configured to provide access to a plurality of computing systems within a physical environment of an entity, the security token comprising a substitute for the one or more security credentials used to access the plurality of computing devices; providing the user, via the security token, with access to multiple computing sessions with at least one of the plurality of computing devices during a particular time period without requesting the one or more security credentials during a second time period; encoding the security token to produce a machine-readable code; and providing the machine-readable code to the user, thereby enabling the user to obtain access to the plurality of computing systems, wherein at least one of the one or more security credentials comprise biometric information obtained from the user enabling the at least one of the plurality of computing devices to use biometric verification to authenticate the user without including a biometric interface. - View Dependent Claims (6, 7, 8, 9, 10)
-
-
11. A computer-implemented method comprising:
as implemented by one or more computing devices configured with specific computer-executable instructions, receiving security credentials of a user; validating the security credentials to determine whether the user is authorized to access a computing device within a location of an entity; and responsive to determining that the user is authorized to access the computing device, generating an authentication token associated with the user, the authentication token comprising a substitute for at least some of the security credentials; providing the user, via the authentication token, with access to computing resources at a second computing device without validating the security credentials a second time during a particular time period associated with a shift of the user at the location of the entity; storing a copy of the authentication token at an authentication system; encoding at least a portion of the authentication token to obtain a machine-readable code; and providing the user with access to a copy of the machine-readable code, wherein validating the security credentials comprises validating biometric information obtained from the user enabling the second computing device to use biometric verification to authenticate the user without including a biometric interface. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
Specification