SYSTEM AND METHOD FOR USER CONTROLLED LOG-IN; INTERACTING AND LOG-OUT

- MODIV MEDIA, INC.

A system in which a user controls the log-in, transaction, and log-out process with respect to a merchant. The user's presence at the merchant's facility triggers the log-in process, such that the merchant's systems become aware of the user's presence. Once the user is registered with the merchant, information and services become available to the user without further action required by the user. Transactions are facilitated, specials are brought to the user's attention, personal shopping becomes available while the user remains in the facility. Upon leaving the facility, or after a certain elapsed time with a transaction being consummated, the user is logged-out of the system.

Skip to: Description  ·  Claims  · Patent History  ·  Patent History

Description

RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No. 11/209,862 filed Aug. 23, 2005, which is incorporated by reference herein in its entirety. This application is related to U.S. patent application Ser. Nos. 10/646,579, filed Aug. 22, 2003, entitled “SYSTEM AND METHOD OF INTEGRATING LOYALTY/REWARD PROGRAMS WITH PAYMENT IDENTIFICATION SYSTEMS,” and 10/877,276, filed Jun. 25, 2004, entitled “SYSTEM AND METHOD FOR COORDINATING PAYMENT IDENTIFICATION SYSTEMS,” and U.S. patent application Ser. No. 11/102,544, filed Apr. 8, 2005, entitled “SYSTEM AND METHOD FOR PATRON NOTIFICATION USING THE PATRON'S WIRELESS DEVICE,” the disclosures of which are hereby incorporated herein by reference.

TECHNICAL FIELD

This invention relates to user transactional systems and more particularly to such systems and methods in which a user logs into a store or other facility, transacts business and logs out, all under control of the user.

BACKGROUND OF THE INVENTION

Shopping, particularly shopping at a physical facility, has become a way of life. In one form or another, shopping is as old as civilization itself and has not varied a great deal, other than perhaps the now extremely wide array of goods and services that are available to the shopper.

Indeed, the number of choices that a modem shopper has is sometimes overwhelming. Thus, often a shopper needs assistance with his/her purchases. This assistance relates not only to styles, but to sizes (especially for gift items) and color coordination, and extends to the financial aspect of shopping, such as credit available or credit remaining on a gift card, or the availability of coupons or other money saving promotions.

Often, a shopper will have made a mental (or physical) note of some item that the shopper wanted to buy on his/her next visit to the store, but memories (and notes written on slips of paper) being what they are the desired item is forgotten about when the user is in the store.

Thus, while PDAs and like devices have eliminated some of the “memory” issues associated with visiting a merchant's facility (whether physically or virtually), these devices are attuned only to the shopper's needs and do not match the desires of the shopper with the merchandise and services available at a particular location.

BRIEF SUMMARY OF THE INVENTION

There is disclosed a system in which a user controls the log-in, transaction, and log-out process with respect to a merchant. The user's presence at the merchant's facility triggers the log-in process, such that the merchant's systems become aware of the user's presence. Once the user is registered with the merchant, information and services become available to the user without further action required by the user. Transactions are facilitated, specials are brought to the user's attention, and personal shopping becomes available while the user remains in the facility. Upon leaving the facility, or after a certain elapsed time with a transaction being consummated, the user is logged-out of the system.

The foregoing has outlined rather broadly the features and technical advantages of the present invention in order that the detailed description of the invention that follows may be better understood. Additional features and advantages of the invention will be described hereinafter which form the subject of the claims of the invention. It should be appreciated by those skilled in the art that the conception and specific embodiment disclosed may be readily utilized as a basis for modifying or designing other structures for carrying out the same purposes of the present invention. It should also be realized by those skilled in the art that such equivalent constructions do not depart from the spirit and scope of the invention as set forth in the appended claims. The novel features which are believed to be characteristic of the invention, both as to its organization and method of operation, together with further objects and advantages will be better understood from the following description when considered in connection with the accompanying figures. It is to be expressly understood, however, that each of the figures is provided for the purpose of illustration and description only and is not intended as a definition of the limits of the present invention.

BRIEF DESCRIPTION OF THE DRAWINGS

For a more complete understanding of the present invention, reference is now made to the following descriptions taken in conjunction with the accompanying drawings, in which:

FIG. 1 shows one embodiment of the invention used with respect to a facility;

FIGS. 2A and 2B show embodiments of the invention used in different environments;

FIG. 2C shows one embodiment of a controller for use in the embodiment;

FIG. 3 shows one embodiment of a process illustrating log-in, transaction, and log-out;

FIG. 4 shows one embodiment of a process illustrating number registration; and

FIG. 5 shows one embodiment of a process illustrating user message control.

DETAILED DESCRIPTION OF THE INVENTION

FIG. 1 shows one embodiment 10 of the invention when used with respect to a facility, such as facility 100. When user 12 arrives at the facility, the user is detected, process 301 of FIG. 3, and logged into the facility. The log-in can be controlled by the user by using a mobile device, such as cell phone 14, to call a log-in number, or by having a magnetic (or near-field device) strip placed in contact with (or in proximity to) sensor 11. In some situations, the log-in can be accomplished without action being taken by the user, for example, by knowing the geographical position of the user, which may be broadcast from the user's wireless device along with the identity of the user. The wireless device would know its location by GPS or otherwise. Bluetooth, NFC, LBS, E911, or IVR technology may be used to make the user's presence known inside facility 100.

Alternatively, the user's wireless device can periodically emit a code identifying the user such that when the user is in proximity of the facility, the user is logged-in. Using such a system, when a user, such as user 13, drives past the facility along street 103, the user could be temporarily logged-in to the facility such that specials or other information, as will be discussed hereinafter, can be communicated to the user.

For example, assume that after a previous visit, the user entered into a user profile (perhaps from a home PC) a list of desired items, or perhaps the user indicated that he/she wanted to purchase an item at a given price point. In such a situation, when the user is driving by (or otherwise logged-in), the user would receive a reminder that he/she wanted to buy item X and that the item is now available at the desired price. A user also may visit a merchant's website to arrange a shopping or item list to identify what he/she may want to purchase at the merchant's store. Then, the list may be available to the user's cell phone, for example, for use when the customer nears or enters the merchant's facility.

Assume now that user 12 walks into facility 100 and sensor 11 signals his/her presence within facility 100. As shown in FIG. 3, embodiment 30, process 301, detection of the presence of user 12, causes process 303 to identify the user, and process 304 retrieves his/her user profile, for example from memory 204 of FIG. 2C. At this time a timer (process 303) is set. The identification process can be automatic, as discussed above, or could require active participation and perhaps a password, on the part of the user. The password would be important if credit or “quick” payment options are available while the user is in the facility.

The user profile accessed by process 304 can contain information about the user including, but not limited to: previous purchases, purchase characteristics, user characteristics, user preferences, receipts, discounts; payment information, identification information, monetary balances, and any other information.

Once the user's profile is retrieved, processes 308 and 309 can be used by the facility to communicate with the user. For example, the facility can notify the user of specials, available credit, the amount of money remaining on gift cards, coupons, previous on-hold or wish list items. At this point, based on the user's location in the facility, the user may learn of special offers via SMS/MMS, NFC, Bluetooth, Media, or IVR. Alternatively, the user may obtain this information by receiving an e-mail on his/her PDA or other handheld device, or the user may access the information through Internet connectivity via his/her cellular phone or handheld device. The customer also may view his/her item or shopping list, and based on the user's location, the list may be sorted to place items nearest in proximity to the user at the top of the list.

If appropriate, process 305 notifies a facility employee, such as personal shopper 15, and optionally provides the personal shopper with access to the user's profile, thereby allowing shopper 15 to view pertinent information pertaining to the shopper. This information is viewed, for example, using a wireless device, such as device 16 (FIG. 1) in the possession of shopper 15. The information supplied to the shopper can be any information, such as sizes, last purchases, birthdays, preferences, names of family members, and any other information stored in the user's profile. For security purposes, the system could limit the amount of access shopper 15 has in viewing and modifying the user's profile.

Shopper 15 also has the option of initiating a transaction with the user, process 307. For example, shopper 15 could send a list of items along with pricing and availability to the user's wireless device for consideration. Upon receipt of this list, the user could conduct the suggested transaction by, for example, purchasing the items or storing them in the user profile's wish list, process 311.

Process 309 provides the user with a plurality of transactional options while in the facility. For example, if user 12 wishes to deactivate wireless device 14 while in the store, he/she selects the deactivation option, process 310, and wireless device 14 is logged-out, process 314. Further, if the user does not desire to interact with a central server of the facility, the user may deactivate his/her wireless device accordingly.

Process 316 sets up a “quick transaction” when wireless device 14 is detected. “Quick transaction” is a process allowing user 12 to authorize payment for merchandise (or services) using wireless device 14. This authorization could be under control of the system and method discussed in the above-identified U.S. Patent Application, “SYSTEM AND METHOD FOR COORDINATING PAYMENT IDENTIFICATION SYSTEMS.” Once “quick transaction” is set up, processes 309 and 310 allow user 12 to select a purchase option from the list of transactional options, thereby authorizing payment for an item from the facility using wireless device 14. If desired, an option from the list of transactional options could allow user 12 to select the medium from which he/she receives the purchase receipt. For example, user 12 could choose to have the receipt printed in the facility, sent to an e-mail account, or stored in his/her user profile.

Once user 12 selects a transactional option, process 310, the transaction is conducted, process 311, and recorded in the user profile, process 312. It should be noted that the transaction could be recorded in other databases as well, such as inventory tracking systems, marketing and promotion systems, and any other system which could benefit from tracking transactions. After the transaction is completed, the timer resets.

Process 315 allows user 12 to access and modify his/her user profile using wireless device 14. For example, if while user 12 is shopping in the facility he/she sees something desired but he/she cannot purchase, user 12 could access his/her user profile and add the desired item to a wish list. If applicable, user 12 could input a price point at which he/she would be willing to make the purchase, so when the price of the item is lowered to the desired purchase price, user 12 will be notified under control of process 308.

Because the user profile contains sensitive information, it is important to include security features. As such, process 313, in conjunction with processes 303 and 311, utilize a timer which determines if a sufficient amount of time has passed since the last transaction. If it has, then it is safe to assume the user has left the facility. Specifically, once the user has been identified by process 303, a timer is set. The system has a pre-determined time limit, process 313, for example twenty minutes, such that when the time limit is exceeded the system assumes the user has left the facility and logs-out the wireless device. However, if the user conducts a transaction before the time limit is exceeded, the timer is reset, process 311, and the user has another period of time to conduct another transaction before the system assumes he/she has left the facility. This step is particularly important for wireless devices which are set up with “quick transaction” to prevent unauthorized transactions.

When user 12 leaves the range of the facility's sensor 11, the system assumes the user has left the facility and logs-out wireless device 14. This process can be used in conjunction with the timer or in place of the timer and is intended to provide further security against unauthorized transactions.

It should be recognized that any number of methods could be used to log wireless device 14 out of the system, thereby ensuring the device's security. For example, the user profile could be set up such that when a triggering event occurs, the system will not allow further transactions. Some examples of triggering events include but are not limited to: a user selecting a log-off option; improper identification supplied by the user; the passage of time; the device leaving the sensor's range; passage of time without a transaction occurring; exceeding a predetermined number of transactions; exceeding a per transaction spending limit; exceeding a cumulative spending limit; conducting an unapproved transaction; or attempting to conduct a transaction outside the transactional options, or conducting transactions detectable by fraud detection systems that are deemed inappropriate for this user based on the user's profile and other information.

FIG. 2A shows another embodiment 250 of a system in which user 252 with a wireless device, such as cellular telephone 255, approaches podium 257 of a restaurant where host/hostess 251 is positioned. Not shown are the plurality of other users mingling around waiting for a table to become available. In the embodiment shown, host/hostess 251 enters an identification number (such as the calling number) of wireless device 255 into controller 256 in a number of ways. The identification number could be spoken or it could be Radio Frequency Identification (RFID) or Near-Field (NF) communication transferred via wireless device 255 via receiving device 254. Controller 256 is essentially the same as controller 25 as will be discussed in more detail hereinafter with respect to FIG. 2C.

In one embodiment, a control number is provided to host/hostess 251 by controller 256, or alternatively host/hostess 251 provides the control number for use by controller 256. This control number is then stored in a memory in association with the calling identification number of the user's wireless device.

When the table for user 252 becomes available, host/hostess 251 inputs the control number of user 252 into controller 256 which then establishes a communication link via either the public switch network, a wireless communication network, or a pager network (not shown) to wireless device 255 which then provides a signal or a message to user 252 indicating the availability of a table. This message, if desired, could also provide other information pertaining to the table, such as its location, etc.

While the user is waiting for a table, messages can be sent to device 255 from the business establishment. These messages can be, for example, specials of the day, menus, coupons for special pricing, music or other entertainment. One or more of these messages could be a bidirectional communication. For example, a message could say, “We are featuring a certain drink or hors d'oeuvre today. The price is $4.95. Do you wish to order?” User 252 then could choose to answer “yes,” “no” or ignore the message. Any reply message would be communicated over a bidirectional link back through the network to controller 256 which would then take the necessary action to insure that the request of user 252 is performed.

While the system is shown in conjunction with a restaurant setting, any merchandise (or service) that a user is waiting for can be the subject of the system. FIG. 2B shows, for example, an embodiment in which pharmacy 21 has drive-up window 201. User 202 is in his/her vehicle waiting for service. User 202 has wireless device 22 which can communicate via RFID or NF communication via input device 24 to register an identification number, such as the calling number of wireless device 22. Alternatively, the calling number can be registered verbally with a person located at pharmacy 21, or the calling number could be registered from a remotely located user by having that user call in and verbally present the calling number. If desired, caller ID or another device could provide the identification of the wireless device of the remote user.

In one embodiment, the calling identification could be from memory 204 (FIG. 2C) of controller 25 or from a remote system, such as remote system 220 which can be, for example, the system shown in the above identified copending application entitled, “SYSTEM AND METHOD FOR COORDINATING PAYMENT IDENTIFICATION SYSTEMS.”

In operation, using system 20, a prescription (Rx) or other merchandise desired from pharmacy 21 would be entered into controller 25 as well as into the normal pharmaceutical system (not shown) of establishment 21. A physician can call the Rx in to the pharmacy 21 or remotely type the Rx into controller 25 from the physician's office or other location. Attached to the prescription would be the user identification number. Controller 25 operates in conjunction with the pharmacy system, to cross-link the user identification, as obtained from the doctor, with the user's calling identification number and with a code number (if desired). An alternate method of delivering a Rx to establishment 21 is, of course, by physically hand carrying the Rx to an attendant, who would then register the user's calling identification in association with a code number.

Yet another method of delivering the Rx to establishment 21 utilizes process 30 of FIG. 3. Here, the physician types the Rx and any additionally required information into a user's profile using either the user's wireless device 23 (user 203, FIG. 2B) or a remote computer (not shown). Then, when user 203 comes within range of detector 24 (FIG. 2B) which detects and identifies user 203, as discussed above with respect to processes 301 and 303, the detected profile notifies (process 305) the pharmacy's employee of the user's presence. The pharmacy's employee can then access user 203's user profile, view/modify the Rx (process 306), and fill the Rx. If desired, the pharmacy's employee could view the user profile for other information, such as other prescribed medication or medical insurance information. Similarly, the pharmacy's employee could modify the user's profile, process 307, if necessary. For example, if the Rx has a limited number of refills, the pharmacy's employee could modify the user profile to reflect the number of refills remaining for the Rx.

The user then is free to leave the establishment or do other shopping in the establishment or elsewhere and from time to time messages can be delivered to the user using, for example, the code number, with respect to other services available, such as specials, coupons, rebates, etc.

At the time when the Rx becomes available, the code number associated with the Rx is communicated to controller 25 of FIG. 2B which, in one embodiment shown in FIG. 2C, has computer 203, memory 204, message store 26, voice-to-text device 27, and text-to-speech device 28, operating in association therewith. When the code number of the available Rx arrives at controller 25, controller 25 then retrieves from memory the user's calling number, such as the calling number of wireless device 23 for user 203. A proper message is then selected from message store 26 for communication via a communication link to user device 23. This communication link can be established locally from establishment 21 or it can be established from remote system 220.

In some instances during the filling process of the Rx, the pharmacist may require additional information about the patient or a clarification of the patient's birth date or other information. If the information is available, for example, in memory 204, then upon initiation of a request, the information can be provided from memory. In some situations, the request for additional information will be sent from controller 25 to the user, such as user 203, via wireless device 23 on a bidirectional link under control of the assigned control code. The user could be asked for a birth date, an address, or other information. The user then can communicate the information, either using a touch pad or verbally back to the pharmacist. The verbal communications could be, if desired, translated by voice-to-text device 27.

When user 203's Rx is ready, a communication is sent from message store 26 through the system to wireless device 23 so that user 203 can drive up to window 201 to retrieve his/her filled Rx. As the user is approaching window 201, wireless device 203 could identify itself, for example, via RFID or NF detector 24, and the proper Rx would be ready when user 203 arrives at window 201. If desired, when user 203 is notified that the Rx (or other merchandise) is available, a price could be included in the message and the user given the opportunity to authorize payment for the merchandise at that time. This authorization could be under control of the system and method discussed in the above-identified U.S. Patent Application, “SYSTEM AND METHOD FOR COORDINATING PAYMENT IDENTIFICATION SYSTEMS.”

Again, it should be pointed out that while the inventive concepts have been discussed with respect to a pharmacy, any type of establishment can utilize the concepts discussed herein so that a user can register (or have registered) his/her calling identification, and when the merchandise is ready, the user will be notified. While the user is waiting for such notification, other messages can be delivered to the user pertaining to services available, either at the establishment or in conjunction with the desires of the user.

FIG. 4 shows one embodiment of flow chart 40 illustrating the processes of FIGS. 2A and 2B. Process 401 determines whether a user has signed in with a service provider. The service provider can be a restaurant, a pharmacy, or any other type of commercial environment where notification of an event is important. Process 402 determines whether the system already has a calling phone or pager number of the wireless device used by the user. If the system does not already have that information, then process 403 controls the input of that calling information number. This could be by RFID or NF communication, caller ID, verbal with a voice-to-text conversion, (such as speech-to-text converter 27, FIG. 2C).

Process 404 assigns a local control number (LCN) to the phone number. Note that process 404 is not necessary and the system could, if desired, use the actual phone number or caller identification number of the wireless device. For ease of discussion herein it will be assumed that an LCN is utilized. The LCN is stored in association with the phone number via process 405. This storage could be, for example, in memory 204 (FIG. 2C) of controller 25 under control of computer 203, but any other system, either local to the physical location of the user or the place of establishment or in a remote system, such as remote system 220 (FIG. 2B) could be used.

FIG. 5 shows an embodiment 50 of a process for receiving messages and notifications and communicating those messages to a user from time to time. Process 501 is the message control which determines which messages are to be sent at a given time. These messages can be prerecorded and selected by identification number or they could be input into the system live by a host/hostess, pharmacist, or other establishment member and converted if desired to speech via text-to-speech device 28 of FIG. 2C.

The messages could contain information including but not limited to: the availability of a service, product, promotion, discount, special pricing, or payment option.

Process 502 determines if it is time to send a message to a user. This determination can be, for example, based on the fact that an Rx is filled or that other merchandise or services are available. The time of the message can be controlled such that, for example, if an Rx is filled in the middle of the night, the notification will not go out until morning. Likewise, the message could be sent immediately following the detection of wireless device within range of sensor 11.

Process 503, in conjunction with process 504, generates the message and/or retrieves it from a data store and sets up a link to the wireless device via process 505 under control of controller 25 (FIG. 2C). The message is then sent via process 506 to either the public switched network, internet connection, packed switched network or otherwise, in accordance with the calling identification number provided during the initial registration period, process 40 of FIG. 4. Process 513 inquires whether log-in to the payment system is desired, and if so, process 514 logs into the payment system.

Process 507 determines if a reply is expected, i.e., bidirectional communication has been set up. If not, then the original message link is terminated via process 508. However, if a reply is expected, then process 509, in conjunction with process 510, determines if a reply has been generated, and if so, then the reply is sent, process 511, and the link is ended, process 512. Note that process 510 can be established such that if a reply is not generated within a certain time a repeat message is sent to the user to try to establish a bidirectional communication so as to obtain a reply message under control of process 515.

Although the present invention and its advantages have been described in detail, it should be understood that various changes, substitutions and alterations can be made herein without departing from the spirit and scope of the invention as defined by the appended claims. Moreover, the scope of the present application is not intended to be limited to the particular embodiments of the process, machine, manufacture, composition of matter, means, methods and steps described in the specification. As one of ordinary skill in the art will readily appreciate from the disclosure of the present invention, processes, machines, manufacture, compositions of matter, means, methods, or steps, presently existing or later to be developed that perform substantially the same function or achieve substantially the same result as the corresponding embodiments described herein may be utilized according to the present invention. Accordingly, the appended claims are intended to include within their scope such processes, machines, manufacture, compositions of matter, means, methods, or steps.

Claims

1. A system for obtaining payment and authentication information for payment transactions at a merchant facility based on a proximity of a wireless device to a host device at the merchant facility, the system comprising:

a host device having one or more physical processors programmed by computer program instructions to:
determine that a wireless device associated with a user is within a proximity of the host device;
obtain an identifier related to the wireless device when the wireless device is within the proximity of the host device;
obtain a user profile related to the user based on the identifier, wherein the user profile includes payment information to be used in a payment transaction at the merchant facility;
receive, from the wireless device, a password used to authenticate the user to secure a payment transaction before a user authorization of the payment transaction is received;
receive the user authorization of the payment transaction from the wireless device; and
facilitate the payment transaction based on the user profile information and the password responsive to the user authorization.

2. The system of claim 1, wherein the wireless device is activated such that the wireless device is enabled to facilitate one or more purchase transactions with respect to the host device after the password is received, and wherein the one or more physical processors are further programmed to:

determine whether the wireless device remains activated after the password is received; and
responsive to a determination that the wireless device is de-activated, prevent one or more subsequent payment transactions from occurring in relation to the wireless device.

3. The system of claim 2, wherein the one or more physical processors are further programmed to:

determine a time of inactivity of the wireless device; and
de-activate the wireless device when the time of inactivity meets or exceeds a predetermined threshold time.

4. The system of claim 2, wherein the one or more physical processors are further programmed to:

determine that the wireless device is no longer with the proximity of the host device; and
de-activate the wireless device responsive to the determination that the wireless device is no longer with the proximity of the host device.

5. The system of claim 2, wherein the one or more physical processors are further programmed to:

determine that a limit for a payment account associated with the payment information has been exceeded; and
de-activate the wireless device responsive to the determination that the limit for the payment account associated with the payment information has been exceeded.

6. The system of claim 1, wherein the one or more physical processors are further programmed to:

receive a de-activate signal from the wireless device; and
de-activate the wireless device responsive to the de-activate signal.

7. The system of claim 1, wherein the one or more physical processors are further programmed to:

obtain information related to one or more items or services provided at the merchant facility; and
provide the information related to the one or more items or services to the wireless device after the determination that the wireless device is within the proximity of the host device and before the user authorization is received.

8. The system of claim 7, wherein the information related to the one or more items or services comprises a promotion related to the one or more items or services.

9. The system of claim 7, wherein the information related to the one or more items or services comprises one or more menu items of a restaurant.

10. The system of claim 9, wherein the one or more menu items are selectable at the wireless device, and wherein the one or more processors are further programmed to:

receive a selection of the one or more menu items from the wireless device; and
facilitate an order of the selected one or more menu items.

11. The system of claim 7, wherein the information related to the one or more items or services comprises information related to a prescription drug order of a pharmacy at the merchant facility.

12. The system of claim 7, wherein the information related to the one or more items or services comprises an indication that the one or more items or services are available for the user.

13. The system of claim 12, wherein the indication that the one or more items or services are available for the user comprises an indication that a prescription drug order at a pharmacy has been filled or a table at a restaurant is ready.

14. The system of claim 7, wherein the information related to the one or more items or services comprises a prompt to the user for additional information related to an order associated with the one or more items or services.

15. The system of claim 1, wherein the one or more processors are further programmed to provide an indication to one or more personnel at the merchant facility that the wireless device is within the proximity of the host device.

16. The system of claim 15, wherein the indication to the one or more personnel comprises an indication to process an order to be fulfilled at the merchant facility.

17. The system of claim 1, wherein the password is received from the wireless device before an item identification of an item to be purchased is added to a point of sale that processes the purchase transaction.

18. A computer implemented method for obtaining payment and authentication information for payment transactions at a merchant facility based on a proximity of a wireless device to a host device at the merchant facility, the method being implemented on a host device having one or more physical processors programmed by computer program instructions that when executed cause the one or more physical processors to perform the method, the method comprising:

determining, by the one or more physical processors, that a wireless device associated with a user is within a proximity of the host device;
obtaining, by the one or more physical processors, an identifier related to the wireless device when the wireless device is within the proximity of the host device;
obtaining, by the one or more physical processors, a user profile related to the user based on the identifier, wherein the user profile includes payment information to be used in a payment transaction at the merchant facility;
receiving, by the one or more physical processors from the wireless device, a password used to authenticate the user to secure a payment transaction before a user authorization of the payment transaction is received;
receiving, by the one or more physical processors, the user authorization of the payment transaction from the wireless device; and
facilitating, by the one or more physical processors, the payment transaction based on the user profile information and the password responsive to the user authorization.

19. The method of claim 18, wherein the wireless device is activated such that the wireless device is enabled to facilitate one or more purchase transactions with respect to the host device after the password is received, the method further comprising:

determining whether the wireless device remains activated after the password is received; and
responsive to a determination that the wireless device is de-activated, preventing one or more subsequent payment transactions from occurring in relation to the wireless device.

20. The method of claim 19, the method further comprising:

determining a time of inactivity of the wireless device; and
de-activating the wireless device when the time of inactivity meets or exceeds a predetermined threshold time.

21. The method of claim 19, the method further comprising:

determining that the wireless device is no longer with the proximity of the host device; and
de-activating the wireless device responsive to the determination that the wireless device is no longer with the proximity of the host device.

22. The method of claim 19, the method further comprising:

determining that a limit for a payment account associated with the payment information has been exceeded; and
de-activating the wireless device responsive to the determination that the limit for the payment account associated with the payment information has been exceeded.

23. The method of claim 18, the method further comprising:

receiving a de-activate signal from the wireless device; and
de-activating the wireless device responsive to the de-activate signal.

24. The method of claim 18, the method further comprising:

obtaining information related to one or more items or services provided at the merchant facility; and
providing the information related to the one or more items or services to the wireless device after the determination that the wireless device is within the proximity of the host device and before the user authorization is received.

25. The method of claim 24, wherein the information related to the one or more items or services comprises a promotion related to the one or more items or services.

26. The method of claim 24, wherein the information related to the one or more items or services comprises one or more menu items of a restaurant.

27. The method of claim 26, wherein the one or more menu items are selectable at the wireless device, the method further comprising:

receiving a selection of the one or more menu items from the wireless device; and
facilitating an order of the selected one or more menu items.

28. The method of claim 24, wherein the information related to the one or more items or services comprises information related to a prescription drug order of a pharmacy at the merchant facility.

29. The method of claim 24, wherein the information related to the one or more items or services comprises an indication that the one or more items or services are available for the user.

30. The method of claim 29, wherein the indication that the one or more items or services are available for the user comprises an indication that a prescription drug order at a pharmacy has been filled or a table at a restaurant is ready.

31. The method of claim 24, wherein the information related to the one or more items or services comprises a prompt to the user for additional information related to an order associated with the one or more items or services.

32. The method of claim 18, the method further comprising:

providing an indication to one or more personnel at the merchant facility that the wireless device is within the proximity of the host device.

33. The method of claim 32, wherein the indication to the one or more personnel comprises an indication to process an order to be fulfilled at the merchant facility.

34. The method of claim 18, wherein the password is received from the wireless device before an item identification of an item to be purchased is added to a point of sale that processes the purchase transaction.

Patent History

Publication number: 20140122114
Type: Application
Filed: Jan 6, 2014
Publication Date: May 1, 2014
Applicant: MODIV MEDIA, INC. (Quincy, MA)
Inventor: Robert J. WESLEY (Wellesley, MA)
Application Number: 14/148,203

Classifications

Current U.S. Class: Health Care Management (e.g., Record Management, Icda Billing) (705/2); Requiring Authorization Or Authentication (705/44); Wireless Device (705/14.64)
International Classification: G06Q 20/32 (20060101); G06Q 20/40 (20060101);