System, Method, and Article of Manufacture to Non-Intrusively Authenticate One or More Secondary Users of a Mobile Device and Displaying a Scanning Code Over a Lock Screen Wallpaper of the Mobile Device

ABSTRACT

An article of manufacture is described as implemented in a mobile device having a lock screen wallpaper, where the mobile device maintains a profile storing authentication data associated with both a primary user of a mobile device and one or more secondary users that are authorized to use the mobile device. When the mobile device is at a business location, the secondary user(s) are non-intrusively authenticated as authorized user(s) of the mobile device. Upon successful authentication a scanning code is displayed over a lock screen wallpaper of the mobile device, where power is conserved in the mobile device by providing the scanning code to the secondary user(s) without unlocking the mobile device.

RELATED APPLICATION

This application is a continuation of U.S. application Ser. No.16/030,837 filed Jul. 9, 2018, pending, which is a continuation of U.S.application Ser. No. 13/896,319 filed May 16, 2013, now U.S. Pat. No.10,019,710.

FIELD OF INVENTION

The present invention relates generally to the field of mobile devices.More specifically, the present invention is related to a system, method,and article of manufacture to non-intrusively authenticate one or moresecondary users of a mobile device and displaying a scanning code over alock screen wallpaper of the mobile device.

DISCUSSION OF RELATED ART

It is well known in the art to utilize a mobile device, such as acellular phone, to conduct financial transactions. As an example, amobile device can be used to pay for financial transaction at a retailestablishment. One such example is discussed below to note some of theproblems associated with the prior art in conducting such financialtransactions.

A retail establishment, e.g., ABC Coffee Shop, may have a software (mayalso be called an application or app) that a user is able to download onhis/her mobile device. Once the software is downloaded and installed bythe user of the mobile device, the user can then power up/open themobile device, click on an icon representative of the software, and runthe software on the mobile device, which may display, as part of therunning software, a scannable barcode. Users are, therefore, able to usethe software installed on the mobile device to conduct a transaction atthe retail establishment, which in this example is the ABC Coffee Shop,by having someone at the retail establishment scan the barcode, whichallows the user to purchase an item (or items) that he/she desires tobuy.

A problem with this scenario is that the user has to go through numeroussteps in order to access the software and pay for a purchase, whichstarts by unlocking the phone, finding the right page having the iconrepresentative of the desired software, clicking on the icon for thedesired software, navigating within the software to the appropriatelocation to load up the barcode that may be used for payment, andpresenting the barcode to the retail establishment. This process is timeconsuming and is also error-prone.

This problem is further compounded for users with numerous softwareapplications that are currently installed on their mobile device, whichmakes it even more difficult and time consuming to locate and run thesoftware. One mechanism provided for in various mobile devices is theability to search for a software among the list of installed software.But, even this approach requires the user to unlock the phone, type thefirst few characters of the software name (if the user can remember thename) and find an appropriate match in the results for the softwarecorresponding to the retail establishment, i.e., the ABC Coffee Shop,run the software, and navigate within the software to the appropriateportion of the software that deals with conducting a transaction. Thisprocess even more time consuming that the scenario discussed previouslyand is also error-prone.

Additionally, there is no non-intrusive way to authenticate the user asan authorized person to use the mobile device in such a financialtransaction. The prior art provides intrusive mechanisms to verify auser's identity where, for example, a user may be asked to provide a pincode as an input prior to proceeding with a financial transaction.

Embodiments of the present invention are an improvement over prior artsystems and methods.

SUMMARY OF THE INVENTION

In one embodiment, the present invention provides an article ofmanufacture having non-transitory computer readable storage mediumcomprising computer readable program code executable by a processor in amobile device, the non-transitory computer readable storage mediumcomprising: (a) computer readable program code maintaining, in themobile device, a profile storing authentication data associated with:(1) a primary user of a mobile device, and (2) at least one secondaryuser that is authorized to use the mobile device, the primary userdifferent than the at least one secondary user; (b) computer readableprogram code identifying the mobile device is at a business location;(c) computer readable program code non-intrusively authenticating the atleast one secondary user as an authorized user of the mobile device, andupon successful authentication: (d) computer readable program codedisplaying a scanning code over a lock screen wallpaper when the mobiledevice is in a screen locked state and when the mobile device is at thebusiness location; and (e) wherein power is conserved in the mobiledevice by displaying the scanning code without unlocking the mobiledevice.

In another embodiment, the present invention provides an article ofmanufacture having non-transitory computer readable storage mediumcomprising computer readable program code executable by a processor in amobile device, the non-transitory computer readable storage mediumcomprising: (a) computer readable program code maintaining, in themobile device, a profile storing authentication data associated with:(1) a primary user of a mobile device, and (2) at least one secondaryuser that is authorized to use the mobile device, the primary userdifferent than the at least one secondary user; (b) computer readableprogram code identifying the mobile device is at a business location;(c) computer readable program code non-intrusively authenticating, viafacial recognition, the at least one secondary user as an authorizeduser of the mobile device, and upon successful authentication: (d)computer readable program code displaying a scanning code over a lockscreen wallpaper when the mobile device is in a screen locked state andwhen the mobile device is at the business location; and (e) whereinpower is conserved in the mobile device by displaying the scanning codewithout unlocking the mobile device.

In yet another embodiment, the present invention provides an article ofmanufacture having non-transitory computer readable storage mediumcomprising computer readable program code executable by a processor in amobile device, the non-transitory computer readable storage mediumcomprising: (a) maintaining, in the mobile device, a profile storingauthentication data associated with: (1) a primary user of a mobiledevice, and (2) at least one secondary user that is authorized to usethe mobile device, the primary user different than the at least onesecondary user; (b) identifying the mobile device is at a businesslocation; (c) non-intrusively authenticating, via a camera in the mobiledevice, the at least one secondary user as an authorized user of themobile device, and upon successful authentication: (d) displaying ascanning code over a lock screen wallpaper when the mobile device is ina screen locked state and when the mobile device is at the businesslocation; and (e) wherein power is conserved in the mobile device bydisplaying the scanning code without unlocking the mobile device.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates an embodiment of the present invention to facilitatea financial transaction without unlocking a mobile device.

FIG. 2 illustrates another embodiment of the present invention tofacilitate a financial transaction without unlocking a mobile device.

FIG. 3 depicts a non-limiting example of a mobile device according tothe present invention.

FIG. 4 depicts an example of such an image having the scannable codewherein the image is rendered as the lock screen wallpaper.

FIG. 5 depicts an example of a default lock screen wallpaper.

FIG. 6 depicts an example where the image having the scanning code iscentered and partially covers the default lock screen wallpaper of FIG.5.

FIG. 7 depicts an example of an image showing the scanning code and anaccount balance.

FIG. 8 depicts an example of a digital receipt shown as part of the lockscreen background.

DESCRIPTION OF THE PREFERRED EMBODIMENTS

While this invention is illustrated and described in a preferredembodiment, the invention may be produced in many differentconfigurations. There is depicted in the drawings, and will herein bedescribed in detail, a preferred embodiment of the invention, with theunderstanding that the present disclosure is to be considered as anexemplification of the principles of the invention and the associatedfunctional specifications for its construction and is not intended tolimit the invention to the embodiment illustrated. Those skilled in theart will envision many other possible variations within the scope of thepresent invention.

FIG. 1 illustrates an embodiment of the present invention whichdiscloses method 100 to facilitate a financial transaction withoutunlocking a mobile device. In step 102, the mobile device is identifiedto be at a business location. In one embodiment, the mobile device isidentified as being located at the business location based on GPS datareceived at the mobile device. In another embodiment, the mobile deviceis identified as being located at the business location based upon anear field communication (NFC) interaction with a device at the businesslocation. For example, the device at the business location may be a NFCtag and the mobile device may interact with such a NFC tag to confirmthat it is located at a particular business location. In yet anotherextended embodiment, the NFC tag is either integrated into apoint-of-sale terminal or is attached to a point-of-sale terminal at thebusiness location.

In another embodiment, the mobile device is identified as being locatedat the business location based on a RFID interaction with a device atthe business location. For example, the device at the business locationmay be a RFID tag and the mobile device may interact with such a RFIDtag to confirm that it is located at a particular business location. Inyet another extended embodiment, the RFID tag is either integrated intoa point-of-sale terminal or is attached to a point-of-sale terminal atthe business location.

In yet another embodiment the mobile device is identified as beinglocated at the business location based on a Bluetooth interaction with adevice at the business location. For example, the device at the businesslocation may be a point-of-sale terminal that can communicate viaBluetooth with the mobile device.

In step 104, the mobile device passively authenticates a user as anauthorized user of the mobile device. It is important to note that inthe preferred embodiment, the authentication of the user is done in anon-invasive manner, where the user is unaware that such anauthentication is taking place. Such non-invasive techniques includefingerprint recognition when the user places their hand on the screen,where such fingerprint recognition is done without the knowledge of theuser, facial recognition where such facial recognition is done withoutthe knowledge of the user, retinal authentication where such retinalauthentication is done without the knowledge of the user, authenticationbased on identifying the presence of another electronic device (e.g.,another tablet, mobile device, etc.) which is also associated with thesame user, or accessing a profile and authenticating said user as anauthorized user when there is a match between a current time (they areat the business location) and a past time in said profile (when the sameuser has visited the same business location in the past). It shouldfurther be noted that while there is always a primary user associatedwith a mobile device, there may also be secondary users associated withthe same mobile device. For example, the same mobile device may be usedby a husband and wife, son or daughter, as the primary user mayauthorize such secondary users to be authorized users of the mobiledevice. A user of the mobile device may maintain a profile andcorresponding passive recognition data to identify a plurality of suchauthorized users of the same mobile device.

Upon successfully authenticating an authorized user, in step 106, aprocessor in the mobile device dynamically sets a lock screen wallpaperin the mobile device to an image having a scanning code (e.g., a QRcode, a barcode, etc.) for use at the business location the user is at.It is important to note that the lock screen wallpaper, which isdisplayed when the mobile device is in a locked state to conserve power,is updated, and not the home screen wallpaper, which is generallydisplayed when a mobile device is not in a locked state.

In step 108, a display of the mobile device is activated and the imagehaving the scannable code is rendered as the lock screen wallpaper onthe activated display of the mobile device which remains in the screenlocked state. Such activation may be user initiated or triggeredautomatically (e.g., when the mobile device is proximate to a point ofsale terminal). FIG. 4 depicts an example of such an image having thescannable code wherein the image is rendered as the lock screenwallpaper.

In step 110, a financial transaction is facilitated at the businesslocation based on the scannable code displayed as the lock screenwallpaper of the mobile device, wherein such a financial transaction isfacilitated without having to unlock the mobile device. For example, theattendant at the point of sale terminal may scan the scannable codedisplayed as the lock screen wallpaper of the mobile device and afinancial transaction could be completed at the point of sale terminalfor an item (or items) the user may wish to purchase at the businesslocation.

In an alternative embodiment, the image having a scanning code (e.g., aQR code, a barcode, etc.) may be rendered in front of a default lockscreen wallpaper (where it visually covers the entirety of the defaultlock screen wallpaper and looks like FIG. 4) or in front of a portion ofthe default lock screen wallpaper (see FIG. 5 for an example of adefault lock screen wallpaper, and FIG. 6 for an example where the imagehaving the scanning code is centered and partially covers the defaultlock screen wallpaper), where the default lock screen wallpaper iseither a custom image previously set by the user of the mobile device oris the system default of the mobile device (the system default image forthe lock screen wallpaper when the user has not previously set the lockscreen wallpaper to a custom image). The point of sale terminal is ableto scan the scannable code to complete a purchase at the businesslocation.

In one embodiment, the method further comprises reverting the lockscreen wallpaper to a default lock screen wallpaper (i.e., a lock screenwallpaper previously set by a user) upon either a successful completionof the financial transaction or upon the user leaving the premises ofthe business location.

In one embodiment, the financial transaction is associated with afinancial account (e.g., an account associated with a credit cardaccount, a gift card, a credit account associated with the business,etc.) and the method further comprises updating the lock screenwallpaper to another image showing a balance left on the financialaccount after successful completion of the financial transaction. Afterdisplaying the image showing the balance as the lock screen wallpaper,the mobile device may revert to a default lock screen wallpaper (i.e., alock screen wallpaper previously set by a user) upon either theexpiration of a pre-determined time (e.g., a few seconds after thedisplay of the image showing the balance) or upon the user leaving thepremises of the business location.

In one embodiment, the image having a scanning code for use at thebusiness additionally displays a balance associated with a financialaccount which is used during the financial transaction. Such an exampleis shown in FIG. 7 which depicts the scanning code and the balance aspart of the lock screen image.

In one embodiment, after successful completion of the financialtransaction, the lock screen wallpaper is updated to display a digitalreceipt as new lock screen wallpaper. Such an example is shown in FIG.8. The digital receipt image may be received from a device at thebusiness location like a point of sale terminal or may be received overa network such as the Internet or via the cellular network. Afterdisplaying the image showing the digital receipt as the lock screenwallpaper, the mobile device may revert to a default lock screenwallpaper (i.e., a lock screen wallpaper previously set by a user) uponeither the expiration of another pre-determined time (e.g., a fewseconds after the display of the image showing the digital receipt) orupon the user leaving the premises of the business location.

In one embodiment, the scannable code comprises user-definedcustomization data related to the financial transaction in addition toinformation required to perform the financial transaction. For example,the user may have previously stored data identifying order detailsassociated with a drink (e.g., type of drink—coffee/espresso/cappuccino,syrup additives, number of pumps of syrup additives, type of milk to beused to make drink, etc.) or order details associated with a food item(type of toppings on a pizza, requested condiments, etc.) and thispreviously stored information regarding the order details may be encodedinto the scannable code (at either the request of the user or isautomatically identified via a profile storing what was previouslyordered at the business location and is presented to the user forverification prior to being encoded as the scannable code), where thepoint of sale terminal may decode this information and the attendant atthe point of sale terminal can review the order details. Such orderdetails that may be encoded along with information required to perform afinancial transaction may be useful in getting an order correct as it isdirectly from the user and is not based on the attendant at the point ofsale terminal inputting such data, which by definition is error prone.

In one embodiment, the financial transaction is a cloud-basedtransaction, wherein a payment provider automatically covers the cost ofa purchase with issuer linked funds and, in a separate transaction, thepayment provider charging the purchaser's selected, cloud-linked accountin a card-not-present environment to recoup its losses on the firsttransaction.

In one embodiment, the image having a scanning code for use at thebusiness location is generated by a software running on the mobiledevice, wherein the software is associated with the business location.

Non-limiting examples of the mobile device include any of the following:a mobile phone, a tablet, a portable gaming device or a digital musicplayer.

FIG. 2 illustrates another embodiment of the present invention's methodto facilitate a financial transaction without unlocking a mobile device,wherein the method comprises the steps of: identifying the mobile deviceis at a business location (step 202); passively authenticating a user ofthe mobile device as an authorized user of the mobile device near apoint of sale terminal at the business location (step 204), and uponsuccessful authentication: dynamically setting lock screen wallpaper inthe mobile device to an image having a scanning code for use at thebusiness location (step 206); activating a display of the mobile deviceand rendering the image having a scannable code as the lock screenwallpaper on the activated display of the mobile device which remains inthe screen locked state (step 208); and facilitating a financialtransaction at the business location based on the scannable codedisplayed as the lock screen wallpaper of the mobile device, thefinancial transaction facilitated without having to unlock the mobiledevice (step 210).

The above-presented discussion with regards to FIG. 1 applies to FIG. 2,but it should be noted that in this embodiment, the passiveauthentication is done while the user is near the point of sale terminalat the business location.

FIG. 3 depicts a non-limiting example of a mobile device 300 accordingto the present invention. While select components (processor 302 memory304, display 306 (e.g. a touch screen display), speaker 308, microphone310, camera 312, wireless electronics 314 required for wirelesscommunication, GPS unit 316) are shown as being part of the mobiledevice 300, it should be noted that these components are provided as asimplistic case scenario and other known components (such as, but notlimited to, a Bluetooth module, a NFC module, a RFID module), may bepresent within the mobile device 300. Mobile device 300 comprises: aprocessor 302; a display 306; and memory/storage 304 storing computerreadable programmable code, which when executed by the processorimplements a method to facilitate a financial transaction withoutunlocking a mobile device, the memory/storage 304 comprising computerreadable program code to: identify the mobile device 300 is at abusiness location (using for example, GPS 316); passively authenticate auser of the mobile device 300 as an authorized user of the mobile device(using, for example, camera 312 to passively conduct facial recognitionor using touch screen display 306 to passively conduct fingerprintrecognition or passively inspecting a profile stored in memory 304 or aprofile stored at a network location which is downloaded to memory 304to identify if the user has been to the business location at about thesame time in the past), and upon successful authentication: dynamicallyset lock screen wallpaper in the mobile device 300 to an image having ascanning code for use at the business location; activate the display 306of the mobile device 300 and render the image having a scannable code asthe lock screen wallpaper on the activated display 306 of the mobiledevice 300 which remains in the screen locked state; and facilitate afinancial transaction at the business location based on the scannablecode displayed as the lock screen wallpaper of the mobile device 300,the financial transaction facilitated without having to unlock themobile device 300. It should be noted that the mobile device may includeany of the following: a mobile phone, a tablet, a portable gaming deviceor a digital music player.

Additionally, the present invention provides for an article ofmanufacture comprising computer readable program code contained withinimplementing one or more modules to facilitate a financial transactionwithout unlocking a mobile device. Furthermore, the present inventionincludes a computer program code-based product, which is a storagemedium having program code stored therein which can be used to instructa computer/processor to perform any of the methods associated with thepresent invention. The computer storage medium includes any of, but isnot limited to, the following: CD-ROM, DVD, magnetic tape, optical disc,hard drive, floppy disk, ferroelectric memory, flash memory,ferromagnetic memory, optical storage, charge coupled devices, magneticor optical cards, smart cards, EEPROM, EPROM, RAM, ROM, DRAM, SRAM,SDRAM, or any other appropriate static or dynamic memory or data storagedevices.

The present invention also provides for an article of manufacture havingnon-transitory computer readable storage medium comprising computerreadable program code executable by a processor to implement a method tofacilitate a financial transaction without unlocking a mobile device,the non-transitory computer readable storage medium comprising: computerreadable program code identifying the mobile device is at a businesslocation; computer readable program code passively authenticating a userof the mobile device as an authorized user of the mobile device, andupon successful authentication: computer readable program codedynamically setting lock screen wallpaper in the mobile device to animage having a scanning code (e.g., a QR code, a barcode, etc.) for useat the business location; computer readable program code activating adisplay of the mobile device and rendering the image having a scannablecode as the lock screen wallpaper on the activated display of the mobiledevice which remains in the screen locked state; and computer readableprogram code facilitating a financial transaction at the businesslocation based on the scannable code displayed as the lock screenwallpaper of the mobile device, the financial transaction facilitatedwithout having to unlock the mobile device.

CONCLUSION

A system, method and article of manufacture has been shown in the aboveembodiments for the effective implementation of a system, method andarticle of manufacture to non-intrusively authenticate one or moresecondary users of a mobile device and displaying a scanning code over alock screen wallpaper of the mobile device While various preferredembodiments have been shown and described, it will be understood thatthere is no intent to limit the invention by such disclosure, butrather, it is intended to cover all modifications falling within thespirit and scope of the invention, as defined in the appended claims.For example, the present invention should not be limited bysoftware/program, computing environment, mobile environment, specificcomputing hardware, or specific mobile hardware.

1. An article of manufacture having non-transitory computer readablestorage medium comprising computer readable program code executable by aprocessor in a mobile device, the non-transitory computer readablestorage medium comprising: (a) computer readable program codemaintaining, in the mobile device, a profile storing authentication dataassociated with: (1) a primary user of a mobile device, and (2) at leastone secondary user that is authorized to use the mobile device, theprimary user different than the at least one secondary user; (b)computer readable program code identifying the mobile device is at abusiness location; (c) computer readable program code non-intrusivelyauthenticating the at least one secondary user as an authorized user ofthe mobile device, and upon successful authentication: (d) computerreadable program code displaying a scanning code over a lock screenwallpaper when the mobile device is in a screen locked state and whenthe mobile device is at the business location; and (e) wherein power isconserved in the mobile device by displaying the scanning code withoutunlocking the mobile device.
 2. The article of manufacture of claim 1,wherein the scanning code is a QR code.
 3. The article of manufacture ofclaim 1, wherein the scanning code is a barcode.
 4. The article ofmanufacture of claim 1, wherein computer readable program codedisplaying a scanning code over a lock screen wallpaper when the mobiledevice is in a screen locked state and when the mobile device is at thebusiness location comprises computer readable program code displayingthe scanning code over a portion of the lock screen wallpaper.
 5. Thearticle of manufacture of claim 1, wherein computer readable programcode non-intrusively authenticating the at least one secondary user asan authorized user of the mobile device comprises computer readableprogram code non-intrusively performing facial recognition toauthenticate the at least one secondary user that is authorized to usethe mobile device.
 6. The article of manufacture of claim 5, whereincomputer readable program code non-intrusively authenticating the atleast one secondary user as an authorized user of the mobile devicecomprises computer readable program code utilizing a camera in themobile device and non-intrusively performing facial recognition toauthenticate the at least one secondary user that is authorized to usethe mobile device.
 7. The article of manufacture of claim 1, wherein thescanning code encoding payment information for conducting a transactionat the business location.
 8. The article of manufacture of claim 7,wherein the transaction is a cloud-based, card-not-present, transactionat the business location.
 9. The article of manufacture of claim 8, inthe cloud-based, card-not-present transaction, a payment providerautomatically covers transaction cost with issuer linked funds and, in aseparate transaction, the payment provider charging purchaser'sselected, cloud-linked account in a card-not-present transaction
 10. Thearticle of manufacture of claim 1, wherein the non-transitory computerreadable storage medium further comprises computer readable program codereceiving an indication of a completion of a transaction based on thescanning code and, upon receiving the indication, computer readableprogram code displaying over the lock screen wallpaper a balance left onan account associated with the scanning code.
 11. The article ofmanufacture of claim 1, wherein identifying the mobile device is at thebusiness location is based on GPS data.
 12. The article of manufactureof claim 1, wherein identifying the mobile device is at the businesslocation is based upon any of the following interactions with a deviceat the business location: (a) a near field communication (NFC)interaction, (b) an RFID interaction, or (c) a Bluetooth interaction.13. The article of manufacture of claim 1, wherein the mobile device isany of the following: a mobile phone, a tablet, a portable gaming deviceor a digital music player.
 14. The article of manufacture of claim 1,wherein the scanning code encodes user defined customization data inaddition to the payment information.
 15. An article of manufacturehaving non-transitory computer readable storage medium comprisingcomputer readable program code executable by a processor in a mobiledevice, the non-transitory computer readable storage medium comprising:(a) computer readable program code maintaining, in the mobile device, aprofile storing authentication data associated with: (1) a primary userof a mobile device, and (2) at least one secondary user that isauthorized to use the mobile device, the primary user different than theat least one secondary user; (b) computer readable program codeidentifying the mobile device is at a business location; (c) computerreadable program code non-intrusively authenticating, via facialrecognition, the at least one secondary user as an authorized user ofthe mobile device, and upon successful authentication: (d) computerreadable program code displaying a scanning code over a lock screenwallpaper when the mobile device is in a screen locked state and whenthe mobile device is at the business location; and (e) wherein power isconserved in the mobile device by displaying the scanning code withoutunlocking the mobile device.
 16. The article of manufacture of claim 15,wherein the scanning code encoding payment information for conducting atransaction at the business location.
 17. The article of manufacture ofclaim 16, wherein the transaction is a cloud-based, card-not-present,transaction at the business location.
 18. The article of manufacture ofclaim 17, in the cloud-based, card-not-present transaction, a paymentprovider automatically covers transaction cost with issuer linked fundsand, in a separate transaction, the payment provider chargingpurchaser's selected, cloud-linked account in a card-not-presenttransaction
 19. An article of manufacture having non-transitory computerreadable storage medium comprising computer readable program codeexecutable by a processor in a mobile device, the non-transitorycomputer readable storage medium comprising: (a) maintaining, in themobile device, a profile storing authentication data associated with:(1) a primary user of a mobile device, and (2) at least one secondaryuser that is authorized to use the mobile device, the primary userdifferent than the at least one secondary user; (b) identifying themobile device is at a business location; (c) non-intrusivelyauthenticating, via a camera in the mobile device, the at least onesecondary user as an authorized user of the mobile device, and uponsuccessful authentication: (d) displaying a scanning code over a lockscreen wallpaper when the mobile device is in a screen locked state andwhen the mobile device is at the business location; and (e) whereinpower is conserved in the mobile device by displaying the scanning codewithout unlocking the mobile device.
 20. The article of manufacture ofclaim 19, wherein the scanning code encoding payment information forconducting a transaction at the business location.