System, method, and article of manufacture to non-intrusively authenticate one or more secondary users of a mobile device and displaying a scanning code over a lock screen wallpaper of the mobile device

ABSTRACT

A method is described as implemented in a mobile device having a lock screen wallpaper, where the mobile device maintains a profile storing authentication data associated with both a primary user of a mobile device and one or more secondary users that are authorized to use the mobile device. When the mobile device is at a business location, the secondary user(s) are non-intrusively authenticated as authorized user(s) of the mobile device. Upon successful authentication a scanning code is displayed over a lock screen wallpaper of the mobile device, where power is conserved in the mobile device by providing the scanning code to the secondary user(s) without unlocking the mobile device.

RELATED APPLICATION

This application claims the benefit of U.S. application Ser. No.13/896,319 filed May 16, 2013, pending.

FIELD OF INVENTION

The present invention relates generally to the field of mobile devices.More specifically, the present invention is related to a system, method,and article of manufacture to non-intrusively authenticate one or moresecondary users of a mobile device and displaying a scanning code over alock screen wallpaper of the mobile device.

DISCUSSION OF RELATED ART

It is well known in the art to utilize a mobile device, such as acellular phone, to conduct financial transactions. As an example, amobile device can be used to pay for financial transaction at a retailestablishment. One such example is discussed below to note some of theproblems associated with the prior art in conducting such financialtransactions.

A retail establishment, e.g., ABC Coffee Shop, may have a software (mayalso be called an application or app) that a user is able to download onhis/her mobile device. Once the software is downloaded and installed bythe user of the mobile device, the user can then power up/open themobile device, click on an icon representative of the software, and runthe software on the mobile device, which may display, as part of therunning software, a scannable barcode. Users are, therefore, able to usethe software installed on the mobile device to conduct a transaction atthe retail establishment, which in this example is the ABC Coffee Shop,by having someone at the retail establishment scan the barcode, whichallows the user to purchase an item (or items) that he/she desires tobuy.

A problem with this scenario is that the user has to go through numeroussteps in order to access the software and pay for a purchase, whichstarts by unlocking the phone, finding the right page having the iconrepresentative of the desired software, clicking on the icon for thedesired software, navigating within the software to the appropriatelocation to load up the barcode that may be used for payment, andpresenting the barcode to the retail establishment. This process is timeconsuming and is also error-prone.

This problem is further compounded for users with numerous softwareapplications that are currently installed on their mobile device, whichmakes it even more difficult and time consuming to locate and run thesoftware. One mechanism provided for in various mobile devices is theability to search for a software among the list of installed software.But, even this approach requires the user to unlock the phone, type thefirst few characters of the software name (if the user can remember thename) and find an appropriate match in the results for the softwarecorresponding to the retail establishment, i.e., the ABC Coffee Shop,run the software, and navigate within the software to the appropriateportion of the software that deals with conducting a transaction. Thisprocess even more time consuming that the scenario discussed previouslyand is also error-prone.

Additionally, there is no non-intrusive way to authenticate the user asan authorized person to use the mobile device in such a financialtransaction. The prior art provides intrusive mechanisms to verify auser's identity where, for example, a user may be asked to provide a pincode as an input prior to proceeding with a financial transaction.

Embodiments of the present invention are an improvement over prior artsystems and methods.

SUMMARY OF THE INVENTION

In one embodiment, the present invention provides a method comprising:(a) maintaining, in a mobile device, a profile storing authenticationdata associated with: (1) a primary user of a mobile device, and (2) atleast one secondary user that is authorized to use the mobile device;(b) identifying the mobile device is at a business location; (c)non-intrusively authenticating the at least one secondary user as anauthorized user of the mobile device, and upon successfulauthentication: (d) displaying a scanning code over a lock screenwallpaper when the mobile device is in a screen locked state and whenthe mobile device is at the business location; and (e) wherein power isconserved in the mobile device by display the scanning code withoutunlocking the mobile device.

In yet another embodiment, the present invention provides a mobiledevice comprising: a processor; a display; storage storing computerreadable programmable code, which when executed by the processorimplements a method to conserve power in the mobile device, the storagecomprising computer readable program code to: (a) maintain, in a mobiledevice, a profile storing authentication data associated with: (1) aprimary user of a mobile device, and (2) at least one secondary userthat is authorized to use the mobile device; (b) identify the mobiledevice is at a business location; (c) non-intrusively authenticate theat least one secondary user as an authorized user of the mobile device,and upon successful authentication: (d) display a scanning code over alock screen wallpaper when the mobile device is in a screen locked stateand when the mobile device is at the business location; and (e) whereinpower is conserved in the mobile device by display the scanning codewithout unlocking the mobile device.

In another embodiment, the present invention provides a methodcomprising: (a) maintaining, in a mobile device, a profile storingauthentication data associated with:

(1) a primary user of a mobile device, and (2) at least one secondaryuser that is authorized to use the mobile device; (b) identifying themobile device is at a business location; (c) non-intrusivelyauthenticating, via facial recognition, the at least one secondary useras an authorized user of the mobile device, and upon successfulauthentication: (d) displaying a scanning code over a lock screenwallpaper when the mobile device is in a screen locked state and whenthe mobile device is at the business location; and (e) wherein power isconserved in the mobile device by displaying the scanning code withoutunlocking the mobile device.

In yet another embodiment, the present invention provides a mobiledevice comprising: a processor; a display; storage storing computerreadable programmable code, which when executed by the processorimplements a method to conserve power in the mobile device, the storagecomprising computer readable program code to: (a) maintain, in a mobiledevice, a profile storing authentication data associated with: (1) aprimary user of a mobile device, and (2) at least one secondary userthat is authorized to use the mobile device; (b) identify the mobiledevice is at a business location; (c) non-intrusively authenticate, viafacial recognition, the at least one secondary user as an authorizeduser of the mobile device, and upon successful authentication: (d)display a scanning code over a lock screen wallpaper when the mobiledevice is in a screen locked state and when the mobile device is at thebusiness location; and (e) wherein power is conserved in the mobiledevice by displaying the scanning code without unlocking the mobiledevice.

In yet another embodiment, the present invention provides a methodcomprising: (a) maintaining, in a mobile device, a profile storingauthentication data associated with: (1) a primary user of a mobiledevice, and (2) at least one secondary user that is authorized to usethe mobile device; (b) identifying the mobile device is at a businesslocation; (c) non-intrusively authenticating, via a camera in the mobiledevice, the at least one secondary user as an authorized user of themobile device, and upon successful authentication: (d) displaying ascanning code over a lock screen wallpaper when the mobile device is ina screen locked state and when the mobile device is at the businesslocation; and (e) wherein power is conserved in the mobile device bydisplay the scanning code without unlocking the mobile device.

In yet another embodiment, the present invention provides a mobiledevice comprising: a processor; a display; storage storing computerreadable programmable code, which when executed by the processorimplements a method to conserve power in the mobile device, the storagecomprising computer readable program code to: (a) maintain in a mobiledevice, a profile storing authentication data associated with: (1) aprimary user of a mobile device, and (2) at least one secondary userthat is authorized to use the mobile device; (b) identify the mobiledevice is at a business location; (c) non-intrusively authenticate, viaa camera in the mobile device, the at least one secondary user as anauthorized user of the mobile device, and upon successfulauthentication: (d) display a scanning code over a lock screen wallpaperwhen the mobile device is in a screen locked state and when the mobiledevice is at the business location; and (e) wherein power is conservedin the mobile device by displaying the scanning code without unlockingthe mobile device.

In another embodiment, the present invention a method comprising: (a)maintaining, in a mobile device, a profile storing authentication dataassociated with: (1) a primary user of a mobile device, and (2) at leastone secondary user that is authorized to use the mobile device; (b)identifying the mobile device is at a business location; (c) utilizing acamera in the mobile device and non-intrusively authenticating, viafacial recognition, the at least one secondary user as an authorizeduser of the mobile device, and upon successful authentication: (d)displaying a scanning code over a lock screen wallpaper when the mobiledevice is in a screen locked state and when the mobile device is at thebusiness location; and (e) wherein power is conserved in the mobiledevice by display the scanning code without unlocking the mobile device.

In yet another embodiment, the present invention provides a mobiledevice comprising: a processor; a display; storage storing computerreadable programmable code, which when executed by the processorimplements a method to conserve power in the mobile device, the storagecomprising computer readable program code to: (a) maintain, in a mobiledevice, a profile storing authentication data associated with: (1) aprimary user of a mobile device, and (2) at least one secondary userthat is authorized to use the mobile device; (b) identify the mobiledevice is at a business location; (c) utilize a camera in the mobiledevice and non-intrusively authenticating, via facial recognition, theat least one secondary user as an authorized user of the mobile device,and upon successful authentication: (d) display a scanning code over alock screen wallpaper when the mobile device is in a screen locked stateand when the mobile device is at the business location; and (e) whereinpower is conserved in the mobile device by displaying the scanning codewithout unlocking the mobile device.

In yet another embodiment, the present invention provides a methodcomprising: (a) maintaining, in a mobile device, a profile storingauthentication data associated with: (1) a primary user of a mobiledevice, and (2) at least one secondary user that is authorized to usethe mobile device; (b) identifying the mobile device is at a businesslocation; (c) non-intrusively authenticating the primary user as anauthorized user of the mobile device, and upon successfulauthentication: (d) displaying a scanning code over a lock screenwallpaper when the mobile device is in a screen locked state and whenthe mobile device is at the business location; (e) identifying themobile device is back at the business location; (f) non-intrusivelyauthenticating the at least one secondary user as an authorized user ofthe mobile device, and upon successful authentication: (g) displayingthe scanning code over the lock screen wallpaper when the mobile deviceis in a screen locked state and when the mobile device is at thebusiness location; (h) wherein power is conserved in the mobile deviceby display the scanning code without unlocking the mobile device forboth the primary user and the at least one secondary user.

In yet another embodiment, the present invention provides a mobiledevice comprising: a processor; a display; storage storing computerreadable programmable code, which when executed by the processorimplements a method to conserve power in the mobile device, the storagecomprising computer readable program code to: (a) maintain, in a mobiledevice, a profile storing authentication data associated with: (1) aprimary user of a mobile device, and (2) at least one secondary userthat is authorized to use the mobile device; (b) identify the mobiledevice is at a business location; (c) non-intrusively authenticate theprimary user as an authorized user of the mobile device, and uponsuccessful authentication: (d) display a scanning code over a lockscreen wallpaper when the mobile device is in a screen locked state andwhen the mobile device is at the business location; (e) identify themobile device is back at the business location; (f) non-intrusivelyauthenticate the at least one secondary user as an authorized user ofthe mobile device, and upon successful authentication: (g) display thescanning code over the lock screen wallpaper when the mobile device isin a screen locked state and when the mobile device is at the businesslocation; (h) wherein power is conserved in the mobile device bydisplaying the scanning code without unlocking the mobile device forboth the primary user and the at least one secondary user.

In yet another embodiment, the present invention provides for a methodcomprising: (a) maintaining, in a mobile device, a profile storingauthentication data associated with: (1) a primary user of a mobiledevice, and (2) at least one secondary user that is authorized to usethe mobile device; (b) identifying the mobile device is at a businesslocation; (c) non-intrusively authenticating the at least one secondaryuser as an authorized user of the mobile device, and upon successfulauthentication: (c1) displaying an image having a scanning code over aportion of a default lock screen wallpaper when the mobile device is ina screen locked state; (c2) facilitating a transaction at the businesslocation based on the scanning code displayed over the portion of thedefault lock screen wallpaper when the mobile device remains in thescreen locked state without unlocking the mobile device; and (d) whereinpower is conserved in the mobile device by not unlocking it at thebusiness location to conduct the financial transaction.

In yet another embodiment, the present invention provides a mobiledevice comprising: a processor; a display; storage storing computerreadable programmable code, which when executed by the processorimplements a method to conserve power in the mobile device, the storagecomprising computer readable program code to: (a) maintain, in a mobiledevice, a profile storing authentication data associated with: (1) aprimary user of a mobile device, and (2) at least one secondary userthat is authorized to use the mobile device; (b) identify the mobiledevice is at a business location; (c) non-intrusively authenticate theat least one secondary user as an authorized user of the mobile device,and upon successful authentication: (c1) display an image having ascanning code over a portion of a default lock screen wallpaper when themobile device is in a screen locked state; (c2) facilitate a transactionat the business location based on the scanning code displayed over theportion of the default lock screen wallpaper when the mobile deviceremains in the screen locked state without unlocking the mobile device;and (d) wherein power is conserved in the mobile device by not unlockingit at the business location to conduct the financial transaction.

In another embodiment, the present invention provides a methodcomprising: (a) maintaining, in a mobile device, a profile storingauthentication data associated with: (1) a primary user of a mobiledevice, and (2) at least one secondary user that is authorized to usethe mobile device; (b) identifying the mobile device is at a businesslocation; (c) non-intrusively authenticating the primary user, and uponsuccessful authentication of the primary user: (c1) displaying an imagehaving a scanning code over a portion of a default lock screen wallpaperwhen the mobile device is in a screen locked state, (c2) facilitating afinancial transaction at the business location based on the scanningcode displayed over the portion of the default lock screen wallpaperwhen the mobile device remains in the screen locked state withoutunlocking the mobile device; and (d) identifying the mobile device isback at the business location; (e) non-intrusively authenticating the atleast one secondary user, and upon successful authentication: (e1)displaying the image having a scanning code over the portion of adefault lock screen wallpaper when the mobile device is in a screenlocked state, (e2) facilitating another financial transaction at thebusiness location based on the scanning code displayed over the portionof the default lock screen wallpaper when the mobile device remains inthe screen locked state without unlocking the mobile device; and (f)wherein power is conserved in the mobile device by not unlocking it atthe business location to conduct the financial transaction and theanother financial transaction for both the primary user and the at leastone secondary user.

In yet another embodiment, the present invention provides a mobiledevice comprising: a processor; a display; storage storing computerreadable programmable code, which when executed by the processorimplements a method to conserve power in the mobile device, the storagecomprising computer readable program code to: (a) maintain, in a mobiledevice, a profile storing authentication data associated with: (1) aprimary user of a mobile device, and (2) at least one secondary userthat is authorized to use the mobile device; (b) identify the mobiledevice is at a business location; (c) non-intrusively authenticate theprimary user, and upon successful authentication of the primary user:(c1) display an image having a scanning code over a portion of a defaultlock screen wallpaper when the mobile device is in a screen lockedstate, (c2) facilitate a financial transaction at the business locationbased on the scanning code displayed over the portion of the defaultlock screen wallpaper when the mobile device remains in the screenlocked state without unlocking the mobile device; and (d) identify themobile device is back at the business location; (e) non-intrusivelyauthenticate the at least one secondary user, and upon successfulauthentication: (e1) display the image having a scanning code over theportion of a default lock screen wallpaper when the mobile device is ina screen locked state, (e2) facilitate another financial transaction atthe business location based on the scanning code displayed over theportion of the default lock screen wallpaper when the mobile deviceremains in the screen locked state without unlocking the mobile device;and (f) wherein power is conserved in the mobile device by not unlockingit at the business location to conduct the financial transaction and theanother financial transaction for both the primary user and the at leastone secondary user.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates an embodiment of the present invention to facilitatea financial transaction without unlocking a mobile device.

FIG. 2 illustrates another embodiment of the present invention tofacilitate a financial transaction without unlocking a mobile device.

FIG. 3 depicts a non-limiting example of a mobile device according tothe present invention.

FIG. 4 depicts an example of such an image having the scannable codewherein the image is rendered as the lock screen wallpaper.

FIG. 5 depicts an example of a default lock screen wallpaper.

FIG. 6 depicts an example where the image having the scanning code iscentered and partially covers the default lock screen wallpaper of FIG.5.

FIG. 7 depicts an example of an image showing the scanning code and anaccount balance.

FIG. 8 depicts an example of a digital receipt shown as part of the lockscreen background.

DESCRIPTION OF THE PREFERRED EMBODIMENTS

While this invention is illustrated and described in a preferredembodiment, the invention may be produced in many differentconfigurations. There is depicted in the drawings, and will herein bedescribed in detail, a preferred embodiment of the invention, with theunderstanding that the present disclosure is to be considered as anexemplification of the principles of the invention and the associatedfunctional specifications for its construction and is not intended tolimit the invention to the embodiment illustrated. Those skilled in theart will envision many other possible variations within the scope of thepresent invention.

FIG. 1 illustrates an embodiment of the present invention whichdiscloses method 100 to facilitate a financial transaction withoutunlocking a mobile device. In step 102, the mobile device is identifiedto be at a business location. In one embodiment, the mobile device isidentified as being located at the business location based on GPS datareceived at the mobile device. In another embodiment, the mobile deviceis identified as being located at the business location based upon anear field communication (NFC) interaction with a device at the businesslocation. For example, the device at the business location may be a NFCtag and the mobile device may interact with such a NFC tag to confirmthat it is located at a particular business location. In yet anotherextended embodiment, the NFC tag is either integrated into apoint-of-sale terminal or is attached to a point-of-sale terminal at thebusiness location.

In another embodiment, the mobile device is identified as being locatedat the business location based on a RFID interaction with a device atthe business location. For example, the device at the business locationmay be a RFID tag and the mobile device may interact with such a RFIDtag to confirm that it is located at a particular business location. Inyet another extended embodiment, the RFID tag is either integrated intoa point-of-sale terminal or is attached to a point-of-sale terminal atthe business location.

In yet another embodiment the mobile device is identified as beinglocated at the business location based on a Bluetooth interaction with adevice at the business location. For example, the device at the businesslocation may be a point-of-sale terminal that can communicate viaBluetooth with the mobile device.

In step 104, the mobile device passively authenticates a user as anauthorized user of the mobile device. It is important to note that inthe preferred embodiment, the authentication of the user is done in anon-invasive manner, where the user is unaware that such anauthentication is taking place. Such non-invasive techniques includefingerprint recognition when the user places their hand on the screen,where such fingerprint recognition is done without the knowledge of theuser, facial recognition where such facial recognition is done withoutthe knowledge of the user, retinal authentication where such retinalauthentication is done without the knowledge of the user, authenticationbased on identifying the presence of another electronic device (e.g.,another tablet, mobile device, etc.) which is also associated with thesame user, or accessing a profile and authenticating said user as anauthorized user when there is a match between a current time (they areat the business location) and a past time in said profile (when the sameuser has visited the same business location in the past). It shouldfurther be noted that while there is always a primary user associatedwith a mobile device, there may also be secondary users associated withthe same mobile device. For example, the same mobile device may be usedby a husband and wife, son or daughter, as the primary user mayauthorize such secondary users to be authorized users of the mobiledevice. A user of the mobile device may maintain a profile andcorresponding passive recognition data to identify a plurality of suchauthorized users of the same mobile device.

Upon successfully authenticating an authorized user, in step 106, aprocessor in the mobile device dynamically sets a lock screen wallpaperin the mobile device to an image having a scanning code (e.g., a QRcode, a barcode, etc.) for use at the business location the user is at.It is important to note that the lock screen wallpaper, which isdisplayed when the mobile device is in a locked state to conserve power,is updated, and not the home screen wallpaper, which is generallydisplayed when a mobile device is not in a locked state.

In step 108, a display of the mobile device is activated and the imagehaving the scannable code is rendered as the lock screen wallpaper onthe activated display of the mobile device which remains in the screenlocked state. Such activation may be user initiated or triggeredautomatically (e.g., when the mobile device is proximate to a point ofsale terminal). FIG. 4 depicts an example of such an image having thescannable code wherein the image is rendered as the lock screenwallpaper.

In step 110, a financial transaction is facilitated at the businesslocation based on the scannable code displayed as the lock screenwallpaper of the mobile device, wherein such a financial transaction isfacilitated without having to unlock the mobile device. For example, theattendant at the point of sale terminal may scan the scannable codedisplayed as the lock screen wallpaper of the mobile device and afinancial transaction could be completed at the point of sale terminalfor an item (or items) the user may wish to purchase at the businesslocation.

In an alternative embodiment, the image having a scanning code (e.g., aQR code, a barcode, etc.) may be rendered in front of a default lockscreen wallpaper (where it visually covers the entirety of the defaultlock screen wallpaper and looks like FIG. 4) or in front of a portion ofthe default lock screen wallpaper (see FIG. 5 for an example of adefault lock screen wallpaper, and FIG. 6 for an example where the imagehaving the scanning code is centered and partially covers the defaultlock screen wallpaper), where the default lock screen wallpaper iseither a custom image previously set by the user of the mobile device oris the system default of the mobile device (the system default image forthe lock screen wallpaper when the user has not previously set the lockscreen wallpaper to a custom image). The point of sale terminal is ableto scan the scannable code to complete a purchase at the businesslocation.

In one embodiment, the method further comprises reverting the lockscreen wallpaper to a default lock screen wallpaper (i.e., a lock screenwallpaper previously set by a user) upon either a successful completionof the financial transaction or upon the user leaving the premises ofthe business location.

In one embodiment, the financial transaction is associated with afinancial account (e.g., an account associated with a credit cardaccount, a gift card, a credit account associated with the business,etc.) and the method further comprises updating the lock screenwallpaper to another image showing a balance left on the financialaccount after successful completion of the financial transaction. Afterdisplaying the image showing the balance as the lock screen wallpaper,the mobile device may revert to a default lock screen wallpaper (i.e., alock screen wallpaper previously set by a user) upon either theexpiration of a pre-determined time (e.g., a few seconds after thedisplay of the image showing the balance) or upon the user leaving thepremises of the business location.

In one embodiment, the image having a scanning code for use at thebusiness additionally displays a balance associated with a financialaccount which is used during the financial transaction. Such an exampleis shown in FIG. 7 which depicts the scanning code and the balance aspart of the lock screen image.

In one embodiment, after successful completion of the financialtransaction, the lock screen wallpaper is updated to display a digitalreceipt as new lock screen wallpaper. Such an example is shown in FIG.8. The digital receipt image may be received from a device at thebusiness location like a point of sale terminal or may be received overa network such as the Internet or via the cellular network. Afterdisplaying the image showing the digital receipt as the lock screenwallpaper, the mobile device may revert to a default lock screenwallpaper (i.e., a lock screen wallpaper previously set by a user) uponeither the expiration of another pre-determined time (e.g., a fewseconds after the display of the image showing the digital receipt) orupon the user leaving the premises of the business location.

In one embodiment, the scannable code comprises user-definedcustomization data related to the financial transaction in addition toinformation required to perform the financial transaction. For example,the user may have previously stored data identifying order detailsassociated with a drink (e.g., type of drink—coffee/espresso/cappuccino,syrup additives, number of pumps of syrup additives, type of milk to beused to make drink, etc.) or order details associated with a food item(type of toppings on a pizza, requested condiments, etc.) and thispreviously stored information regarding the order details may be encodedinto the scannable code (at either the request of the user or isautomatically identified via a profile storing what was previouslyordered at the business location and is presented to the user forverification prior to being encoded as the scannable code), where thepoint of sale terminal may decode this information and the attendant atthe point of sale terminal can review the order details. Such orderdetails that may be encoded along with information required to perform afinancial transaction may be useful in getting an order correct as it isdirectly from the user and is not based on the attendant at the point ofsale terminal inputting such data, which by definition is error prone.

In one embodiment, the financial transaction is a cloud-basedtransaction, wherein a payment provider automatically covers the cost ofa purchase with issuer linked funds and, in a separate transaction, thepayment provider charging the purchaser's selected, cloud-linked accountin a card-not-present environment to recoup its losses on the firsttransaction.

In one embodiment, the image having a scanning code for use at thebusiness location is generated by a software running on the mobiledevice, wherein the software is associated with the business location.

Non-limiting examples of the mobile device include any of the following:a mobile phone, a tablet, a portable gaming device or a digital musicplayer.

FIG. 2 illustrates another embodiment of the present invention's methodto facilitate a financial transaction without unlocking a mobile device,wherein the method comprises the steps of: identifying the mobile deviceis at a business location (step 202); passively authenticating a user ofthe mobile device as an authorized user of the mobile device near apoint of sale terminal at the business location (step 204), and uponsuccessful authentication: dynamically setting lock screen wallpaper inthe mobile device to an image having a scanning code for use at thebusiness location (step 206); activating a display of the mobile deviceand rendering the image having a scannable code as the lock screenwallpaper on the activated display of the mobile device which remains inthe screen locked state (step 208); and facilitating a financialtransaction at the business location based on the scannable codedisplayed as the lock screen wallpaper of the mobile device, thefinancial transaction facilitated without having to unlock the mobiledevice (step 210).

The above-presented discussion with regards to FIG. 1 applies to FIG. 2,but it should be noted that in this embodiment, the passiveauthentication is done while the user is near the point of sale terminalat the business location.

FIG. 3 depicts a non-limiting example of a mobile device 300 accordingto the present invention. While select components (processor 302 memory304, display 306 (e.g. a touch screen display), speaker 308, microphone310, camera 312, wireless electronics 314 required for wirelesscommunication, GPS unit 316) are shown as being part of the mobiledevice 300, it should be noted that these components are provided as asimplistic case scenario and other known components (such as, but notlimited to, a Bluetooth module, a NFC module, a RFID module), may bepresent within the mobile device 300. Mobile device 300 comprises: aprocessor 302; a display 306; and memory/storage 304 storing computerreadable programmable code, which when executed by the processorimplements a method to facilitate a financial transaction withoutunlocking a mobile device, the memory/storage 304 comprising computerreadable program code to: identify the mobile device 300 is at abusiness location (using for example, GPS 316); passively authenticate auser of the mobile device 300 as an authorized user of the mobile device(using, for example, camera 312 to passively conduct facial recognitionor using touch screen display 306 to passively conduct fingerprintrecognition or passively inspecting a profile stored in memory 304 or aprofile stored at a network location which is downloaded to memory 304to identify if the user has been to the business location at about thesame time in the past), and upon successful authentication: dynamicallyset lock screen wallpaper in the mobile device 300 to an image having ascanning code for use at the business location; activate the display 306of the mobile device 300 and render the image having a scannable code asthe lock screen wallpaper on the activated display 306 of the mobiledevice 300 which remains in the screen locked state; and facilitate afinancial transaction at the business location based on the scannablecode displayed as the lock screen wallpaper of the mobile device 300,the financial transaction facilitated without having to unlock themobile device 300. It should be noted that the mobile device may includeany of the following: a mobile phone, a tablet, a portable gaming deviceor a digital music player.

Additionally, the present invention provides for an article ofmanufacture comprising computer readable program code contained withinimplementing one or more modules to facilitate a financial transactionwithout unlocking a mobile device. Furthermore, the present inventionincludes a computer program code-based product, which is a storagemedium having program code stored therein which can be used to instructa computer/processor to perform any of the methods associated with thepresent invention. The computer storage medium includes any of, but isnot limited to, the following: CD-ROM, DVD, magnetic tape, optical disc,hard drive, floppy disk, ferroelectric memory, flash memory,ferromagnetic memory, optical storage, charge coupled devices, magneticor optical cards, smart cards, EEPROM, EPROM, RAM, ROM, DRAM, SRAM,SDRAM, or any other appropriate static or dynamic memory or data storagedevices.

The present invention also provides for an article of manufacture havingnon-transitory computer readable storage medium comprising computerreadable program code executable by a processor to implement a method tofacilitate a financial transaction without unlocking a mobile device,the non-transitory computer readable storage medium comprising: computerreadable program code identifying the mobile device is at a businesslocation; computer readable program code passively authenticating a userof the mobile device as an authorized user of the mobile device, andupon successful authentication: computer readable program codedynamically setting lock screen wallpaper in the mobile device to animage having a scanning code (e.g., a QR code, a to barcode, etc.) foruse at the business location; computer readable program code activatinga display of the mobile device and rendering the image having ascannable code as the lock screen wallpaper on the activated display ofthe mobile device which remains in the screen locked state; and computerreadable program code facilitating a financial transaction at thebusiness location based on the scannable code displayed as the lockscreen wallpaper of the mobile device, the financial transactionfacilitated without having to unlock the mobile device.

CONCLUSION

A system, method and article of manufacture has been shown in the aboveembodiments for the effective implementation of a system, method andarticle of manufacture to non-intrusively authenticate one or moresecondary users of a mobile device and displaying a scanning code over alock screen wallpaper of the mobile device While various preferredembodiments have been shown and described, it will be understood thatthere is no intent to limit the invention by such disclosure, butrather, it is intended to cover all modifications falling within thespirit and scope of the invention, as defined in the appended claims.For example, the present invention should not be limited bysoftware/program, computing environment, mobile environment, specificcomputing hardware, or specific mobile hardware.

The invention claimed is:
 1. A method comprising: (a) maintaining, in amobile device, a profile storing authentication data associated with:(1) a primary user of a mobile device, and (2) at least one secondaryuser that is authorized to use the mobile device, the primary userdifferent than the at least one secondary user; (b) identifying themobile device is at a business location; (c) non-intrusivelyauthenticating the at least one secondary user as an authorized user ofthe mobile device, and upon successful authentication: (d) displaying ascanning code over a lock screen wallpaper when the mobile device is ina screen locked state and when the mobile device is at the businesslocation; and (e) wherein power is conserved in the mobile device bydisplaying the scanning code without unlocking the mobile device.
 2. Themethod of claim 1, wherein the scanning code is a QR code.
 3. The methodof claim 1, wherein the scanning code is a barcode.
 4. The method ofclaim 1, wherein the step of displaying a scanning code over the lockscreen wallpaper comprises the step of displaying the scanning code overa portion of the lock screen wallpaper.
 5. The method of claim 1,wherein the non-intrusively authenticating step (c) comprisesnon-intrusively performing facial recognition to authenticate the atleast one secondary user that is authorized to use the mobile device. 6.The method of claim 5, wherein the non-intrusively authenticating step(c) comprises utilizing a camera in the mobile device andnon-intrusively performing facial recognition to authenticate the atleast one secondary user that is authorized to use the mobile device. 7.The method of claim 1, wherein the scanning code encoding paymentinformation for conducting a transaction at the business location. 8.The method of claim 7, wherein the transaction is a cloud-based,card-not-present, transaction at the business location.
 9. The method ofclaim 8, in the cloud-based, card-not-present transaction, a paymentprovider automatically covers transaction cost with issuer linked fundsand, in a separate transaction, the payment provider chargingpurchaser's selected, cloud-linked account in a card-not-presenttransaction.
 10. The method of claim 1, wherein the method furthercomprises receiving an indication of a completion of a transaction basedon the scanning code and, upon receiving the indication, displaying overthe lock screen wallpaper a balance left on an account associated withthe scanning code.
 11. The method of claim 1, wherein the step ofidentifying the mobile device is at the business location is based onGPS data.
 12. The method of claim 1, wherein the step of identifying themobile device is at the business location is based upon any of thefollowing interactions with a device at the business location: (a) anear field communication (NFC) interaction, (b) an RFID interaction, or(c) a Bluetooth interaction.
 13. The method of claim 1, wherein themobile device is any of the following: a mobile phone, a tablet, aportable gaming device or a digital music player.
 14. The method ofclaim 1, wherein the scanning code encodes user defined customizationdata in addition to the payment information.
 15. A method comprising:(a) maintaining, in a mobile device, a profile storing authenticationdata associated with: (1) a primary user of a mobile device, and (2) atleast one secondary user that is authorized to use the mobile device,the primary user different than the at least one secondary user; (b)identifying the mobile device is at a business location; (c)non-intrusively authenticating, via facial recognition, the at least onesecondary user as an authorized user of the mobile device, and uponsuccessful authentication: (d) displaying a scanning code over a lockscreen wallpaper when the mobile device is in a screen locked state andwhen the mobile device is at the business location; and (e) whereinpower is conserved in the mobile device by displaying the scanning codewithout unlocking the mobile device.
 16. The method of claim 15, whereinthe scanning code encoding payment information for conducting atransaction at the business location.
 17. The method of claim 16,wherein the transaction is a cloud-based, card-not-present, transactionat the business location.
 18. The method of claim 17, in thecloud-based, card-not-present transaction, a payment providerautomatically covers transaction cost with issuer linked funds and, in aseparate transaction, the payment provider charging purchaser'sselected, cloud-linked account in a card-not-present transaction.
 19. Amethod comprising: (a) maintaining, in a mobile device, a profilestoring authentication data associated with: (1) a primary user of amobile device, and (2) at least one secondary user that is authorized touse the mobile device, the primary user different than the at least onesecondary user; (b) identifying the mobile device is at a businesslocation; (c) non-intrusively authenticating, via a camera in the mobiledevice, the at least one secondary user as an authorized user of themobile device, and upon successful authentication: (d) displaying ascanning code over a lock screen wallpaper when the mobile device is ina screen locked state and when the mobile device is at the businesslocation; and (e) wherein power is conserved in the mobile device bydisplaying the scanning code without unlocking the mobile device. 20.The method of claim 19, wherein the scanning code encoding paymentinformation for conducting a transaction at the business location.