Electronic mechanism to self-authenticate and automate actions

ABSTRACT

Systems and methods for a authenticating a user on an alien electronic device is described. The system may include a first device associated with a first user and a second device associated with a second user. The first device may include a non-transitory memory and one or more hardware processors coupled to the non-transitory memory and configured to read instructions from the non-transitory memory to cause the first device to perform operations that include receiving from the second user, an identification data of the second user, determining that the identification data of the second user does not correspond to the first device, searching for the second device associated with the identification data of the second user, receiving an indication from the second device confirming that the identification data of the second user is associated with the second device, and initiating data communication between the first device and the second device.

RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No. 15/170,679, filed Jun. 1, 2016, which is incorporated herein by reference in its entirety.

BACKGROUND

The present application generally relates to an electronic method for authenticating a user on an alien device, and more specifically to an electronic mechanism to self-authenticate and automate actions.

Personal electronic devices are utilized these days to perform a variety of functions. Such functions include storing personal information such as phone numbers and email addresses, sharing stored information with other devices, and/or conducting financial transactions such as making a payment. These functions may be performed manually on the electronic devices, for example, by manually typing in name and contact information of a friend. In other examples, if the user wants to make an electronic payment transaction to a friend, the user may log in to his bank account or a payment provider account (e.g., PAYPAL® account) and manually initiate a payment transaction. However, these manual methods can be cumbersome to perform. Furthermore, manual performances can be prone to errors such as typographical errors. Thus, an automated method for performing such transactions in a secure manner is desirable.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is an illustration of an exemplary electronic device, according to an embodiment of the present disclosure.

FIG. 2 is an illustration of a system including a pair of electronic devices configured to authenticate and exchange data between each other, according to an embodiment of the present disclosure.

FIG. 3 is an illustration of a system including a pair of electronic devices configured to authenticate and exchange data between each other via a cloud network, according to an embodiment of the present disclosure.

FIG. 4 is an illustration of a system including a plurality of electronic devices configured to authenticate and exchange data, according to another embodiment of the present disclosure.

FIG. 5 is a flowchart of a process for authenticating a first smartphone with a second smartphone, according to an embodiment of the disclosure.

FIG. 6 is a flowchart of a process for authenticating a customer's smartphone with a merchant's computer, according to an embodiment of the disclosure.

FIG. 7 is a block diagram of a computer system suitable for implementing a network server, according to an embodiment of the present disclosure.

Embodiments of the present disclosure and their advantages are best understood by referring to the detailed description that follows. It should be appreciated that like reference numerals are used to identify like elements illustrated in one or more of the figures, wherein showings therein are for purposes of illustrating embodiments of the present disclosure and not for purposes of limiting the same.

DETAILED DESCRIPTION

The detailed description set forth below, in connection with the appended drawings, is intended as a description of various configurations and is not intended to represent the only configurations in which the concepts described herein may be practiced. The detailed description includes specific details for the purpose of providing a thorough understanding of the various concepts. However, it will be apparent to those skilled in the art that these concepts may be practiced without these specific details. In some instances, well-known structures and components are shown in block diagram form in order to avoid obscuring such concepts. In the drawings, the relative sizes of elements, layers, and regions may be exaggerated for clarity.

In the present disclosure, reference will be made to a smartphone as an exemplary electronic device for describing various aspects of the embodiments. Therefore, even though the description will be made with reference to smartphones, the electronic devices are not limited to just smartphones but rather any other electronic devices such as tablets or laptop computers, etc., including a transaction processing device, such as a merchant point of sale (POS) device, and descriptions directed to smartphones also apply to other electronic devices. Furthermore, the terms “smartphone” and “electronic device” may be used interchangeably throughout the present disclosure.

Embodiments of the disclosure are directed to a system and a method for authenticating users on alien smartphones and automating actions between one or more smartphones. For example, when people share personal information such as phone numbers, email addresses, etc., with each other, they typically solicit such information verbally and then store that information on personal electronic devices such as a smartphone. In other instances, people may solicit business cards from each other as a way to exchange information. However, these methods can be a burden for the person having to speak or write down the information while the other person writes down or enters the information in their smartphone. Furthermore, the process of exchanging information is also prone to errors. For example, the person receiving the information may make a typographical error when entering the information into the smartphone. The person providing the information may misstate the information, or the information may be misheard by the receiving party during the exchange. Such potential for errors and the burden can be reduced by electronically exchanging information between a first smartphone and a second smartphone. For example, a first electronic device may be associated with a first person, and the first person may electronically provide data (e.g., contact information) from the first electronic device to a second electronic device that is associated to a second person.

According to an embodiment, the identity of the users of the electronic devices should be authenticated before transferring the data to ensure that the data is provided to the electronic device of the intended user. In one embodiment, a first user (e.g., a consumer) associated with a first device (e.g., a smartphone) desires to have data communicated to a second device (e.g., a merchant POS or another smartphone) associated with a second user (e.g., a merchant or another user). The first user authenticates through the second device, such as by using a biometric (e.g., placing the first user's finger on a scanner of the second device) or entering a password or PIN along with an identifier of the first user (such as a name or phone number). The second device, recognizing that the entered data is not associated with the second user, searches local devices associated with the data received by the second device. If a match is found, the second device communicates a notification of a match or authentication data to the found device (i.e., the first device). Based on the match notification and/or the authentication data, the first device then communicates information to or shares information with the second device, such as payment credentials, contact information, phones, or any suitable digital content. The first device can also receive content from the second device. Each device can then use that information as appropriate, such as the second device processing a payment transaction between the first user and the second user. Limits can be placed by the user or users on what information can be shared or actions performed in such a situation and can vary based on the type of authentication provided on the alien device (e.g., different fingerprints from different fingers of a user, different authenticators, etc.). For example, an index finger authentication may not permit a payment process, while a thumb authentication may allow funding data to be shared and a payment processed. As such, authentication can be performed on a device not associated with the user (an alien device) and digital content or data can be shared between the user device and the alien device safely after authentication.

FIG. 1 is a block diagram of an exemplary electronic device such as a smartphone 100, according to an embodiment. The smartphone 100 includes a transceiver 102, a memory 104, a processor 106, a user interface 108, a data store 110, a location determination system 112, a position sensor 114, wireless communication sensors 116, and a biometric scanner 118. These elements may be in direct or indirect communication with each other, for example via one or more buses.

The transceiver 102 may include a modem subsystem and a radio frequency (RF) unit and be configured to communicate bi-directionally with other devices, such as other mobile communications devices and/or networks. The memory 104 may include a cache memory (e.g., a cache memory of the processor 106), random access memory (RAM), magnetoresistive RAM (MRAM), read-only memory (ROM), programmable read-only memory (PROM), erasable programmable read only memory (EPROM), electrically erasable programmable read only memory (EEPROM), flash memory, solid state memory device, hard disk drives, other forms of volatile and non-volatile memory, or a combination of different types of memory. In an embodiment, the memory 104 includes a non-transitory computer-readable medium.

The memory 104 may store instructions that, when executed by the processor 106, cause the processor 106 to perform the operations described herein in connection with embodiments of the present disclosure. Instructions may also be referred to as code. The terms “instructions” and “code” may include any type of computer-readable statement(s). For example, the terms “instructions” and “code” may refer to one or more programs, routines, sub-routines, functions, procedures, etc. “Instructions” and “code” may include a single computer-readable statement or many computer-readable statements.

The processor 106 may include a central processing unit (CPU), a digital signal processor (DSP), an application-specific integrated circuit (ASIC), a controller, a field programmable gate array (FPGA) device, another hardware device, a firmware device, or any combination thereof configured to perform the operations described herein and discussed in more detail below. The processor 106 may also be implemented as a combination of computing devices, e.g., a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration. The processor 106 may be a single processor or multiple processors, where each processor may have one or more processing cores capable of parallel and/or sequential operation.

The user interface 108 may include an input component and an output component. For example, the user interface 108 may include a touchscreen interface that outputs data for visual use as well as receives/processes one or more touches/swipes/gestures to be potentially interpreted according to embodiments of the present disclosure such as discussed with respect to swipe interpretation system 116. Further, the user interface 108 may be used to display one or more notifications, elements of information, and application data according to embodiments of the present disclosure. The user interface 108 may also include one or more lights (e.g., LEDs) separate from a touchscreen, a vibration generator, a speaker, a microphone, input for a mouse, input for a keyboard, etc. useful for providing feedback to a user as well as receiving further input therefrom.

The data store 110 may be, for example, a hard drive, flash drive, storage array, or other type of storage. The data store 110 may store notifications, transferred information, location information, map information, and/or update information (e.g., as an “app”).

In an embodiment, the location determination system 112 may include one or more transceivers to enable communication with a global navigation satellite system. The smartphone 100 may further include assisted-GPS for enhanced signal acquisition/location quality.

The position sensor 114 may be an orientation and/or motion detection component, such as a gyroscope and/or accelerometer. It may be used in combination with gesture detection according to embodiments of the present disclosure, such as for confirmation to send information to another device or to accept receipt of information from another device.

The wireless communication sensors 116 may include sensors and antennas for near field communication (NFC), Wi-Fi, and/or Bluetooth for wirelessly detecting, sensing, and/or exchanging data with other electronic devices.

The biometric scanner 118 may include a fingerprint scanner for capturing fingerprint identification data, which may be utilized, for example, as a security feature for the smartphone. Note that “identification” data can include any type of data that enables a user to be identified or authenticated, including a name, phone number, password, PIN, or biometric feature (e.g., fingerprint, retina scan, facial image, etc.). The smartphone may be configured such that a user must scan his fingerprint on the fingerprint scanner before being allowed to access the contents of the smartphone. During initial use of the smartphone, the user may configure the smartphone by scanning his fingerprint(s) and storing his fingerprint data on the smartphone so that the smartphone will recognize his fingerprint(s) when he later desires to unlock the phone by scanning his fingerprint. The smartphone may compare the fingerprint that is scanned with the fingerprint that is stored, and if the two fingerprints match, then the user may be granted access to the smartphone, for example, by unlocking the phone.

In some embodiments, the biometric scanner 118 may be a camera for capturing an image of a person (e.g., a user). The image may be a facial image of the user which can be utilized to identify the user by facial recognition.

FIG. 2 illustrates a first smartphone 100A, which is associated with a first user 202 and a second smartphone 100B, which is associated with a second user 204. According to an embodiment of the present disclosure, the first smartphone 100A is configured to recognize the first user's fingerprint and determine whether or not the first user 202 is a registered user (e.g., an authorized user) of the first smartphone 100A. More specifically, the first user's fingerprint(s) may be stored in a memory of the first smartphone 100A and when the first user 102 scans his fingerprint on the fingerprint scanner of the first smartphone, his fingerprint is compared with the stored fingerprint(s) to determine whether or not the fingerprints match. In one embodiment, multiple user fingerprints are stored, where the fingerprints can be used equally for authentication or different fingerprints can be used for different access, authentication levels, and/or actions.

In some embodiments, the first user's fingerprint may be stored in a cloud (e.g., a network server associated with a user account of the first smartphone 100A or an application that utilizes fingerprint identification such as a payment provider application) and accessed when needed by the first smartphone 100A for verification. For example, when a user's fingerprint is scanned, the smartphone may retrieve the stored fingerprint from the cloud and compare the retrieved fingerprint with the scanned fingerprint to determine whether or not the two fingerprints match. In other embodiments, when a user's fingerprint is scanned, the smartphone may transmit the scanned fingerprint to the cloud, and the network server may compare the scanned fingerprint and the stored fingerprint to determine whether or not the fingerprints match. As such, fingerprint verification is made by the network server in the cloud and the result of the verification is provided to the smartphone from the cloud.

Similarly to the first smartphone 100A, the second smartphone 100B may be configured to recognize the second user's fingerprint and determine whether or not the second user 204 is a registered user (e.g., an authorized user) of the second smartphone 100B. In this manner, smartphones 100A, 100B can be unlocked by the registered users with fingerprint identification. Fingerprint identification may also be utilized for performing various operations on the smartphones such as authorizing purchase transactions or authorizing data transfer, in addition to, or instead of entering a password.

According to an example implementation of the embodiments of the present disclosure, the first user 202 desires to have data communicated (e.g., share his contact information) with the second user 204 by sending data (e.g., his contact information) from his smartphone (i.e., first smartphone 100A) to the second user's smartphone (i.e., second smartphone 100B). In order to do this, the first smartphone 100A and the second smartphone 100B are authenticated with each other to ensure that the contact information is provided to the intended smartphone. According to the embodiment, the first user 202 scans his fingerprint on the fingerprint scanner of the second smartphone 100B instead of on his own smartphone (i.e., first smartphone 100A). When the first user 202 scans his fingerprint on the second smartphone 100B, the second smartphone 100B does not recognize the first user's fingerprint because the first user's fingerprint is not registered on the second smartphone 100B. Therefore, the second user 204 is not granted access to the contents of the second smartphone. However, the second smartphone 100B searches the vicinity of the second smartphone 100B for other smartphones that may be registered with the first user's fingerprint.

In some embodiments, the second smartphone 100B utilizes location determination system 112 to search for other smartphones that are within a set or a predetermined distance from the second smartphone 100B. The distance may be a fixed distance or it may be set by the user to a suitable distance for the given application and/or situation. According to an embodiment, the second smartphone may utilize a wireless connection such as, for example, Wi-Fi, Bluetooth, and/or NFC, to search for other smartphones within the vicinity. When the second smartphone 100B finds another smartphone (in this case, first smartphone 100A) located within range, the second smartphone 100B transmits the scanned fingerprint (i.e., the first user's fingerprint) to the first smartphone 100A over the wireless connection and compares the received fingerprint with the registered fingerprint. If the received fingerprint and the registered fingerprint match, then the first smartphone 100A and the second smartphone 100B are authenticated with each other and data may now be exchanged between the two smartphones over the wireless connection.

In some embodiments, when the received fingerprint and the registered fingerprint match, a notification (e.g., a message or acknowledgement) of the match or authentication data is sent from the first smartphone 100A (i.e., found smartphone) to the second smartphone 100B (i.e., searching smartphone). The notification may be, for example, a composite of codes or encrypted codes that the second smartphone 100B recognizes as authentic data that can only be provided by a smartphone that is registered with the first user's fingerprint (i.e., first smartphone 100A). Thus, the second smartphone 100B can be assured that data will be communicated (e.g., exchanged) with the intended smartphone. Once the two smartphones are authenticated, a plurality of codes may be freely exchanged back and forth between the two smartphones. In some embodiments, the data may include credentials that may be utilized by payment providers to conduct payment transactions. In other embodiments, the data may be codes that are utilized by social media accounts to send, for example, friend requests. Yet, in other embodiments, the data may be address book information that includes contact information utilized by smartphones, or any other suitable digital content.

In some embodiments, the first user 202 and/or the second user 204 may place limits on the amount and/or the type of information that may be communicated between the two smartphones. For example, the first user 202 may allow only his phone number to be automatically provided to the second user 204 when the two smartphones are authenticated. However, the first user 202 may manually authorized other contact information (e.g., email address, home address, etc.) depending on who the information is being provided to. In other embodiments, the smartphones may be configured such that fingerprints of different fingers of the same user (e.g., thumb vs. index finger) perform different automated actions or share different amounts of information when the two smartphones are authenticated. Furthermore, the smartphones may be configured to recognize multiple fingerprints that are scanned concurrently. For example, a fingerprint scan of the index fingerprint may authorize a payment transaction of a lower limit (e.g., $100) but a multiple fingerprint scan (e.g., fingerprints of the index finger and the middle finger scanned together) may authorize a payment transaction of a higher limit (e.g., $5,000). Accordingly, various limits and actions can be performed by enabling/disabling certain features and/or providing a variation of biometric identification.

In some embodiments, the first user's contact information may be provided directly from the first smartphone 100A to the second smartphone 100B via the wireless connection. In some embodiments, the first user's contact information may be provided from the first smartphone 100A to the second smartphone 100B through other computers such as the network server in the cloud. For example, after the authentication, the first user's contact information may be transmitted to the network server over a cellular data connection, and the network server may in turn, transmit the first user's contact information to the second smartphone 100B. The smartphones may transmit data with the network server over any suitable connections such as, for example, cellular data connection or the Internet.

FIG. 3 illustrates a first smartphone 100A and a second smartphone 100B associated with a first user 202 and a second user 204, respectively. Furthermore, the first smartphone 100A and second smartphone 100B may be connected to a network server 300. The network server 300 may be a payment provider server, such as for example, PAYPAL®, that processes payment transactions between parties. Payment transactions may be performed on a computer device such as the smartphone described in with reference to FIG. 1 of the present disclosure. However, the computer device is not limited to a smartphone but may also include other computer devices such as desktop computers, laptop computers, tablets, etc. More details of the implementation of an example payment provider server will be described later in the disclosure with reference to FIG. 7.

In some embodiments, the first and second smartphones 100A, 100B may be separated from each other by a distance that is greater than the range of the wireless connections such as Wi-Fi, Bluetooth, and/or NFC. Thus, when the first and second smartphones 100A, 100B attempt to authenticate, the smartphones may not be able to find each other. In this case, the network server 300 may be utilized to locate other smartphones that are within a set range. For example, similar to the embodiment described with reference to FIG. 2, when the first user 202 scans his fingerprint on the second smartphone 100B and the second smartphone 100B does not recognize this fingerprint as the registered fingerprint on the second smartphone 100B, the second smartphone 100B communicates with the network server 300 to search for other smartphones within a set or predetermined range. In this example, the range is greater than the typical range of the wireless connections. More specifically, the second smartphone 100B sends a geolocation of the second smartphone 100B to the network server 300. Based on the geolocation of the second smartphone 100B, the network server looks for other smartphones that have provided to the network server 300 a geolocation of the smartphones that correspond within the set or predetermined range from the second smartphone 100B. Once the network server 300 detects one or more smartphones within the range, the first user's fingerprint may be compared with the registered fingerprint on the one or more smartphone within the vicinity. This comparison may be performed at the network server 300 or it may be performed locally on the smartphone.

More specifically, according to one embodiment, the first user's fingerprint may be sent to the network server 300 and the registered fingerprint from the one or more smartphones within the range may also be sent to the network server 300. The network server 300 may then compare the fingerprints and determine if they match. If the fingerprints match, then the network server 300 indicates to the corresponding smartphones that a match has been found and the two smartphones may be authenticated.

According to another embodiment, the first user's scanned fingerprint may be provided from the second smartphone 100B to the network server 300 and the network server 300 may then send the first user's fingerprint to the smartphones located within the set range. Then, each of the smartphones within the set range may compare the received fingerprint (e.g., first user's fingerprint) with the fingerprint that is registered on its smartphone to determine whether or not the fingerprint matches with the registered fingerprint. If the fingerprints match, the smartphone will indicate the match to the network server 300, and the network server 300 may then indicate to the second smartphone 100B that a match was found for the first user's fingerprint. Accordingly, the first smartphone 100A and the second smartphone 100B are authenticated via the network server 300.

In some embodiments, the network server 300 may further be utilized to exchange data between the two smartphones. For example, the first user 202 may desire to pay the second user 204 by making a payment transaction via the network server 300. In some embodiments, an invoice where the first user owes money to the second user may be stored at the network server 300. Thus, when the first user's smartphone (i.e., first smartphone 100A) is authenticated with the second user's smartphone (i.e., second smartphone 100B), the network server 300 may be configured to automatically recognize that the first user has an outstanding invoice where he needs to pay money to the second user. Thus, an automatic payment transaction may be made from the first smartphone 100A to the second smartphone 100B via the network server 300.

In some embodiments, the network server 300 may be a social media server, such as, for example, FACEBOOK®, LINKEDIN®, etc. The user may configure his smartphone to automatically perform operations with his social media account when the smartphone is authenticated with another smartphone. For example, the first user may configure the first smartphone such that a “friend request” is automatically initiated with the second user when the first smartphone is authenticated with the second smartphone. In other embodiments, the user may configure his smartphone such that automatic actions are not performed until specifically authorized by the user each time. That is, the user may manually initiate certain operations on the smartphone such as, sending a friend request or sending money when the smartphone is authenticated.

In some embodiments, data exchange may be performed between a customer's smartphone and a merchant's system so that a customer can make a payment transaction with the merchant from his smartphone. For example, the merchant's system may include at least a computer and a biometric scanner for the customers to use. As described above with reference to FIGS. 2-3, the customer scans his fingerprint on the merchant's fingerprint scanner, and the merchant's computer searches within a set or predetermined range from the computer for smartphones that have a registered fingerprint that matches the scanned fingerprint. According to the example embodiment, the customer's smartphone is located within the set range and the customer's scanned fingerprint matches the registered fingerprint on the customer's smartphone. Based on this match, the customer's smartphone may be authenticated so that the customer can make a payment transaction with the merchant, for example, via a payment provider. In some embodiments, the customer may enable his smartphone to automatically make a payment to the merchant after the authentication or the customer may manually initiate the payment after the authentication.

In some embodiments, when the customer's smartphone is authenticated with the merchant's computer as described above, the customer's contact information (e.g., email address) may be automatically transferred to the merchant's computer. Thus, merchants may conveniently collect contact information from customers every time they make a payment transaction, which may be used, for example, for marketing purposes. In some embodiments, the customers may opt out so that contact information is not automatically transferred to the merchant unless the customer specifically authorizes the transfer.

FIG. 4 illustrates an exemplary embodiment of a first user 400 with a first smartphone 401, a second user 402 with a second smartphone 403, and a third user 404 with a third smartphone 405 all located within a set range from each user. The radius of the set or predetermined range is shown as circle 408. A fourth user 406 with a fourth smartphone 407 is located outside of the set distance.

According to an embodiment, all of the smartphones 401, 403, 405 that are located within the set distance 408 may be authenticated concurrently and exchange data with each other. For example, the first user 400 may scan his fingerprint on second smartphone 403 but because the first user's fingerprint is not registered on the second smartphone 403 so the second smartphone 403 searches for smartphones that are registered with the first user's fingerprint within the set range from the second smartphone 403. In this example, the second smartphone 403 find the first smartphone 401 and determines that it is registered with the first user's fingerprint and therefore the first smartphone 401 and the second smartphone 403 may be authenticated. Furthermore, third smartphone 405 is also authenticated with the first smartphone 401 and the second smartphone 403 so that the third smartphone may also exchange data with the first smartphone 401 and the second smartphone 403 without the third smartphone 405 going through a separate authentication process. That is, according to this embodiment, all smartphones located within the set range are part of the same group based on the authentication of the first and second smartphones 401, 403. However, because fourth smartphone 407 is located outside of the set range 408, fourth smartphone 407 will not be authenticated with the other smartphones.

According to one example, suppose a group of friends (e.g., first user 400, second user 402, and third user 404) are sitting around a table (e.g., at a restaurant). The range may be selected to include only the friends that are sitting around the table. Thus, the smartphones of the friends sitting around the table can exchange data with each other and exclude the smartphone of other people (e.g., fourth user 406) sitting at other tables.

FIG. 5 is a flowchart of a process for authenticating a first smartphone with a second smartphone, according to an embodiment of the disclosure. The operations of FIG. 5 may be implemented with any combination of software instructions executed by the electronic device (e.g., smartphone) described with reference to FIG. 1.

In block 500, a first user scans his fingerprint on a second user's smartphone by placing his thumb or finger on a biometric scanner (e.g., a fingerprint scanner) on the second user's smartphone. Because the first user's fingerprint is not registered on the second user's smartphone, in block 501, the second user's smartphone does not recognize the first user's fingerprint. In block 502, the second user's smartphone uses geolocation to search in the vicinity of the second user's smartphone for other smartphones that are registered with the first user's fingerprint. In some embodiments, the second user's smartphone may utilize, e.g., Wi-Fi, Bluetooth, and/or NFC, to search the vicinity for other smartphones. The range of the “vicinity” may be a distance that is variable by the second user on his smartphone, or the distance may be fixed by the software application executing the instructions on the smartphone. Furthermore, the range is with reference to the distance from the smartphone that is searching for other smartphones, i.e., the second user's smartphone. In some embodiments, the second user's smartphone may utilize a network server to utilize geolocation of the smartphones to find a smartphone that has a matching fingerprint.

In block 503, the first user's smartphone is found by the second user's smartphone as having the first user's fingerprint registered on it. More specifically, the first user's smartphone compares the first user's fingerprint (that was scanned on the second user's smartphone) with the fingerprint that is registered on the first user's smartphone, and determines that the two fingerprints match. Then, the first user's smartphone sends a message via Wi-Fi, Bluetooth, and/or NFC, to the second user's smartphone of the match. Once both smartphone acknowledge the match, data may be exchanged between the two smartphone at block 504. For example, the first user's phone number may be sent from the first user's smartphone to the second user's smartphone, or the second user's email address may be sent from the second user's smartphone to the first user's smartphone. In some embodiments, social media action may be performed. For example, a FACEBOOK® friend request may be sent, or the friend may be tagged in a photo. Yet in some embodiments, financial transactions may be performed between the two users through the use of a payment provider such as PAYPAL®.

FIG. 6 is a flowchart of a process for authenticating a customer's smartphone with a merchant's computer, according to an embodiment of the disclosure. The operations of FIG. 6 may be implemented with any combination of software instructions executed by the electronic device (e.g., smartphone) described with reference to FIG. 1.

In block 600, a customer (e.g., a customer at a retail store) scans his fingerprint on a biometric scanner (e.g., a fingerprint scanner) on the merchant's computer. In block 601, the merchant's computer searches the vicinity of the merchant's computer for a smartphone that recognizes the customer's fingerprint. The range of the “vicinity” may be a distance that is variable by the merchant from the merchant's computer, or the distance may be fixed by the software application executing the instructions on the merchant's computer. Furthermore, the range is described with reference to the distance from the location of the merchant's computer that is searching for the customer's smartphone. In some embodiments, the merchant's computer may utilize a network server to utilize geolocation of the smartphones to find a smartphone that has a matching fingerprint.

In block 602, a smartphone registered with the customer's fingerprint (i.e., customer's smartphone) is found. More specifically, the customer's smartphone compares the first user's fingerprint (that was scanned on the merchant's fingerprint scanner) with the fingerprint that is registered on the customer's smartphone, and determines that the two fingerprints match. Then, the customer's smartphone sends a message via Wi-Fi, Bluetooth, and/or NFC, to the merchant's computer that a match has been found. Once both, the merchant's computer and the customer's smartphone are authenticated, data may be exchanged and a payment transaction may be made from the customer to the merchant at block 603. For example, the merchant's computer may send an electronic invoice to the customer's smartphone indicating a balance due, and the customer's smartphone may initiate the payment transaction to the merchant via a payment provide such as, for example, PAYPAL®. In some embodiments, the merchant's computer may automatically retrieve the customer's contact information such as a phone number or email address.

Although the above description refers to fingerprint identification for performing the authentication process, other identification methods may also be utilized. For example, instead of scanning a user's fingerprint, facial features of the user may be captured with a camera to identify the user via facial recognition. In some embodiments, for example, when a biometric scanner is not available, an alphanumeric authorization code may be entered by the user on the smartphone.

FIG. 7 is a block diagram of a computer system 700 suitable for implementing a network server utilized for example by a payment service provider, according to one or more embodiments of the present disclosure. In various embodiments, the electronic device may comprise a personal computing device (e.g., a personal computer, laptop, smart phone, tablet, PDA, Bluetooth device, key FOB, badge, etc.) capable of communicating with the network. The merchant and/or payment provider may utilize a network computing device (e.g., a network server) capable of communicating with the network. It should be appreciated that each of the devices utilized by users, merchants, and service/payment providers may be implemented as computer system 700 in a manner as follows.

Computer system 700 includes a bus 702 or other communication mechanism for communicating information data, signals, and information between various components of computer system 700. Components include an input/output (I/O) component 704 that processes a user action, such as selecting keys from a keypad/keyboard, selecting one or more buttons or links, etc., and sends a corresponding signal to bus 702. I/O component 704 may also include an output component, such as a display 711 and a cursor control 713 (such as a keyboard, keypad, mouse, etc.). One or more optional audio/video (A/V) input/output (I/O) components 705 may also be included to allow a user to use voice and/or video for inputting information by converting audio signals. A/V I/O component 705 may allow the user to hear audio. A transceiver or network interface 706 transmits and receives signals between computer system 700 and other devices, such as another user device, a merchant server, or a service/payment provider server via network 300. In one embodiment, the transmission is wireless, although other transmission mediums and methods may also be suitable. A processor 712, which can be a micro-controller, digital signal processor (DSP), or other processing component, processes these various signals, such as for display on computer system 700 or transmission to other devices via a communication link 718. Processor 712 may also control transmission of information, such as cookies or IP addresses, to other devices.

Components of computer system 700 also include a system memory component 714 (e.g., RAM), a static storage component 716 (e.g., ROM), and/or a disk drive 717 to store information, such as account information, transaction numbers, machine IDs, and other information described above. Computer system 700 performs specific operations by processor 712 and other components by executing one or more sequences of instructions contained in system memory component 714. Instructions may be performed by one or more processors 712. Logic may be encoded in a computer readable medium, which may refer to any medium that participates in providing instructions to processor 712 for execution. Such a medium may take many forms, including but not limited to, non-volatile media, volatile media, and transmission media. In various embodiments, non-volatile media includes optical or magnetic disks, volatile media includes dynamic memory, such as system memory component 714, and transmission media includes coaxial cables, copper wire, and fiber optics, including wires that comprise bus 702. In one embodiment, the logic is encoded in non-transitory computer readable medium. In one example, transmission media may take the form of acoustic or light waves, such as those generated during radio wave, optical, and infrared data communications.

Components of computer system 700 also include a system memory component 714 (e.g., RAM), a static storage component 716 (e.g., ROM), and/or a disk drive 717 to store information, such as account information, transaction numbers, machine IDs, and other information described above. Computer system 700 performs specific operations by processor 712 and other components by executing one or more sequences of instructions contained in system memory component 714. Instructions may be performed by one or more processors 712. Logic may be encoded in a computer readable medium, which may refer to any medium that participates in providing instructions to processor 712 for execution. Such a medium may take many forms, including but not limited to, non-volatile media, volatile media, and transmission media. In various embodiments, non-volatile media includes optical or magnetic disks, volatile media includes dynamic memory, such as system memory component 714, and transmission media includes coaxial cables, copper wire, and fiber optics, including wires that comprise bus 702. In one embodiment, the logic is encoded in non-transitory computer readable medium. In one example, transmission media may take the form of acoustic or light waves, such as those generated during radio wave, optical, and infrared data communications.

Some common forms of computer readable media includes, for example, floppy disk, flexible disk, hard disk, magnetic tape, any other magnetic medium, CD-ROM, any other optical medium, punch cards, paper tape, any other physical medium with patterns of holes, RAM, PROM, EPROM, FLASH-EPROM, any other memory chip or cartridge, or any other medium from which a computer is adapted to read.

In various embodiments of the present disclosure, execution of instruction sequences to practice the present disclosure may be performed by computer system 700. In various other embodiments of the present disclosure, a plurality of computer systems 700 coupled by communication link 718 to the network (e.g., such as a LAN, WLAN, PTSN, and/or various other wired or wireless networks, including telecommunications, mobile, and cellular phone networks) may perform instruction sequences to practice the present disclosure in coordination with one another.

Where applicable, various embodiments provided by the present disclosure may be implemented using hardware, software, or combinations of hardware and software. Also, where applicable, the various hardware components and/or software components set forth herein may be combined into composite components comprising software, hardware, and/or both without departing from the spirit of the present disclosure. Where applicable, the various hardware components and/or software components set forth herein may be separated into sub-components comprising software, hardware, or both without departing from the scope of the present disclosure. In addition, where applicable, it is contemplated that software components may be implemented as hardware components and vice-versa.

Software, in accordance with the present disclosure, such as program code and/or data, may be stored on one or more machine readable mediums, including non-transitory machine readable medium. It is also contemplated that software identified herein may be implemented using one or more general purpose or specific purpose computers and/or computer systems, networked and/or otherwise. Where applicable, the ordering of various steps described herein may be changed, combined into composite steps, and/or separated into sub-steps to provide features described herein.

Embodiments described herein are exemplary only. One skilled in the art may recognize various alternative embodiments from those specifically disclosed. Those alternative embodiments are also intended to be within the scope of this disclosure. As such, the embodiments are limited only by the following claims and their equivalents. 

The invention claimed is:
 1. A system, comprising: one or more biometric sensors; a non-transitory memory; and one or more hardware processors coupled to the non-transitory memory and configured to read instructions from the non-transitory memory to cause the system to perform operations comprising: detecting, via the one or more biometric sensors, first biometric user identification data of a first user; determining that the first biometric user identification data does not match second biometric user identification data stored on the system; initiating a search, in response to the determining that the first biometric user identification data does not match second biometric user identification data and via one or more wireless electronic communication protocols, for a first device, wherein the first biometric user identification data is stored on the first device; receiving, from the first device, a notification that the first biometric user identification data is stored on the first device; determining a type of the first biometric user identification data; and electronically exchanging data with the first device after the receiving the notification, wherein the electronically exchanging the data comprises electronically exchanging a predefined type of transaction data based on the determined type of the first biometric user identification data.
 2. The system of claim 1, wherein the initiating the search comprises searching for devices that are not in electronic communication with the system prior to the search being initiated.
 3. The system of claim 1, wherein the determining the type of the first biometric user identification data comprises determining whether the first biometric user identification data comprises a first type of biometric user identification data or a second type of biometric user identification data; and the electronically exchanging the predefined type of transaction data comprises: electronically exchanging a first type of transaction data based on a determination that the first biometric user identification data comprises the first type of biometric user identification data; or electronically exchanging a second type of transaction data based on a determination that the first biometric user identification data comprises the second type of biometric user identification data.
 4. The system of claim 3, wherein the first type of transaction data and the second type of transaction data correspond to different types of transactions or different transactions with different restrictions.
 5. The system of claim 3, wherein: the first type of biometric user identification data comprises fingerprint data of a first finger; and the second type of biometric user identification data comprises fingerprint data of a second finger.
 6. The system of claim 3, wherein: the first type of biometric user identification data comprises fingerprint data of a single finger; and the second type of biometric user identification data comprises fingerprint data of multiple fingers.
 7. The system of claim 1, wherein: the one or more biometric sensors include a touchscreen interface; and the first biometric user identification data includes an authentication credential entered through the touchscreen interface.
 8. The system of claim 1, wherein the receiving the notification comprises receiving an encrypted code from the first device.
 9. The system of claim 1, wherein the initiating the search comprises electronically transmitting the first biometric user identification data to one or more devices within a predefined range of the system.
 10. The system of claim 1, wherein the initiating the search comprises transmitting a geolocation of the system to a remote server, and wherein the operations further comprise receiving, from the remote server, a list of mobile devices that are located within a predefined range of the geolocation.
 11. The system of claim 1, wherein: the data that is electronically exchanged comprises data corresponding to an electronic address book.
 12. The system of claim 1, wherein: the system is a point of sale (POS) of a merchant; and the electronically exchanging the data comprises electronically exchanging data pertaining to a transaction between the merchant and the first user.
 13. A method, comprising: accessing, via one or more sensors of a second device, first biometric user identification data of a first user; determining, by one or more hardware processors of the second device, that the first biometric user identification data has not been registered with the second device; initiating a wireless transmission, by the second device and in response to the determining, to transmit the first biometric user identification data to one or more devices within a predefined distance from the second device; receiving, by the second device from a first device of the one or more devices, a confirmation that the first biometric user identification data is registered with the first device; determining a type of the first biometric user identification data; and establishing, by the second device, an electronic communication session with the first device after the receiving the confirmation, wherein the establishing comprises establishing a predefined type of electronic communication session based on the determined type of the first biometric user identification data.
 14. The method of claim 13, wherein: the determining the type of the first biometric user identification data comprises determining whether the first biometric user identification data comprises a first type of biometric user identification data or a second type of biometric user identification data; and the establishing the predefined type of electronic communication session comprises: establishing a first type of electronic communication session based on a determination that the first biometric user identification data comprises the first type of biometric user identification data; or establishing a second type of electronic communication session based on a determination that the first biometric user identification data comprises the second type of biometric user identification data.
 15. The method of claim 14, wherein the first type of biometric user identification data and the second type of biometric user identification data correspond to different fingerprints.
 16. The method of claim 14, wherein the first type of electronic communication session and the second type of electronic communication session correspond to transactions with different transaction limits.
 17. The method of claim 13, wherein the receiving the confirmation comprises receiving an encrypted code from the first device.
 18. The method of claim 13, wherein: the electronic communication session comprises an exchange of an electronic address book or a monetary transaction.
 19. A non-transitory machine-readable medium having stored thereon machine-readable instructions executable to cause a machine to perform operations comprising: detecting, via one or more sensors of a second device, an entry of first biometric user identification data of a first user; comparing the first biometric user identification data with second biometric user identification data that is registered with the second device; determining, in response to the comparing indicating a mismatch between the first biometric user identification data and the second biometric user identification data, that the first user is not an authorized user of the second device; locating, in response to the determining, a first device for which the first user is an authorized user, the first device being located within a predetermined distance from the second device; determining whether the first biometric user identification data includes a first type of biometric data or a second type of biometric data; and establishing a first type of data communication with the first device in response to the first biometric user identification data including the first type of biometric data or establishing a second type of data communication with the first device in response to the first biometric user identification data including the second type of biometric data.
 20. The non-transitory machine-readable medium of claim 19, wherein the locating comprises sending the first biometric user identification data to a plurality of devices within the predetermined distance via Wi-Fi or Bluetooth. 