Keypad dulcet authentication cardless payment technology

ABSTRACT

Architecture and methods may be provided to enable a user to authenticate and complete a cardless transaction at a point-of-sale (“POS”) device. The POS device may include a keypad configured to receive a sequence of keypresses. The POS device may also include a processor configured to record the sequence of keypresses and tag each keypress with a timestamp. The POS device may include a keypress controller configured to determine from the sequence of keypresses, a number of keypresses, a frequency of each keypress and a time-delay between each keypresss. The sequence of keypresses may be transmitted to a secure transaction network and, using a machine-learning pattern identifier, be configured to identify a pattern to the sequence of keypresses based off of the determined number of keypresses, the frequency and time-delay and then further verify that the pattern matches to a stored pattern to authenticate the cardless transaction.

FIELD OF TECHNOLOGY

Aspects of the disclosure relate to performing transactions usingcardless authentication.

BACKGROUND OF THE DISCLOSURE

Payment mechanisms typically rely on cards or other devices like mobile,laptop, desktop or payment wallet to make a payment. All of thesechannels are dependent on cards or other devices to make a payment. If auser forgets his card or other device then the user may not be able tomake the payment.

It would be desirable, therefore, to have systems and methods to allow auser to authenticate himself at a point-of-sale (“POS”) and/or onlinepayment channel without the need for a card, mobile device, laptop,desktop device. This is desirable at least because it gives the user theopportunity to authenticate himself independent of the device(s) that heis carrying with him. It would also be desirable to allow a user toauthenticate himself without input of an additional biometric.

BRIEF DESCRIPTION OF THE DRAWINGS

The objects and advantages of the disclosure will be apparent uponconsideration of the following detailed description, taken inconjunction with the accompanying drawings, in which like referencecharacters refer to like parts throughout, and in which:

FIG. 1 shows an illustrative architecture in accordance with principlesof the disclosure.

FIG. 2 shows an exemplary diagram in accordance with principles of thedisclosure.

FIG. 3 shows an exemplary diagram in accordance with principles of thedisclosure

FIG. 4 shows an exemplary table in accordance with principles of thedisclosure

FIG. 5 shows an exemplary diagram in accordance with principles of thedisclosure.

FIG. 6 shows an illustrative flowchart in accordance with principles ofthe disclosure.

DETAILED DESCRIPTION OF THE DISCLOSURE

Architecture for a system that enables authentication and execution of acardless transaction is provided. A cardless transaction may beperformed at a point-of-sale (“POS”) device within a store. The cardlesstransaction may be performed on a smart phone, laptop and/or tablet atany location. The cardless transaction may be performed on a website onthe internet using the smart phone or other mobile device.

The cardless transaction may enable a transaction to be completedwithout the use of any physical credit card, debit card, smart cardand/or electronic wallet.

The architecture may include a POS device. The POS device may include akeypad. The keypad may include a set of numeric and/or alphanumericbuttons that are configured to be depressed.

It should be appreciated that the keypad may be a touch keypad. Thetouch keypad may be displayed on a display screen at the POS device. Thetouch keypad may display numeric and/or alphanumeric keys. These keysmay be configured to be depressed by a touch of a finger. These keys maybe configured to be depressed by a touch of a stylus.

The keypad may be configured to receive a sequence of keypresses. Thesequence of keypresses may be used as authentication for a cardlesstransaction. The sequence of keypresses, once verified, may be furtherused to execute and complete the cardless transaction.

The POS device may also include a processor. The processor may beconfigured to record the sequence of keypresses. The processor may alsobe configured to tag each keypress with a timestamp. The timestamp maystamp the start time of each keypress being depressed.

The keypad may be connected to a keypress controller included in the POSdevice. The keypress controller may be configured to determine from thesequence of keypresses a number of keypresses.

The keypress controller may also be configured to determine a frequencyof each keypress. The frequency may include a rate of keypresses perunit of time. The frequency may determine the number of keypressesreceived in the total time of receipt of the sequence.

The keypress controller may also determine a time-delay between eachkeypresss. The time-delay may be calculated based off of the timestamptagged to each keypress.

In some embodiments, the keypress controller may also be configured tocalculate a duration of time for a keydown of each keypress when thekeydown is greater than a pre-determined number of time. A keydown maybe when a user presses on a key. The time before the user releases thepressure may be considered the time of the keydown. When the keydown isgreater than a pre-determined number of time, the determination of thepattern may also be determined based on the keydown time.

The pre-determined number of time may be one second. The pre-determinednumber of time may be a half a second. When the duration of time of thekeydown is greater than the pre-determined number of time, the keypresscontroller may be configured to tag the duration of time of the keydown.

The processor may be further configured to temporarily store thesequence, the timestamp, the number of keypresses, the frequency and thetime-delay as authentication data for the cardless transaction.

The processor may then be configured to encrypt the authentication datain order to transmit the authentication data securely. Applicationprograms within the POS device may utilize one or more algorithms toencrypt the data.

Software may be stored within the non-transitory memory and/or otherstorage media within the POS device. Software may provide instructions,that when executed by the processor, enable the POS to perform variousfunctions. For example, software may include an operating system,application programs, web browser and a database. Alternatively, some orall of computer executable instructions of the smart card may beembodied in hardware or firmware components of the POS device.

Application programs, which may be used by the POS device, may includecomputer executable instructions for invoking user functionality relatedto communication, authentication services, and voice input and speechrecognition applications. Application programs may utilize one or morealgorithms that encrypt information, process received executableinstructions, interact with an issuer or acquirer bank systems, performpower management routines or other suitable tasks.

Following encryption, the processor may be configured to transmit theencrypted authentication data to the secure transaction network forverification.

The secure transaction network may include a machine-learning (“ML”)pattern identifier. The ML pattern identifier may be configured todecrypt the authentication data.

The ML pattern identifier may be an application. The ML patternidentifier may be enabled to identify a pattern of the sequence. Thepattern may be enabled to be identified based off of the determinednumber of keypresses, the determined frequency and the determinedtime-delay.

In some embodiments, the ML pattern identifier may also use thecalculated duration of time as part of identifying the pattern. The MLpattern identifier may identify the pattern further based off of theduration of time of the keydown.

It should be appreciated that the pattern of the sequence of thekeypresses is irrespective of an alphanumeric value of each keypress.

The pattern verification controller may be configured to verify that theidentified pattern maps to a stored pattern associated with an entity.The entity may be an individual that entered the sequence of keys at thePOS device. The entity may have a pre-generated pattern stored withinthe secure transaction network. The mapping may be in order toauthenticate the cardless transaction.

The pattern verification controller may determine if the patternsubstantially matches to the stored pattern. The pattern verificationcontroller may be configured to verify that the number of keypresses maybe equal to a stored number of keypressess. The pattern verificationcontroller may be further configured to verify that the frequency of thekeypresses may be within a pre-determined range of a stored frequency ofkeypresses. The pattern verification controller may also be configuredto verify that the time-delay between each keypress may be within apre-determined range of a stored number of time for each time-delay.

An example of a sequence of keypresses may include a user depressing afirst key on the keypad two times in a row. Then the user may pause for2 seconds. Then the user may press a second key three times in a row.Then the user may pause for one second. Then the user may press a thirdkey one time and hit the submit button.

It should be appreciated that the first, second and third key may not beany specific key. The numerical value of the key depressed may beinsignificant and may not be recorded.

Furthermore, this architecture may enable a visually impaired individuala more seamless method for authenticating himself and making purchasesand other transactions. The user may not need to know which specifickeys he is pressing on. Once the user pre-sets a personal pattern, theuser can press any keys to authenticate himself because the pattern doesnot include the numerical value of the keypresses.

A method for authenticating and executing a cardless transaction betweena first entity and a second entity may be provided. The method mayinclude receiving authentication data at a point-of-sale device. Theauthentication data may not include presence of a card and may notinclude card account data. The authentication data may include asequence of keypresses.

The method may include, following the receiving, tagging each keypressin the sequence with a timestamp. The method may also include encryptingthe authentication data.

The method may also include transmitting the authentication data, usinga secure communication channel, from the POS device to a secure paymentnetwork.

The method may include decrypting the authentication data. The methodmay include determining, from the authentication data, a pattern of thesequence of keypresses.

The pattern may include a number of keypresses. The pattern may alsoinclude a frequency of each keypress. The frequency may include a rateof keypresses per unit of time. The pattern may also include atime-delay between each keypresss. The time-delay may be calculatedbased off of the timestamp tagged to each keypress.

The method may also include verifying, by the secure payment network,that the pattern of the sequence of keypresses maps to a stored patternof a sequence of keypresses stored within a personal profile accountassociated with the first entity.

In response to the verification, the method may include authenticatingthe transaction at the POS device between the first and second entity.

In some embodiments, when at least one of the number of keypresses,frequency of each keypress that is repetitive and the time-delay is notconfirmed, the method may further include transmitting an error messageto the POS device and terminating the transaction.

Time-delays may be counted in increments of whole seconds. Time-delaysmay be counted in increments of half seconds. Time-delays may be countedin milliseconds. In some embodiments, time-delays may be counted innanoseconds.

In some embodiments, when calculating the time-delay between eachkeypress, the time-delay may be counted by whole seconds. In thisembodiment, when the time-delay is less than half a second, thetime-delay may be counted as a zero time-delay which may be interpretedas no time-delay. This may further be interpreted as two keypresses thatimmediately follow one after another. When the time-delay between twokeypresses is equal to or greater than half a second, the time-delay maybe calculated as one second. When the number of time between twokeypresses is greater than one second, the time-delay may be roundedeither up or down by whole seconds. For example, when the time-delay isequal to or greater than 1.5 seconds, the time-delay may be rounded upto 2 seconds. When the time-delay is less than 1.5 seconds, thetime-delay may be rounded down to 1 second.

One of ordinary skill in the art will appreciate that the steps shownand described herein may be performed in other than the recited orderand that one or more steps illustrated may be optional. Apparatus andmethods may involve the use of any suitable combination of elements,components, method steps, computer-executable instructions, orcomputer-readable data structures disclosed herein.

Illustrative embodiments of apparatus and methods in accordance with theprinciples of the invention will now be described with reference to theaccompanying drawings, which form a part hereof. It is to be understoodthat other embodiments may be utilized and that structural, functionaland procedural modifications may be made without departing from thescope and spirit of the present invention.

As will be appreciated by one of skill in the art, the inventiondescribed herein may be embodied in whole or in part as a method, a dataprocessing system, or a computer program product. Accordingly, theinvention may take the form of an entirely hardware embodiment, anentirely software embodiment or an embodiment combining software,hardware and any other suitable approach or apparatus.

Furthermore, such aspects may take the form of a computer programproduct stored by one or more computer-readable storage media havingcomputer-readable program code, or instructions, embodied in or on thestorage media. Any suitable computer readable storage media may beutilized, including hard disks, CD-ROMs, optical storage devices,magnetic storage devices, and/or any combination thereof. In addition,various signals representing data or events as described herein may betransferred between a source and a destination in the form ofelectromagnetic waves traveling through signal-conducting media such asmetal wires, optical fibers, and/or wireless transmission media (e.g.,air and/or space).

FIG. 1 shows an architectural diagram 100 of the cardless paymentsystem. The cardless payment system may enable a user to perform atransaction without a credit/debit card. The cardless payment system mayenable the user to perform a transaction without a credit/debit cardnumber. The cardless payment system may be configured to enable a userto input a sequence of keypresses into a keypad as a method ofauthenticating and completing a transaction.

The diagram 100 may include box 102. Box 102 may be a POS. The POS maybe a device where a user can submit a payment for products beingpurchased. The POS may be a device a user is submitting payment for aninvoice. The POS may be for other financial transactions.

The POS may be a physical POS terminal as shown at 104. The POS may bean online website where a user is making a purchase, as shown at 106.The POS device may be an automated teller machine (“ATM”), as shown at108.

The POS 102 may include a keypad 110. The keypad 110 may include keysthat may be depressed. The keypad may be displayed on a touch screen andmay be tapped. The keypad may be configured to receive input of asequence of keypresses on the keypad in order to authenticate a user.

The keypad 110 may include a keypress controller 112. Keypresscontroller 112 may be configured to identify the keys that may bedepressed and/or tapped. The keypress controller 112 may be configuredto identify the number of keys in the sequence, as shown at 114.Keypress controller 112 may be configured to determine the frequency,116, of the sequence of keypresses. Keypress controller 112 may beconfigured to determine the time-delay 118 between each keypress.Keypress controller 112 may tag each keypress with a time-stamp in orderto calculate the time-delay 118 between each keypress.

The POS may also include a processor that may be configured to transmitthe data determined by the keypress controller 112 and may transmit thedata to a machine-learning (“ML”) based pattern identifier 120. ML basedpattern identifier 120 may be associated with a secure payment network.ML based pattern identifier 120 may be an application on the securepayment network. ML based pattern identifier 120 may be linked to apattern verification controller 122. Pattern verification controller 122may also be an application on the secure payment network. The securepayment network may be a server. The secure payment network maycommunicate with a financial institution to complete a securetransaction.

ML based pattern identifier 120 may receive the data from the processorassociated with the keypress controller. ML based pattern identifier 120may be enabled to identify a pattern based off of the number ofkeypresses, the frequency, and the time-delay. The pattern may be aunique pattern that a user pre-generated as means of authentication ofthe user. ML based pattern identifier 120 may be enabled to decipher theunique pattern in order to identify and authenticate the user. Thenumber of keypresses may be independent of the numerical value of eachkeypress. The number of time between each keypress may be a part of theidentified pattern. The time may be calculated in seconds, millisecondsand in some embodiments, nanoseconds.

Pattern verification controller 122 may compare the identified patternto a list of stored patterns in a database associated with the securepayment network. The user performing the transaction may have apre-generated pattern stored in a personal account profile. Theidentified pattern may be compared to the pre-generated pattern. Whenthe pattern verification controller 122 determines that the identifiedpattern and the pre-generated pattern substantially match, the bankassociated with the secure payment network may authenticate and completethe transaction with the user at the POS 102.

FIG. 2 shows an exemplary diagram of POS devices 200 in accordance withprinciples of the disclosure. POS devices 202, 204, 206 and 208 may bedevices that may be enabled to accept a cardless transaction inaccordance with principles of the disclosure. POS devices 202 - 208 maybe enabled to accept, authenticate and complete the cardless transactionby receiving input of a sequence of keypresses by a user that may beidentified as a unique pattern associated with the user.

POS devices 200 may include POS device 202. POS device 202 may be acredit/debit card machine. The machine may be handheld. The machine maybe on a ledge or stand. Credit card machine 202 may include keys thatmay be configured to be depressed. Credit card machine 202 may beenabled to receive a cardless transaction. Credit card machine 202 maybe enabled to receive a sequence of keypresses depressed on the keypadas authentication for the user in accordance with principles of thedisclosure.

POS devices 200 may include POS device 204. POS device 204 may be a POSterminal with a touch-screen. POS device 204, in this exemplary diagrammay be a self-checkout terminal. The touch-screen may display keys onthe screen. Each keypress may be enabled by tapping the key on thescreen. Self-checkout terminal 204 may be enabled to receive a cardlesstransaction in accordance with principles of the disclosure.Self-checkout terminal 204 may be configured to receive a sequence ofkeypresses tapped on the screen as authentication in accordance withprinciples of the disclosure.

POS devices 200 may include POS device 206. POS device 206 may be amobile device. Mobile device 206 may be configured to perform atransaction. Mobile device 206 may be enabled to display a keypad on thescreen. When a user is making a purchase and or any other transaction,the mobile device 206 may be configured to, in accordance withprinciples of the disclosure, perform a cardless transaction.

POS devices 200 may include POS device 208. POS device 208 may be alaptop. Laptop 208 may also be used to authenticate and complete atransaction in accordance with principles of the disclosure. Laptop 208may include a keypad on the keyboard. Laptop 208, in some embodiments,may include a touch-screen. Both the keypad and the touch-screen, may beconfigured to receive input of the sequence of keypresses as a method ofauthenticating and completing a cardless transaction. Laptop 208 may beenabled receive the sequence of keypresses and authenticate a user tocomplete a transaction.

FIG. 3 shows an exemplary sequence of keypresses 300. The sequence ofkeypresses 300 may be inputted to a keypad by a user. The user may beperforming a transaction. The sequence of keypresses may be used inplace of a credit card, debit card and/or card number. An identified andverified pattern, determined from the sequence of keypresses maypreferably be enabled to authenticate the user and complete thetransaction.

The sequence of keypresses 300 may include a number of keypresses thatmay be depressed and inputted as part of the sequence. The keypressesmay include keypress 302, 304, 306, 308, 310, 312, 314, 316 and 318.Keypresses 302 - 218 may be displayed in order of receipt. Keypress 302may be the first keypress and keypress 318 may be the last keypress.Keypress 318 may be the submit button on the keypad. Keypress 318 insome embodiments may not be included in the sequence. The time betweenkeypress 316 and keypress 318 may, in some embodiments, be included inidentifying the pattern to the sequence of keypresses.

In this example, keypress 302 may be the first keypress. Keypress 302may include a time-stamp. The time-stamp for each keypress may be thetime at which the key was pressed and/or tapped. Keypress 302 may bereceived at 1:00 and 1 second. Keypress 304 may be the second keypress.Keypress 304 may be the second keypress. Keypress 304 may be received at1:00 and 1 second and 459 milliseconds. In this example, since the timecalculated between the first and second keypress is less than a half asecond, it may not be counted as a time-delay.

In some embodiments, when calculating the time between two keypresses,the system may round off the time. For example, if the time between twokeypresses is less than 500 milliseconds (half a second), the system maycalculate the time-delay as a zero time-delay. If the time between twokeypresses is equal to or greater than 500 milliseconds, and less thanor equal to one second, the system may calculate the time-delay as a onesecond time-delay.

Space 320 and 322 may be a time-delay between a keypress. In thisexample, the time-delay may be considered a time-delay when the timebetween one keypress and another keypress is greater than a half asecond. The time between the second keypress and the third keypress isgreater than a half a second. The time-delay may be approximately 2 anda half seconds. Since the time-delay is greater than 2.5 seconds, thetime-delay may be rounded to three seconds, as shown at 324. The thirdkeypress 306 may be received at 1:00 and 4 seconds. Following the thirdkeypress, there may be a 3 second time-delay between the third keypress306 and the fourth keypress 308. Each second may be displayed at spaces326, 328 and 330.

The fourth keypress, 308, may be received at 1:00 and second seconds.The fifth keypress 310 may be received at 1:00 and seven seconds and 400milliseconds. The sixth keypress 312 may be received at 1:00 and sevenseconds and 850 milliseconds. Following the sixth keypress 312 there maybe a one second time-delay prior to the seventh keypress, as shown at332.

The seventh keypress 314 may be received at 1:00 and 9 seconds. Theeighth keypress may be received at 1:00 and 9 seconds and 300milliseconds. The ninth key may be the submit button 318. The ninthkeypress may be received at 1:00 and nine seconds and 600 milliseconds.

FIG. 4 may be a table 400. Table 400 may display data associated withthe sequence of keypresses displayed in FIG. 3 . Table 400 may displaydata determined by the keypress controller and the ML patternidentifier. The data displayed in table 400 may enable identifying thepattern associated with the sequence of keypresses in order toauthenticate a user and complete a transaction.

Column 420 may display the number keypress in the sequence. Column 422may display the time-stamp that may be tagged to the keypress at thetime of receipt of the keypress. Column 424 may display the time-delaycalculated between each keypress. The time-delay may be calculated basedoff the time-stamp at 422. The time-delay 424 for each keypress 420, mayidentify the time-delay between the current keypress and the priorkeypress.

The sequence is calculated at the start of the first keypress. At row402, the first keypress is received at 1:00 and 1 seconds. There may beno time-delay since it is the first keypress in the sequence. At row404, the second keypress is received at 1:00 and 1 second and 459milliseconds. The time calculated between the first and second keypressis 459 milliseconds. Since 459 milliseconds is less than a half asecond, there is no time-delay calculated as a part of the pattern.

At row 406, the third keypress is received at 1:00 and 4 seconds. Thetime calculated between the second and third keypress is 2 seconds and501 milliseconds. 501 milliseconds is greater than a half a second. Thesystem may then round up the calculated time-delay to the nearestsecond. This may be 3 seconds.

At row 408, the fourth keypress may be received at 1:00 and sevenseconds. The time calculated between the third and fourth keypress is 3seconds. The time-delay determined is a time-delay of 3 seconds.

At row 410, the fifth keypress may be received at 1:00 and 7 seconds and400 milliseconds. The time calculated between the fourth and fifthkeypress is 400 milliseconds. Since 400 milliseconds is less than a halfa second, the time is rounded down to zero. There is no time-delaycalculated for the fifth keypress.

At row 412, the sixth keypress may be received at 1:00 and seven secondsand 850 milliseconds. The time calculated between the fifth and sixthkeypress may be 450 milliseconds. Since 400 milliseconds is less than ahalf a second, the time is rounded down to zero. There is no time-delaycalculated for the fifth keypress.

At row 414, the seventh keypress may be received at 1:00 and 9 seconds.The time calculated between the sixth and seventh keypress is 1 secondand 150 milliseconds. Since 150 milliseconds is less than half a second,the time is rounded down to the nearest second. The time-delaydetermined, therefore, is 1 second.

At row 416, the eighth keypress may be received at 1:00 and 9 secondsand 300 milliseconds. Because 300 milliseconds is less than half asecond, the time may be rounded down to the nearest second. Therefore,there may be a zero time-delay between the seventh keypress and theeighth keypress.

At row 418, the ninth keypress may be received. The ninth keypress, inthis example is the submit button. The ninth keypress may be received at1:00 and 9 seconds and 600 milliseconds. The time between the eighth andninth keypress may be 300 milliseconds. Three hundred millisecond may beless than half a second. Therefore, there may be no time-delay betweenthe eighth and ninth keypress.

When determining the pattern of the sequence of keypresses, thedetermined number of keypresses in the sequence may be 9. This mayinclude the submit button. In some embodiments, the submit button maynot be calculated in the pattern.

The total time from the start of receipt of the first keypress throughthe receipt of the last keypress may be 8 seconds and 600 milliseconds.The frequency, in this example may be 9 keypresses in 00:08:600.

It should be appreciated that each of the keypresses may be the samenumerical value. Each of the keypresses may be a different numericalvalue. The pattern may not be determined by the numerical value of thekeypress. The pattern may be the same pattern despite the numericalvalue.

Following a determination of the time-delay between each keypress, thesequence of keypresses in FIG. 3 may playout as 2 keypresses, a 3 seconddelay, 1 keypress, a 3 second delay, 2 keypresses, a 1 second delay, 2keypresses and then submit.

FIG. 5 shows another exemplary sequence of keypresses 500 in accordancewith principles of the disclosure. The sequence of keypresses 500 may bereceived in a total of two seconds. This sequence may be comparable to amusical tune played on a piano.

The first 5 keypresses may all be received within one second. The first5 keypresses may be received one after another without the user stoppingfor any significant delay. The first keypress 502 may be received at2:00 and one second. The second keypress 504 may be received at 2:00 andone second and 100 milliseconds. The third keypress 506 may be receivedat 2:00 and one second and 300 milliseconds. The fourth keypress 508 maybe received at 2:00 and one second and 650 milliseconds. The fifthkeypress 510 may be received at 2:00 and one second and 900milliseconds.

The time between the receipt of the fifth keypress and the sixthkeypress may be about a half second. The time-delay 512 calculated maybe, for this exemplary diagram, half a second. Since the total time ofreceipt is two seconds, a time-delay may be considered greater than zerowhen the time between two keypresses is equal to or greater than 400milliseconds.

The sixth keypress 514 may be received at 2:00 and 2 seconds and 450milliseconds. The seventh keypress 516 may be received at 2:00 and 2seconds and 650 milliseconds.

The pattern for the sequence of keypresses 500 may be determined. Thenumber of keypresses in the sequence is 7 keypresses. The total timefrom receipt of the first keypress to the seventh keypress is one secondand 750 milliseconds. The frequency of the sequence may be 7 keypressesin one second and 750 milliseconds.

FIG. 6 shows a flowchart of the steps 600 for authenticating a cardlesstransaction. At step 602, a sequence of keypresses may be received at aPOS device from a user to authenticate the user to perform atransaction.

At step 604, each keypress may be tagged with a time-stamp. Thetime-stamp may mark the time of receipt of the keypress. The time-stampmay be the time the user presses the key on the keypad. In someembodiments, the duration of time the key is in keydown mode may also becalculated.

At step 606, the sequence of keypresses and the time-stamp may beencrypted prior to being transmitted to the secure payment network.

At step 608, the sequence of keypresses may be transmitted to the securepayment network. At step 610, a pattern may be determined from thesequence of keypresses. The pattern may be determined based on thenumber of keypresses, the frequency of the sequence of keypresses and atime-delay between each keypress.

At step 612, the secure payment network may verify the authenticity ofthe sequence of keypresses. The secure payment network may verify thatthe determined pattern maps substantially to a stored pattern associatedwith the user.

Thus, methods and apparatus for authenticating and executing a cardlesstransaction is provided. Persons skilled in the art will appreciate thatthe present invention can be practiced by other than the describedembodiments, which are presented for purposes of illustration ratherthan of limitation, and that the present invention is limited only bythe claims that follow.

What is claimed is:
 1. A method for authenticating and executing acardless transaction between a first entity and a second entity, themethod comprising: receiving authentication data at a point-of-saledevice, the authentication data not including presence of a card and notincluding card account data, the authentication data comprising asequence of keypresses; tagging each keypress in the sequence with atimestamp; encrypting the authentication data; transmitting theauthentication data, using a secure communication channel, from the POSdevice to a secure payment network; decrypting the authentication data;determining, from the authentication data, a pattern of the sequence ofkeypresses, the pattern comprising: a number of keypresses; a frequencyof each keypress, the frequency comprising a number of keypresses perunit of time; and a time-delay between each keypresss, the time-delaycalculated based off of the timestamp tagged to each keypress;verifying, by the secure payment network, that the pattern of thesequence of keypresses maps to a stored pattern of a sequence ofkeypresses stored within a personal profile account associated with thefirst entity; and in response to the verification, authenticating thetransaction at the POS device between the first and second entity. 2.The method of claim 1 wherein the verifying further comprises confirmingthat: the number of keypresses is equal to a stored number ofkeypresses; the frequency of the keypresses is within a pre-determinedrange of a stored frequency of keypresses; and the time-delay betweeneach keypress is within a pre-determined range of a stored number oftime for each time-delay.
 3. The method of claim 2 wherein when at leastone of the number of keypresses, frequency of each keypress that isrepetitive and the time-delay is not confirmed, the method furthercomprises transmitting an error message to the POS device andterminating the transaction.
 4. The method of claim 1 wherein thepattern of the sequence of the keypresses are irrespective of analphanumeric value of each keypress.
 5. The method of claim 1 whereinthe authenticating the transaction further comprises: transmitting aconfirmation to the POS device to authenticate the cardless transaction;generating, by a microprocessor at the POS device, transactioninstructions; transmitting the transaction instructions to the securepayment network using the secure communication channel; and in responseto the transmission, executing, by the payment network, the cardlesstransaction between the first entity and the second entity.
 6. Themethod of claim 1 wherein the POS device is one of a smartphone, laptop,online website and a POS device at a physical location.
 7. The method ofclaim 1 wherein the POS device comprises executable instructions storedin the non-transitory memory, when run by the microprocessor encryptsthe authentication data such that the authentication data is decryptableby the secure payment network.
 8. The method of claim 1 wherein thefirst entity is an individual.
 9. The method of claim 1 wherein thefirst entity is a company.
 10. The method of claim 1 further comprising,calculating a duration of time for a keydown of each keypress.
 11. Themethod of claim 10 further comprising, when the duration of time of thekeydown is greater than one second, tagging the duration of time of thekeydown as included in the pattern of the sequence of keypresses. 12.The method of claim 1 wherein the pre-determined range is within 100milliseconds.
 13. A cardless payment architecture comprising: apoint-of-sale (“POS”) device comprising: a keypad configured to receivea sequence of keypresses as authentication for a cardless transaction; aprocessor configured to record the sequence of keypresses and tag eachkeypress with a timestamp; a keypress controller configured to determinefrom the sequence of keypresses: a number of keypresses; a frequency ofeach keypress, the frequency comprising a rate of keypresses per unit oftime; and a time-delay between each keypresss, the time-delay calculatedbased off of the timestamp tagged to each keypress; the processorfurther configured to: store the sequence, the timestamp, the number ofkeypresses, the frequency and the time-delay as authentication data forthe cardless transaction; encrypt the authentication data; and transmitthe encrypted authentication data to the secure transaction network forverification; the secure transaction network comprising: amachine-learning (“ML”) pattern identifier configured to: decrypt theauthentication data; identify a pattern to the sequence of keypressesbased off of the determined number of keypresses, the determinedfrequency and the determined time-delay; and a pattern verificationcontroller configured to verify that the identified pattern matches to astored pattern associated with an entity, the matching to authenticatethe cardless transaction.
 14. The architecture of claim 13 wherein thePOS device is one of a smartphone, laptop, online website and a POSdevice at a physical location.
 15. The architecture of claim 13 whereinthe pattern of the sequence of the keypresses is irrespective of analphanumeric value of each keypress.
 16. The architecture of claim 13wherein the verifying by the pattern verification controller furthercomprises verifying that: the number of keypresses is equal to a storednumber of keypresses; the frequency of the keypresses is within apre-determined range of a stored frequency of keypresses; and thetime-delay between each keypress is within a pre-determined range of astored number of time for each time-delay.
 17. The architecture of claim13 wherein the keypress controller is further configured to calculate aduration of time for a keydown of each keypress.
 18. The method of claim17 wherein when the duration of time of the keydown is greater than onesecond, the keypress controller is configured to tag the duration oftime of the keydown and the machine learning pattern identifier isfurther configured to identify the pattern based off of the duration oftime of the keydown.
 19. A method for authenticating a cardlesstransaction, the method comprising: receiving authentication data at apoint-of-sale device, the authentication data comprising a sequence ofkeypresses; tagging each keypress in the sequence with a timestamp and aduration of time of a keydown of each keypress; encrypting theauthentication data; transmitting the authentication data, using asecure communication channel, from the POS device to a secure paymentnetwork; decrypting the authentication data; determining, from theauthentication data, a pattern of the sequence of keypresses, thepattern comprising: a number of keypresses; a frequency of eachkeypress, the frequency comprising a number of keypresses per unit oftime; the duration of time of the keydown when the keydown is greaterthan a pre-determined amount of time; and a time-delay between eachkeypresss, the time-delay calculated based off of the timestamp taggedto each keypress; verifying, by the secure payment network, that thepattern of the sequence of keypresses maps to a stored pattern of asequence of keypresses stored within a personal profile account; and inresponse to the verification, authenticating the transaction at the POSdevice.
 20. The method of claim 19 wherein the pattern of the sequenceof the keypresses are irrespective of an alphanumeric value of eachkeypress.