Dongle facilitated wireless consumer payments

ABSTRACT

Computing systems and methods for facilitating consumer transactions in retail and other establishments include communication interfaces adapted to couple a computing system to a plurality of third party mobile electronic devices, storage components adapted to store user information, participating merchant information, or any combination thereof, and processors in communication with the communication interfaces and storage components. The processors are adapted to facilitate automatic wireless transactions between third party users of the third party mobile electronic devices and the participating merchants when the third party devices are present at the participating merchants without any affirmative activity by the third party users.

CROSS REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.13/938,860, filed on Jul. 10, 2013, which claims priority to U.S.Provisional Application No. 61/747,918, entitled “AUTOMATIC WIRELESSCONSUMER CHECKINS,” filed Dec. 31, 2012; and also U.S. Designapplication Ser. No. 29/455,720, entitled “BLUETOOTH LOW ENERGY DONGLEDESIGN,” filed May 23, 2013, the full disclosures of which areincorporated by reference herein in their entirety and for all purposes.

TECHNICAL FIELD

The present disclosure relates generally to systems and devices thatfacilitate consumer transactions, and more particularly to systems anddevices for consumer transactions that utilize the personal mobiledevices of consumers.

BACKGROUND

Computer systems and networks can facilitate the tasks of buying,selling and transferring goods, as technology advances have allowed fora wider variety of devices and transaction types in the retail and othermarketplaces. One example of a relatively new development within therealm of electronic commerce is the ability to allow a consumer to payfor a good or service at a point of sale through the use of his or hersmart phone, tablet, laptop computer, or other personal mobile device. Auser merely needs to have an appropriate mobile payment application or“app” on his or her device, whereupon the user can present his or hersmart phone or other similar device at an appropriate time and locationat a retail or other establishment. The retailer or other seller orservice provider can then “check in” the given user through some processof reading his or her smart phone or other similar device, after whichthe seller or service provider can accept payment or credit through someform of communication with the checked in or acknowledged device.

Unfortunately, such setups are not without their own drawbacks andinconvenient features. In many instances, the current check in processcan be time consuming. For example, current check in procedures oftenrequire the customer to take out his or her smart phone or other deviceat a point of sale in order to make a payment or provide a credit. Thisoften involves the device searching for the appropriate wirelessconnection at the store, searching for the store among many possiblechoices on the device, and/or manual user input or selection on his orher personal mobile device, all of which can take some inconvenientamount of time. Even small amounts of time that are less than a minutecan be frustrating where other consumers are waiting in line behind theuser at a register or other point of sale.

Although many systems and methods for facilitating consumer paymentsusing personal mobile devices have generally worked well in the past,there is always a desire for improvement. In particular, what is desiredare systems and methods that provide for faster or more convenient checkins and payment processing where smart phones or other personal mobiledevices are used to facilitate consumer transactions.

BRIEF DESCRIPTION OF THE DRAWINGS

The included drawings are for illustrative purposes and serve only toprovide examples of possible systems and methods for the discloseddongle facilitated wireless consumer payments. These drawings in no waylimit any changes in form and detail that may be made to that which isdisclosed by one skilled in the art without departing from the spiritand scope of this disclosure.

FIG. 1 illustrates in block diagram format an exemplary computing systemadapted for implementing the purchase of goods or services according toone embodiment of the present invention.

FIG. 2 illustrates in block diagram format an exemplary computer systemsuitable for implementing on one or more devices of the computing systemin FIG. 1 according to one embodiment of the present invention.

FIG. 3 illustrates in block diagram format an exemplary merchant layoutand associated system components adapted for implementing the purchaseof goods or services using automatic wireless consumer check insaccording to one embodiment of the present invention.

FIG. 4 illustrates in various perspective views an exemplary merchantdongle adapted for implementing the purchase of goods or services usingautomated wireless consumer check ins according to one embodiment of thepresent invention.

FIG. 5 illustrates in various perspective views another exemplarymerchant dongle adapted for implementing the purchase of goods orservices using automated wireless consumer check ins according to oneembodiment of the present invention.

FIG. 6 illustrates in various perspective views yet another exemplarymerchant dongle adapted for implementing the purchase of goods orservices using automated wireless consumer check ins according to oneembodiment of the present invention.

FIG. 7 illustrates in various perspective views still another exemplarymerchant dongle adapted for implementing the purchase of goods orservices using automated wireless consumer check ins according to oneembodiment of the present invention.

FIG. 8 illustrates in block diagram format an exemplary internal layoutfor a merchant dongle adapted for implementing the purchase of goods orservices using automatic wireless consumer check ins according to oneembodiment of the present invention.

FIG. 9 provides a flowchart of an exemplary method of facilitatingpayment or credit for a purchase by utilizing an automated wirelessconsumer check in according to one embodiment of the present invention.

FIG. 10 provides a flowchart of an exemplary method of performing ahandshake between a merchant dongle and a purchaser mobile device on anunbonded channel so as to facilitate a payment or credit for a purchaseaccording to one embodiment of the present invention.

DETAILED DESCRIPTION

Exemplary applications of apparatuses and methods according to thepresent invention are described in this section. These examples arebeing provided solely to add context and aid in the understanding of theinvention. It will thus be apparent to one skilled in the art that thepresent invention may be practiced without some or all of these specificdetails. In other instances, well known process steps have not beendescribed in detail in order to avoid unnecessarily obscuring thepresent invention. Other applications are possible, such that thefollowing examples should not be taken as limiting.

In the following detailed description, references are made to theaccompanying drawings, which form a part of the description and in whichare shown, by way of illustration, specific embodiments of the presentinvention. Although these embodiments are described in sufficient detailto enable one skilled in the art to practice the invention, it isunderstood that these examples are not limiting, such that otherembodiments may be used, and changes may be made without departing fromthe spirit and scope of the invention.

The present invention relates in various embodiments to devices, systemsand methods involving activities with respect to the purchase of goodsor services, such as in a retail setting. In various particularembodiments, the subject devices, systems or methods can involve one ormore user devices in communication over a network. Such a network canfacilitate the improved and purchase of goods or services, such asthrough a more robust use of a smart phone, tablet, laptop or otherpersonal mobile device. The subject systems or methods can utilizeprograms and/or associated hardware on user phones and other mobiledevices to facilitate the automated check ins of users when they are ata cooperating or subscribing location. Users that have beenautomatically checked in by such a system can then more readily pay orprovide credit for goods or services at a point of sale in theestablishment.

While the various examples disclosed herein focus on particular aspectsregarding the purchase of goods or services in a retail or similarsetting, it will be understood that the various inventive principles andembodiments disclosed herein can be applied to other types ofapplications and arrangements involving consumer or personaltransactions as well. For example, the various aspects and features withrespect to automated check ins and transaction processing disclosedherein can also take place at a taxi cab or other transportationvehicle, fast food or other drive through, coffee shop, self-service gaspump or other gas station application, library, private club, publicvenue or government building, among other possible applications.

Systems and Devices

Beginning with FIG. 1, an exemplary embodiment of a computing systemadapted for implementing the purchase of goods or services isillustrated in block diagram format. As shown, computing system 100 maycomprise or implement a plurality of servers and/or software componentsthat operate to perform various methodologies in accordance with thedescribed embodiments. Exemplary servers may include, for example,stand-alone and enterprise-class servers operating a server OS such as aMICROSOFT® OS, a UNIX® OS, a LINUX® OS, or other suitable server-basedOS. It can be appreciated that the servers illustrated in FIG. 1 may bedeployed in other ways and that the operations performed and/or theservices provided by such servers may be combined or separated for agiven implementation and may be performed by a greater number or fewernumber of servers. One or more servers may be operated and/or maintainedby the same or different entities.

Computing system 100 can include, among various devices, servers,databases and other elements, a client 102 that may comprise or employone or more client devices 104, such as a laptop, a mobile computingdevice, a PC, and/or any other computing device having computing and/orcommunications capabilities in accordance with the describedembodiments. In particular, it is specifically contemplated that clientdevices 104 can include a cellular telephone or other similar mobiledevice that a user can carry on or about his or her person and accessreadily.

Client devices 104 generally may provide one or more client programs106, such as system programs and application programs to perform variouscomputing and/or communications operations. Exemplary system programsmay include, without limitation, an operating system (e.g., MICROSOFT®OS, UNIX® OS, LINUX® OS, Symbian OS™, Embedix OS, Binary Run-timeEnvironment for Wireless (BREW) OS, JavaOS, a Wireless ApplicationProtocol (WAP) OS, and others), device drivers, programming tools,utility programs, software libraries, application programming interfaces(APIs), and so forth. Exemplary application programs may include,without limitation, a web browser application, messaging applications(e.g., e-mail, IM, SMS, MMS, telephone, voicemail, VoIP, videomessaging), contacts application, calendar application, electronicdocument application, database application, media application (e.g.,music, video, television), location-based services (LBS) application(e.g., GPS, mapping, directions, point-of-interest, locator), and soforth. One or more of client programs 106 may display various graphicaluser interfaces (GUIs) to present information to and/or receiveinformation from one or more of client devices 104.

As shown, client 102 can be communicatively coupled via one or morenetworks 108 to a network-based system 110. Network-based system 110 maybe structured, arranged, and/or configured to allow client 102 toestablish one or more communications sessions with network-based system110 using various computing devices 104 and/or client programs 106.Accordingly, a communications session between client 102 andnetwork-based system 110 may involve the unidirectional and/orbidirectional exchange of information and may occur over one or moretypes of networks 108 depending on the mode of communication. While theembodiment of FIG. 1 illustrates a computing system 100 deployed in aclient-server operating environment, it is to be understood that othersuitable operating environments and/or architectures may be used inaccordance with the described embodiments.

Data and/or voice communications between client 102 and thenetwork-based system 110 may be sent and received over one or morenetworks 108 such as the Internet, a WAN, a WWAN, a WLAN, a mobiletelephone network, a landline telephone network, a VoIP network, as wellas other suitable networks. For example, client 102 may communicate withnetwork-based system 110 over the Internet or other suitable WAN bysending and or receiving information via interaction with a web site,e-mail, IM session, and/or video messaging session. Any of a widevariety of suitable communication types between client 102 and system110 can take place, as will be readily appreciated. In particular,wireless communications of any suitable form may take place betweenclient 102 and system 110, such as that which often occurs in the caseof mobile phones or other personal mobile devices.

In various embodiments, computing system 100 can include, among otherelements, a third party 112, which may comprise or employ a third-partyserver 114 hosting a third-party application 116. In variousimplementations, third-party server 314 and/or third-party application116 may host a web site associated with or employed by a third party112. For example, third-party server 114 and/or third-party application116 may enable network-based system 110 to provide client 102 withadditional services and/or information, such as advertisements orpromotions regarding sale items. In some embodiments, one or more ofclient programs 106 may be used to access network-based system 110 viathird party 112. For example, client 102 may use a web client to accessand/or receive content from network-based system 110 after initiallycommunicating with a third-party web site 112.

Network-based system 110 may comprise one or more communications servers120 to provide suitable interfaces that enable communication usingvarious modes of communication and/or via one or more networks 108.Communications servers 120 can include a web server 122, an API server124, and/or a messaging server 126 to provide interfaces to one or moreapplication servers 130. Application servers 130 of network-based system110 may be structured, arranged, and/or configured to provide variousonline marketplace and/or purchasing services to users that accessnetwork-based system 110. In various embodiments, client 102 maycommunicate with applications servers 130 of network-based system 110via one or more of a web interface provided by web server 122, aprogrammatic interface provided by API server 124, and/or a messaginginterface provided by messaging server 126. It can be appreciated thatweb server 122, API server 124, and messaging server 126 may bestructured, arranged, and/or configured to communicate with varioustypes of client devices 104 and/or client programs 106 and mayinteroperate with each other in some implementations.

Web server 122 may be arranged to communicate with web clients and/orapplications such as a web browser, web browser toolbar, desktop widget,mobile widget, web-based application, web-based interpreter, virtualmachine, and so forth. API server 124 may be arranged to communicatewith various client programs 106 and/or a third-party application 116comprising an implementation of API for network-based system 110.Messaging server 126 may be arranged to communicate with variousmessaging clients and/or applications such as e-mail, IM, SMS, MMS,telephone, VoIP, video messaging, and so forth, and messaging server 126may provide a messaging interface to enable access by client 102 and/orthird party 112 to the various services and functions provided byapplication servers 130.

When implemented as an online goods and services marketplace,application servers 130 of network-based system 110 may provide variousonline marketplace services including, for example, account services,buying services, selling services, listing catalog services, dynamiccontent management services, delivery services, payment services, andnotification services. Application servers 130 may include an accountserver 132, a buying server 134, a selling server 136, a listing catalogserver 138, a dynamic content management server 140, a payment server142, a notification server 144, and/or a delivery server 146 structuredand arranged to provide such online marketplace services.

Application servers 130, in turn, may be coupled to and capable ofaccessing one or more databases 150 including a subscriber database 152,an active events database 154, and/or a transaction database 156.Databases 150 generally may store and maintain various types ofinformation for use by application servers 130 and may comprise or beimplemented by various types of computer storage devices (e.g., servers,memory) and/or database structures (e.g., relational, object-oriented,hierarchical, dimensional, network) in accordance with the describedembodiments.

Continuing with FIG. 2, an exemplary computer system 200 suitable forimplementing on one or more devices of the computing system in FIG. 1 isdepicted in block diagram format. In various implementations, a devicethat includes computer system 200 may comprise a personal computingdevice (e.g., a smart or mobile phone, a computing tablet, a personalcomputer, laptop, PDA, Bluetooth device, key FOB, badge, etc.) that iscapable of communicating with a network. The goods or services providermay utilize a network computing device (e.g., a network server) capableof communicating with the network. It should be appreciated that each ofthe devices utilized by users, goods and services providers, and paymentproviders may be implemented as computer system 200 in a manner asfollows.

Computer system 200 can include a bus 202 or other communicationmechanism for communicating information data, signals, and informationbetween various components of computer system 200. Components include aninput/output (I/O) component 204 that processes a user action, such asselecting keys from a keypad/keyboard, selecting one or more buttons orlinks, etc., and sends a corresponding signal to bus 202. I/O component204 may also include an output component, such as a display 211 and acursor control 213 (such as a keyboard, keypad, mouse, etc.). Anoptional audio input/output component 205 may also be included to allowa user to use voice for inputting information by converting audiosignals. Audio I/O component 205 may allow the user to hear audio. Atransceiver or network interface 206 transmits and receives signalsbetween computer system 200 and other devices, such as another userdevice, a merchant server, or a payment provider server via a network.In various embodiments, such as for many cellular telephone and othermobile device embodiments, this transmission can be wireless, althoughother transmission mediums and methods may also be suitable. A processor212, which can be a micro-controller, digital signal processor (DSP), orother processing component, processes these various signals, such as fordisplay on computer system 200 or transmission to other devices over anetwork 260 via a communication link 218. Again, communication link 218can simply be a wireless communication form in some embodiments.Processor 212 may also control transmission of information, such ascookies or IP addresses, to other devices.

Components of computer system 200 also include a system memory component214 (e.g., RAM), a static storage component 216 (e.g., ROM), and/or adisk drive 217. Computer system 200 performs specific operations byprocessor 212 and other components by executing one or more sequences ofinstructions contained in system memory component 214. Logic may beencoded in a computer readable medium, which may refer to any mediumthat participates in providing instructions to processor 212 forexecution. Such a medium may take many forms, including but not limitedto, non-volatile media, volatile media, and transmission media. Invarious implementations, non-volatile media includes optical or magneticdisks, volatile media includes dynamic memory, such as system memorycomponent 214, and transmission media includes coaxial cables, copperwire, and fiber optics, including wires that comprise bus 202. In oneembodiment, the logic is encoded in non-transitory computer readablemedium. In one example, transmission media may take the form of acousticor light waves, such as those generated during radio wave, optical, andinfrared data communications.

Some common forms of computer readable media includes, for example,floppy disk, flexible disk, hard disk, magnetic tape, any other magneticmedium, CD-ROM, any other optical medium, punch cards, paper tape, anyother physical medium with patterns of holes, RAM, PROM, EPROM,FLASH-EPROM, any other memory chip or cartridge, or any other mediumfrom which a computer is adapted to read.

In various embodiments of the present disclosure, execution ofinstruction sequences to practice the present disclosure may beperformed by computer system 200. In various other embodiments of thepresent disclosure, a plurality of computer systems 200 coupled bycommunication link 218 to the network (e.g., such as a LAN, WLAN, PTSN,and/or various other wired or wireless networks, includingtelecommunications, mobile, and cellular phone networks) may performinstruction sequences to practice the present disclosure in coordinationwith one another.

Where applicable, various embodiments provided by the present disclosuremay be implemented using hardware, software, or combinations of hardwareand software. Also, where applicable, the various hardware componentsand/or software components set forth herein may be combined intocomposite components comprising software, hardware, and/or both withoutdeparting from the spirit of the present disclosure. Where applicable,the various hardware components and/or software components set forthherein may be separated into sub-components comprising software,hardware, or both without departing from the scope of the presentdisclosure. In addition, where applicable, it is contemplated thatsoftware components may be implemented as hardware components andvice-versa.

Software, in accordance with the present disclosure, such as programcode and/or data, may be stored on one or more computer readablemediums. It is also contemplated that software identified herein may beimplemented using one or more general purpose or specific purposecomputers and/or computer systems, networked and/or otherwise. Suchsoftware may be stored and/or used at one or more locations along orthroughout the system, at client 102, network-based system 110, or both.

Automated Wireless Transactions

As will be readily appreciated, the foregoing networks, systems,devices, methods and variations thereof can be used to implement anautomated checkin of users at a cooperating or subscribingestablishment, such that subsequent purchase transactions and otheractivities can be more streamlined and convenient. Rather than havingusers resort to known procedures involving wireless checkins with theirown personal mobile devices at a point of sale, a more user friendlysystem involving the use of Bluetooth Low Energy (“LE”) in associationwith separate user phones, other mobile devices or any suitable usercomputing devices can be provided. One or more applications or “apps”can be provided for download and use on private consumer phones andmobile devices to help facilitate the use of the automated checkinprocess. In various embodiments, such automated checkins can befacilitated by a transaction service provider, such as, for example,PayPal Inc. of San Jose, Calif.

Bluetooth low energy (“BLE”) is a relatively new feature of Bluetooth4.0 wireless radio technology. BLE is intended for primarily low-powerand low-latency applications for wireless devices within a short range,such as up to about 50 meters. Devices using BLE utilize a protocolhaving intermittent communications, smaller amounts of data transfer andbandwidths, as well as low duty cycles. As such, BLE can consume only afraction of the power of traditional Bluetooth enabled products forBluetooth communications. In many cases, BLE products will be able tooperate more than a year on a tiny battery without recharging. The useof BLE can allow for a wider variety of applications in relatively lowpower devices, such as smart phones and other personal mobile devices.

In various embodiments, it is specifically contemplated that personalsmart phones and other mobile devices that are equipped with BLEcapabilities can be provided with programs or “apps” that leverage theuse of these capabilities to allow for the automated checkins of ownersor users carrying those devices when they are merely in or at aparticipating establishment. BLE allows for constant passive scanningfor Bluetooth peripherals. A suitable program or app on a user devicecan be set to run constantly in the background under a BLE protocol,always monitoring for a significant change in location and/or presenceof an appropriate BLE peripheral or “beacon” at a merchant or vendor.When the owner or user of the phone or personal mobile device enters astore or other participating location, he or she would pass by a BLEperipheral or beacon by the entrance or at some other appropriatelocation. This merchant or third party run BLE peripheral can be sendingout a signal, such as for advertising a checkin service with auniversally unique identifier (“UUID”) and store information. The BLEdongle, beacon or other peripheral can be a specific type of dongle invarious applications, as set forth in greater detail below.

It is worth noting that the communication process between the merchantdongle or other beacon and the purchaser smart phone or other mobiledevice can take place on an unbonded channel. This is significant inthat the communications between the devices actually involve a financialtransaction, the details of which can be detected by any party due tothe unbonded nature of the communication. While the use of an unbondedchannel provides greater speed and flexibility for the use of manydifferent devices, certain precautions should be taken to protect thesensitive nature of the financial or other consumer transaction. Thiscan be accomplished by providing UUIDs and tokens for the devices toidentify each other only in a generic fashion, with all sensitiveinformation being retained remotely by a financial processing entity orother service provider. Also, since communications take place overunbonded channels, there is no reason for a device to retain long termspecific identifiers or information that is typically needed for bondedcommunications.

In practice, the smart phone or other mobile user device wouldwirelessly detect or “see” this outside BLE peripheral or beacon as thedevices are in proximity with each other. The peripheral or beacon canbe a dongle, as set forth below, and detection can be had due to theconstant background running of the app under a BLE protocol. Oncedetection is made at a low or lowest energy level and duty cycle, a rampup in energy, duty cycle, and/or other operating parameters can takeplace so that a handshake and checkin can take place automaticallybetween the user device and the merchant device. In particular, theprivately or separately owned mobile phone or other mobile user devicecan connect to the service at the store, merchant or other location,encrypt a payment token along with the UUID and write it to the service.This information could then be used directly by the merchant themself,or alternatively passed by the peripheral or other component up to aremote third party payment provider, such as for example, PayPal. Thethird party provider can then execute a checkin at the establishment onbehalf of the customer or user. Later, when the customer or userapproaches a checkout aisle or other point of sale, another BLEperipheral advertising a checkout service can be present. Various checksand processes can then take place based on the transmit power andreceived power of the BLE peripheral, mobile user device, or both, andthe phone or other mobile device can again write credentials to thecheckout service. This associates the customer with a particularregister. Checkout can then proceed as normal for a checkin payment.

In order for the actual handshake and communication between the dongleor beacon and the user mobile device to be effective over an unbondedchannel, it is important that both devices already be initialized andsigned up for the same remote third party service provider, such asPaypal or any other suitable provider. Each device can then be providedwith public encryption keys, private encryption keys and payment tokensprior to meeting each other, such that the devices are able to recognizeeach other as belonging to the proper service when the signals aredetected and the handshake begins. Information is then exchanged purelyby way of keys and payment tokens, such that no sensitive information isever exchanged over the unbonded channel. Details of such key and tokenprovisions, as well as the handshake process and protocols are providedbelow with respect to FIG. 10.

With the use of BLE and appropriate apps or programs on user devices,this entire process can be automated in many instances. This can savesignificant amounts of time and inconvenience for many consumers at thepoint of sale. In some embodiments, a beep, other sound, vibration,visual display or other output from the smart phone or other mobile userdevice can be provided upon automatic checkin. This can simply provide anotice to the user that they are now checked in at the establishment.Different sounds or indicators on a display can confirm to the userwhich establishment(s) the user is currently checked in, such as wheremalls or other locations having multiple vendors in a small area mightbe applicable. In this manner, a user can be made aware that he or sheis checked in and is able to readily shop here and check out quickly.

In various further embodiments, other procedures can be implemented totake advantage of the knowledge that a user is at a given merchantlocation and that a purchase or other point of sale activity might beimminent. The bidirectional nature of BLE can allow for a more robustexperience and interaction between the merchant, user, and/or thirdparty payment service provider. For example, advertising and promotionaloffers can be directed to a known user from the merchant, the paymentservice provider, or both. These items can rely on a known history andother parameters applicable to the specific user. For example, noticescan be provided regarding sales or promotions on items or related itemsthat are known to be of interest or the subject of past purchases by aknown user. Also, a step-up procedure to assess risk can be implemented,such that the user can be prompted for a PIN or other identifier ifthere is any concern over risk for that user or about a particularpurchase. In addition, a customized offer of credit can be made for theuser based upon various known factors in the associated customeraccount, history or profile. In various embodiments, a signal to thephone or device to buzz or emit a sound or display can be provided ifthe merchant or third party payment service provider might need a PIN orother verification at the time of purchase.

In various embodiments, the one or more processors 212 can be located ona remote server, such as a third party payment service provider server,while the display and user inputs can be located onsite at a store orother participating location, such as on a register, and/or also on amobile user device, such as a smart phone. Processor(s) 212 can beadapted to facilitate an automatic check in process, and can be furtheradapted to accept and process a request to purchase goods upon checkout.Other services can be provided by processor(s) 212, such as any of theactions or services set forth herein.

FIG. 3 illustrates in block diagram format an exemplary merchant layoutand associated system components adapted for implementing the purchaseof goods or services using automatic wireless consumer checkinsaccording to one embodiment of the present invention. It will be readilyappreciated that this merchant layout is only provided for purposes ofillustration, and that many other types of layouts, devices, proceduresand the like could be effectively implemented using the variousprinciples of the present disclosure.

Merchant layout 300 includes an indoor store floor having a number ofBLE signaling devices 310. These devices can be distributedstrategically throughout the store or establishment, such as near thefront door, at central locations, and/or at locations of high volumetraffic within the establishment. One or more third party mobile userdevices 102, such as phones, PDAs, tablets or the like, can interactwith one or more of the signaling devices 310 throughout the store.Preferably, only one interaction with a signaling device 310 is neededfor a checkin, although it may be useful for an establishment to knowwhere a user is located and/or user travel and shopping patterns orhabits within a store. Such further information can be used to providefurther advertising and promotional offers (e.g., related to somethingat or near where the user is physically located), and/or to authenticatethe actual user versus one who may have stolen or is otherwise using themobile device in an unauthorized fashion. Such further authenticationcan involve checking known user traffic and shopping patterns againstwhat is currently happening for a given device.

An actual automatic checkin process can involve a subscribed oraffirmatively active user entering a store or establishment, whereuponthe phone or other user device on the person of the user has a low levelbackground program running that detects a low level BLE signal from oneor more beacons or other suitable devices 310 in the store. The phone ordevice 102 can then “wake up” and communicate on a more active levelwith the store device 310. A UUID and token can be generated andassigned to the user device for a particular time, location and session,with appropriate expiration and other safeguards in place to protectagainst fraud or other misuse. For example, a period of one or two hoursmight suffice for a typical checkin session or event.

The UUID, token, and other informational items can be exchanged betweenthe store device and the user device, whereupon the user device (anduser) are “checked in” at that location and are ready to make a purchaseor otherwise check out at some later time. Other informational itemsexchanged or provided can include the store type, name and number, storelocation or address, actual or likely items of interest or purchase forthe user, a user history at that location, similar locations, and/oroverall, the uniquely identified user, a maximum amount of credit orcurrency available overall to the user for an automated purchase, theamount of credit or currency that may be used without a PIN or otheraffirmative user authentication being required, among otherpossibilities. This information can be stored on the user device for asession or longer, can be provided to the store or other establishment,and can also be provided to a remotely owned and controlled separatepayment service provider.

After checkin, various intermediate transactions, offers, credit or riskassessments can take place, whereupon check out or purchase can takeplace at any of a number of terminals or registers 320. If needed,authentication of the user can be had by way of a manual PIN entry, afingerprint scan, a manual facial recognition by store personnel, and/orthe like. In an automated fashion, one or more of the terminal 320 canalso be equipped with BLE signaling and communication devices, such thatthe presence or close proximity of one or more checked in devices 102can be read. Automated or automatic check in processes can utilize GPS,triangulation, a signal strength of the different devices 102 todifferent terminals, and/or the like to estimate where a particulardevice 102 is located in the check out process.

In some embodiments, a display readout of several possible devices canbe presented to store personnel, such that the right device or user canbe readily picked from a subset of all presently checked in devices andcustomers. For example, the 3 or 5 most likely devices/users for a givenchecked in customer that is trying to check out can be presented on aterminal 320 for a store clerk. A quick verification of the correctdevice/user can be made by the clerk, whereupon the final payment andcheck out process is quickly consummated and finished. In the event thatthe small subset of 3 or 5 most likely devices does not have the correctdevice for the customer that is immediately before the clerk, anavailable input can allow the clerk to expand the possible number oflikely choices to 10, 20 or even all currently checked in devices. Inthe event that the present customer/user/device can still not be foundon the menu of selections available to the clerk, then a re-checkinprocess can take place at the terminal 320 itself.

Bluetooth Low Energy Dongle

As will be readily appreciated, the actual BLE beacon can be a donglethat merchants are able to implement in order to help facilitateconsumer transactions having zero “friction” (i.e., no interaction oreffort needed from the consumer, other than to be carrying a smart phoneor other suitable device). The consumer device can be carried in apocket, purse or other convenient location, and does not need to beaccessed by the user in order for the check in and transactionprocessing to occur. Such convenience is highly advantageous over manyother current ways of attending to consumer transactions.

FIGS. 4-7 each illustrate in various perspective views differentexemplary merchant dongles adapted for implementing the purchase ofgoods or services using automated wireless consumer check ins accordingto one embodiment of the present invention. As shown, such dongles canbe equipped with USB type connections, and such connections can pivot,slide, swivel or otherwise function in a manner so as to facilitateinstallation. In some embodiments, such USB connections are simply thereto provide power to the beacon or dongle. A USB to AC adaptor may alsobe provided, and/or a battery may be used for providing power, as may bedesired.

FIG. 8 illustrates in block diagram format an exemplary internal layoutfor a merchant dongle adapted for implementing the purchase of goods orservices using automatic wireless consumer check ins according to oneembodiment of the present invention. As shown, various components of thedongle 800 can include memory components 802, processors 804, a WiFiinterface 806, a BLE interface 808, a USB connection 810, variousdisplays 812 and a power source 814.

Use Examples

While the foregoing devices, systems and methods can be applied at aretail store or outlet, many other specific examples and applicationsare also contemplated. For example, the disclosed wireless consumertransaction systems and methods can take place in or about a taxi cab orother mode of transportation. In such instances, a user wishing to use acab or other transportation can get into the cab or other vehicle withhis or her smart phone or other suitable device, whereupon a BLE beaconin or about the cab or other suitable vehicle can connect with the userdevice. Again, such a connection can involve a handshake andcommunication between the beacon and the third party device, such asover an unbonded channel as set forth above. Such a financialtransaction for a ride or other transportation mode can be processedwith zero friction or effort to the user.

As another specific example, a drive through can be equipped with a BLEbeacon so as to process consumer transactions with zero friction in asimilar manner. Such a drive through can be for fast food, coffee, orother suitable environments where consumer transactions take place. TheBLE beacon can be provided in a matrix setup such that the appropriatedriver can be identified and authenticated for payments with no efforton the part of the purchasing driver.

As yet another specific example, gas and other fueling stations can alsobe equipped with BLE beacons. These can be placed at or near theregister or other locations within a store or other central location, aswell as at one or more of the individual fuel pumps. A user can thenpump gas without needing to swipe a card or perform any other action atthe pump, such as by being identified and authenticated by way of theprocesses set forth above. Again, a matrix mode may be used if desiredto achieve better accuracy in attributing purchases to the rightpersons.

Methods

Although a wide variety of applications and methods involving the use ofBLE to facilitate automatic wireless consumer checkins and transactionprocessing might be envisioned, one basic method is illustrated here.Turning next to FIG. 9, a flowchart of an exemplary method offacilitating payment or credit for a purchase by utilizing an automatedwireless consumer check in is provided. In particular, such a method caninvolve using or operating any of the various computing components,devices, systems and/or networks described above. It will be readilyappreciated that not every method step set forth in this flowchart isalways necessary, and that further steps not set forth herein may alsobe included. Furthermore, the exact order of steps may be altered asdesired for various applications.

Beginning with a start step 900, a first process step 902 can involve anapplication, app or other suitable program being provided to a thirdparty user phone or other mobile computing device. Such providing can beperformed electronically by a processor, such as on a separately ownedserver located remotely from the mobile device user. As will be readilyappreciated, this providing can be facilitated by the remote processor,such as through an app store or other processor or server owned byanother separate party that communicates directly with third partymobile phones and user devices. The app or program can include softwarecode to run a number of functions, including code or informationregarding automatic wireless checkins using the phone or other personalmobile device.

At a subsequent process step 904, suitable BLE signals can be broadcastfrom one or more merchant controlled devices at a suitable store,merchant or other participating establishment. Such signals can bebroadcast by one or more dongles, for example. At least one of these BLEsignals can then be detected by the third party smart phone or othersuitable device when it comes within range of the BLE signals at processstep 906. Again, this detection can be accomplished by enabling thethird party phone or other mobile computing device to utilize aBluetooth low energy protocol to detect the presence of a nearbymerchant device using the provided software code. This detecting canoccur automatically without any affirmative action by the user, as theprogram or app can run continuously or semi continuously orintermittently in automated fashion in the background and at low energyand bandwidth levels under a BLE protocol.

At the next process step 908, a wireless communications exchange betweenthe third party phone or mobile computing device and the nearby dongleor other merchant device can take place. Such an exchange can involve ahandshake, UUID assignment, exchange of pertinent information and thelike, as will be readily appreciated by one of skill in the art. Again,said exchange can occur automatically without any affirmative action bythe user of the phone or mobile device. Upon a proper exchange andverification of information, a following process step 910 can involvethe owner or user of the phone or other mobile device being checked intothe merchant, either on the merchant computer system, on a remotepayment service provider system, or both. Again, this checking in of theuser or owner of the user device takes in automatically without anyaffirmative action by the user.

Additional process steps after checkin can then take place as a resultof the automatic checkin. For example, a next step 912 can involvedetecting the user approaching, waiting in line, and/or trying to pay ata register or other point of sale at the merchant or other participatingestablishment. This step effectively detects the previously checked inuser device, which is now close to or in the process of making apurchase or otherwise checking out. A proper matching inquiry can takeplace at the register or point of sale at decision step 914. This caninvolve a register, terminal or bank of same or other point of saledevices detecting numerous checked in user devices at or near a point ofsale. One or more automated, manual or mixed processes can then be usedto make sure that the right user is being charged for a giventransaction, as noted above.

In the event that a proper match cannot be made at step 914, then theprocess can revert to process step 906 in order to checkin the deviceand user in a manner that can be used. Once a proper match (andrecheckin, if necessary) is found or made at inquiry 914, then themethod can continue to process step 916, where the transaction can becompleted, payment or credit can be had, and the user can be checkedout. The method then finishes at end step 918. Further steps notdepicted can include, for example, reviewing signal strengths or otherpersonal identifiers as part of the proper matching process at step 914.Still further steps can include providing offers or advertisements tothe known user while he or she is at the participating establishment,assessing for risk in a possible transaction by the known user,extending credit offers, or requiring a PIN or other personal identifierof the user where certain transactions are determined to be more riskythan less risky ones. In the event of less risky transactions, a moreautomated process can allow a user to check out and take goods withoutany further need for identification, cash, cards, payment, receipts orthe like, in a very convenient and streamlined fashion.

Turning lastly to FIG. 10, a flowchart of an exemplary method ofperforming a handshake between a merchant dongle and a purchaser mobiledevice on an unbonded channel so as to facilitate a payment or creditfor a purchase according to one embodiment of the present invention.Again, such a method can involve using or operating a merchant dongle,consumer smart phone, and/or any of the other various computingcomponents, devices, systems and/or networks described above. It willagain be readily appreciated that not every method step set forth inthis flowchart is always necessary, that further steps not set forthherein may also be included, and/or that the exact order of steps may bealtered as desired for various applications.

Beginning with a start step 1000, a first process step 1002 is made withrespect to signing up a given user device to a remote service provider,such as Paypal. This can involve installing an application on the userdevice, registering the user, and initializing the application with theregistered user. At this point, the device can then be given a set ofadvance one-time use payment tokens and associated private keys atprocess step 1004. These user tokens can each have, for example, a useridentifier, a token value, a private key serial number and an AES orother crypto key, as will be readily appreciated by one of skill in theart. Such user tokens can be assigned by a backend service providerserver, such as that which might be the remote service provider notedabove. At process step 1006, records of these assigned keys and usertokens are stored on database(s) at the remote service provider, suchthat it can be known to the provider who such a token belongs to when itis put into use.

At a following process step 1008, one or more merchant beacons can alsobe supplied with a set of private keys and merchant one-time use tokens.Each check-in and possible purchase or other transaction can then betracked using a one-time token from both the user device and a merchantbeacon or beacon system that checks in the user device. As in the caseof the user device above, the keys and tokens for the beacon are alsoassigned by and stored at the remote service provider for laterreference, which can be done at process step 1010. The user device andbeacon are now in condition for communications, check-ins andtransactions.

At a subsequent process step 1012, a generic UUID is constantlybroadcast from the beacon. This UUID is detected and verified as issuedby the same service provider by the user device at process step 1014.The user device and beacon then initiate communications, whereuponmetadata and a specific one-time use beacon token can be sent from thebeacon to the user device at process step 1016. The application on theuser device can then certify the beacon token as being issued by theservice provider by using a public key from the service provider atprocess step 1018. Assuming that the beacon token sent over isauthentic, the user device then selects one of its assigned one-time useuser tokens at process step 1020.

At a following process step 1022, the user device then encrypts both itsuser token value and the beacon token value together, and then sendsthis encrypted value back to the beacon, where it is received at processstep 1024. Again, all of these communications between the user deviceand the beacon can be on an unbonded channel, as any other outsidedevice that might be listening or noting these open communications willnot know what to make of the token values without any reference tablethat knows where those tokens were assigned. In fact, the beacon itselfdoes not know what to make of the combined encrypted value. Rather, thebeacon simply forwards this value on a back channel to the remoteservice provider server at process step 1026. The remote server knowswhat to do with these values, since it has the details of where and towhom all tokens were assigned in various tables or other storagemechanisms on its database(s).

As such, the remote server decrypts the combined encrypted value atprocess step 1028 and verifies the authenticity and ownership of boththe user token and the beacon (i.e., merchant) token. The remote serverthen approves of the user device and provides affirmative check-ininstructions back to the beacon at process step 1030. It is worth notingthat while the communications between the user device and the beaconover BLE are unbonded, the communications between the beacon and theremote server are on a separate more protected channel. Neither the userdevice nor any other device need see these communications between beaconand remote server of the service provider. As the user device is thenchecked in and the one time use tokens for the user device and beaconare both committed to this checkin and any resulting transaction, one ormore new tokens can then be optionally provided to the user deviceand/or the beacon at process step 1032. The remote server then marksboth of these tokens as used on its databases at process step 1034,whereupon the “handshake” checkin process or method then ends at endstep 1036.

In various embodiments, many respective one-time use tokens can bestored on each of the various user devices and/or beacons at any giventime. Selection of a given token from the pool of possible tokens canthen be random, which adds some layer of protection from potential fraudor misuse. Further, the requirements that each token be used one timeonly, and that the combined encrypted token values be verified by thebackend provider server tends to prevent or reduce the possibility oftoken replay or bit fiddling by unscrupulous persons who might otherwisetry to make something of the unbonded and open communications over BLEchannels. Again, these tokens can be replenished one at a time as theyare used and discarded or otherwise rendered unusable, such as by partof a check in process. Alternatively, or in addition, each user deviceand/or beacon can also request more tokens from the remote serviceprovider server independently as needed.

Other safety mechanisms to provide better security can includeexpiration dates on each token, as well as a requirement that the userdevice be in constant communication with one or more beacons at themerchant from checkin through any checkout and purchase or othertransaction. In the event that communications are lost or dropped, thena new checkin with new tokens may be required if desired for securitypurposes. Further, it is also worth noting that the third party userdevice does not need to access the private keys of any beacon. Rather,the public keys are all that are necessary for the backend server toverify and authenticate tokens for both the user device and the beaconfor checkin and later transaction.

Although the foregoing invention has been described in detail by way ofillustration and example for purposes of clarity and understanding, itwill be recognized that the above described invention may be embodied innumerous other specific variations and embodiments without departingfrom the spirit or essential characteristics of the invention. Variouschanges and modifications may be practiced, and it is understood thatthe invention is not to be limited by the foregoing details, but ratheris to be defined by the scope of the claims.

What is claimed is:
 1. A system comprising: a non-transitory memory; and one or more hardware processors coupled to the non-transitory memory and configured to read instructions from the non-transitory memory to perform operations comprising: detecting, via a hardware communication interface, a passive check in request for a user device, the passive check in request occurring as a result of a first wireless exchange using a Bluetooth low energy (BLE) protocol between the user device and a beacon installed at a particular location within a merchant establishment while the user device is in proximity to the beacon and without requiring affirmative action by a user on the user device; identifying a user associated with the user device as being present at the particular location; responsive to the identifying, determining one or more promotional information items based on the particular location; presenting the one or more promotional information items on the user device; and causing, based on an authentication of the user device, a payment to be made from a user payment account identified on the user device to a merchant associated with the merchant establishment.
 2. The system of claim 1, wherein the payment is made to the merchant using a second wireless exchange different from the first wireless exchange.
 3. The system of claim 1, wherein the beacon is installed at a check-out terminal within the merchant establishment.
 4. The system of claim 1, wherein the beacon comprises a Universal Serial Bus (USB) connection configured to pivot, slide, or swivel to facilitate installation of the beacon and to provide power to the beacon.
 5. The system of claim 1, wherein the beacon comprises a battery for powering the beacon.
 6. The system of claim 1, wherein the passive check-in request comprises an encrypted value.
 7. The system of claim 6, wherein the encrypted value comprises a beacon token value and a user token value encrypted using a private key associated with the user device.
 8. The system of claim 7, wherein the operations further comprise decrypting the encrypted value to authenticate the beacon and the user device.
 9. The system of claim 6, wherein the beacon token value is a one-time use value.
 10. The system of claim 1, wherein the passive check in request includes a wireless data communication initiated by the beacon using the BLE protocol and responded to by the user device.
 11. A method comprising: detecting, a passive check in request for a user device, the passive check in request occurring as a result of a first wireless exchange using a Bluetooth low energy (BLE) protocol between the user device and a beacon installed at a particular location within a merchant establishment while the user device is in proximity to the beacon and without requiring affirmative action by a user on the user device; identifying a user associated with the user device as being present at the particular location; responsive to the identifying, determining one or more promotional information items based on the particular location; presenting the one or more promotional information items on the user device; and causing, based on an authentication of the user device, a payment to be made from a user payment account identified on the user device to a merchant associated with the merchant establishment.
 12. The method of claim 11, wherein the payment is made to the merchant using a second wireless exchange different from the first wireless exchange.
 13. The method of claim 11, wherein the beacon comprises a Universal Serial Bus (USB) connection configured to pivot, slide, or swivel to facilitate installation of the beacon and to provide power to the beacon.
 14. The method of claim 11, wherein the passive check-in request comprises an encrypted value comprising a beacon token value and a user token value encrypted using a private key associated with the user device.
 15. The method of claim 14, further comprising: decrypting the encrypted value to extract the user token value; and authenticating the user device based on the user token value.
 16. The method of claim 14, further comprising: decrypting the encrypted value to extract the beacon token value; and authenticating the beacon based on the beacon token value.
 17. The method of claim 11, further comprising providing a token to be transmitted via the beacon to the user device based on the passive check in request, wherein the token is used to perform the payment.
 18. A non-transitory machine-readable medium having stored thereon machine-readable instructions executable to cause a machine to perform operations comprising: detecting via a hardware communication interface, a passive check in request for a user device, the passive check in request occurring as a result of a first wireless exchange using a Bluetooth low energy (BLE) protocol between the user device and a beacon installed at a particular location within a merchant establishment while the user device is in proximity to the beacon and without requiring affirmative action by a user on the user device; identifying a user associated with the user device as being present at the particular location; responsive to the identifying, determining one or more promotional information items based on the particular location; presenting the one or more promotional information items on the user device; and causing, based on an authentication of the user device, a payment to be made from a user payment account identified on the user device to a merchant associated with the merchant establishment.
 19. The non-transitory medium of claim 18, wherein the passive check-in request comprises an encrypted value comprising a user token value encrypted using a private key associated with the user device; and wherein the operations further comprise: decrypting the encrypted value to extract the user token value; and authenticating the purchaser device based on the user token value.
 20. The non-transitory medium of claim 18, wherein the passive check-in request comprises an encrypted value comprising a beacon token value encrypted using a private key associated with the user device; and wherein the operations further comprise: decrypting the encrypted value to extract the beacon token value; and authenticating the beacon based on the beacon token value. 