US20140058865A1 - Method and system for authenticating transaction request from device - Google Patents
Method and system for authenticating transaction request from device Download PDFInfo
- Publication number
- US20140058865A1 US20140058865A1 US13/965,364 US201313965364A US2014058865A1 US 20140058865 A1 US20140058865 A1 US 20140058865A1 US 201313965364 A US201313965364 A US 201313965364A US 2014058865 A1 US2014058865 A1 US 2014058865A1
- Authority
- US
- United States
- Prior art keywords
- authentication information
- pos terminal
- transaction
- user
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000000034 method Methods 0.000 title claims abstract description 53
- 210000001747 pupil Anatomy 0.000 claims description 49
- 238000004891 communication Methods 0.000 claims description 18
- 238000013459 approach Methods 0.000 abstract description 20
- 238000010586 diagram Methods 0.000 description 6
- 230000005540 biological transmission Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 238000010276 construction Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000018109 developmental process Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000014509 gene expression Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012552 review Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/18—Payment architectures involving self-service terminals [SST], vending machines, kiosks or multimedia terminals
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F18/00—Pattern recognition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/20—Point-of-sale [POS] network systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/327—Short range or proximity payments by means of M-devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- H04B5/48—
Definitions
- Methods, systems, and devices consistent with exemplary embodiments relate to authenticating a transaction request from a device by using authentication information that is generated in the device and authentication information that is generated in a point of sale (POS) terminal.
- POS point of sale
- SIM subscriber identity module
- One or more exemplary embodiments provide a method and system for authenticating a transaction request from a device by using authentication information that is generated in the device and authentication information that is generated in a point of sale (POS) terminal.
- POS point of sale
- One or more exemplary embodiments also provide a method and system for authenticating a transaction request from a device by using authentication information with respect to at least one of a fingerprint, a pupil, a voice, and a signature which are of a user.
- a method of requesting, by a device, a transaction with a point of sale (POS) terminal including storing authentication information that is generated by the device based on a user input to the device; and when the device approaches to within a predetermined range from the POS terminal, providing the authentication information to the POS terminal, wherein the authentication information that is provided to the POS terminal is compared with authentication information that is generated by the POS terminal based on a user input to the POS terminal, and then is used to authenticate a transaction request from the device.
- POS point of sale
- the method may further include providing transaction information to the POS terminal, and when the transaction request from the device is authenticated, the transaction information that is provided to the POS terminal may be then provided from the POS terminal to a transaction server.
- At least one of the authentication information that is provided to the POS terminal and the authentication information that is generated by the POS terminal may be then provided from the POS terminal to the transaction server.
- the authentication information that is provided to the transaction server may be used by the transaction server to perform the transaction request from the device.
- the operation of providing the transaction information may include providing the transaction information to the POS terminal when the transaction request from the device is authenticated.
- the authentication information may include information about at least one of an image of a pupil of a user, a voice of the user, a fingerprint of the user, and a signature of the user.
- the authentication information may include link information for downloading information about at least one of an image of a pupil of a user, a voice of the user, a fingerprint of the user, and a signature of the user.
- the transaction information may include at least one of card information, coupon information, and user information.
- a method of requesting, by a device, a transaction with a point of sale (POS) terminal including storing authentication information that is generated by the device based on a user input to the device; when the device approaches to within a predetermined range from the POS terminal, receiving authentication information, which is generated by the POS terminal based on a user input to the POS terminal, from the POS terminal; authenticating a transaction request from the device, based on the authentication information generated by the device and the received authentication information; and providing transaction information to the POS terminal.
- POS point of sale
- the transaction information that is provided to the POS terminal may be then provided from the POS terminal to a transaction server.
- At least one of the authentication information that is provided to the POS terminal and the authentication information that is generated by the POS terminal may be then provided from the POS terminal to the transaction server.
- the authentication information that is provided to the transaction server may be used by the transaction server to perform the transaction request from the device.
- the operation of providing the transaction information may include an providing the transaction information to the POS terminal when the transaction request from the device is authenticated.
- the authentication information may include information about at least one of an image of a pupil of a user, a voice of the user, a fingerprint of the user, and a signature of the user.
- the authentication information may include link information for downloading information about at least one of an image of a pupil of a user, a voice of the user, a fingerprint of the user, and a signature of the user.
- the transaction information may include at least one of card information, coupon information, and user information.
- a method of authenticating, by a point of sale (POS) terminal, a transaction request from a device including, when the device approaches to within a predetermined range from the POS terminal, receiving authentication information that is stored in the device from the device; generating authentication information based on a user input to the POS terminal; and comparing the received authentication information and the generated authentication information, and authenticating the transaction request from the device based on a result of the comparing.
- POS point of sale
- the method may further include operations of receiving transaction information from the device; and when the transaction request from the device is authenticated, providing the received authentication information to a transaction server.
- At least one of the received authentication information and the generated authentication information may be then provided from the POS terminal to the transaction server.
- the at least one of the received authentication information and the generated authentication information that is provided from the POS terminal to the transaction server may be used by the transaction server to perform the transaction request from the device.
- a method of authenticating, by a point of sale (POS) terminal, a transaction request from a device including operations of generating authentication information based on a user input to the POS terminal; and when the device approaches to within a predetermined range from the POS terminal, providing the authentication information to the device, wherein the authentication information that is provided to the device is compared with authentication information that is generated by the device based on a user input to the device, and is used to authenticate the transaction request from the device.
- POS point of sale
- a device including an authentication information storage that stores authentication information that is generated by the device based on a user input to the device; an authentication information comparer that receives authentication information, which is generated by a point of sale (POS) terminal based on a user input to the POS terminal, from the POS terminal when the device approaches to within a predetermined range from the POS terminal, and compares the authentication information generated by the device and the received authentication information; and a transaction requester that requests a transaction with the POS terminal, based on a result of the comparing.
- POS point of sale
- a point of sale (POS) terminal including an authentication information generator that generates authentication information based on a user input to the POS terminal; and an authentication information transmitter that provides the authentication information to the device, when the device approaches to within a predetermined range from the POS terminal, wherein the authentication information that is provided to the device is compared with authentication information that is generated by the device based on a user input to the device, and is used to authenticate a transaction request from the device.
- POS point of sale
- a non-transitory computer-readable recording medium having recorded thereon a program, which when executed by a computer, performs one of the methods described above.
- FIG. 1 is a block diagram of a system for authenticating a transaction request from a device, according to an exemplary embodiment
- FIG. 2 illustrates an example in which, since the device and a point of sale (POS) terminal perform a short-range contact, each of the device and the POS terminal obtains authentication information of a user in a transaction request authenticating system;
- POS point of sale
- FIG. 3 is a flowchart of a method of authenticating, by the POS terminal, a transaction request from the device in the transaction request authenticating system, according to an exemplary embodiment
- FIG. 4 is a flowchart of a method of authenticating, by the POS terminal, a transaction request from the device in the transaction request authenticating system, according to another exemplary embodiment
- FIG. 5 is a flowchart of a method of authenticating, by a server, a transaction request from the device in the transaction request authenticating system, according to an exemplary embodiment
- FIG. 6 illustrates an example in which each of the device and the POS terminal obtains authentication information by capturing an image of a pupil of a user, according to an exemplary embodiment
- FIG. 7 illustrates an example in which each of the device and the POS terminal obtains authentication information by recognizing a fingerprint of a user, according to an exemplary embodiment
- FIG. 8 illustrates an example in which each of the device and the POS terminal obtains authentication information by recording a voice of a user, according to an exemplary embodiment
- FIG. 9 illustrates an example in which each of the device and the POS terminal obtains authentication information by receiving a signature of a user, according to an exemplary embodiment
- FIGS. 10A and 10B illustrate execution screens of a transaction application that is executed in the device, according to an exemplary embodiment
- FIG. 11 illustrates an example in which a credit card for a transaction is selected in the device, according to an exemplary embodiment
- FIGS. 12A and 12B illustrate an example in which a card and a coupon for a transaction are selected in the device, and transaction information is displayed on a screen of the device, according to an exemplary embodiment
- FIG. 13 illustrates an example in which a shopping list (i.e., a shopping cart) is displayed on the device, according to an exemplary embodiment
- FIG. 14 is a block diagram of the device, according to an exemplary embodiment.
- FIG. 15 is a block diagram of the POS terminal, according to an exemplary embodiment.
- an element A and an element B perform a short-range contact, it means that the element A is located within a communication range of the element B or the element B is located within a communication range of the element A.
- FIG. 1 is a block diagram of a system for authenticating a transaction request from a device, according to an exemplary embodiment.
- the system for authenticating the transaction request (hereinafter, referred to as the ‘transaction request authenticating system’) includes a device 1000 , a point of sale (POS) terminal 2000 , a server 3000 , and a network 4000 .
- POS point of sale
- the device 1000 may previously generate and store authentication information of a user. As the device 1000 approaches the POS terminal 2000 , the device 1000 may automatically provide the stored authentication information to the POS terminal 2000 .
- the authentication information may be used to authenticate a transaction request from the device 1000 , and for example, the authentication information may include at least one of an image obtained by capturing a pupil of the user, a voice of the user, a fingerprint of the user, and a signature of the user.
- the device 1000 may include, but is not limited to, a smart phone, a mobile phone, a personal digital assistant (PDA), a laptop, a media player, a global positioning system (GPS) apparatus, or other mobile or non-mobile apparatuses.
- PDA personal digital assistant
- GPS global positioning system
- the POS terminal 2000 may separately generate authentication information of the user, compared to the device 1000 .
- the POS terminal 2000 may capture an image of the user, may record a voice of the user, may recognize a fingerprint of the user, or may receive a signature input from the user, thereby separately generating the authentication information of the user.
- the POS terminal 2000 may authenticate the transaction request from the device 1000 by comparing the authentication information from the device 1000 with the authentication information that is generated by the POS terminal 2000 .
- the POS terminal 2000 may receive transaction information from the device 1000 , may provide the transaction information to the server 3000 , and thus may allow the server 3000 to perform the transaction.
- the network 4000 may be formed as a wired network such as a wide area network (WAN), a value added network (VAN), or the like, or may be formed as a wireless network such as a mobile radio communication network, a near field communication (NFC) network, a satellite communication network, or the like. Also, the network 4000 collectively indicates data communication networks allowing network configuration elements shown in FIG. 1 to smoothly communicate with each other, and includes wired internet, wireless internet, and a mobile wireless communication network.
- WAN wide area network
- VAN value added network
- NFC near field communication
- satellite communication network or the like.
- the network 4000 collectively indicates data communication networks allowing network configuration elements shown in FIG. 1 to smoothly communicate with each other, and includes wired internet, wireless internet, and a mobile wireless communication network.
- FIG. 2 illustrates an example in which, since the device 1000 and the POS terminal 2000 perform a short-range contact, each of the device 1000 and the POS terminal 2000 obtains authentication information of a user in the transaction request authenticating system.
- the device 1000 may previously generate authentication information of the user by using several pieces of equipment that are included in the device 1000 .
- the device 1000 may capture an image of a pupil of the user by using a camera of the device 1000 and may store the captured image, or may recognize a fingerprint of the user from a finger of the user that touches a screen of the device 1000 and may store fingerprint information.
- the device 1000 may record a voice of the user by using a microphone of the device 1000 and may store the recorded voice.
- the authentication information that is previously stored in the device 1000 may be automatically transmitted to the POS terminal 2000 via a wireless personal area network (WPAN), and then the POS terminal 2000 may authenticate a transaction request from the device 1000 by comparing the authentication information from the device 1000 with the authentication information that is generated by the POS terminal 2000 .
- WPAN wireless personal area network
- the WPAN may include, but is not limited to, NFC, ZigBee communication, radio frequency identification (RFID) communication, and ultra wide band (UWB) communication.
- RFID radio frequency identification
- UWB ultra wide band
- the POS terminal 2000 may capture an image of the pupil of the user by using a camera that is included in the POS terminal 2000 or that is connected with the POS terminal 2000 , and may store the captured image. Also, the POS terminal 2000 may recognize the fingerprint of the user that touches a screen of a fingerprint recognizing apparatus that is included in the POS terminal 2000 or that is connected with the POS terminal 2000 , and may store fingerprint information. Also, the POS terminal 2000 may record a voice of the user by using a microphone that is included in the POS terminal 2000 or that is connected with the POS terminal 2000 , and may store the recorded voice.
- FIG. 3 is a flowchart of a method of authenticating, by the POS terminal 2000 , a transaction request from the device 1000 in the transaction request authenticating system, according to an exemplary embodiment of the present invention.
- the device 1000 stores authentication information that is input by a user.
- the authentication information may be used to authenticate the transaction request from the device 1000 and may include information about at least one of a pupil image of the user, a voice of the user, a fingerprint of the user, and a signature of the user.
- the device 1000 may generate the authentication information by using at least one of a camera, a microphone, a fingerprint recognizing apparatus, and a touch screen, and may previously store the generated authentication information in its memory. Alternatively, the device 1000 may store the generated authentication information in a separate storage space.
- the device 1000 performs a short-range contact with the POS terminal 2000 .
- the device 1000 and the POS terminal 2000 may approach each other to within a predetermined range, and once the device 1000 and the POS terminal 2000 reach the predetermined range, the device 1000 and the POS terminal 2000 may be connected to each other via an NFC network.
- the connection between the device 1000 and the POS terminal 2000 may be established by exchanging messages between the device 1000 and the POS terminal 2000 .
- the device 1000 requests a transaction with the POS terminal 2000 .
- the device 1000 may request the transaction with the POS terminal 2000 .
- the device 1000 transmits the authentication information that is stored in the device 1000 to the POS terminal 2000 .
- the device 1000 may extract the information about at least one of the pupil image of the user, the voice of the user, the fingerprint of the user, and the signature of the user from the memory or the separate storage space, and may transmit the extracted information to the POS terminal 2000 .
- the device 1000 may store the authentication information in the separate storage space and may transmit link information for downloading the authentication information to the POS terminal 2000 .
- the POS terminal 2000 may then use the link information to download the authentication information from the separate storage space of the device 1000 .
- the device 1000 may display a user interface for an input of a password on the screen of the device 1000 , and when the password is correctly input by the user, the device 1000 may provide the authentication information to the POS terminal 2000 .
- the device 100 may transmit a preset type of authentication information to the POS terminal 2000 .
- the user may previously set types of the authentication information according to a payment amount or types of an item to be purchased, and the device 1000 may transmit the preset type of the authentication information to the POS terminal 2000 .
- the present inventive concept is not limited thereto, and thus, the user may randomly preset types of the authentication information to be used.
- the POS terminal 2000 may authenticate the transaction request from the device 1000 only when authentication information that is generated by the POS terminal 2000 is of the same type as the authentication information that has been transmitted to the POS terminal 2000 .
- the POS terminal 2000 generates authentication information based on the user input.
- the POS terminal 2000 may capture an image of the pupil of the user by using a camera that is included in the POS terminal 2000 or that is connected with the POS terminal 2000 .
- the POS terminal 2000 may record the voice of the user by using a microphone that is included in the POS terminal 2000 or that is connected with the POS terminal 2000 .
- the POS terminal 2000 may recognize the fingerprint of the user by using a fingerprint recognizing apparatus that is included in the POS terminal 2000 or that is connected with the POS terminal 2000 .
- the POS terminal 2000 may generate an image of the signature that is input from the user via a touch screen that is in the POS terminal 2000 or connected with the POS terminal 2000 .
- the POS terminal 2000 compares the authentication information that is received from the device 1000 with the authentication information that is generated by the POS terminal 2000 .
- the authentication information is an image obtained by capturing an image of the pupil of the user
- the POS terminal 2000 may compare the pupil image that is received from the device 1000 with the pupil image that is captured by the POS terminal 2000 .
- the POS terminal 2000 may compare voice data of the user that is received from the device 1000 with voice data of the user that is recorded by the POS terminal 2000 . In this case, the POS terminal 2000 may determine whether the voice data that is received from the device 1000 and the voice data that is recorded by the POS terminal 2000 are voice data of the same user. Also, the POS terminal 2000 may convert the voice data into text, and may determine whether text that corresponds to the voice data from the device 1000 is equal to the text that corresponds to the voice data that is recorded by the POS terminal 2000 .
- the POS terminal 2000 may compare the fingerprint image that is received from the device 1000 with a fingerprint image that is generated by the POS terminal 2000 . Also, for example, when the authentication information is the signature of the user, the POS terminal 2000 may compare the signature image that is received from the device 1000 with a signature image that is generated by the POS terminal 2000 .
- the POS terminal 2000 authenticates the transaction request.
- the POS terminal 2000 may authenticate the transaction request that is received from the device 1000 .
- the device 1000 transmits transaction information to the POS terminal 2000 .
- the device 1000 may transmit the transaction information to the POS terminal 2000 .
- the transaction information may be used in a transaction with respect to a product or a service and may include one or more of card information, coupon information, and user information.
- the device 1000 may transmit the authentication information and the transaction information to the POS terminal 2000 .
- the POS terminal 2000 transmits the transaction information and the authentication information to the server 3000 .
- the POS terminal 2000 may transmit the transaction information and the authentication information, which are received from the device 1000 , to the server 3000 .
- the POS terminal 2000 may transmit the authentication information, which is generated by the POS terminal 2000 , to the server 3000 .
- the server 3000 performs the transaction.
- the server 3000 may perform the transaction, based on the transaction information and the authentication information that are received from the POS terminal 2000 .
- the server 3000 may further safely perform the transaction by using the authentication information that is generated by the device 1000 and the authentication information that is generated by the POS terminal 2000 .
- FIG. 4 is a flowchart of a method of authenticating, by the POS terminal 2000 , a transaction request from the device 1000 in the transaction request authenticating system, according to another exemplary embodiment.
- the device 1000 may compare authentication information that is generated by the device 1000 with authentication information that is generated by the POS terminal 2000 .
- the device 1000 stores authentication information that is input by a user.
- the device 1000 may generate the authentication information by using at least one of a camera, a microphone, a fingerprint recognizing apparatus, and a touch screen, and may previously store the authentication information in a memory of the device 1000 .
- the device 1000 may store the authentication information in a separate storage space.
- the POS terminal 2000 generates authentication information, based on a user input.
- the POS terminal 2000 may capture an image of a pupil of the user by using a camera that is included in the POS terminal 2000 or that is connected with the POS terminal 2000 .
- the POS terminal 2000 may record a voice of the user by using a microphone that is included in the POS terminal 2000 or that is connected with the POS terminal 2000 .
- the POS terminal 2000 may recognize a fingerprint of the user by using a fingerprint recognizing apparatus that is included in the POS terminal 2000 or that is connected with the POS terminal 2000 .
- the POS terminal 2000 may generate an image of a signature that is input from the user to a touch screen that is included in the POS terminal 2000 or that is connected with the POS terminal 2000 .
- the device 1000 performs a short-range contact with the POS terminal 2000 .
- the device 1000 and the POS terminal 2000 may approach each other to within a predetermined range, and once the device 1000 and the POS terminal 2000 are within the predetermined range, the device 1000 and the POS terminal 2000 may be connected to each other via an NFC network.
- the connection between the device 1000 and the POS terminal 2000 may be established by exchanging messages between the device 1000 and the POS terminal 2000 .
- the POS terminal 2000 generates authentication information
- the device 1000 performs a short-range contact with the POS terminal 2000 , but the present inventive concept is not limited thereto.
- the POS terminal 2000 After the device 1000 performs a short-range contact with the POS terminal 2000 , the POS terminal 2000 generates authentication information, based on a user input.
- the POS terminal 2000 transmits the authentication information, which is generated by the POS terminal 2000 , to the device 1000 . Since the POS terminal 2000 is within the predetermined range of the device 1000 , the POS terminal 2000 may transmit information about at least one of the pupil image of the user, the voice of the user, the fingerprint of the user, and the signature of the user to the device 1000 . The POS terminal 2000 may store the authentication information in a separate storage space and may transmit link information for downloading the authentication information to the device 1000 . The device 1000 may then use the link information to download the authentication information from the separate storage space of the POS terminal 2000 .
- the device 1000 compares the authentication information that is received from the POS terminal 2000 with the authentication information that is generated by the device 1000 .
- the device 1000 may compare the pupil image that is received from the POS terminal 2000 with a pupil image that is generated by the device 1000 .
- the device 1000 may compare voice data of the user that is received from the POS terminal 2000 with voice data of the user that is recorded by the device 1000 . In this case, the device 1000 may determine whether the voice data from the POS terminal 2000 and the voice data that is recorded by the device 1000 are from the same user, based on a frequency and a pattern of the voice data. Also, the device 1000 may convert the voice data into text, and may determine whether text that corresponds to the voice data from the POS terminal 2000 is equal to the text that corresponds to the voice data that is recorded by the device 1000 .
- the device 1000 may compare a fingerprint image that is received from the POS terminal 2000 with a fingerprint image that is generated by the device 1000 . Also, when the authentication information corresponds to a signature of the user, the device 1000 may compare a signature image that is received from the POS terminal 2000 with a signature image that is generated by the device 1000 .
- the device 1000 requests a transaction with the POS terminal 2000 .
- the device 1000 may request a transaction with the POS terminal 2000 .
- the device 1000 may request the transaction with the POS terminal 2000 and simultaneously may provide transaction information and the authentication information that is generated by the device 1000 to the POS terminal 2000 .
- the transaction information may be used in a transaction with respect to a product or a service and may include one or more of card information, coupon information, and user information.
- the device 1000 may request the transaction with the POS terminal 2000 .
- the POS terminal 2000 authenticates the transaction request.
- the POS terminal 2000 may authenticate the transaction request that is received from the device 1000 .
- the POS terminal 2000 transmits the transaction information and the authentication information to the server 3000 .
- the POS terminal 2000 transmits the transaction information and the authentication information that are received from the device 1000 to the server 3000 .
- the POS terminal 2000 may transmit the authentication information that is generated by the POS terminal 2000 to the server 3000 .
- the server 3000 performs the transaction.
- the server 3000 may perform the transaction, based on the transaction information and the authentication information that are received from the POS terminal 2000 .
- the server 3000 may perform the transaction, by using the authentication information that is generated by the device 1000 and the authentication information that is generated by the POS terminal 2000 .
- FIG. 5 is a flowchart of a method of authenticating, by the server 3000 , a transaction request from the device 1000 in the transaction request authenticating system, according to an exemplary embodiment.
- the server 3000 may compare authentication information that is generated by the device 1000 with authentication information that is generated by the POS terminal 2000 .
- the device 1000 stores authentication information that is input by a user.
- the authentication information is used in authentication of the transaction request from the device 1000 .
- the device 1000 may generate the authentication information by using at least one of a camera, a microphone, a fingerprint recognizing apparatus, and a touch screen, and may previously store the authentication information in a memory of the device 1000 .
- the device 1000 may store the authentication information in a separate storage space.
- the device 1000 performs a short-range contact with the POS terminal 2000 .
- the device 1000 and the POS terminal 2000 may approach each other to within a predetermined range, and once the device 1000 and the POS terminal 2000 are within the predetermined range, the device 1000 and the POS terminal 2000 may be connected to each other via an NFC network.
- the connection between the device 1000 and the POS terminal 2000 may be established by exchanging messages between the device 1000 and the POS terminal 2000 .
- the device 1000 requests a transaction with the POS terminal 2000 .
- the device 1000 may request the transaction with the POS terminal 2000 .
- the device 1000 transmits the authentication information that is stored in the device 1000 to the POS terminal 2000 .
- the device 1000 may extract information about at least one of a pupil image of the user, a voice of the user, a fingerprint of the user, and a signature of the user from the memory or the separate storage space, and may transmit the extracted information to the POS terminal 2000 .
- the device 1000 may store the authentication information in the separate storage space and may transmit link information for downloading the authentication information to the POS terminal 2000 .
- the POS terminal 2000 may then use the link information to download the authentication information from the separate storage space of the device 1000 .
- the device 1000 may display a user interface for an input of a password on a screen of the device 1000 , and when the password is correctly input by the user, the device 1000 may provide the authentication information to the POS terminal 2000 .
- the device 100 may transmit a preset type of authentication information to the POS terminal 2000 .
- the user may previously set types of the authentication information according to a payment amount or types of an item to be purchased, and the device 1000 may transmit the preset type of the authentication information to the POS terminal 2000 .
- the present inventive concept is not limited thereto, and thus, the user may randomly preset types of the authentication information to be used.
- the POS terminal 2000 may authenticate the transaction request from the device 1000 only when authentication information that is generated by the POS terminal 2000 is of the same type as the authentication information that has been transmitted to the POS terminal 2000 .
- the POS terminal 2000 generates authentication information based on the user input.
- the POS terminal 2000 may capture an image of a pupil of the user by using a camera that is included in the POS terminal 2000 or that is connected with the POS terminal 2000 .
- the POS terminal 2000 may record a voice of the user by using a microphone that is included in the POS terminal 2000 or that is connected with the POS terminal 2000 .
- the POS terminal 2000 may recognize a fingerprint of the user by using a fingerprint recognizing apparatus that is included in the POS terminal 2000 or that is connected with the POS terminal 2000 .
- the POS terminal 2000 may generate an image of a signature that is input from the user via a touch screen that is included in the POS terminal 2000 or that is connected with the POS terminal 2000 .
- the POS terminal 2000 transmits the authentication information that is received from the device 1000 and the authentication information that is generated by the POS terminal 2000 to the server 3000 .
- the server 3000 compares the authentication information that is generated by the device 1000 with the authentication information that is generated by the POS terminal 2000 .
- the server 3000 may compare a pupil image that is generated by the device 1000 with a pupil image that is generated by the POS terminal 2000 .
- the server 3000 may compare voice data of the user that is generated by the device 1000 with voice data of the user that is generated by the POS terminal 2000 . In this case, the server 3000 may determine whether the voice data that is generated by the device 1000 and the voice data that is generated by the POS terminal 2000 are voice data of the same user. Also, the server 3000 may convert the voice data into text, and may determine whether text that corresponds to the voice data that is generated by the device 1000 is equal to text that corresponds to the voice data that is generated by the POS terminal 2000 .
- the server 3000 may compare a fingerprint image that is generated by the device 1000 with a fingerprint image that is generated by the POS terminal 2000 . Also, for example, when the authentication information is the signature of the user, the server 3000 may compare a signature image that is generated by the device 1000 with a signature image that is generated by the POS terminal 2000 .
- the server 3000 authenticates the transaction request.
- the server 3000 may authenticate the transaction request from the device 1000 .
- the device 1000 transmits the transaction information to the POS terminal 2000
- the POS terminal 2000 transmits the transaction information to the server 3000 .
- the device 1000 may transmit the transaction information to the POS terminal 2000 .
- the transaction information may be used in a transaction with respect to a product or a service and may include card information, coupon information, and user information. Further, the device 1000 directly transmits the transaction information to the server 3000 .
- the device 1000 After the server 3000 authenticates the transaction request, the device 1000 provides the transaction information to the POS terminal 2000 , but the present inventive concept is not limited thereto.
- the device 1000 may transmit the authentication information and the transaction information to the POS terminal 2000 .
- the server 3000 performs the transaction.
- the server 3000 may perform the transaction, based on the transaction information and the authentication information that are received from the POS terminal 2000 .
- the server 3000 may perform the transaction by using both of the authentication information that is generated by the device 1000 and the authentication information that is generated by the POS terminal 2000 .
- FIG. 6 illustrates an example in which each of the device 1000 and the POS terminal 2000 obtains authentication information by capturing an image of a pupil of a user, according to an exemplary embodiment.
- the device 1000 may capture the image of the pupil of the user by using a camera included in the device 1000
- the POS terminal 2000 may capture the image of the pupil of the user by using a camera included in the POS terminal 2000 .
- the device 1000 may capture the image of the pupil of the user and may previously store the pupil image, and once the device 1000 and the POS terminal 2000 approach each other to within a predetermined range, the POS terminal 2000 may capture the image of the pupil of the user and then may generate the pupil image.
- the pupil image that is generated by the device 1000 and the pupil image that is generated by the POS terminal 2000 may be compared to each other, and the comparison may be used in authentication of a transaction request from the device 1000 .
- FIG. 7 illustrates an example in which each of the device 1000 and the POS terminal 2000 obtains authentication information by recognizing a fingerprint of a user, according to an exemplary embodiment.
- the device 1000 may recognize the fingerprint of the user by using a touch screen included in the device 1000
- the POS terminal 2000 may recognize the fingerprint of the user by using a fingerprint recognizing apparatus included in the POS terminal 2000 .
- the device 1000 may recognize the fingerprint of the user and may previously store a fingerprint image, and once the device 1000 and the POS terminal 2000 approach each other to within a predetermined range, the POS terminal 2000 may recognize the fingerprint of the user and may generate a fingerprint image. Also, the fingerprint image that is generated by the device 1000 and the fingerprint image that is generated by the POS terminal 2000 may be compared to each other, and the comparison may be used in authentication of a transaction request from the device 1000 .
- FIG. 8 illustrates an example in which each of the device 1000 and the POS terminal 2000 obtains authentication information by recording a voice of a user, according to an exemplary embodiment.
- the device 1000 may record the voice of the user by using a microphone included in the device 1000
- the POS terminal 2000 may record the voice of the user by using a microphone included in the POS terminal 2000 .
- the device 1000 may record the voice of the user and may previously store voice data, and once the device 1000 and the POS terminal 2000 approach each other to within a predetermined range, the POS terminal 2000 may record the voice of the user and then may generate voice data.
- the voice data that is generated by the device 1000 and the voice data that is generated by the POS terminal 2000 may be compared to each other, and the comparison may be used in authentication of a transaction request from the device 1000 .
- FIG. 9 illustrates an example in which each of the device 1000 and the POS terminal 2000 obtains authentication information by receiving a signature of a user, according to an exemplary embodiment.
- the device 1000 may generate a signature image of the user by using a touch screen included in the device 1000
- the POS terminal 2000 may generate a signature image of the user by using a touch screen included in the POS terminal 2000 .
- the device 1000 may previously store the signature image of the user, and once the device 1000 and the POS terminal 2000 approach each other to within a predetermined range, the POS terminal 2000 may generate the signature image of the user.
- the signature image that is generated by the device 1000 and the signature image that is generated by the POS terminal 2000 may be compared to each other, and the comparison may be used in authentication of a transaction request from the device 1000 .
- FIGS. 10A and 10B illustrate execution screens of a transaction application that is executed in the device 1000 , according to an exemplary embodiment.
- a credit card to be used in transaction and a transaction amount may be displayed on a screen of the device 1000 .
- a user interface for an input of a password may be displayed.
- the device 1000 may generate authentication information by capturing an image of a pupil of the user, by recording a voice of the user, by recognizing a fingerprint of the user, or by receiving a signature of the user.
- the authentication information that is generated by the device 1000 may match with the credit card as displayed in FIG. 10A , and may be stored.
- a plurality of pieces of authentication information that are different from one other may be respectively matched with credit cards of the user.
- the device 1000 may match predetermined authentication information with at least one of the credit card and the transaction amount. Also, it is possible that the device 1000 does not match predetermined authentication information with the credit card and the transaction amount.
- FIG. 11 illustrates an example in which a credit card for a transaction is selected in the device 1000 , according to an exemplary embodiment.
- the device 1000 may output a list of the plurality of transaction means on its screen.
- a user may select a predetermined transaction means from the list of the plurality of transaction means that are displayed on the screen.
- FIGS. 12A and 12B illustrate an example in which a card and a coupon for transaction are selected in the device 1000 , and transaction information is displayed on a screen of the device 1000 , according to an exemplary embodiment.
- a user may select a plurality of transaction means (e.g., a card 1 and a coupon 2 ) from a transaction means list.
- a transaction means e.g., a card 1 and a coupon 2
- the device 1000 may pay $100 out of a total transaction amount (i.e., $300) by using the coupon 2 , and may pay $200 by using the card 1 .
- FIG. 13 illustrates an example in which a shopping list (i.e., a shopping cart) is displayed on the device 1000 , according to an exemplary embodiment.
- a shopping list i.e., a shopping cart
- the device 1000 may display a list of a plurality of products and a plurality of pieces of price information that correspond to the plurality of products, respectively, on a screen of the device 1000 .
- a user may review the plurality of products and prices and then may select a product to buy.
- the device 1000 may collectively process a transaction for the products 1 and 2 .
- FIG. 14 is a block diagram of the device 1000 , according to an exemplary embodiment.
- the device 1000 includes an authentication information storage 1100 , an authentication information transmitter 1200 , an authentication information comparer 1300 , a transaction requester 1400 , a memory 1500 , a transceiver 1600 , and a controller 1700 .
- the authentication information storage 1100 stores authentication information that is input by a user.
- the authentication information may be used to authenticate a transaction request from the device 1000 and may include information about at least one of a pupil image of the user, a voice of the user, a fingerprint of the user, and a signature of the user.
- the authentication information storage 1100 may generate the authentication information by using at least one of a camera, a microphone, a fingerprint recognizing apparatus, and a touch screen, and may previously store the authentication information in the memory 1500 to be described later.
- the present inventive concept is not limited thereto, and thus the authentication information storage 1100 may store the authentication information in a separate storage space.
- the authentication information transmitter 1200 transmits the authentication information to the POS terminal 2000 .
- the authentication information transmitter 1200 may extract information about at least one of a pupil image of the user, a voice of the user, a fingerprint of the user, and a signature of the user from the memory 1500 or a separate storage space, and may transmit the extracted information to the POS terminal 2000 .
- the authentication information providing unit 1200 may transmit link information for downloading the authentication information to the POS terminal 2000 .
- the device 1000 may display a user interface for an input of a password on a screen of the device 1000 , and when the password is correctly input by the user, the authentication information transmitter 1200 may provide the authentication information to the POS terminal 2000 .
- the authentication information transmitter 1200 may transmit a preset type of authentication information to the POS terminal 2000 .
- the user may previously set types of the authentication information according to a payment amount or types of an item to be purchased, and the authentication information transmitter 1200 may transmit the preset type of the authentication information to the POS terminal 2000 .
- the present inventive concept is not limited thereto, and thus, the user may randomly preset types of the authentication information to be used.
- the POS terminal 2000 may authenticate the transaction request from the device 1000 only when authentication information that is generated by the POS terminal 2000 is of the same type as the authentication information that has been transmitted to the POS terminal 2000 .
- the authentication information comparer 1300 compares the authentication information that is received from the POS terminal 2000 with the authentication information that is generated by the device 1000 .
- the POS terminal 2000 may generate the authentication information in a manner different than the device 1000 , and may provide the generated authentication information to the device 1000 .
- the authentication information comparer 1300 may compare a pupil image that is received from the POS terminal 2000 with a pupil image that is generated by the device 1000 .
- the authentication information comparer 1300 may compare voice data of the user that is received from the POS terminal 2000 with voice data of the user that is recorded by the device 1000 . In this case, the authentication information comparer 1300 may determine whether the voice data from the POS terminal 2000 and the voice data that is generated by the device 1000 are from the same user, based on a frequency and a pattern of the voice data. Also, the authentication information comparer 1300 may convert the voice data into text, and may determine whether text that corresponds to the voice data from the POS terminal 2000 is equal to the text that corresponds to the voice data that is generated by the device 1000 .
- the authentication information comparer 1300 may compare a fingerprint image that is received from the POS terminal 2000 with a fingerprint image that is generated by the device 1000 . Also, when the authentication information corresponds to a signature of the user, the device 1000 may compare a signature image that is received from the POS terminal 2000 with a signature image that is generated by the device 1000 .
- the transaction requester 1400 requests transaction. Once the device 1000 and the POS terminal 2000 approach each other to within a predetermined range, the transaction requester 1400 may request the transaction with the POS terminal 2000 .
- Transaction information may be used in transaction with respect to a product or a service and may include one or more of card information, coupon information, and user information.
- the memory 1500 stores various types of information that are used for the device 1000 to generate the authentication information, to compare the stored authentication information with the authentication information that is generated by the POS terminal 2000 , and to request the transaction with the POS terminal 2000 .
- the transceiver 1600 exchanges the various types of information with the server 3000 and the POS terminal 2000 , wherein the various types of information are used for the device 1000 to generate the authentication information, to compare the stored authentication information with the authentication information that is generated by the POS terminal 2000 , and to request the transaction with the POS terminal 2000 .
- the controller 1700 controls all operations of the device 1000 , and controls the authentication information storage 1100 , the authentication information transmitter 1200 , the authentication information comparer 1300 , the transaction requester 1400 , the memory 1500 , and the transceiver 1600 so as to allow the device 1000 to generate the authentication information, to compare the stored authentication information with the authentication information that is generated by the POS terminal 2000 , and to request the transaction with the POS terminal 2000 .
- FIG. 15 is a block diagram of the POS terminal 2000 , according to an exemplary embodiment.
- the POS terminal 2000 includes an authentication information generator 2100 , an authentication information receiver 2200 , an authentication information transmitter 2300 , an authenticator 2400 , a transaction requester 2500 , a memory 2600 , a transceiver 2700 , and a controller 2800 .
- the authentication information generator 2100 generates authentication information, based on a user input.
- the authentication information generator 2100 may capture an image of a pupil of a user by using a camera that is included in the POS terminal 2000 or that is connected with the POS terminal 2000 .
- the authentication information generator 2100 may record a voice of the user by using a microphone that is included in the POS terminal 2000 or that is connected with the POS terminal 2000 .
- the authentication information generator 2100 may recognize a fingerprint of the user by using a fingerprint recognizing apparatus that is included in the POS terminal 2000 or that is connected with the POS terminal 2000 .
- the authentication information generator 2100 may generate an image of a signature that is input from the user to a touch screen that is included in the POS terminal 2000 or that is connected with the POS terminal 2000 .
- the authentication information receiver 2200 receives authentication information, which is stored in the device 1000 , from the device 1000 . Once the device 1000 approaches the POS terminal 2000 to within a predetermined range, the device 1000 may extract information about at least one of a pupil image of the user, a voice of the user, a fingerprint of the user, and a signature of the user from the memory 1500 or a separate storage space, and may transmit the extracted information to the POS terminal 2000 . In a case where the device 1000 stores the authentication information in the separate storage space, the authentication information receiver 2200 may receive link information for downloading the authentication information from the device 1000 .
- the authentication information transmitter 2300 provides the authentication information that is generated by the authentication information generator 2100 to the device 1000 . Once the POS terminal 2000 approaches the device 1000 to within a predetermined range, the authentication information transmitter 2300 may transmit information about at least one of a pupil image of the user, a voice of the user, a fingerprint of the user, and a signature of the user to the device 1000 . In a case where the POS terminal 2000 stores the authentication information in a separate storage space, the authentication information transmitter 2300 may transmit link information for downloading the authentication information to the device 1000 .
- the authenticator 2400 authenticates a transaction request from the device 1000 .
- the authenticator 2400 may authenticate the transaction request that is received from the device 1000 .
- the device 100 may transmit a preset type of authentication information to the POS terminal 2000 .
- the user may previously set types of the authentication information according to a payment amount or types of an item to be purchased, and the device 1000 may transmit the preset type of the authentication information to the POS terminal 2000 .
- the present inventive concept is not limited thereto, and thus, the user may randomly preset types of the authentication information to be used.
- the authenticator 2400 may authenticate the transaction request from the device 1000 only when authentication information that is generated by the POS terminal 2000 is of the same type as the authentication information that has been transmitted to the POS terminal 2000 .
- the transaction requester 2500 requests a transaction with the server 3000 .
- the transaction requester 2500 may transmit transaction information and the authentication information to the server 3000 .
- the transaction requester 2500 may transmit transaction information and the authentication information, which are received from the device 1000 , to the server 3000 .
- the transaction requester 2500 may transmit the authentication information that is generated by the POS terminal 2000 to the server 3000 .
- the memory 2600 stores various types of information that are used for the POS terminal 2000 to generate the authentication information, to compare the authentication information that is generated by the POS terminal 2000 with the authentication information that is received from the device 1000 , and to request the transaction with the server 3000 .
- the transceiver 2700 exchanges the various types of information with the device 1000 and the server 3000 , wherein the various types of information are used for the POS terminal 2000 to generate the authentication information, to compare the authentication information that is generated by the POS terminal 2000 with the authentication information that is received from the device 1000 , and to request the transaction with the server 3000 .
- the controller 2800 controls all operations of the POS terminal 2000 , and controls the authentication information generator 2100 , the authentication information receiver 2200 , the authentication information transmitter 2300 , the authenticator 2400 , the transaction requester 2500 , the memory 2600 , and the transceiver 2700 so as to allow the POS terminal 2000 to generate the authentication information, to compare the authentication information that is generated by the POS terminal 2000 with the authentication information that is received from the device 1000 , and to request the transaction with the server 3000 .
- the one or more exemplary embodiments of the present invention may be embodied as a recording medium, e.g., a program module to be executed in computers, which include computer-readable commands.
- the computer storage medium may include any usable medium that may be accessed by computers, volatile and non-volatile medium, and detachable and non-detachable medium.
- the computer storage medium may include a computer storage medium and a communication medium.
- the computer storage medium includes all of volatile and non-volatile medium, and detachable and non-detachable medium that are designed to store information including computer readable commands, data structures, program modules or other data.
- the communication medium includes computer-readable commands, a data structure, a program module, and other transmission mechanisms, and includes other information transmission mediums.
Abstract
A method and system for authenticating a transaction request from a device are provided. The method includes storing authentication information that is generated by the device based on a user input to the device; and when the device approaches to within a predetermined range from the POS terminal, providing the authentication information to the POS terminal. The authentication information that is provided to the POS terminal is compared with authentication information that is generated by the POS terminal based on a user input to the POS terminal, and then is used to authenticate a transaction request from the device.
Description
- This application claims priority from Korean Patent Application No. 10-2012-0092541, filed on Aug. 23, 2012, in the Korean Intellectual Property Office, the disclosure of which is incorporated herein by reference in its entirety.
- 1. Field
- Methods, systems, and devices consistent with exemplary embodiments relate to authenticating a transaction request from a device by using authentication information that is generated in the device and authentication information that is generated in a point of sale (POS) terminal.
- 2. Description of the Related Art
- Due to developments in a data transmission technology and network technology, mobile devices are commonly used, thus, a technology for providing a transaction service by using the mobile device becomes an issue. In order to use a mobile transaction service, a user may use a subscriber identity module (SIM), and in this regard, the user may insert or mount a SIM card storing credit card information, financial information, or the like into a mobile phone or a smart phone and this stored information may be provided to the mobile transaction service.
- However, when the user loses the SIM card or the mobile device having the SIM card mounted therein, a transaction by a third party may be possible, such that the mobile transaction service using the SIM card may cause a security problem. In order to address the security problem, access to the data of the mobile device or a point of sale (POS) terminal may be restricted by requesting the user to input a password or the like. However, when the PIN code is exposed, security of the transaction information cannot be assured.
- One or more exemplary embodiments provide a method and system for authenticating a transaction request from a device by using authentication information that is generated in the device and authentication information that is generated in a point of sale (POS) terminal.
- One or more exemplary embodiments also provide a method and system for authenticating a transaction request from a device by using authentication information with respect to at least one of a fingerprint, a pupil, a voice, and a signature which are of a user.
- According to an aspect of an exemplary embodiment, there is provided a method of requesting, by a device, a transaction with a point of sale (POS) terminal, the method including storing authentication information that is generated by the device based on a user input to the device; and when the device approaches to within a predetermined range from the POS terminal, providing the authentication information to the POS terminal, wherein the authentication information that is provided to the POS terminal is compared with authentication information that is generated by the POS terminal based on a user input to the POS terminal, and then is used to authenticate a transaction request from the device.
- The method may further include providing transaction information to the POS terminal, and when the transaction request from the device is authenticated, the transaction information that is provided to the POS terminal may be then provided from the POS terminal to a transaction server.
- When the transaction request from the device is authenticated, at least one of the authentication information that is provided to the POS terminal and the authentication information that is generated by the POS terminal may be then provided from the POS terminal to the transaction server.
- The authentication information that is provided to the transaction server may be used by the transaction server to perform the transaction request from the device.
- The operation of providing the transaction information may include providing the transaction information to the POS terminal when the transaction request from the device is authenticated.
- The authentication information may include information about at least one of an image of a pupil of a user, a voice of the user, a fingerprint of the user, and a signature of the user.
- The authentication information may include link information for downloading information about at least one of an image of a pupil of a user, a voice of the user, a fingerprint of the user, and a signature of the user.
- The transaction information may include at least one of card information, coupon information, and user information.
- According to an aspect of another exemplary embodiment, there is provided a method of requesting, by a device, a transaction with a point of sale (POS) terminal, the method including storing authentication information that is generated by the device based on a user input to the device; when the device approaches to within a predetermined range from the POS terminal, receiving authentication information, which is generated by the POS terminal based on a user input to the POS terminal, from the POS terminal; authenticating a transaction request from the device, based on the authentication information generated by the device and the received authentication information; and providing transaction information to the POS terminal.
- When the transaction request from the device is authenticated, the transaction information that is provided to the POS terminal may be then provided from the POS terminal to a transaction server.
- When the transaction request from the device is authenticated, at least one of the authentication information that is provided to the POS terminal and the authentication information that is generated by the POS terminal may be then provided from the POS terminal to the transaction server.
- The authentication information that is provided to the transaction server may be used by the transaction server to perform the transaction request from the device.
- The operation of providing the transaction information may include an providing the transaction information to the POS terminal when the transaction request from the device is authenticated.
- The authentication information may include information about at least one of an image of a pupil of a user, a voice of the user, a fingerprint of the user, and a signature of the user.
- The authentication information may include link information for downloading information about at least one of an image of a pupil of a user, a voice of the user, a fingerprint of the user, and a signature of the user.
- The transaction information may include at least one of card information, coupon information, and user information.
- According to an aspect of another exemplary embodiment, there is provided a method of authenticating, by a point of sale (POS) terminal, a transaction request from a device, the method including, when the device approaches to within a predetermined range from the POS terminal, receiving authentication information that is stored in the device from the device; generating authentication information based on a user input to the POS terminal; and comparing the received authentication information and the generated authentication information, and authenticating the transaction request from the device based on a result of the comparing.
- The method may further include operations of receiving transaction information from the device; and when the transaction request from the device is authenticated, providing the received authentication information to a transaction server.
- When the transaction request from the device is authenticated, at least one of the received authentication information and the generated authentication information may be then provided from the POS terminal to the transaction server.
- The at least one of the received authentication information and the generated authentication information that is provided from the POS terminal to the transaction server may be used by the transaction server to perform the transaction request from the device.
- According to yet another aspect of one or more exemplary embodiments, there is provided a method of authenticating, by a point of sale (POS) terminal, a transaction request from a device, the method including operations of generating authentication information based on a user input to the POS terminal; and when the device approaches to within a predetermined range from the POS terminal, providing the authentication information to the device, wherein the authentication information that is provided to the device is compared with authentication information that is generated by the device based on a user input to the device, and is used to authenticate the transaction request from the device.
- According to an aspect of another exemplary embodiment, there is provided a device including an authentication information storage that stores authentication information that is generated by the device based on a user input to the device; an authentication information comparer that receives authentication information, which is generated by a point of sale (POS) terminal based on a user input to the POS terminal, from the POS terminal when the device approaches to within a predetermined range from the POS terminal, and compares the authentication information generated by the device and the received authentication information; and a transaction requester that requests a transaction with the POS terminal, based on a result of the comparing.
- According to yet another aspect of one or more exemplary embodiments, there is provided a point of sale (POS) terminal including an authentication information generator that generates authentication information based on a user input to the POS terminal; and an authentication information transmitter that provides the authentication information to the device, when the device approaches to within a predetermined range from the POS terminal, wherein the authentication information that is provided to the device is compared with authentication information that is generated by the device based on a user input to the device, and is used to authenticate a transaction request from the device.
- According to an aspect of another exemplary embodiment, there is provided a non-transitory computer-readable recording medium having recorded thereon a program, which when executed by a computer, performs one of the methods described above.
- The above and other aspects will become more apparent by describing in detail exemplary embodiments with reference to the attached drawings in which:
-
FIG. 1 is a block diagram of a system for authenticating a transaction request from a device, according to an exemplary embodiment; -
FIG. 2 illustrates an example in which, since the device and a point of sale (POS) terminal perform a short-range contact, each of the device and the POS terminal obtains authentication information of a user in a transaction request authenticating system; -
FIG. 3 is a flowchart of a method of authenticating, by the POS terminal, a transaction request from the device in the transaction request authenticating system, according to an exemplary embodiment; -
FIG. 4 is a flowchart of a method of authenticating, by the POS terminal, a transaction request from the device in the transaction request authenticating system, according to another exemplary embodiment; -
FIG. 5 is a flowchart of a method of authenticating, by a server, a transaction request from the device in the transaction request authenticating system, according to an exemplary embodiment; -
FIG. 6 illustrates an example in which each of the device and the POS terminal obtains authentication information by capturing an image of a pupil of a user, according to an exemplary embodiment; -
FIG. 7 illustrates an example in which each of the device and the POS terminal obtains authentication information by recognizing a fingerprint of a user, according to an exemplary embodiment; -
FIG. 8 illustrates an example in which each of the device and the POS terminal obtains authentication information by recording a voice of a user, according to an exemplary embodiment; -
FIG. 9 illustrates an example in which each of the device and the POS terminal obtains authentication information by receiving a signature of a user, according to an exemplary embodiment; -
FIGS. 10A and 10B illustrate execution screens of a transaction application that is executed in the device, according to an exemplary embodiment; -
FIG. 11 illustrates an example in which a credit card for a transaction is selected in the device, according to an exemplary embodiment; -
FIGS. 12A and 12B illustrate an example in which a card and a coupon for a transaction are selected in the device, and transaction information is displayed on a screen of the device, according to an exemplary embodiment; -
FIG. 13 illustrates an example in which a shopping list (i.e., a shopping cart) is displayed on the device, according to an exemplary embodiment; -
FIG. 14 is a block diagram of the device, according to an exemplary embodiment; and -
FIG. 15 is a block diagram of the POS terminal, according to an exemplary embodiment. - Hereinafter, the exemplary embodiments will now be described more fully with reference to the accompanying drawings. The present inventive concept may, however, be embodied in many different forms and should not be construed as being limited to the exemplary embodiments set forth herein; rather, these exemplary embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the present inventive concept to those of ordinary skill in the art. In the following description, well-known functions or constructions are not described in detail so as not to obscure the present inventive concept with unnecessary detail. Also, throughout the specification, like reference numerals in the drawings denote like elements.
- Throughout the specification, it will also be understood that when an element is referred to as being “connected to” another element, it can be directly connected to the other element, or electrically connected to the other element while intervening elements may also be present. Also, when a part “includes” or “comprises” an element, unless there is a particular description contrary thereto, the part can further include other elements, not excluding the other elements.
- Also, throughout the specification, it will be understood that when an element A and an element B perform a short-range contact, it means that the element A is located within a communication range of the element B or the element B is located within a communication range of the element A.
- Expressions such as “at least one of,” when preceding a list of elements, modify the entire list of elements and do not modify the individual elements of the list.
-
FIG. 1 is a block diagram of a system for authenticating a transaction request from a device, according to an exemplary embodiment. - As illustrated in
FIG. 1 , the system for authenticating the transaction request (hereinafter, referred to as the ‘transaction request authenticating system’) includes adevice 1000, a point of sale (POS) terminal 2000, aserver 3000, and anetwork 4000. - The
device 1000 may previously generate and store authentication information of a user. As thedevice 1000 approaches thePOS terminal 2000, thedevice 1000 may automatically provide the stored authentication information to thePOS terminal 2000. The authentication information may be used to authenticate a transaction request from thedevice 1000, and for example, the authentication information may include at least one of an image obtained by capturing a pupil of the user, a voice of the user, a fingerprint of the user, and a signature of the user. - The
device 1000 may include, but is not limited to, a smart phone, a mobile phone, a personal digital assistant (PDA), a laptop, a media player, a global positioning system (GPS) apparatus, or other mobile or non-mobile apparatuses. - The
POS terminal 2000 may separately generate authentication information of the user, compared to thedevice 1000. When thePOS terminal 2000 receives the authentication information from thedevice 1000, thePOS terminal 2000 may capture an image of the user, may record a voice of the user, may recognize a fingerprint of the user, or may receive a signature input from the user, thereby separately generating the authentication information of the user. Also, thePOS terminal 2000 may authenticate the transaction request from thedevice 1000 by comparing the authentication information from thedevice 1000 with the authentication information that is generated by thePOS terminal 2000. - Also, after the
POS terminal 2000 authenticates the transaction request, thePOS terminal 2000 may receive transaction information from thedevice 1000, may provide the transaction information to theserver 3000, and thus may allow theserver 3000 to perform the transaction. - The
network 4000 may be formed as a wired network such as a wide area network (WAN), a value added network (VAN), or the like, or may be formed as a wireless network such as a mobile radio communication network, a near field communication (NFC) network, a satellite communication network, or the like. Also, thenetwork 4000 collectively indicates data communication networks allowing network configuration elements shown inFIG. 1 to smoothly communicate with each other, and includes wired internet, wireless internet, and a mobile wireless communication network. -
FIG. 2 illustrates an example in which, since thedevice 1000 and thePOS terminal 2000 perform a short-range contact, each of thedevice 1000 and thePOS terminal 2000 obtains authentication information of a user in the transaction request authenticating system. - Referring to
FIG. 2 , thedevice 1000 may previously generate authentication information of the user by using several pieces of equipment that are included in thedevice 1000. Thedevice 1000 may capture an image of a pupil of the user by using a camera of thedevice 1000 and may store the captured image, or may recognize a fingerprint of the user from a finger of the user that touches a screen of thedevice 1000 and may store fingerprint information. Alternatively, thedevice 1000 may record a voice of the user by using a microphone of thedevice 1000 and may store the recorded voice. - Once the
device 1000 and thePOS terminal 2000 approach each other to within a predetermined range, the authentication information that is previously stored in thedevice 1000 may be automatically transmitted to thePOS terminal 2000 via a wireless personal area network (WPAN), and then thePOS terminal 2000 may authenticate a transaction request from thedevice 1000 by comparing the authentication information from thedevice 1000 with the authentication information that is generated by thePOS terminal 2000. - For example, the WPAN may include, but is not limited to, NFC, ZigBee communication, radio frequency identification (RFID) communication, and ultra wide band (UWB) communication.
- The
POS terminal 2000 may capture an image of the pupil of the user by using a camera that is included in thePOS terminal 2000 or that is connected with thePOS terminal 2000, and may store the captured image. Also, thePOS terminal 2000 may recognize the fingerprint of the user that touches a screen of a fingerprint recognizing apparatus that is included in thePOS terminal 2000 or that is connected with thePOS terminal 2000, and may store fingerprint information. Also, thePOS terminal 2000 may record a voice of the user by using a microphone that is included in thePOS terminal 2000 or that is connected with thePOS terminal 2000, and may store the recorded voice. -
FIG. 3 is a flowchart of a method of authenticating, by thePOS terminal 2000, a transaction request from thedevice 1000 in the transaction request authenticating system, according to an exemplary embodiment of the present invention. - In operation S300, the
device 1000 stores authentication information that is input by a user. The authentication information may be used to authenticate the transaction request from thedevice 1000 and may include information about at least one of a pupil image of the user, a voice of the user, a fingerprint of the user, and a signature of the user. Thedevice 1000 may generate the authentication information by using at least one of a camera, a microphone, a fingerprint recognizing apparatus, and a touch screen, and may previously store the generated authentication information in its memory. Alternatively, thedevice 1000 may store the generated authentication information in a separate storage space. - In operation S302, the
device 1000 performs a short-range contact with thePOS terminal 2000. Thedevice 1000 and thePOS terminal 2000 may approach each other to within a predetermined range, and once thedevice 1000 and thePOS terminal 2000 reach the predetermined range, thedevice 1000 and thePOS terminal 2000 may be connected to each other via an NFC network. The connection between thedevice 1000 and thePOS terminal 2000 may be established by exchanging messages between thedevice 1000 and thePOS terminal 2000. - In operation S304, the
device 1000 requests a transaction with thePOS terminal 2000. In operation S304, since thedevice 1000 is within the predetermined range of thePOS terminal 2000, thedevice 1000 may request the transaction with thePOS terminal 2000. - In operation S306, the
device 1000 transmits the authentication information that is stored in thedevice 1000 to thePOS terminal 2000. Once thedevice 1000 is within the predetermined range of thePOS terminal 2000, thedevice 1000 may extract the information about at least one of the pupil image of the user, the voice of the user, the fingerprint of the user, and the signature of the user from the memory or the separate storage space, and may transmit the extracted information to thePOS terminal 2000. Thedevice 1000 may store the authentication information in the separate storage space and may transmit link information for downloading the authentication information to thePOS terminal 2000. ThePOS terminal 2000 may then use the link information to download the authentication information from the separate storage space of thedevice 1000. - Also, the
device 1000 may display a user interface for an input of a password on the screen of thedevice 1000, and when the password is correctly input by the user, thedevice 1000 may provide the authentication information to thePOS terminal 2000. - Also, according to a payment amount of types of an item to be purchased, the
device 100 may transmit a preset type of authentication information to thePOS terminal 2000. For example, the user may previously set types of the authentication information according to a payment amount or types of an item to be purchased, and thedevice 1000 may transmit the preset type of the authentication information to thePOS terminal 2000. However, the present inventive concept is not limited thereto, and thus, the user may randomly preset types of the authentication information to be used. Also, when thedevice 1000 has transmitted the preset type of the authentication information to thePOS terminal 2000, thePOS terminal 2000 may authenticate the transaction request from thedevice 1000 only when authentication information that is generated by thePOS terminal 2000 is of the same type as the authentication information that has been transmitted to thePOS terminal 2000. - In operation S308, the
POS terminal 2000 generates authentication information based on the user input. ThePOS terminal 2000 may capture an image of the pupil of the user by using a camera that is included in thePOS terminal 2000 or that is connected with thePOS terminal 2000. Alternatively, thePOS terminal 2000 may record the voice of the user by using a microphone that is included in thePOS terminal 2000 or that is connected with thePOS terminal 2000. Alternatively, thePOS terminal 2000 may recognize the fingerprint of the user by using a fingerprint recognizing apparatus that is included in thePOS terminal 2000 or that is connected with thePOS terminal 2000. Alternatively, thePOS terminal 2000 may generate an image of the signature that is input from the user via a touch screen that is in thePOS terminal 2000 or connected with thePOS terminal 2000. - In operation S310, the
POS terminal 2000 compares the authentication information that is received from thedevice 1000 with the authentication information that is generated by thePOS terminal 2000. For example, when the authentication information is an image obtained by capturing an image of the pupil of the user, thePOS terminal 2000 may compare the pupil image that is received from thedevice 1000 with the pupil image that is captured by thePOS terminal 2000. - Also, for example, when the authentication information is the voice of the user, the
POS terminal 2000 may compare voice data of the user that is received from thedevice 1000 with voice data of the user that is recorded by thePOS terminal 2000. In this case, thePOS terminal 2000 may determine whether the voice data that is received from thedevice 1000 and the voice data that is recorded by thePOS terminal 2000 are voice data of the same user. Also, thePOS terminal 2000 may convert the voice data into text, and may determine whether text that corresponds to the voice data from thedevice 1000 is equal to the text that corresponds to the voice data that is recorded by thePOS terminal 2000. - Also, for example, when the authentication information is a fingerprint image, the
POS terminal 2000 may compare the fingerprint image that is received from thedevice 1000 with a fingerprint image that is generated by thePOS terminal 2000. Also, for example, when the authentication information is the signature of the user, thePOS terminal 2000 may compare the signature image that is received from thedevice 1000 with a signature image that is generated by thePOS terminal 2000. - In operation S312, the
POS terminal 2000 authenticates the transaction request. When thePOS terminal 2000 determines that the authentication information from thedevice 1000 is equal to the authentication information that is generated by thePOS terminal 2000, thePOS terminal 2000 may authenticate the transaction request that is received from thedevice 1000. - In operation S314, the
device 1000 transmits transaction information to thePOS terminal 2000. When the transaction request from thedevice 1000 is authenticated by thePOS terminal 2000, thedevice 1000 may transmit the transaction information to thePOS terminal 2000. The transaction information may be used in a transaction with respect to a product or a service and may include one or more of card information, coupon information, and user information. - In the above, it is described that, after the
POS terminal 2000 authenticates the transaction request, thedevice 1000 provides the transaction information to thePOS terminal 2000, but the present inventive concept is not limited thereto. In operation S306, thedevice 1000 may transmit the authentication information and the transaction information to thePOS terminal 2000. - In operation S316, the
POS terminal 2000 transmits the transaction information and the authentication information to theserver 3000. ThePOS terminal 2000 may transmit the transaction information and the authentication information, which are received from thedevice 1000, to theserver 3000. Also, thePOS terminal 2000 may transmit the authentication information, which is generated by thePOS terminal 2000, to theserver 3000. - In operation S318, the
server 3000 performs the transaction. Theserver 3000 may perform the transaction, based on the transaction information and the authentication information that are received from thePOS terminal 2000. Theserver 3000 may further safely perform the transaction by using the authentication information that is generated by thedevice 1000 and the authentication information that is generated by thePOS terminal 2000. -
FIG. 4 is a flowchart of a method of authenticating, by thePOS terminal 2000, a transaction request from thedevice 1000 in the transaction request authenticating system, according to another exemplary embodiment. In the exemplary embodiment ofFIG. 4 , thedevice 1000 may compare authentication information that is generated by thedevice 1000 with authentication information that is generated by thePOS terminal 2000. - In operation S400, the
device 1000 stores authentication information that is input by a user. Thedevice 1000 may generate the authentication information by using at least one of a camera, a microphone, a fingerprint recognizing apparatus, and a touch screen, and may previously store the authentication information in a memory of thedevice 1000. Alternatively, thedevice 1000 may store the authentication information in a separate storage space. - In operation S402, the
POS terminal 2000 generates authentication information, based on a user input. ThePOS terminal 2000 may capture an image of a pupil of the user by using a camera that is included in thePOS terminal 2000 or that is connected with thePOS terminal 2000. Also, thePOS terminal 2000 may record a voice of the user by using a microphone that is included in thePOS terminal 2000 or that is connected with thePOS terminal 2000. Also, thePOS terminal 2000 may recognize a fingerprint of the user by using a fingerprint recognizing apparatus that is included in thePOS terminal 2000 or that is connected with thePOS terminal 2000. Also, thePOS terminal 2000 may generate an image of a signature that is input from the user to a touch screen that is included in thePOS terminal 2000 or that is connected with thePOS terminal 2000. - In operation S404, the
device 1000 performs a short-range contact with thePOS terminal 2000. Thedevice 1000 and thePOS terminal 2000 may approach each other to within a predetermined range, and once thedevice 1000 and thePOS terminal 2000 are within the predetermined range, thedevice 1000 and thePOS terminal 2000 may be connected to each other via an NFC network. The connection between thedevice 1000 and thePOS terminal 2000 may be established by exchanging messages between thedevice 1000 and thePOS terminal 2000. In the above, it is described that, after thePOS terminal 2000 generates authentication information, thedevice 1000 performs a short-range contact with thePOS terminal 2000, but the present inventive concept is not limited thereto. After thedevice 1000 performs a short-range contact with thePOS terminal 2000, thePOS terminal 2000 generates authentication information, based on a user input. - In operation S406, the
POS terminal 2000 transmits the authentication information, which is generated by thePOS terminal 2000, to thedevice 1000. Since thePOS terminal 2000 is within the predetermined range of thedevice 1000, thePOS terminal 2000 may transmit information about at least one of the pupil image of the user, the voice of the user, the fingerprint of the user, and the signature of the user to thedevice 1000. ThePOS terminal 2000 may store the authentication information in a separate storage space and may transmit link information for downloading the authentication information to thedevice 1000. Thedevice 1000 may then use the link information to download the authentication information from the separate storage space of thePOS terminal 2000. - In operation S408, the
device 1000 compares the authentication information that is received from thePOS terminal 2000 with the authentication information that is generated by thedevice 1000. For example, when the authentication information corresponds to the image obtained by capturing an image of the pupil of the user, thedevice 1000 may compare the pupil image that is received from thePOS terminal 2000 with a pupil image that is generated by thedevice 1000. - Alternatively, for example, when the authentication information corresponds to the voice of the user, the
device 1000 may compare voice data of the user that is received from thePOS terminal 2000 with voice data of the user that is recorded by thedevice 1000. In this case, thedevice 1000 may determine whether the voice data from thePOS terminal 2000 and the voice data that is recorded by thedevice 1000 are from the same user, based on a frequency and a pattern of the voice data. Also, thedevice 1000 may convert the voice data into text, and may determine whether text that corresponds to the voice data from thePOS terminal 2000 is equal to the text that corresponds to the voice data that is recorded by thedevice 1000. - Also, when the authentication information corresponds to a fingerprint image of the user, the
device 1000 may compare a fingerprint image that is received from thePOS terminal 2000 with a fingerprint image that is generated by thedevice 1000. Also, when the authentication information corresponds to a signature of the user, thedevice 1000 may compare a signature image that is received from thePOS terminal 2000 with a signature image that is generated by thedevice 1000. - In operation S410, the
device 1000 requests a transaction with thePOS terminal 2000. When the authentication information that is received from thePOS terminal 2000 is equal to the authentication information that is generated by thedevice 1000, thedevice 1000 may request a transaction with thePOS terminal 2000. Thedevice 1000 may request the transaction with thePOS terminal 2000 and simultaneously may provide transaction information and the authentication information that is generated by thedevice 1000 to thePOS terminal 2000. The transaction information may be used in a transaction with respect to a product or a service and may include one or more of card information, coupon information, and user information. Also, in operation S410, once thedevice 1000 is within the predetermined distance of thePOS terminal 2000, thedevice 1000 may request the transaction with thePOS terminal 2000. - In operation S412, the
POS terminal 2000 authenticates the transaction request. When thePOS terminal 2000 determines that the authentication information that is received from thedevice 1000 is equal to the authentication information that is generated by thePOS terminal 2000, thePOS terminal 2000 may authenticate the transaction request that is received from thedevice 1000. - In operation S414, the
POS terminal 2000 transmits the transaction information and the authentication information to theserver 3000. ThePOS terminal 2000 transmits the transaction information and the authentication information that are received from thedevice 1000 to theserver 3000. Also, thePOS terminal 2000 may transmit the authentication information that is generated by thePOS terminal 2000 to theserver 3000. - In operation S416, the
server 3000 performs the transaction. Theserver 3000 may perform the transaction, based on the transaction information and the authentication information that are received from thePOS terminal 2000. Theserver 3000 may perform the transaction, by using the authentication information that is generated by thedevice 1000 and the authentication information that is generated by thePOS terminal 2000. -
FIG. 5 is a flowchart of a method of authenticating, by theserver 3000, a transaction request from thedevice 1000 in the transaction request authenticating system, according to an exemplary embodiment. In the exemplary embodiment ofFIG. 5 , theserver 3000 may compare authentication information that is generated by thedevice 1000 with authentication information that is generated by thePOS terminal 2000. - In operation S500, the
device 1000 stores authentication information that is input by a user. The authentication information is used in authentication of the transaction request from thedevice 1000. Thedevice 1000 may generate the authentication information by using at least one of a camera, a microphone, a fingerprint recognizing apparatus, and a touch screen, and may previously store the authentication information in a memory of thedevice 1000. Alternatively, thedevice 1000 may store the authentication information in a separate storage space. - In operation S502, the
device 1000 performs a short-range contact with thePOS terminal 2000. Thedevice 1000 and thePOS terminal 2000 may approach each other to within a predetermined range, and once thedevice 1000 and thePOS terminal 2000 are within the predetermined range, thedevice 1000 and thePOS terminal 2000 may be connected to each other via an NFC network. The connection between thedevice 1000 and thePOS terminal 2000 may be established by exchanging messages between thedevice 1000 and thePOS terminal 2000. - In operation S504, the
device 1000 requests a transaction with thePOS terminal 2000. In operation S504, once thedevice 1000 is within the predetermined distance of thePOS terminal 2000, thedevice 1000 may request the transaction with thePOS terminal 2000. - In operation S506, the
device 1000 transmits the authentication information that is stored in thedevice 1000 to thePOS terminal 2000. Once thedevice 1000 is within the predetermined distance of thePOS terminal 2000, thedevice 1000 may extract information about at least one of a pupil image of the user, a voice of the user, a fingerprint of the user, and a signature of the user from the memory or the separate storage space, and may transmit the extracted information to thePOS terminal 2000. Thedevice 1000 may store the authentication information in the separate storage space and may transmit link information for downloading the authentication information to thePOS terminal 2000. ThePOS terminal 2000 may then use the link information to download the authentication information from the separate storage space of thedevice 1000. - Also, the
device 1000 may display a user interface for an input of a password on a screen of thedevice 1000, and when the password is correctly input by the user, thedevice 1000 may provide the authentication information to thePOS terminal 2000. - Also, according to a payment amount or types of an item to be purchased, the
device 100 may transmit a preset type of authentication information to thePOS terminal 2000. For example, the user may previously set types of the authentication information according to a payment amount or types of an item to be purchased, and thedevice 1000 may transmit the preset type of the authentication information to thePOS terminal 2000. However, the present inventive concept is not limited thereto, and thus, the user may randomly preset types of the authentication information to be used. Also, when thedevice 1000 has transmitted the preset type of the authentication information to thePOS terminal 2000, thePOS terminal 2000 may authenticate the transaction request from thedevice 1000 only when authentication information that is generated by thePOS terminal 2000 is of the same type as the authentication information that has been transmitted to thePOS terminal 2000. - In operation S508, the
POS terminal 2000 generates authentication information based on the user input. ThePOS terminal 2000 may capture an image of a pupil of the user by using a camera that is included in thePOS terminal 2000 or that is connected with thePOS terminal 2000. Alternatively, thePOS terminal 2000 may record a voice of the user by using a microphone that is included in thePOS terminal 2000 or that is connected with thePOS terminal 2000. Alternatively, thePOS terminal 2000 may recognize a fingerprint of the user by using a fingerprint recognizing apparatus that is included in thePOS terminal 2000 or that is connected with thePOS terminal 2000. Alternatively, thePOS terminal 2000 may generate an image of a signature that is input from the user via a touch screen that is included in thePOS terminal 2000 or that is connected with thePOS terminal 2000. - In operation S510, the
POS terminal 2000 transmits the authentication information that is received from thedevice 1000 and the authentication information that is generated by thePOS terminal 2000 to theserver 3000. - In operation S512, the
server 3000 compares the authentication information that is generated by thedevice 1000 with the authentication information that is generated by thePOS terminal 2000. For example, when the authentication information is an image obtained by capturing an image of the pupil of the user, theserver 3000 may compare a pupil image that is generated by thedevice 1000 with a pupil image that is generated by thePOS terminal 2000. - Also, for example, when the authentication information is the voice of the user, the
server 3000 may compare voice data of the user that is generated by thedevice 1000 with voice data of the user that is generated by thePOS terminal 2000. In this case, theserver 3000 may determine whether the voice data that is generated by thedevice 1000 and the voice data that is generated by thePOS terminal 2000 are voice data of the same user. Also, theserver 3000 may convert the voice data into text, and may determine whether text that corresponds to the voice data that is generated by thedevice 1000 is equal to text that corresponds to the voice data that is generated by thePOS terminal 2000. - Also, for example, when the authentication information is a fingerprint image of the user, the
server 3000 may compare a fingerprint image that is generated by thedevice 1000 with a fingerprint image that is generated by thePOS terminal 2000. Also, for example, when the authentication information is the signature of the user, theserver 3000 may compare a signature image that is generated by thedevice 1000 with a signature image that is generated by thePOS terminal 2000. - In operation S514, the
server 3000 authenticates the transaction request. When theserver 3000 determines that the authentication information that is generated by thedevice 1000 is equal to the authentication information that is generated by thePOS terminal 2000, theserver 3000 may authenticate the transaction request from thedevice 1000. - In operation S516, the
device 1000 transmits the transaction information to thePOS terminal 2000, and in operation S518, thePOS terminal 2000 transmits the transaction information to theserver 3000. When theserver 3000 authenticates the transaction request from thedevice 1000, thedevice 1000 may transmit the transaction information to thePOS terminal 2000. The transaction information may be used in a transaction with respect to a product or a service and may include card information, coupon information, and user information. Further, thedevice 1000 directly transmits the transaction information to theserver 3000. - In the above, it is described that, after the
server 3000 authenticates the transaction request, thedevice 1000 provides the transaction information to thePOS terminal 2000, but the present inventive concept is not limited thereto. In operation S506, thedevice 1000 may transmit the authentication information and the transaction information to thePOS terminal 2000. - In operation S520, the
server 3000 performs the transaction. Theserver 3000 may perform the transaction, based on the transaction information and the authentication information that are received from thePOS terminal 2000. Theserver 3000 may perform the transaction by using both of the authentication information that is generated by thedevice 1000 and the authentication information that is generated by thePOS terminal 2000. -
FIG. 6 illustrates an example in which each of thedevice 1000 and thePOS terminal 2000 obtains authentication information by capturing an image of a pupil of a user, according to an exemplary embodiment. - Referring to
FIG. 6 , thedevice 1000 may capture the image of the pupil of the user by using a camera included in thedevice 1000, and thePOS terminal 2000 may capture the image of the pupil of the user by using a camera included in thePOS terminal 2000. Thedevice 1000 may capture the image of the pupil of the user and may previously store the pupil image, and once thedevice 1000 and thePOS terminal 2000 approach each other to within a predetermined range, thePOS terminal 2000 may capture the image of the pupil of the user and then may generate the pupil image. Also, the pupil image that is generated by thedevice 1000 and the pupil image that is generated by thePOS terminal 2000 may be compared to each other, and the comparison may be used in authentication of a transaction request from thedevice 1000. -
FIG. 7 illustrates an example in which each of thedevice 1000 and thePOS terminal 2000 obtains authentication information by recognizing a fingerprint of a user, according to an exemplary embodiment. - Referring to
FIG. 7 , thedevice 1000 may recognize the fingerprint of the user by using a touch screen included in thedevice 1000, and thePOS terminal 2000 may recognize the fingerprint of the user by using a fingerprint recognizing apparatus included in thePOS terminal 2000. Thedevice 1000 may recognize the fingerprint of the user and may previously store a fingerprint image, and once thedevice 1000 and thePOS terminal 2000 approach each other to within a predetermined range, thePOS terminal 2000 may recognize the fingerprint of the user and may generate a fingerprint image. Also, the fingerprint image that is generated by thedevice 1000 and the fingerprint image that is generated by thePOS terminal 2000 may be compared to each other, and the comparison may be used in authentication of a transaction request from thedevice 1000. -
FIG. 8 illustrates an example in which each of thedevice 1000 and thePOS terminal 2000 obtains authentication information by recording a voice of a user, according to an exemplary embodiment. - Referring to
FIG. 8 , thedevice 1000 may record the voice of the user by using a microphone included in thedevice 1000, and thePOS terminal 2000 may record the voice of the user by using a microphone included in thePOS terminal 2000. Thedevice 1000 may record the voice of the user and may previously store voice data, and once thedevice 1000 and thePOS terminal 2000 approach each other to within a predetermined range, thePOS terminal 2000 may record the voice of the user and then may generate voice data. Also, the voice data that is generated by thedevice 1000 and the voice data that is generated by thePOS terminal 2000 may be compared to each other, and the comparison may be used in authentication of a transaction request from thedevice 1000. -
FIG. 9 illustrates an example in which each of thedevice 1000 and thePOS terminal 2000 obtains authentication information by receiving a signature of a user, according to an exemplary embodiment. - Referring to
FIG. 9 , thedevice 1000 may generate a signature image of the user by using a touch screen included in thedevice 1000, and thePOS terminal 2000 may generate a signature image of the user by using a touch screen included in thePOS terminal 2000. Thedevice 1000 may previously store the signature image of the user, and once thedevice 1000 and thePOS terminal 2000 approach each other to within a predetermined range, thePOS terminal 2000 may generate the signature image of the user. Also, the signature image that is generated by thedevice 1000 and the signature image that is generated by thePOS terminal 2000 may be compared to each other, and the comparison may be used in authentication of a transaction request from thedevice 1000. -
FIGS. 10A and 10B illustrate execution screens of a transaction application that is executed in thedevice 1000, according to an exemplary embodiment. - As illustrated in
FIG. 10A , when the transaction application is executed in thedevice 1000, a credit card to be used in transaction and a transaction amount may be displayed on a screen of thedevice 1000. Also, when a user selects a button for transaction, as illustrated inFIG. 10B , a user interface for an input of a password may be displayed. When the user inputs the password via the displayed user interface, thedevice 1000 may generate authentication information by capturing an image of a pupil of the user, by recording a voice of the user, by recognizing a fingerprint of the user, or by receiving a signature of the user. In this case, the authentication information that is generated by thedevice 1000 may match with the credit card as displayed inFIG. 10A , and may be stored. Thus, a plurality of pieces of authentication information that are different from one other may be respectively matched with credit cards of the user. - In the above, it is described that, after the credit card and the transaction amount are displayed, the
device 1000 generates the authentication information, but the present inventive concept is not limited thereto. Thus, thedevice 1000 may match predetermined authentication information with at least one of the credit card and the transaction amount. Also, it is possible that thedevice 1000 does not match predetermined authentication information with the credit card and the transaction amount. -
FIG. 11 illustrates an example in which a credit card for a transaction is selected in thedevice 1000, according to an exemplary embodiment. - As illustrated in
FIG. 11 , in the present exemplary embodiment, when a plurality of transaction means (e.g., credit cards, coupons, etc.) exist, thedevice 1000 may output a list of the plurality of transaction means on its screen. A user may select a predetermined transaction means from the list of the plurality of transaction means that are displayed on the screen. -
FIGS. 12A and 12B illustrate an example in which a card and a coupon for transaction are selected in thedevice 1000, and transaction information is displayed on a screen of thedevice 1000, according to an exemplary embodiment. - As illustrated in
FIG. 12A , a user may select a plurality of transaction means (e.g., acard 1 and a coupon 2) from a transaction means list. Here, as illustrated inFIG. 12B , thedevice 1000 may pay $100 out of a total transaction amount (i.e., $300) by using thecoupon 2, and may pay $200 by using thecard 1. -
FIG. 13 illustrates an example in which a shopping list (i.e., a shopping cart) is displayed on thedevice 1000, according to an exemplary embodiment. - Referring to
FIG. 13 , thedevice 1000 may display a list of a plurality of products and a plurality of pieces of price information that correspond to the plurality of products, respectively, on a screen of thedevice 1000. In this case, a user may review the plurality of products and prices and then may select a product to buy. For example, when the user selects aproduct 1 and aproduct 2, thedevice 1000 may collectively process a transaction for theproducts -
FIG. 14 is a block diagram of thedevice 1000, according to an exemplary embodiment. - As illustrated in
FIG. 14 , thedevice 1000 includes an authentication information storage 1100, anauthentication information transmitter 1200, an authentication information comparer 1300, a transaction requester 1400, amemory 1500, atransceiver 1600, and acontroller 1700. - The authentication information storage 1100 stores authentication information that is input by a user. The authentication information may be used to authenticate a transaction request from the
device 1000 and may include information about at least one of a pupil image of the user, a voice of the user, a fingerprint of the user, and a signature of the user. The authentication information storage 1100 may generate the authentication information by using at least one of a camera, a microphone, a fingerprint recognizing apparatus, and a touch screen, and may previously store the authentication information in thememory 1500 to be described later. However, the present inventive concept is not limited thereto, and thus the authentication information storage 1100 may store the authentication information in a separate storage space. - The
authentication information transmitter 1200 transmits the authentication information to thePOS terminal 2000. Once thedevice 1000 and thePOS terminal 2000 approach each other to within a predetermined range, theauthentication information transmitter 1200 may extract information about at least one of a pupil image of the user, a voice of the user, a fingerprint of the user, and a signature of the user from thememory 1500 or a separate storage space, and may transmit the extracted information to thePOS terminal 2000. In a case where the authentication information is stored in the separate storage space, the authenticationinformation providing unit 1200 may transmit link information for downloading the authentication information to thePOS terminal 2000. - Also, the
device 1000 may display a user interface for an input of a password on a screen of thedevice 1000, and when the password is correctly input by the user, theauthentication information transmitter 1200 may provide the authentication information to thePOS terminal 2000. - Also, according to a payment amount or types of an item to be purchased, the
authentication information transmitter 1200 may transmit a preset type of authentication information to thePOS terminal 2000. For example, the user may previously set types of the authentication information according to a payment amount or types of an item to be purchased, and theauthentication information transmitter 1200 may transmit the preset type of the authentication information to thePOS terminal 2000. However, the present inventive concept is not limited thereto, and thus, the user may randomly preset types of the authentication information to be used. Also, when theauthentication information transmitter 1200 has transmitted the preset type of the authentication information to thePOS terminal 2000, thePOS terminal 2000 may authenticate the transaction request from thedevice 1000 only when authentication information that is generated by thePOS terminal 2000 is of the same type as the authentication information that has been transmitted to thePOS terminal 2000. - The
authentication information comparer 1300 compares the authentication information that is received from thePOS terminal 2000 with the authentication information that is generated by thedevice 1000. ThePOS terminal 2000 may generate the authentication information in a manner different than thedevice 1000, and may provide the generated authentication information to thedevice 1000. - For example, when the authentication information corresponds to an image obtained by capturing an image of the pupil of the user, the authentication information comparer 1300 may compare a pupil image that is received from the
POS terminal 2000 with a pupil image that is generated by thedevice 1000. - Alternatively, for example, when the authentication information corresponds to the voice of the user, the authentication information comparer 1300 may compare voice data of the user that is received from the
POS terminal 2000 with voice data of the user that is recorded by thedevice 1000. In this case, the authentication information comparer 1300 may determine whether the voice data from thePOS terminal 2000 and the voice data that is generated by thedevice 1000 are from the same user, based on a frequency and a pattern of the voice data. Also, the authentication information comparer 1300 may convert the voice data into text, and may determine whether text that corresponds to the voice data from thePOS terminal 2000 is equal to the text that corresponds to the voice data that is generated by thedevice 1000. - Also, when the authentication information corresponds to a fingerprint image of the user, the authentication information comparer 1300 may compare a fingerprint image that is received from the
POS terminal 2000 with a fingerprint image that is generated by thedevice 1000. Also, when the authentication information corresponds to a signature of the user, thedevice 1000 may compare a signature image that is received from thePOS terminal 2000 with a signature image that is generated by thedevice 1000. - The transaction requester 1400 requests transaction. Once the
device 1000 and thePOS terminal 2000 approach each other to within a predetermined range, the transaction requester 1400 may request the transaction with thePOS terminal 2000. Transaction information may be used in transaction with respect to a product or a service and may include one or more of card information, coupon information, and user information. - The
memory 1500 stores various types of information that are used for thedevice 1000 to generate the authentication information, to compare the stored authentication information with the authentication information that is generated by thePOS terminal 2000, and to request the transaction with thePOS terminal 2000. - The
transceiver 1600 exchanges the various types of information with theserver 3000 and thePOS terminal 2000, wherein the various types of information are used for thedevice 1000 to generate the authentication information, to compare the stored authentication information with the authentication information that is generated by thePOS terminal 2000, and to request the transaction with thePOS terminal 2000. - The
controller 1700 controls all operations of thedevice 1000, and controls the authentication information storage 1100, theauthentication information transmitter 1200, the authentication information comparer 1300, the transaction requester 1400, thememory 1500, and thetransceiver 1600 so as to allow thedevice 1000 to generate the authentication information, to compare the stored authentication information with the authentication information that is generated by thePOS terminal 2000, and to request the transaction with thePOS terminal 2000. -
FIG. 15 is a block diagram of thePOS terminal 2000, according to an exemplary embodiment. - As illustrated in
FIG. 15 , thePOS terminal 2000 includes an authentication information generator 2100, anauthentication information receiver 2200, anauthentication information transmitter 2300, anauthenticator 2400, a transaction requester 2500, amemory 2600, atransceiver 2700, and acontroller 2800. - The authentication information generator 2100 generates authentication information, based on a user input. The authentication information generator 2100 may capture an image of a pupil of a user by using a camera that is included in the
POS terminal 2000 or that is connected with thePOS terminal 2000. Also, the authentication information generator 2100 may record a voice of the user by using a microphone that is included in thePOS terminal 2000 or that is connected with thePOS terminal 2000. Also, the authentication information generator 2100 may recognize a fingerprint of the user by using a fingerprint recognizing apparatus that is included in thePOS terminal 2000 or that is connected with thePOS terminal 2000. Also, the authentication information generator 2100 may generate an image of a signature that is input from the user to a touch screen that is included in thePOS terminal 2000 or that is connected with thePOS terminal 2000. - The
authentication information receiver 2200 receives authentication information, which is stored in thedevice 1000, from thedevice 1000. Once thedevice 1000 approaches thePOS terminal 2000 to within a predetermined range, thedevice 1000 may extract information about at least one of a pupil image of the user, a voice of the user, a fingerprint of the user, and a signature of the user from thememory 1500 or a separate storage space, and may transmit the extracted information to thePOS terminal 2000. In a case where thedevice 1000 stores the authentication information in the separate storage space, theauthentication information receiver 2200 may receive link information for downloading the authentication information from thedevice 1000. - The
authentication information transmitter 2300 provides the authentication information that is generated by the authentication information generator 2100 to thedevice 1000. Once the POS terminal 2000 approaches thedevice 1000 to within a predetermined range, theauthentication information transmitter 2300 may transmit information about at least one of a pupil image of the user, a voice of the user, a fingerprint of the user, and a signature of the user to thedevice 1000. In a case where the POS terminal 2000 stores the authentication information in a separate storage space, theauthentication information transmitter 2300 may transmit link information for downloading the authentication information to thedevice 1000. - The
authenticator 2400 authenticates a transaction request from thedevice 1000. When theauthenticator 2400 determines that the authentication information that is received from thedevice 1000 is equal to the authentication information that is generated by thePOS terminal 2000, theauthenticator 2400 may authenticate the transaction request that is received from thedevice 1000. - Also, according to a payment amount or types of an item to be purchased, the
device 100 may transmit a preset type of authentication information to thePOS terminal 2000. For example, the user may previously set types of the authentication information according to a payment amount or types of an item to be purchased, and thedevice 1000 may transmit the preset type of the authentication information to thePOS terminal 2000. However, the present inventive concept is not limited thereto, and thus, the user may randomly preset types of the authentication information to be used. - When the
device 1000 has transmitted the preset type of the authentication information to thePOS terminal 2000, theauthenticator 2400 may authenticate the transaction request from thedevice 1000 only when authentication information that is generated by thePOS terminal 2000 is of the same type as the authentication information that has been transmitted to thePOS terminal 2000. - The transaction requester 2500 requests a transaction with the
server 3000. The transaction requester 2500 may transmit transaction information and the authentication information to theserver 3000. The transaction requester 2500 may transmit transaction information and the authentication information, which are received from thedevice 1000, to theserver 3000. Also, the transaction requester 2500 may transmit the authentication information that is generated by thePOS terminal 2000 to theserver 3000. - The
memory 2600 stores various types of information that are used for thePOS terminal 2000 to generate the authentication information, to compare the authentication information that is generated by thePOS terminal 2000 with the authentication information that is received from thedevice 1000, and to request the transaction with theserver 3000. - The
transceiver 2700 exchanges the various types of information with thedevice 1000 and theserver 3000, wherein the various types of information are used for thePOS terminal 2000 to generate the authentication information, to compare the authentication information that is generated by thePOS terminal 2000 with the authentication information that is received from thedevice 1000, and to request the transaction with theserver 3000. - The
controller 2800 controls all operations of thePOS terminal 2000, and controls the authentication information generator 2100, theauthentication information receiver 2200, theauthentication information transmitter 2300, theauthenticator 2400, the transaction requester 2500, thememory 2600, and thetransceiver 2700 so as to allow thePOS terminal 2000 to generate the authentication information, to compare the authentication information that is generated by thePOS terminal 2000 with the authentication information that is received from thedevice 1000, and to request the transaction with theserver 3000. - The one or more exemplary embodiments of the present invention may be embodied as a recording medium, e.g., a program module to be executed in computers, which include computer-readable commands. The computer storage medium may include any usable medium that may be accessed by computers, volatile and non-volatile medium, and detachable and non-detachable medium. Also, the computer storage medium may include a computer storage medium and a communication medium. The computer storage medium includes all of volatile and non-volatile medium, and detachable and non-detachable medium that are designed to store information including computer readable commands, data structures, program modules or other data. The communication medium includes computer-readable commands, a data structure, a program module, and other transmission mechanisms, and includes other information transmission mediums.
- The present inventive concept may, however, be embodied in many different forms and should not be construed as being limited to the exemplary embodiments set forth herein; rather, these exemplary embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the inventive concept to those of ordinary skill in the art. For example, configuring elements that are singular forms may be executed in a distributed fashion, and also, configuring elements that are distributed may be combined and then executed.
- While the present inventive concept has been particularly shown and described with reference to exemplary embodiments thereof, it will be understood by those of ordinary skill in the art that various changes in form and details may be made therein without departing from the spirit and scope as defined by the following claims.
Claims (33)
1. A method of requesting, by a device, a transaction with a point of sale (POS) terminal, the method comprising:
storing authentication information that is generated by the device based on a user input to the device; and
when the device enters within a predetermined range from the POS terminal, providing the authentication information to the POS terminal,
wherein the authentication information that is provided to the POS terminal is compared with authentication information that is generated by the POS terminal based on a user input to the POS terminal, and then is used to authenticate a transaction request from the device.
2. The method of claim 1 , further comprising:
providing transaction information to the POS terminal,
wherein, when the transaction request from the device is authenticated, the transaction information that is provided to the POS terminal is then provided from the POS terminal to a transaction server.
3. The method of claim 2 , wherein, when the transaction request from the device is authenticated, at least one of the authentication information that is provided to the POS terminal and the authentication information that is generated by the POS terminal is then provided from the POS terminal to the transaction server.
4. The method of claim 3 , wherein the authentication information that is provided to the transaction server is used by the transaction server to perform the transaction request from the device.
5. The method of claim 2 , wherein the providing of the transaction information comprises providing the transaction information to the POS terminal when the transaction request from the device is authenticated.
6. The method of claim 1 , wherein the authentication information comprises information about at least one of an image of a pupil of a user, a voice of the user, a fingerprint of the user, and a signature of the user.
7. The method of claim 1 , wherein the authentication information comprises link information for downloading information about at least one of an image of a pupil of a user, a voice of the user, a fingerprint of the user, and a signature of the user.
8. The method of claim 1 , wherein the transaction information comprises at least one of card information, coupon information, and user information.
9. A method of requesting, by a device, a transaction with a point of sale (POS) terminal, the method comprising:
storing authentication information that is generated by the device based on a user input to the device;
when the device enters within a predetermined range from the POS terminal, receiving authentication information, which is generated by the POS terminal based on a user input to the POS terminal, from the POS terminal;
authenticating a transaction request from the device, based on the authentication information generated by the device and the received authentication information; and
providing transaction information to the POS terminal.
10. The method of claim 9 , wherein, when the transaction request from the device is authenticated, the transaction information that is provided to the POS terminal is then provided from the POS terminal to a transaction server.
11. The method of claim 10 , wherein, when the transaction request from the device is authenticated, at least one of the authentication information that is provided to the POS terminal and the authentication information that is generated by the POS terminal is then provided from the POS terminal to the transaction server.
12. The method of claim 11 , wherein the authentication information that is provided to the transaction server is used by the transaction server to perform the transaction request from the device.
13. The method of claim 9 , wherein the providing of the transaction information comprises providing the transaction information to the POS terminal when the transaction request from the device is authenticated.
14. The method of claim 9 , wherein the authentication information comprises information about at least one of an image of a pupil of a user, a voice of the user, a fingerprint of the user, and a signature of the user.
15. The method of claim 9 , wherein the authentication information comprises link information for downloading information about at least one of an image of a pupil of a user, a voice of the user, a fingerprint of the user, and a signature of the user.
16. The method of claim 9 , wherein the transaction information comprises at least one of card information, coupon information, and user information.
17. A method of authenticating, by a point of sale (POS) terminal, a transaction request from a device, the method comprising:
when the device enters within a predetermined range from the POS terminal, receiving authentication information that is stored in the device from the device;
generating authentication information based on a user input to the POS terminal;
comparing the received authentication information and the generated authentication information; and
authenticating the transaction request from the device based on a result of the comparing.
18. The method of claim 17 , further comprising:
receiving transaction information from the device; and
when the transaction request from the device is authenticated, providing the received authentication information to a transaction server.
19. The method of claim 18 , wherein, when the transaction request from the device is authenticated, at least one of the received authentication information and the generated authentication information is then provided from the POS terminal to the transaction server.
20. The method of claim 19 , wherein the at least one of the received authentication information and the generated authentication information that is provided from the POS terminal to the transaction server is used by the transaction server to perform the transaction request from the device.
21. A method of authenticating, by a point of sale (POS) terminal, a transaction request from a device, the method comprising:
generating authentication information based on a user input to the POS terminal; and
when the device enters within a predetermined range from the POS terminal, providing the authentication information to the device,
wherein the authentication information that is provided to the device is compared with authentication information that is generated by the device based on a user input to the device, and a result of the comparison is used to authenticate the transaction request from the device.
22. A device comprising:
an authentication information storage that is configured to store authentication information that is generated by the device based on a user input to the device;
an authentication information comparer that is configured to receive authentication information, which is generated by a point of sale (POS) terminal based on a user input to the POS terminal, from the POS terminal when the device enters within a predetermined range from the POS terminal, and compare the authentication information generated by the device and the received authentication information; and
a transaction requester that is configured to request a transaction with the POS terminal, based on a result of the comparing.
23. A point of sale (POS) terminal comprising:
an authentication information generator that is configured to generate authentication information based on a user input to the POS terminal; and
an authentication information transmitter that is configured to transmit the authentication information to the device, when the device enters within a predetermined range from the POS terminal,
wherein the authentication information that is provided to the device is compared with authentication information that is generated by the device based on a user input to the device, and a result of the comparison is used to authenticate a transaction request from the device.
24. A non-transitory computer-readable recording medium having recorded thereon a program, which when executed by a computer, performs a method comprising:
storing authentication information that is generated by the device based on a user input to the device; and
when the device enters within a predetermined range from the POS terminal, providing the authentication information to the POS terminal,
wherein the authentication information that is provided to the POS terminal is compared with authentication information that is generated by the POS terminal based on a user input to the POS terminal, and then is used to authenticate a transaction request from the device.
25. A computer-readable recording medium having recorded thereon a program, which when executed by a computer, performs the method comprising:
storing authentication information that is generated by the device based on a user input to the device;
when the device enters within a predetermined range from the POS terminal, receiving authentication information, which is generated by the POS terminal based on a user input to the POS terminal, from the POS terminal;
authenticating a transaction request from the device, based on the authentication information generated by the device and the received authentication information; and
providing transaction information to the POS terminal.
26. A non-transitory computer-readable recording medium having recorded thereon a program, which when executed by a computer, performs, by using a computer, a method comprising:
when the device enters within a predetermined range from the POS terminal, receiving authentication information that is stored in the device from the device;
generating authentication information based on a user input to the POS terminal;
comparing the received authentication information and the generated authentication information; and
authenticating the transaction request from the device based on a result of the comparing.
27. A non-transitory computer-readable recording medium having recorded thereon a program, which when executed by a computer, performs, by using a computer, a method comprising:
generating authentication information based on a user input to the POS terminal; and
when the device enters within a predetermined range from the POS terminal, providing the authentication information to the device,
wherein the authentication information that is provided to the device is compared with authentication information that is generated by the device based on a user input to the device, and a result of the comparison is used to authenticate the transaction request from the device.
28. A system for authenticating a transaction request between devices, the system comprising:
a first device that comprises a storage, a camera, a touch screen, and a microphone, the first device configured to pre-store authentication information input by a user into the device using the camera, the touch screen, or the microphone; and
a second device that comprises a storage, a camera, a touch screen, and a microphone,
wherein when the first device is physically moved within a range of the second device for communicating using a wireless personal area network (WPAN), the first device is further configured to automatically transmit the authentication information to the second device using the WPAN, and in response to receiving the authentication information, the second device is configured to request and receive an input from a target user through one of the camera, the touch screen, and the microphone of the second device, generate authentication information using the input, and compare the received authentication information with the generated authentication information, and
wherein in response to receiving a transaction request from the first device, the second device is further configured to authenticate the transaction request the when the generated authentication data matches the received authentication data.
29. The system according to claim 28 , wherein the WPAN includes near field communication, ZigBee communication, radio frequency identification (RFID) communication, or ultra wide band (UWB) communication.
30. The system according to claim 29 , wherein the WPAN uses near field communication.
31. The system according to claim 29 , wherein the WPAN uses RFID communication.
32. The system according to claim 28 , wherein the authentication information comprises information about at least one of an image of a pupil of a user input through the camera, a voice of the user input through the microphone, a fingerprint of the user input through the touch screen, and a signature of the user input through the touch screen of the first device.
33. The system according to claim 32 , wherein the authentication information generated by the second device comprises information about at least one of an image of a pupil of a user input through the camera, a voice of the user input through the microphone, a fingerprint of the user input through the touch screen, and a signature of the user input through the touch screen of the first device.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16/252,109 US11232438B2 (en) | 2012-08-23 | 2019-01-18 | Method and system for authenticating transaction request from device |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR10-2012-0092541 | 2012-08-23 | ||
KR1020120092541A KR20140026844A (en) | 2012-08-23 | 2012-08-23 | Method and system for authenticating transaction request from device |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/252,109 Continuation US11232438B2 (en) | 2012-08-23 | 2019-01-18 | Method and system for authenticating transaction request from device |
Publications (1)
Publication Number | Publication Date |
---|---|
US20140058865A1 true US20140058865A1 (en) | 2014-02-27 |
Family
ID=49036447
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/965,364 Abandoned US20140058865A1 (en) | 2012-08-23 | 2013-08-13 | Method and system for authenticating transaction request from device |
US16/252,109 Active 2034-03-18 US11232438B2 (en) | 2012-08-23 | 2019-01-18 | Method and system for authenticating transaction request from device |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/252,109 Active 2034-03-18 US11232438B2 (en) | 2012-08-23 | 2019-01-18 | Method and system for authenticating transaction request from device |
Country Status (10)
Country | Link |
---|---|
US (2) | US20140058865A1 (en) |
EP (2) | EP2953077A1 (en) |
JP (2) | JP2014041616A (en) |
KR (1) | KR20140026844A (en) |
CN (1) | CN103632265B (en) |
AU (1) | AU2013306668B2 (en) |
BR (1) | BR112015003848A2 (en) |
RU (1) | RU2615334C2 (en) |
TW (1) | TWI585701B (en) |
WO (1) | WO2014030836A1 (en) |
Cited By (31)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103903133A (en) * | 2014-04-09 | 2014-07-02 | 广西中烟工业有限责任公司 | High-safety POS machine system and payment processing method thereof |
US20140337220A1 (en) * | 2012-05-15 | 2014-11-13 | Bphav, Llc | Systems, methods, and computer program products for the receipt of transaction offers |
US9202212B1 (en) | 2014-09-23 | 2015-12-01 | Sony Corporation | Using mobile device to monitor for electronic bank card communication |
US9292875B1 (en) | 2014-09-23 | 2016-03-22 | Sony Corporation | Using CE device record of E-card transactions to reconcile bank record |
US9317847B2 (en) | 2014-09-23 | 2016-04-19 | Sony Corporation | E-card transaction authorization based on geographic location |
US9355424B2 (en) | 2014-09-23 | 2016-05-31 | Sony Corporation | Analyzing hack attempts of E-cards |
US9367845B2 (en) | 2014-09-23 | 2016-06-14 | Sony Corporation | Messaging customer mobile device when electronic bank card used |
US9378502B2 (en) | 2014-09-23 | 2016-06-28 | Sony Corporation | Using biometrics to recover password in customer mobile device |
US9519901B1 (en) * | 2015-09-16 | 2016-12-13 | Square, Inc. | Biometric payment technology |
US9558488B2 (en) | 2014-09-23 | 2017-01-31 | Sony Corporation | Customer's CE device interrogating customer's e-card for transaction information |
TWI578245B (en) * | 2014-04-08 | 2017-04-11 | Rakuten Inc | Portable terminals, delivery servers, control methods, and programs |
WO2017072647A1 (en) * | 2015-10-27 | 2017-05-04 | Fox Glacier Asset Management Llc | Mobile payment system |
US9646307B2 (en) * | 2014-09-23 | 2017-05-09 | Sony Corporation | Receiving fingerprints through touch screen of CE device |
US20170178126A1 (en) * | 2014-09-05 | 2017-06-22 | Kuang-Chi Intelligent Photonic Technology Ltd. | Payment system |
US20170249667A1 (en) * | 2016-02-25 | 2017-08-31 | Cayan Llc | Use of item level transactional details in payment processing and customer engagement platforms |
US20170308897A1 (en) * | 2016-01-21 | 2017-10-26 | Elements of Genius, Inc. | Systems, methods, and computer program products for the receipt of health and wellness transaction offers |
US20180006821A1 (en) * | 2015-02-17 | 2018-01-04 | Visa International Service Association | Token and cryptogram using transaction specific information |
US9953323B2 (en) | 2014-09-23 | 2018-04-24 | Sony Corporation | Limiting e-card transactions based on lack of proximity to associated CE device |
US20180167385A1 (en) * | 2016-12-09 | 2018-06-14 | International Business Machines Corporation | Method and apparatus to identify and authorize caller via ultrasound |
US20180349889A1 (en) * | 2017-05-31 | 2018-12-06 | Paypal, Inc. | Accessing digital wallet information using a point-of-sale device |
US10262316B2 (en) | 2014-09-23 | 2019-04-16 | Sony Corporation | Automatic notification of transaction by bank card to customer device |
WO2019094071A1 (en) * | 2017-11-07 | 2019-05-16 | Visa International Service Association | Biometric validation process utilizing access device and location determination |
US20190266598A1 (en) * | 2014-07-11 | 2019-08-29 | Google Llc | Hands-free transactions with a challenge and response |
US10438202B2 (en) | 2013-03-14 | 2019-10-08 | Square, Inc. | Mobile device payments |
US10440017B2 (en) | 2016-01-25 | 2019-10-08 | Elements of Genius, Inc. | Secure health data storage and transaction system |
US10740748B2 (en) | 2016-11-30 | 2020-08-11 | Square, Inc. | System for improving card on file transactions |
US10861019B2 (en) * | 2016-03-18 | 2020-12-08 | Visa International Service Association | Location verification during dynamic data transactions |
US10878402B1 (en) | 2018-08-31 | 2020-12-29 | Square, Inc. | Temporarily provisioning payment functionality to alternate payment instrument |
US10997583B1 (en) | 2018-08-31 | 2021-05-04 | Square, Inc. | Temporarily provisioning card on file payment functionality to proximate merchants |
US11348083B1 (en) | 2014-09-30 | 2022-05-31 | Block, Inc. | Payment by use of identifier |
US11756034B2 (en) * | 2021-06-25 | 2023-09-12 | Verifone, Inc. | Systems and methods for alternative payment mechanism payments using ultra-wideband radio technology |
Families Citing this family (29)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3063608B1 (en) | 2013-10-30 | 2020-02-12 | Apple Inc. | Displaying relevant user interface objects |
CN103927654B (en) * | 2014-04-17 | 2018-03-30 | 福建联迪商用设备有限公司 | A kind of mobile terminal contacts the means of communication, device and method of payment with POS |
US9483763B2 (en) | 2014-05-29 | 2016-11-01 | Apple Inc. | User interface for payments |
US10066959B2 (en) | 2014-09-02 | 2018-09-04 | Apple Inc. | User interactions for a mapping application |
US10425814B2 (en) * | 2014-09-24 | 2019-09-24 | Princeton Identity, Inc. | Control of wireless communication device capability in a mobile device with a biometric key |
CN105719130B (en) * | 2014-12-02 | 2020-07-31 | 南京中兴软件有限责任公司 | Payment verification method, device and system |
US20160224973A1 (en) | 2015-02-01 | 2016-08-04 | Apple Inc. | User interface for payments |
SG10201506662XA (en) * | 2015-03-03 | 2016-10-28 | Mastercard Asia Pacific Pte Ltd | Method For Enabling A Communication Link Between A Mobile Terminal And A Receiving Terminal |
US20160358133A1 (en) | 2015-06-05 | 2016-12-08 | Apple Inc. | User interface for loyalty accounts and private label accounts for a wearable device |
US9940637B2 (en) | 2015-06-05 | 2018-04-10 | Apple Inc. | User interface for loyalty accounts and private label accounts |
KR101721132B1 (en) * | 2015-09-02 | 2017-03-29 | 엘지전자 주식회사 | Mobile terminal and method for controlling the same |
CN105405217A (en) * | 2015-10-13 | 2016-03-16 | 昆山古鳌电子机械有限公司 | Automatic transaction system with crime prevention system |
US10621581B2 (en) | 2016-06-11 | 2020-04-14 | Apple Inc. | User interface for transactions |
US11580608B2 (en) | 2016-06-12 | 2023-02-14 | Apple Inc. | Managing contact information for communication applications |
US9842330B1 (en) | 2016-09-06 | 2017-12-12 | Apple Inc. | User interfaces for stored-value accounts |
US10860199B2 (en) | 2016-09-23 | 2020-12-08 | Apple Inc. | Dynamically adjusting touch hysteresis based on contextual data |
KR101808733B1 (en) | 2016-10-24 | 2018-01-19 | 주식회사 올아이티탑 | Electronic payment system using finger vein recognition and method for processing thereof |
KR102143148B1 (en) | 2017-09-09 | 2020-08-10 | 애플 인크. | Implementation of biometric authentication |
KR102185854B1 (en) | 2017-09-09 | 2020-12-02 | 애플 인크. | Implementation of biometric authentication |
DK179992B1 (en) | 2018-05-07 | 2020-01-14 | Apple Inc. | Visning af brugergrænseflader associeret med fysiske aktiviteter |
US11100498B2 (en) | 2018-06-03 | 2021-08-24 | Apple Inc. | User interfaces for transfer accounts |
KR20240024294A (en) | 2018-06-03 | 2024-02-23 | 애플 인크. | User interfaces for transfer accounts |
US11328352B2 (en) | 2019-03-24 | 2022-05-10 | Apple Inc. | User interfaces for managing an account |
DK201970531A1 (en) | 2019-05-06 | 2021-07-09 | Apple Inc | Avatar integration with multiple applications |
US11481094B2 (en) | 2019-06-01 | 2022-10-25 | Apple Inc. | User interfaces for location-related communications |
US11477609B2 (en) | 2019-06-01 | 2022-10-18 | Apple Inc. | User interfaces for location-related communications |
KR102310912B1 (en) * | 2019-07-30 | 2021-10-12 | 세레브럴 | Biometric Identification System and its operating method |
US11169830B2 (en) | 2019-09-29 | 2021-11-09 | Apple Inc. | Account management user interfaces |
KR102451495B1 (en) | 2019-09-29 | 2022-10-06 | 애플 인크. | Account Management User Interfaces |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100032500A1 (en) * | 2006-03-30 | 2010-02-11 | Giuseppe Righini | Multiple configuration shower device |
US20100325002A1 (en) * | 2008-06-11 | 2010-12-23 | Lmr Inventions, Llc | System and method for verifying user identity information in financial transactions |
US20110019125A1 (en) * | 2008-03-19 | 2011-01-27 | Hiroki Nakahama | Mounted board, mounted board set, and panel unit |
US20130014760A1 (en) * | 2010-03-25 | 2013-01-17 | Koninklijke Philips Electronics N.V. | Respiratory mask with ribbed contacting surface |
US20130147603A1 (en) * | 2011-12-13 | 2013-06-13 | Irisguard Inc. | Iris Cameras |
US20140021467A1 (en) * | 2012-07-20 | 2014-01-23 | Semiconductor Energy Laboratory Co., Ltd. | Semiconductor device and method for manufacturing semiconductor device |
Family Cites Families (45)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2001167054A (en) | 1999-12-09 | 2001-06-22 | Casio Comput Co Ltd | Portable information equipment, device and system for authentication |
KR100407834B1 (en) | 2000-11-14 | 2003-12-06 | 이영문 | A polishing by pounding apparatus |
US6601762B2 (en) * | 2001-06-15 | 2003-08-05 | Koninklijke Philips Electronics N.V. | Point-of-sale (POS) voice authentication transaction system |
JP4187451B2 (en) * | 2002-03-15 | 2008-11-26 | 松下電器産業株式会社 | Personal authentication device and mobile terminal |
US20060206725A1 (en) * | 2002-04-23 | 2006-09-14 | Michael Milgramm | System and method for platform-independent biometrically verified secure information transfer and access control |
JP2004030176A (en) * | 2002-06-25 | 2004-01-29 | Nec Infrontia Corp | System, method, and program for settlement by using fingerprint |
US8930270B2 (en) * | 2002-07-30 | 2015-01-06 | Aol Inc. | Smart payment instrument selection |
US7784684B2 (en) * | 2002-08-08 | 2010-08-31 | Fujitsu Limited | Wireless computer wallet for physical point of sale (POS) transactions |
CN1514635A (en) * | 2003-04-29 | 2004-07-21 | 叶丰平 | Method of realizing mobile electronic business using finger print intelligence terminal and intelligent hand set |
KR20050014052A (en) | 2003-07-29 | 2005-02-07 | 주식회사 비즈모델라인 | Mobile Devices and Method for Certificating Biometric Information by Using It |
JP2005242768A (en) * | 2004-02-27 | 2005-09-08 | Toshiba Tec Corp | Settlement system, settlement terminal used for settlement system, and server for settlement terminal |
WO2005107137A2 (en) * | 2004-04-23 | 2005-11-10 | Passmark Security, Inc. | Method and apparatus for authenticating users using two or more factors |
JP2005346606A (en) * | 2004-06-07 | 2005-12-15 | Matsushita Electric Ind Co Ltd | Electronic settlement system using mobile telephone |
ES2251878B1 (en) | 2004-10-26 | 2007-02-16 | SOLER & PALAU, S.A. | AXIAL FLOW AIR EXTRACTOR FOR BATHROOMS AND SIMILAR. |
JP4927747B2 (en) * | 2004-10-26 | 2012-05-09 | ザ コカ・コーラ カンパニー | Transaction system and method |
JP2006221515A (en) * | 2005-02-14 | 2006-08-24 | Oki Joho Systems:Kk | Pos system |
JP2006350588A (en) * | 2005-06-15 | 2006-12-28 | Sharp Corp | Information processing apparatus and information processing system |
KR200407834Y1 (en) | 2005-11-02 | 2006-02-03 | 밸크리텍주식회사 | Pos terminal |
KR100762971B1 (en) | 2005-12-02 | 2007-10-02 | 윤경원 | System of Real-time Funds Transfer in Point of Sale Using Portable Recording Medium Storing Biometric Information, And Method Thereof, And Media That Can Record Computer Program for Method Thereof |
JP2006155636A (en) | 2005-12-28 | 2006-06-15 | Hitachi Ltd | Ic card settlement device |
US20080126260A1 (en) * | 2006-07-12 | 2008-05-29 | Cox Mark A | Point Of Sale Transaction Device With Magnetic Stripe Emulator And Biometric Authentication |
JP4382793B2 (en) * | 2006-09-28 | 2009-12-16 | 株式会社エヌ・ティ・ティ・ドコモ | Payment system, payment apparatus, and mobile device |
JP4640319B2 (en) * | 2006-11-15 | 2011-03-02 | 凸版印刷株式会社 | Authentication apparatus and method |
JP2008176435A (en) | 2007-01-17 | 2008-07-31 | Hitachi Ltd | Settlement terminal and ic card |
JP2009075907A (en) * | 2007-09-21 | 2009-04-09 | Dainippon Printing Co Ltd | Guide path information collection system |
CN201226167Y (en) * | 2008-05-30 | 2009-04-22 | 汇宝科技有限公司 | POS terminal |
SK288757B6 (en) * | 2008-09-19 | 2020-05-04 | Smk Kk | System and method for contactless payment authorization |
US20100082490A1 (en) * | 2008-09-30 | 2010-04-01 | Apple Inc. | Systems and methods for secure wireless transactions |
KR20100060707A (en) * | 2008-11-28 | 2010-06-07 | 주식회사 하렉스인포텍 | Patment and authorization, settlement and membership joining method, device and system by purchaser using mobile communication terminal |
US20100161488A1 (en) * | 2008-12-22 | 2010-06-24 | Paul Michael Evans | Methods and systems for biometric verification |
CN101770668B (en) * | 2008-12-31 | 2012-05-30 | 技嘉科技股份有限公司 | Mobile phone capable of transacting with electronic transaction device |
US20100235313A1 (en) * | 2009-03-16 | 2010-09-16 | Tim Rea | Media information analysis and recommendation platform |
CN101853542B (en) * | 2009-04-01 | 2012-01-18 | 张子文 | IC card consumption system integrating finger vein identification technology |
CN101901517A (en) * | 2009-05-27 | 2010-12-01 | 上海点佰趣信息科技有限公司 | Fingerprint payment certificate server, fingerprint payment method and system thereof |
EP2486508A4 (en) * | 2009-09-04 | 2016-10-12 | Thomas Szoke | A personalized multifunctional access device possessing an individualized form of authenticating and controlling data exchange |
US9129269B2 (en) | 2010-02-02 | 2015-09-08 | Xia Dai | Secured point-of-sale transaction system |
US9576195B2 (en) | 2010-08-09 | 2017-02-21 | Sk Planet Co., Ltd. | Integrated image searching system and service method thereof |
KR101729938B1 (en) | 2010-08-09 | 2017-04-26 | 에스케이플래닛 주식회사 | Integrative image searching system and service method of the same |
US9292870B2 (en) * | 2010-12-13 | 2016-03-22 | Qualcomm Incorporated | System and method for point of service payment acceptance via wireless communication |
US8195576B1 (en) * | 2011-01-31 | 2012-06-05 | Bank Of America Corporation | Mobile transaction device security system |
US10580049B2 (en) * | 2011-04-05 | 2020-03-03 | Ingenico, Inc. | System and method for incorporating one-time tokens, coupons, and reward systems into merchant point of sale checkout systems |
WO2012142045A2 (en) * | 2011-04-11 | 2012-10-18 | Visa International Service Association | Multiple tokenization for authentication |
WO2013095434A1 (en) | 2011-12-21 | 2013-06-27 | Intel Corporation | Method for authentication using biometric data for mobile device e-commerce transactions |
US9361619B2 (en) * | 2012-08-06 | 2016-06-07 | Ca, Inc. | Secure and convenient mobile authentication techniques |
US9928493B2 (en) * | 2013-09-27 | 2018-03-27 | Groupon, Inc. | Systems and methods for providing consumer facing point-of-sale interfaces |
-
2012
- 2012-08-23 KR KR1020120092541A patent/KR20140026844A/en not_active Application Discontinuation
-
2013
- 2013-07-03 BR BR112015003848A patent/BR112015003848A2/en not_active Application Discontinuation
- 2013-07-03 WO PCT/KR2013/005880 patent/WO2014030836A1/en active Application Filing
- 2013-07-03 RU RU2015109972A patent/RU2615334C2/en not_active IP Right Cessation
- 2013-07-03 AU AU2013306668A patent/AU2013306668B2/en not_active Ceased
- 2013-07-11 TW TW102124937A patent/TWI585701B/en not_active IP Right Cessation
- 2013-08-13 US US13/965,364 patent/US20140058865A1/en not_active Abandoned
- 2013-08-23 CN CN201310372851.4A patent/CN103632265B/en not_active Expired - Fee Related
- 2013-08-23 JP JP2013173102A patent/JP2014041616A/en active Pending
- 2013-08-23 EP EP15174698.9A patent/EP2953077A1/en not_active Ceased
- 2013-08-23 EP EP13181595.3A patent/EP2701108A1/en not_active Ceased
-
2018
- 2018-08-22 JP JP2018155309A patent/JP6689925B2/en not_active Expired - Fee Related
-
2019
- 2019-01-18 US US16/252,109 patent/US11232438B2/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100032500A1 (en) * | 2006-03-30 | 2010-02-11 | Giuseppe Righini | Multiple configuration shower device |
US20110019125A1 (en) * | 2008-03-19 | 2011-01-27 | Hiroki Nakahama | Mounted board, mounted board set, and panel unit |
US20100325002A1 (en) * | 2008-06-11 | 2010-12-23 | Lmr Inventions, Llc | System and method for verifying user identity information in financial transactions |
US20130014760A1 (en) * | 2010-03-25 | 2013-01-17 | Koninklijke Philips Electronics N.V. | Respiratory mask with ribbed contacting surface |
US20130147603A1 (en) * | 2011-12-13 | 2013-06-13 | Irisguard Inc. | Iris Cameras |
US20140021467A1 (en) * | 2012-07-20 | 2014-01-23 | Semiconductor Energy Laboratory Co., Ltd. | Semiconductor device and method for manufacturing semiconductor device |
Cited By (43)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140337220A1 (en) * | 2012-05-15 | 2014-11-13 | Bphav, Llc | Systems, methods, and computer program products for the receipt of transaction offers |
US10438202B2 (en) | 2013-03-14 | 2019-10-08 | Square, Inc. | Mobile device payments |
US11455633B2 (en) | 2013-03-14 | 2022-09-27 | Block, Inc. | Mobile device payments |
TWI578245B (en) * | 2014-04-08 | 2017-04-11 | Rakuten Inc | Portable terminals, delivery servers, control methods, and programs |
CN103903133A (en) * | 2014-04-09 | 2014-07-02 | 广西中烟工业有限责任公司 | High-safety POS machine system and payment processing method thereof |
US20190266598A1 (en) * | 2014-07-11 | 2019-08-29 | Google Llc | Hands-free transactions with a challenge and response |
US20170178126A1 (en) * | 2014-09-05 | 2017-06-22 | Kuang-Chi Intelligent Photonic Technology Ltd. | Payment system |
US9953323B2 (en) | 2014-09-23 | 2018-04-24 | Sony Corporation | Limiting e-card transactions based on lack of proximity to associated CE device |
US9355424B2 (en) | 2014-09-23 | 2016-05-31 | Sony Corporation | Analyzing hack attempts of E-cards |
US9558488B2 (en) | 2014-09-23 | 2017-01-31 | Sony Corporation | Customer's CE device interrogating customer's e-card for transaction information |
US9378502B2 (en) | 2014-09-23 | 2016-06-28 | Sony Corporation | Using biometrics to recover password in customer mobile device |
US9202212B1 (en) | 2014-09-23 | 2015-12-01 | Sony Corporation | Using mobile device to monitor for electronic bank card communication |
US9646307B2 (en) * | 2014-09-23 | 2017-05-09 | Sony Corporation | Receiving fingerprints through touch screen of CE device |
US9652760B2 (en) | 2014-09-23 | 2017-05-16 | Sony Corporation | Receiving fingerprints through touch screen of CE device |
US9367845B2 (en) | 2014-09-23 | 2016-06-14 | Sony Corporation | Messaging customer mobile device when electronic bank card used |
US9292875B1 (en) | 2014-09-23 | 2016-03-22 | Sony Corporation | Using CE device record of E-card transactions to reconcile bank record |
US10262316B2 (en) | 2014-09-23 | 2019-04-16 | Sony Corporation | Automatic notification of transaction by bank card to customer device |
US9317847B2 (en) | 2014-09-23 | 2016-04-19 | Sony Corporation | E-card transaction authorization based on geographic location |
US11348083B1 (en) | 2014-09-30 | 2022-05-31 | Block, Inc. | Payment by use of identifier |
US11861581B2 (en) | 2014-09-30 | 2024-01-02 | Block, Inc. | Payment by use of identifier |
US20180006821A1 (en) * | 2015-02-17 | 2018-01-04 | Visa International Service Association | Token and cryptogram using transaction specific information |
US11943231B2 (en) * | 2015-02-17 | 2024-03-26 | Visa International Service Association | Token and cryptogram using transaction specific information |
US20210312448A1 (en) * | 2015-02-17 | 2021-10-07 | Visa International Service Association | Token and cryptogram using transaction specific information |
US11068895B2 (en) * | 2015-02-17 | 2021-07-20 | Visa International Service Association | Token and cryptogram using transaction specific information |
US20220366424A1 (en) * | 2015-09-16 | 2022-11-17 | Block, Inc. | Biometric Payment Technology |
US9519901B1 (en) * | 2015-09-16 | 2016-12-13 | Square, Inc. | Biometric payment technology |
US11270304B2 (en) | 2015-09-16 | 2022-03-08 | Square, Inc. | Biometric payment technology |
WO2017072647A1 (en) * | 2015-10-27 | 2017-05-04 | Fox Glacier Asset Management Llc | Mobile payment system |
US20170308897A1 (en) * | 2016-01-21 | 2017-10-26 | Elements of Genius, Inc. | Systems, methods, and computer program products for the receipt of health and wellness transaction offers |
US10440017B2 (en) | 2016-01-25 | 2019-10-08 | Elements of Genius, Inc. | Secure health data storage and transaction system |
US20170249667A1 (en) * | 2016-02-25 | 2017-08-31 | Cayan Llc | Use of item level transactional details in payment processing and customer engagement platforms |
US11810116B2 (en) | 2016-03-18 | 2023-11-07 | Visa International Service Association | Location verification during dynamic data transactions |
US10861019B2 (en) * | 2016-03-18 | 2020-12-08 | Visa International Service Association | Location verification during dynamic data transactions |
US10740748B2 (en) | 2016-11-30 | 2020-08-11 | Square, Inc. | System for improving card on file transactions |
US10601820B2 (en) * | 2016-12-09 | 2020-03-24 | International Business Machines Corporation | Method and apparatus to identify and authorize caller via ultrasound |
US20180167385A1 (en) * | 2016-12-09 | 2018-06-14 | International Business Machines Corporation | Method and apparatus to identify and authorize caller via ultrasound |
US20180349889A1 (en) * | 2017-05-31 | 2018-12-06 | Paypal, Inc. | Accessing digital wallet information using a point-of-sale device |
US10733599B2 (en) * | 2017-05-31 | 2020-08-04 | Paypal, Inc. | Accessing digital wallet information using a point-of-sale device |
US11496467B2 (en) * | 2017-11-07 | 2022-11-08 | Visa International Service Association | Biometric validation process utilizing access device and location determination |
WO2019094071A1 (en) * | 2017-11-07 | 2019-05-16 | Visa International Service Association | Biometric validation process utilizing access device and location determination |
US10997583B1 (en) | 2018-08-31 | 2021-05-04 | Square, Inc. | Temporarily provisioning card on file payment functionality to proximate merchants |
US10878402B1 (en) | 2018-08-31 | 2020-12-29 | Square, Inc. | Temporarily provisioning payment functionality to alternate payment instrument |
US11756034B2 (en) * | 2021-06-25 | 2023-09-12 | Verifone, Inc. | Systems and methods for alternative payment mechanism payments using ultra-wideband radio technology |
Also Published As
Publication number | Publication date |
---|---|
RU2015109972A (en) | 2016-10-20 |
RU2615334C2 (en) | 2017-04-04 |
JP2014041616A (en) | 2014-03-06 |
EP2953077A1 (en) | 2015-12-09 |
JP2019012538A (en) | 2019-01-24 |
US20190172056A1 (en) | 2019-06-06 |
BR112015003848A2 (en) | 2017-08-08 |
US11232438B2 (en) | 2022-01-25 |
CN103632265B (en) | 2019-05-03 |
TWI585701B (en) | 2017-06-01 |
JP6689925B2 (en) | 2020-04-28 |
AU2013306668A1 (en) | 2015-02-05 |
KR20140026844A (en) | 2014-03-06 |
AU2013306668B2 (en) | 2016-05-19 |
CN103632265A (en) | 2014-03-12 |
EP2701108A1 (en) | 2014-02-26 |
WO2014030836A1 (en) | 2014-02-27 |
TW201413610A (en) | 2014-04-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11232438B2 (en) | Method and system for authenticating transaction request from device | |
US11481754B2 (en) | Secure payment method and system | |
US10667310B2 (en) | Midrange contactless transactions | |
US20190180286A1 (en) | System and method for providing software-based contactless payment | |
US9898728B2 (en) | System and method for one-time payment authorization in a portable communication device | |
US20160224961A1 (en) | System and method for providing diverse secure data communication permissions to trusted applications on a portable communication device | |
US20170032370A1 (en) | Electronic payment transactions using machine readable code without requiring online connection | |
US20120123935A1 (en) | System and Method for Physical-World Based Dynamic Contactless Data Emulation in a Portable Communication Device | |
US20150081554A1 (en) | Systems and Methods for Managing Mobile Account Holder Verification Methods | |
US20170202040A1 (en) | Dongle device for automatic pairing to a local device | |
US20140057561A1 (en) | Data transmission method for terminal performing near field communication and terminal thereof | |
US11010482B2 (en) | System and method for secure device connection | |
KR20160071421A (en) | System and method for dynamic temporary payment authorization in a portable communication device | |
US20200382955A1 (en) | Terminal type identification in interaction processing | |
KR102154740B1 (en) | Method and system for authenticating transaction request from device | |
KR20160015774A (en) | Payment method using near field communicatio and payment apparatus performing the payment method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: SAMSUNG ELECTRONICS CO., LTD., KOREA, REPUBLIC OF Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:YANG, DO-JUN;PARK, SUN-EUNG;SEO, JIN-GOO;AND OTHERS;REEL/FRAME:030996/0585 Effective date: 20130726 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |