EP3090402A1 - Check-in systems and methods - Google Patents
Check-in systems and methodsInfo
- Publication number
- EP3090402A1 EP3090402A1 EP14876003.6A EP14876003A EP3090402A1 EP 3090402 A1 EP3090402 A1 EP 3090402A1 EP 14876003 A EP14876003 A EP 14876003A EP 3090402 A1 EP3090402 A1 EP 3090402A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- check
- user
- information
- enabled network
- mobile
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
- 238000000034 method Methods 0.000 title claims abstract description 84
- 230000002730 additional effect Effects 0.000 claims abstract description 53
- 238000013475 authorization Methods 0.000 claims description 26
- 230000009471 action Effects 0.000 claims description 18
- 238000012546 transfer Methods 0.000 claims description 13
- 230000004308 accommodation Effects 0.000 claims description 6
- 230000006870 function Effects 0.000 description 16
- 230000008569 process Effects 0.000 description 15
- 238000004891 communication Methods 0.000 description 10
- 230000002093 peripheral effect Effects 0.000 description 10
- 238000012545 processing Methods 0.000 description 8
- 230000008901 benefit Effects 0.000 description 6
- 230000007246 mechanism Effects 0.000 description 5
- 230000036541 health Effects 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 3
- 238000009434 installation Methods 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 230000008439 repair process Effects 0.000 description 3
- 238000012552 review Methods 0.000 description 2
- VYZAMTAEIAYCRO-UHFFFAOYSA-N Chromium Chemical compound [Cr] VYZAMTAEIAYCRO-UHFFFAOYSA-N 0.000 description 1
- 206010020751 Hypersensitivity Diseases 0.000 description 1
- 208000026935 allergic disease Diseases 0.000 description 1
- 230000007815 allergy Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000003745 diagnosis Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 235000013410 fast food Nutrition 0.000 description 1
- 235000013305 food Nutrition 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 230000005055 memory storage Effects 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 230000000737 periodic effect Effects 0.000 description 1
- 230000001902 propagating effect Effects 0.000 description 1
- 230000004224 protection Effects 0.000 description 1
- 230000002123 temporal effect Effects 0.000 description 1
- 238000011282 treatment Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
- 230000003442 weekly effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/12—Hotels or restaurants
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/023—Services making use of location information using mutual or relative location information between multiple location based services [LBS] targets or of distance thresholds
Definitions
- the present invention relates to electronic check-in services, and more particularly to a systems and methods for electronically checking in when arriving at an enabled location.
- methods for providing check-in services may be provided to a system having a mobile device and a check-in enabled network.
- the methods may include locating a check-in enabled network when the mobile computer device is within sufficient physical proximity to the check-in enabled network, accessing the check- in enabled network, and providing check- in information to the check-in enabled network to check in a user of the mobile computer device to an entity providing (or otherwise using) the check-in enabled network.
- the methods may also include determining whether any additional actions are available to the mobile device from the check-in enabled network, when an additional action is available, presenting the additional action to the user via the mobile device, and receiving input from the user causing the mobile device to take the additional action.
- the additional action may be an action selected from the following: providing a payment to an entity operating the check-in enabled network; providing additional information about the user to the check-in enabled network; providing purchase information to the check-in enabled network; using the mobile computer device to fill out paperwork necessary for the user to complete check-in at a business operating the check-in enabled network; providing customer loyalty information to the check-in enabled network from the mobile computer device; providing coupons to or from the mobile computer device; guiding or directing the user within a store (or other location) operating the check-in enabled network; tracking the user within a store operating the check-in enabled network; completing a check-out transaction associated with a purchase of goods within a store operating the check-in enabled network; directing the user to a parking location for an order pick-up; tracking arrival and readiness of the user's party for seating at a restaurant; notifying the user of an updated status by an action selected from the group consisting of: a text message; notification through a check-in app; an automated telephone call; an email; and a notification method
- payment may be provided to a location, entity, person, and/or other business while protecting the user's personal information.
- the user's personal information can be protected in any suitable manner, in some implementations, the user's personal information is protected by storing the user's payment information at a third-party repository, so that the actual transfer of funds occurs between the repository and the business.
- the repository may obtain authorization for the transfer of funds from the user via the check-in enabled network and/or the mobile computer device.
- the repository may obtain authorization for the transfer of funds from the user via a third-party network and/or the mobile computer device.
- a method for providing check-in services includes using the wireless network device to provide check-in enabled network, detecting when the mobile computer device attempts to access the check-in enabled network, establishing a connection between the mobile computer device and the check-in enabled network, and receiving check-in information to the check-in enabled network to check in a user of the mobile computer device to an entity providing the check-in enabled network.
- the method also optionally includes determining whether any additional actions are available to provide to the mobile device via the check-in enabled network, when an additional action is available, presenting the additional action to the user via the mobile device, and receiving input from the mobile device to take the additional action.
- the additional actions may include those discussed above.
- the user's personal information may be protected as discussed above as well.
- the described systems and methods can be modified in any suitable manner. Indeed, in some implementations, instead of requiring a user's mobile device to check into a business' check-in enabled network before the user is checked into the business, the user's mobile device (e.g., smartphone, tablet, handheld computer, cellphone, function phone, and/or any other suitable known or novel mobile device) is configured (e.g., via an app installed on the device and/or a webpage accessible through the device) to use the device's own communication methods (e.g., its telephone services, WiFi, Bluetooth, etc.) to check into the business.
- the user's mobile device e.g., smartphone, tablet, handheld computer, cellphone, function phone, and/or any other suitable known or novel mobile device
- the device's own communication methods e.g., its telephone services, WiFi, Bluetooth, etc.
- Such a check in process can be initiated in any suitable manner, including, without limitation, by having the user start the check-in process through an app and/or website and/or by having the device automatically begin the check-in process as the device is determined to be in proximity to the desired business.
- the proximity of the mobile device to the business can be determined in any suitable manner, including, but not limited to, the use of GPS location; the use of multi-lateration of radio signals between radio towers and/or transmitters (e.g., cell tower triangulation) for applicable mobile devices; Bluetooth positioning techniques, WiFi positioning techniques, and/or any suitable technique that is capable of substantially determining the proximity of a user's mobile device to a specific business location.
- the methods and process of the present invention may be particularly useful in the area checking users into a restaurant, those skilled in the art can appreciate that the described methods and processes can be used in a variety of different applications and in a variety of different areas to help users check-in to an establishment, location, service provider, store, and/or other business.
- the described systems and methods can be used to check one or more users into a hotel, motel, automotive repair shop, medical office, dental office, legal office, movie theater, store, amusement park, amusement park ride, registration process, audition, and/or any other suitable business and/or check- in process.
- Figure 1 shows a representative embodiment of a computer system for use with some embodiments of the invention
- Figure 2 shows a representative embodiment of a networked computer system for use with some embodiments of the invention
- Figure 3 shows a representative embodiment of a browser window for use in accessing the Internet
- Figure 4 shows a representative embodiment of a system for providing check-in services to a user of a mobile device
- Figure 5 shows a representative flow chart, illustrating steps of a check- in method in accordance with some embodiments of the invention.
- a method for providing check-in services may be provided to a system having a mobile device and a check-in enabled network. Some embodiments of the method include locating a check- in enabled network when the mobile computer device is within sufficient physical proximity to the check-in enabled network, accessing the check- in enabled network, and providing check-in information to the check-in enabled network to check in a user of the mobile computer device to an entity providing the check-in enabled network.
- the method also includes determining whether any additional actions are available to the mobile device from the check-in enabled network, when an additional action is available, presenting the additional action to the user via the mobile device, and receiving input from the user causing the mobile device to take the additional action.
- the additional action may be one or more actions selected from the following: providing a payment to an entity operating the check-in enabled network; providing additional information about the user to the check-in enabled network; providing purchase information to the check-in enabled network; using the mobile computer device to fill out paperwork necessary for the user to complete check-in at a business operating the check-in enabled network; providing customer loyalty information to the check-in enabled network from the mobile computer device; providing coupons to or from the mobile computer device; guiding or directing the user within a store, location, and/or other business operating the check-in enabled network; tracking the user within a store operating the check-in enabled network; completing a check-out transaction associated with a purchase of goods within a store operating the check-in enabled network; directing the user to a parking location for an order pick-up; obtaining a list of special requests (e.g., a high- chair, seating preferences, and/or any other requests) and/or accommodations (e.g., wheelchair accessibility, allergy notifications, and/or any other accommodations) for the user; tracking
- payment is optionally provided to a business while protecting the user's personal information.
- the user's personal information can be protected in any suitable manner
- the user's personal information is protected by storing the user's payment information at a third-party repository, so that the actual transfer of funds occurs between the repository and the business.
- the repository may obtain authorization for the transfer of funds in any suitable manner, including, without limitation, from the user via the check-in enabled network and the mobile computer device.
- the repository obtains authorization for the transfer of funds from the user via a third-party network and the mobile computer device.
- a method for providing check-in services includes using the wireless network device to provide check-in enabled network, detecting when the mobile computer device attempts to access the check-in enabled network, establishing a connection between the mobile computer device and the check-in enabled network, and receiving check-in information to the check-in enabled network to check in a user of the mobile computer device to an entity providing the check-in enabled network.
- the method also optionally includes determining whether any additional actions are available to provide to the mobile device via the check-in enabled network, when an additional action is available, presenting the additional action to the user via the mobile device, and receiving input from the mobile device to take the additional action.
- the additional actions may include those discussed above.
- the user's personal information may be protected as discussed above as well.
- FIG. 1 and the corresponding discussion are intended to provide a general description of a suitable operating environment in which embodiments of the invention may be implemented.
- One skilled in the art will appreciate that embodiments of the invention may be practiced by one or more computing devices and in a variety of system configurations, including in a networked configuration.
- embodiments of the present invention include utilization of the methods and processes in a variety of environments, including, without limitation, embedded systems with general purpose processing units, digital/media signal processors (“DSP/MSP”), application specific integrated circuits (“ASIC”), standalone electronic devices, and other such electronic environments.
- DSP/MSP digital/media signal processors
- ASIC application specific integrated circuits
- Embodiments of the present invention embrace one or more computer-readable media, wherein each medium may be configured to include or includes thereon data or computer executable instructions for manipulating data.
- the computer executable instructions include data structures, objects, programs, routines, or other program modules that may be accessed by a processing system, such as one associated with a general-purpose computer capable of performing various different functions or one associated with a special-purpose computer capable of performing a limited number of functions.
- Computer executable instructions cause the processing system to perform a particular function or group of functions and are examples of program code means for implementing steps for methods disclosed herein.
- a particular sequence of the executable instructions provides an example of corresponding acts that may be used to implement such steps.
- RAM random- access memory
- ROM read-only memory
- PROM programmable read-only memory
- EPROM erasable programmable read-only memory
- EEPROM electrically erasable programmable read-only memory
- CD-ROM compact disk read-only memory
- a representative system for implementing embodiments of the invention includes computer device 10, which may be a general-purpose or special-purpose computer or any of a variety of consumer electronic devices.
- computer device 10 may be a personal computer, a notebook or laptop computer, a netbook, a personal digital assistant ("PDA") or other hand-held device, a smart phone, a tablet computer, a workstation, a minicomputer, a mainframe, a supercomputer, a multi -processor system, a network computer, a processor-based consumer electronic device, a computer device integrated into another device or vehicle, or the like.
- PDA personal digital assistant
- Computer device 10 includes system bus 12, which may be configured to connect various components thereof and enables data to be exchanged between two or more components.
- System bus 12 may include one of a variety of bus structures including a memory bus or memory controller, a peripheral bus, or a local bus that uses any of a variety of bus architectures.
- Typical components connected by system bus 12 include processing system 14 and memory 16.
- Other components may include one or more mass storage device interfaces 18, input interfaces 20, output interfaces 22, and/or network interfaces 24, each of which will be discussed below.
- Processing system 14 includes one or more processors, such as a central processor and optionally one or more other processors designed to perform a particular function or task. It is typically processing system 14 that executes the instructions provided on computer-readable media, such as on memory 16, a magnetic hard disk, a removable magnetic disk, a magnetic cassette, an optical disk, or from a communication connection, which may also be viewed as a computer-readable medium.
- processors such as a central processor and optionally one or more other processors designed to perform a particular function or task. It is typically processing system 14 that executes the instructions provided on computer-readable media, such as on memory 16, a magnetic hard disk, a removable magnetic disk, a magnetic cassette, an optical disk, or from a communication connection, which may also be viewed as a computer-readable medium.
- Memory 16 includes one or more computer-readable media that may be configured to include or includes thereon data or instructions for manipulating data, and may be accessed by processing system 14 through system bus 12.
- Memory 16 may include, for example, ROM 28, used to permanently store information, and/or RAM 30, used to temporarily store information.
- ROM 28 may include a basic input/output system ("BIOS") having one or more routines that are used to establish communication, such as during start-up of computer device 10.
- BIOS basic input/output system
- RAM 30 may include one or more program modules, such as one or more operating systems, application programs, and/or program data.
- One or more mass storage device interfaces 18 may be used to connect one or more mass storage devices 26 to system bus 12.
- the mass storage devices 26 may be incorporated into or may be peripheral to computer device 10 and allow computer device 10 to retain large amounts of data.
- one or more of the mass storage devices 26 may be removable from computer device 10. Examples of mass storage devices include hard disk drives, magnetic disk drives, tape drives and optical disk drives.
- a mass storage device 26 may read from and/or write to a magnetic hard disk, a removable magnetic disk, a magnetic cassette, an optical disk, or another computer-readable medium.
- Mass storage devices 26 and their corresponding computer- readable media provide nonvolatile storage of data and/or executable instructions that may include one or more program modules such as an operating system, one or more application programs, other program modules, or program data. Such executable instructions are examples of program code means for implementing steps for methods disclosed herein.
- One or more input interfaces 20 may be employed to enable a user to enter data and/or instructions to computer device 10 through one or more corresponding input devices 32.
- input devices include a keyboard and alternate input devices, such as a mouse, trackball, light pen, stylus, or other pointing device, a microphone, a joystick, a game pad, a satellite dish, a scanner, a camcorder, a digital camera, and the like.
- examples of input interfaces 20 that may be used to connect the input devices 32 to the system bus 12 include a serial port, a parallel port, a game port, a universal serial bus (“USB”), an integrated circuit, a firewire (“IEEE 1394"), or another interface.
- input interface 20 includes an ASIC that is designed for a particular application. In a further embodiment, the ASIC is embedded and connects existing circuit building blocks.
- One or more output interfaces 22 may be employed to connect one or more corresponding output devices 34 to system bus 12. Examples of output devices include a monitor or display screen, a speaker, a printer, a multi-functional peripheral, and the like. A particular output device 34 may be integrated with or peripheral to computer device 10. Examples of output interfaces include a video adapter, an audio adapter, a parallel port, and the like.
- One or more network interfaces 24 enable computer device 10 to exchange information with one or more other local or remote computer devices, illustrated as computer devices 36, via a network 38 that may include hardwired and/or wireless links.
- network interfaces include a network adapter for connection to a local area network ("LAN") or a modem, wireless link, or other adapter for connection to a wide area network (“WAN”), such as the Internet.
- the network interface 24 may be incorporated with or peripheral to computer device 10.
- accessible program modules or portions thereof may be stored in a remote memory storage device.
- computer device 10 may participate in a distributed computing environment, where functions or tasks are performed by a plurality of networked computer devices.
- Figure 2 provides a representative networked system configuration that may be used in association with embodiments of the present invention.
- the representative system of Figure 2 includes a computer device, illustrated as client 40, which is connected to one or more other computer devices (illustrated as client 42 and client 44) and one or more peripheral devices 46 across network 38.
- Figure 2 illustrates an embodiment that includes a client 40, two additional clients, client 42 and client 44, one peripheral device 46, and optionally a server 48, which may be a print server, connected to network 38
- alternative embodiments include more or fewer clients, more than one peripheral device, no peripheral devices, no server 48, and/or more than one server 48 connected to network 38.
- Other embodiments of the present invention include local, networked, or peer-to-peer environments where one or more computer devices may be connected to one or more local or remote peripheral devices.
- embodiments in accordance with the present invention also embrace a single electronic consumer device, wireless networked environments, and/or wide area networked environments, such as the Internet.
- the client 40 may be a computer device having a limited set of hardware and/or software resources. Because the client 40 is connected to the network 38, it may be able to access hardware and/or software resources provided across the network 38 by other computer devices and resources, such as client 42, client 44, server 48, or any other resources. The client 40 may access these resources through an access program, such as a web browser, and the results of any computer functions or resources may be delivered through the access program to the user of the client 40.
- an access program such as a web browser
- the client 40 may be any type of computer device or electronic device discussed above or known to the world of cloud computing, including traditional desktop and laptop computers, smart phones and other smart devices, tablet computers, or any other device able to provide access to remote computing resources through an access program such as a browser.
- FIG. 1 shows a representative embodiment of a browser window 50 similar to what might be displayed on a user's computer device. It will be appreciated that many of the features described below with respect to the illustrated browser window 50 are optional or are optionally displayed or hidden as desired by the user, but each feature is typical or illustrative of features common to many browser programs.
- the browser window 50 of Figure 3 includes a title bar 52.
- the title bar 52 often is used to display a page name of whatever page is actively being viewed. Most commonly, the page name that is displayed is selected by the administrator of the website being viewed, and the page name often includes one or more phrases associated with the administrator of the website and/or the page being viewed.
- the browser window 50 also includes a menu bar 54 that includes items that may be selected to provide access to various menu functions, as is well known in the art.
- the menu functions provided in the menu bar 54 vary according to the specific browser program, among other considerations, and access to menu functions may be provided other than by a menu bar similar to menu bar 54.
- the browser window 50 of Figure 3 also includes (in accordance with some embodiments) an address bar 56, which in the browser window 50 shown in Figure 3 includes several browser controls 58 and an address entry area 60.
- the browser controls 58 and the address entry area 60 facilitate browsing using the window, permitting the user, for example, to go back one or more pages, to go forward one or more pages, to refresh a page, and/or to type in a destination site's address to directly access a page.
- Such browser features are well known in the art and need not be further discussed.
- the browser window 50 also includes a bookmark bar 62 that a user can populate with bookmarks to commonly-accessed web pages, such that the user can quickly re-access the page(s) by clicking on the relevant bookmark button.
- a bookmark bar 62 that a user can populate with bookmarks to commonly-accessed web pages, such that the user can quickly re-access the page(s) by clicking on the relevant bookmark button.
- each tab 64 provides access to one open website.
- the tabs 64 facilitate navigation between different open websites.
- the contents of each open and actively- viewed website may be displayed in a content area 66. Thus, the content displayed in the content area 66 may vary depending on which tab 64 is selected, and which website is being viewed.
- the browser window 50 optionally includes features to facilitate navigating within a website, as is known in the art.
- the browser window optionally includes one or more scroll bars 68. When a portion of the website being viewed lies outside of the viewable portion of the content area 66, the user may use the scroll bars 68 to access non-visible portions, as is known in the art.
- Browser extensions are becoming more and more common in today's browser programs, and have become one of the means, if not the standard, for extending the functionality of the browser programs. For browsers that do not currently support browser extensions, other mechanisms and installed programs are often available to provide similar functionality. Some embodiments of the invention utilize a browser extension or similar format to provide functions in accordance with embodiments of the invention. The use and installation of a browser extension is typically significantly less involved and less computer-intensive than the use and installation of a stand-alone program.
- FIG. 4 illustrates the major components of an illustrative configuration of devices and participants in accordance with features of embodiments of the invention.
- Users of the instant check-in system access the system through their mobile devices, illustrated in Figure 4 as mobile devices 70.
- the mobile devices 70 may be any type of mobile device (e.g., smart phone, cellphone, PDA, tablet, laptop, feature phone, handheld computing device, and/or other mobile device) currently available, whether or not specifically discussed herein, or any type of mobile device that later becomes available. It has become common for functionality to be provided to devices such as mobile devices 70 using apps, and embodiments of the invention embrace the use of apps to provide the functionality discussed herein.
- the mobile devices 70 are at least intermittently communicatively connected to one or more other devices.
- the mobile devices 70 may be communicatively connected to the network 38 (e.g., the Internet) through a typically wireless wide-area connection, such as a cell site 72 provided and operated by a mobile provider 74 or an entity affiliated with the mobile provider 74.
- a typically wireless wide-area connection such as a cell site 72 provided and operated by a mobile provider 74 or an entity affiliated with the mobile provider 74.
- many mobile devices are purchased under contract from mobile providers, and are used for telephone calls and to transmit data to and from the network 38, allowing users to have access and connectivity wherever the wide-area connection is available.
- At least some features of embodiments of the invention may be provided using a connection between the mobile devices 70 and the network 38 provided by third parties such as the mobile provider 74.
- the users' mobile devices when users of mobile devices 70 are in sufficient physical proximity to a business 76 (or to a wireless network maintained by or provided for the business 76), the users' mobile devices are configured to access a typically wireless local-area connection provided by a wireless access device 78 of the business 76.
- the wireless access device 78 may be any desired type of access device (e.g., wireless access point, wireless router, etc.) and may use any desired communications mechanism and protocol (e.g., Bluetooth, IEEE 802.11 , etc.), including mechanisms and protocols now utilized or created in the future.
- the user may utilize (directly or indirectly) the mobile device 70 to access check-in features provided by the business using, for example a check-in app on the mobile device 70. While the remaining examples discussed herein will utilize a check-in app on the mobile device to provide the features discussed herein, it should be remembered that embodiments of the invention embrace the provision of such features, for example, through a web portal accessed by a browser of the mobile device, through a browser extension, and/or using any other desirable mechanism.
- Figure 5 illustrates an exemplary process by which the check-in app on the mobile device
- execution begins at step 80, where the user accesses the mobile device 70 and opens or accesses the check- in app.
- execution then proceeds to decision block 82, where the check- in app utilizes communication capabilities of the mobile device (e.g., telephony, wireless (802.11), Bluetooth, and/or any other suitable method) to determine whether any check-in enabled networks are available. If no check-in enabled networks are available, execution loops at this point until a check-in enabled network becomes available, or execution ends (e.g., the user ends the check-in app.
- communication capabilities of the mobile device e.g., telephony, wireless (802.11), Bluetooth, and/or any other suitable method
- the business 76 providing the local area network provides a local-area network that is check-in enabled.
- the local-area network is check-in enabled, it is distinguished in some fashion from standard local-area networks.
- the network may provide additional security features, may use additional or different communications protocols, and may identify itself to accessing devices (such as mobile device 70) and programs (such as the check-in app on the mobile device 70) differently from standard networks. This allows the user's check-in app to recognize check-in enabled networks for possible connection and check-in.
- decision block 84 where a determination is made as to whether to check in to the network.
- the system optionally uses information of the user stored by the user's mobile device 70 (e.g., in the check-in application) or provided by the user at the time of check- in to communicate with the network and check in.
- step 86 where the mobile device 70 accesses the network
- step 88 where the mobile device 70 provides check-in information.
- the information may be provided using encryption or other secure technology, as is known in the art.
- checking in notifies the business 76 that the user of the mobile device 70 is at the business 76 and allows the business 76 and the user to act accordingly, such as by placing the user in a queue to be seen, or to take any other action as will be discussed further below.
- the mobile device 70 may then manually or automatically refresh available check-in enabled networks from time to time until a desired check-in-enabled network is available (e.g., in sufficient physical proximity and located by the user's mobile device 70).
- the user's check- in information may be manually entered by the user at the time of check in, or the check-in information may have been previously entered in by the user (or another, including, without limitation, the user's legal guardian) and may be automatically transmitted by the user's mobile device 70 (e.g., by the check-in application) through the check- in-enabled network.
- the information conveyed by the mobile device 70 may include a unique check-in ID of the user (and/or a unique transaction ID (as discussed below) for one or more transactions carried out by the user) and, in some embodiments, the information conveyed by the mobile device is optionally limited to the unique check-in ID of the user (and/or transaction ID) so as to prevent others from intercepting personal data of the user over the wireless link (and/or any other suitable network connection).
- the user could previously have set up his or her information with a central repository of information maintained by (or otherwise associated with) the check-in provider.
- Such information could include, but is not limited to, identifying information such as name, address, telephone, email, and any other contact information, medical information (such as prescriptions, medical records, health provider contact information, medical history, and any other medical information), payment information such as credit card information, debit card information, bank account information, PayPal or other electronic payment account information, any other type of payment information, and/or any other type of information relevant to the user, the business 76, or any transactions to occur between the user and the business 76.
- medical information such as prescriptions, medical records, health provider contact information, medical history, and any other medical information
- payment information such as credit card information, debit card information, bank account information, PayPal or other electronic payment account information, any other type of payment information, and/or any other type of information relevant to the user, the business 76, or any transactions to occur between the user and the business 76.
- the business 76 securely contacts the central repository and is able to retrieve the user's previously stored information using the user's unique check- in ID (and/or the transaction ID).
- the business 76 requests certain information from the central repository. Then, the central repository determines that access to the requested information requires authorization of the user. While this determination can occur in any suitable manner, in some embodiments, the determination occurs based on the nature of the information (e.g., medical information or records might always be subject to authorization requirements, while address information might not), and/or based on preferences previously identified by the user, such as on providing the information to the central repository. In some embodiments, once the central repository has identified a need for authorization, the central repository (or the entity providing the central repository) contacts the user to request the authorization. The central repository can contact the user using the local network (and/or any other suitable communication channel) and the check- in application on the user's mobile device 70.
- the central repository can contact the user using the local network (and/or any other suitable communication channel) and the check- in application on the user's mobile device 70.
- the central repository uses a mechanism to request authorization that is independent of the local network (and/or other network provided for or by the business 76 to ensure that the business 76 cannot falsely represent that authorization has been received.
- the central repository requests the authorization through the check-in application, but using a connection between the mobile device 70 and the Internet (e.g., using a connection provided by the mobile provider 74).
- the central repository requests authorization by email, text message, and/or in any other suitable manner.
- the user is provided additional control over the release of information to the business 76.
- the business 76 notifies the user at the time of check in the information that the business 76 wishes to obtain, and the user authorizes the business 76 to retrieve, the information either by providing the user's unique check-in ID (and/or a specific transaction ID) and/or by responding to an authorization dialog provided by the check- in application for transmission of an authorization to the business 76 with the user's check-in ID.
- the business 76 identifies information that it wishes to receive about the user after the user has checked in and requests an authorization from the user over the local network (and/or another suitable communication channel). In these two examples, the business 76 delivers the authorization with the request for information to the central repository.
- the user optionally selectively authorizes release of less than all the information requested by the business 76.
- the business 76 might request home and cell telephone numbers, address, and birthdate.
- the user might believe that the needs of the business 76 justify releasing all the information requested except for birthdate, and could authorize release of all information except for birthdate.
- Limited releases of less than all requested information may occur automatically (e.g., the release is automatically controlled by rules previously established by the user), semi-automatically (e.g., the user authorizes release of information but only information allowed by previously established rules), and/or under the direct control of the user at the time of the request (e.g., the user authorizes each release of information).
- the check-in process is not limited to notifying the business 76 that the user has arrived, but additional actions may also be provided to the user and business 76.
- additional information about the user is only one example of an additional action that may occur upon or after check in. Therefore, returning to Figure 5, execution proceeds to decision block 90, where a determination is made as to whether there are any additional actions that are available to the user of the mobile device 70 or to the business 76. If additional actions are found, execution proceeds to decision block 92, where a determination is made as to whether to take any available additional actions. If so, execution proceeds to step 94, where any steps necessary for taking the additional action are performed. Examples of additional actions may vary depending on the situation and needs of the user and/or business 76.
- the user 76 may wish to provide the user with an opportunity to fill out any necessary check-in forms using the mobile device 70 (and/or otherwise), thereby reducing the workload on a receptionist.
- the user benefits by having to not wait in line to check in and fill out the check-in forms.
- the user accesses his or her mobile device 70 and opens or otherwise accesses the check-in app.
- the app looks for available networks with the check- in feature enabled and displays the available networks. The user selects the network, and the check- in app notifies the business of the user's arrival. Additional information may be obtained as discussed previously.
- the business 76 has software that is notified of the user's arrival and is able to look up the user in the appointment schedule and notifies the office assistant, attendant, and or other personnel of (and/or otherwise prepares for) the user's arrival.
- the business software may also have the option of pushing forward any forms that the patron must complete.
- the user then completes the paperwork on his or her mobile device 70 and signs the documents electronically.
- the completed and signed documents are then returned to the business 76, and the business software is updated and the appointment is moved forward in the workflow process, all without any time- consuming interaction between the user and the office assistant/attendant and without any waiting in line by the user.
- further additional actions are optionally made available.
- the user arriving at a medical appointment often is required to provide medical insurance information and/or make a copay at the time of service.
- the user's insurance information may be stored by the central repository as discussed above, and may be provided to the business 76 upon request and/or authorization of the user using the check-in app.
- the check- in app also allows the user to make payments such as the copay. The payments may be made without releasing any confidential payment information of the user.
- the user may store payment data with the provider of the check-in app
- the business 76 when the user is connected to the check-in enabled network, the business 76 requests payment for services provided or to be provided. In some such embodiments, the user then uses his or her check-in app to view the request for payment, to select a source of payment from available sources, and to authorize payment. When payment is authorized and made, the check- in app need not send the user's confidential payment data to the business 76. Instead, a one-time authorization is transmitted to the business 76, which uses the authorization to receive payment from the check-in app provider. Thus, the check-in app and the associated features provide an additional layer of security for the user's private information.
- FIG. 1 Other examples may occur in a retail setting (and/or any other suitable location).
- the user arrives at the business 76, such as at a grocery or department store. Again, when the user arrives at the store, the user is either aware that the business 76 provides the check-in feature or becomes aware such as through signage posted at the store.
- the user then accesses his or her mobile device 70 and opens or otherwise accesses the check-in app.
- the app looks for available networks with the check- in feature enabled and displays the available networks. The user selects the network, and the check- in app notifies the business of the user's arrival. Additional information may be obtained as discussed previously, including, in this example, customer loyalty information, coupons previously saved by the user, user preferences, special requests, and/or any other suitable information.
- the business 76 may also immediately provide any available specials, such as weekly or daily specials, to the user through the check-in app. Additionally, the user may be provided with an opportunity to search for items sold by the store, such as to look up "children's bikes” or any other suitable searches relevant to the offerings of the business 76.
- the store may use multiple networking units provided throughout the store (and/or other location) to assess the relative signal strengths between the units and the user's mobile device 70 to triangulate the user's location within the store and to provide directions to the user through the mobile device 70 and check-in app to guide the user to a desired location.
- the retailer rings up all the items and creates a total.
- the purchaser reviews the total and selects to pay the total through the check-in application.
- the user utilizes the check-in application to apply any coupon savings stored by the user and/or available through the check-in system.
- the total can be transmitted to the mobile device 70 and check-in application directly, by a scan operation conducted by the mobile device, by entering in a code provided by the retailer at the point of check out, by triangulation of the user's location, by geolocation techniques, and/or by any other relevant means.
- payment may be processed as discussed above, with the user selecting a payment source and making payment without the retailer ever knowing or obtaining the user's payment information.
- the retailer updates the user's loyalty account information, and the update is linked to the check-in account information.
- Check-in features and benefits as discussed herein may be provided to businesses 76 such as medical offices, retailers, food providers, hotels, motels, service providers, spas, repair shops, laundromats, and the like at little to no cost, but additional revenues may also be achieved.
- businesses 76 such as medical offices, retailers, food providers, hotels, motels, service providers, spas, repair shops, laundromats, and the like at little to no cost, but additional revenues may also be achieved.
- businesses 76 signs up for the check-in system, it provides its exact physical address to the check-in provider.
- the check-in provider then is able to use the address information to provide additional features to the user.
- the user of the mobile device 70 may access the check-in application to conduct a search for businesses 76 providing the check-in features.
- the user may be provided with a map of the city or other location in which the user is currently located or travelling, or a map of any desired location (e.g., for future planning). Locations of businesses 76 providing check-in features as discussed herein may be marked on the map with relevant information, such as the type of business, etc. In some instances, the user is provided with an opportunity to make a reservation or appointment, and the user is then able to check in upon arrival as discussed above.
- the business 76 is optionally provided with an opportunity to purchase search terms and/or advertising for the check-in system. Then, in some embodiments, when a user operates the check-in app and the business 76 has purchased advertising, the user is shown advertising (e.g., advertising purchased by the business 76 and/or otherwise provided). Alternatively, when the user conducts a keyword search using the check- in app and the business 76 has purchased relevant keywords, the business 76 may be featured in the search results.
- the user uses the check- in app to place an order prior to arrival.
- the user may use the map, advertising, or some other search feature to locate a desired business 76, such as a fast food restaurant.
- the check-in app upon selection of the business 76, the check-in app obtains a menu or other ordering information for the business and provides the information to the user, who uses the check-in app to place an order.
- the user even uses the check-in app to pay for the order, in a fashion similar to that discussed above, with no personal information of the user sent to the business 76. All this may occur before the user is connected to the business's local network.
- the check-in app and mobile device 70 communicate by other means, such as using the cell site 72 and Internet connectivity provided by the mobile provider 74 or using another connection (e.g., Bluetooth, WiFi, etc.) to the Internet available to the mobile device 70.
- Various options may be used to timely provide the user with his or her order (and/or other goods, services, accommodations, etc.) upon arriving at the business 76.
- the user he or she checks in to the business using the check-in app in a manner similar to that discussed above.
- the business 76 may utilize the check- in app to direct the user to a proper parking space (e.g., for pickup of the user's order), or the user could pass through a drive-up window as normal, and know that the order will be prepared shortly after check-in.
- the check-in app is used to query the user whether the system is authorized to use tracking features of the user's mobile device (e.g., GPS, cell tower triangulation, and the like) to track the user's location and provide the location to the business 76.
- tracking features of the user's mobile device e.g., GPS, cell tower triangulation, and the like
- the user's location information can be provided to the business 76 so the business 76 can know where the user is and when to prepare the user' s order so that it will be ready immediately upon the user' s arrival.
- a sit-down restaurant could use location information to determine that the user will not arrive by his or her scheduled appointment time and could rearrange the queue to serve other patrons while still keeping an appointment for the user available for the user's arrival.
- the check- in app becomes interactive in one or more of a variety of fashions.
- the app may allow the user to identify how many people are in the user' s party and whether or not all members of the party are present or not. If not all members of the party are present, the app might allow the user to update an arrival status as members of the party arrive so that the restaurant knows when to seat the party. Meanwhile, the user may be put in the restaurant's queue.
- the restaurant could notify the user of his or her wait time (and changes to the wait time as time passes), and could even use notification features of the mobile device (ringtone, vibration, spoken announcement, etc.) to notify the user when the restaurant is ready to seat the user's party.
- notification features of the mobile device ringtone, vibration, spoken announcement, etc.
- notifications to the user may occur whether or not the user is within range of the business 's local check- in-enabled network. Such notifications may occur with or without disclosure of information about the user to the business 76.
- the business 76 could notify the provider of the check-in service/app of the relevant information (updated wait time, ready to seat party, etc.) and the provider of the check- in service or app could then either contact the user by text message, automated telephone call, through the check-in app, and/or in any other suitable manner capable of passing the relevant information.
- the business 76 optionally has the check-in app request additional information from the user (e.g., the user's phone number associated with the mobile device) and then uses that information to contact the user (e.g., by text message, automated telephone call, live telephone call by personnel of the business 76, and/or in any other suitable manner).
- additional information e.g., the user's phone number associated with the mobile device
- uses that information e.g., by text message, automated telephone call, live telephone call by personnel of the business 76, and/or in any other suitable manner.
- information of the user that is provided to the business 76 may be provided in such a way as to limit an amount of time that the information may be electronically stored by the business 76.
- the user's information may expire after passage of a certain amount of time when the business 76 presumably no longer needs access to the information.
- the unique user check- in ID (and/or unique transaction ID (as discussed below)) provided by the check-in app may be protected with additional protections to prevent others from attempting to use the user's check- in ID (and/or transaction ID).
- each user has a single unique check-in ID for all purposes.
- the check-in app in an enhanced-security embodiment, generates a new unique check-in ID (and/or transaction ID) at each check in, so that if the check- in ID (and/or transaction ID) were intercepted by another party or if the business 76 (or a dishonest employee of the business 76) were to attempt to use the check-in ID (and/or transaction ID) elsewhere, it would not function properly.
- the described systems create a unique transaction ID (as mentioned above) that is associated with one (or in some cases, more than one) transaction between a user and a particular business.
- the transaction ID is attached to (and/or otherwise associated with) the user's check-in ID as well as a check- in ID of the business.
- most (if not all) actions e.g., provision of insurance information, payments, completed forms, check-in procedures, and/or other additional actions reference the corresponding transaction ID.
- the described systems use the transaction ID to ensure that additional actions (as discussed below) can only be accomplished when a transaction with a corresponding transaction ID is open or pending.
- additional actions e.g., is closed by a client, times out, expires, is completed, the use checks out of or otherwise leaves a business, and/or the transaction otherwise terminates
- no additional actions can be performed under that ID, unless the user previously authorized such actions.
- a transaction begins and a transaction ID is assigned to that particular transaction.
- a transaction ID is assigned to that particular transaction.
- the patient completes necessary forms, authorizes the payment of a single copay, authorizes the office to bill a third-party insurance, allows the office to share pertinent patient information with the insurance company, allows the office to upload medical information (e.g., lab reports, a diagnosis, etc.) to the patient's personal health databases, allows the office to further access the patient's personal health information for a period not to exceed sixty days from the patient's visit to the office etc.
- the transaction ID is associated with each such action.
- the described system would deny payment to any other business that was not authorized by the patient and would further deny other payments to the doctor's office under the transaction ID, unless additional authorization were given. Moreover, in this example, the described systems would further prevent the doctor's office from viewing the patient's personal health information after the authorized sixty day period.
- the transaction ID (as well as user and/or business check-in IDs) can be setup at any suitable time and in any suitable manner
- the transaction ID is created as part of the check-in process for a particular visit to a business, before the actual check-in process occurs (e.g., when an appointment is made), and/or at any other suitable time.
- the transaction ID is created when an appointment is made and the transaction is kept in a pending state, an inactive state, and/or another suitable state ("pending") until further acted upon by the user (e.g., when the check-in process actually occurs).
- the described systems when the user checks in to a business, the described systems would check the pending transaction (e.g., for specific authorizations, information, etc. provided by the user) during check in to provide the user with one or more check-in options (e.g., discounts, coupons, perks, services, goods, etc.).
- pending transaction e.g., with a corresponding transaction ID
- such transactions can terminate in any suitable manner. Indeed, in some embodiments, such transactions terminate by self-expiring after a certain date, closing after a certain period of time has passed, closing after a certain time period of user inactivity, etc. In this manner, the transaction ID can further prevent unauthorized actions from taking place.
- each use of the check-in system may be tracked and stored at the central repository.
- each use of a check-in ID associated with the user might generate an email, text message, and/or other log message to the user, either at the time of use or in summary fashion from time to time, as in a statement or periodic communication.
- the system flags suspicious activity.
- any further attempts to check in are disabled until a verification procedure ensures that the user has control over his mobile device 70 and his or her check-in information.
- Additional security may be provided at the mobile device 70 by the check-in app, in fashions known in the art.
- the check-in app may be used to make payment
- the check-in app will require a password and/or other authentication step to access the check-in app and/or the payment function of the check-in app.
- an authentication step includes a biometric authentication, such as a face-match authentication, a fingerprint authentication, and/or the like, a password or other entry authentication, a challenge/answer authentication and/or any type of authentication known in the art.
- mobile device security ensures that the mobile device 70 cannot be stolen and the check-in app fraudulently used.
- the described systems and methods can be modified in any suitable manner. Indeed, in some implementations, instead of requiring a user's mobile device to check into a business' check-in enabled network before the user is checked into the business, the user's mobile device (e.g., smartphone, tablet, handheld computer, cellphone, function phone, and/or any other suitable known or novel mobile device) is configured (e.g., via an app installed on the device and/or a webpage accessible through the device) to use the device's own communication methods (e.g., its telephone services, WiFi, Bluetooth, etc.) to check into the business.
- the user's mobile device e.g., smartphone, tablet, handheld computer, cellphone, function phone, and/or any other suitable known or novel mobile device
- the device's own communication methods e.g., its telephone services, WiFi, Bluetooth, etc.
- Such a check in process can be initiated in any suitable manner, including, without limitation, by having the user start the check-in process through an app and/or website, by having the device prompt the user to check-in to the business (e.g., via the app and/or a webpage) when the device comes in proximity to the business, and/or by having the device automatically begin the check-in process as the device is determined to be in proximity to the desired business.
- the proximity of the mobile device to the business can be determined in any suitable manner, including, but not limited to, the use of GPS location coordinates; the use of multi-lateration of radio signals between radio towers and/or transmitters (e.g., cell tower triangulation) for applicable mobile devices; a Bluetooth positioning technique, a WiFi positioning technique, and/or any suitable technique that is capable of substantially determining the proximity of a user's mobile device to a specific business location.
- the check-in service may be provided at any location or business where the service may be desirable.
- the check-in service could be provided at businesses providing a variety of services, such as car repair/service businesses, salons (hair, nail, etc.), take-out and sit-down restaurants, golf courses, bowling alleys, other appointment-based sports businesses, medical offices, law offices, dentists, any other business providing treatments and/or services, government offices, any other offices having a waiting line or list, parking services, and the like.
- the systems and methods may be varied as necessary to provide desirable features.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Tourism & Hospitality (AREA)
- Signal Processing (AREA)
- Marketing (AREA)
- Theoretical Computer Science (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Economics (AREA)
- Human Resources & Organizations (AREA)
- Accounting & Taxation (AREA)
- Development Economics (AREA)
- Finance (AREA)
- Primary Health Care (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Mobile Radio Communication Systems (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201361922625P | 2013-12-31 | 2013-12-31 | |
PCT/US2014/072464 WO2015103091A1 (en) | 2013-12-31 | 2014-12-28 | Check-in systems and methods |
Publications (2)
Publication Number | Publication Date |
---|---|
EP3090402A1 true EP3090402A1 (en) | 2016-11-09 |
EP3090402A4 EP3090402A4 (en) | 2017-09-13 |
Family
ID=53493939
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP14876003.6A Ceased EP3090402A4 (en) | 2013-12-31 | 2014-12-28 | Check-in systems and methods |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP3090402A4 (en) |
CN (2) | CN113378028A (en) |
WO (1) | WO2015103091A1 (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11113634B2 (en) | 2013-12-31 | 2021-09-07 | Dennis Stong | Check-in systems and methods |
CN108428275A (en) * | 2018-01-03 | 2018-08-21 | 平安科技(深圳)有限公司 | Row number method, server and storage medium based on recognition of face |
Family Cites Families (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH09330372A (en) * | 1996-06-07 | 1997-12-22 | Nec Corp | Gathering and recording process system for medical consultation information for every patient |
EP1150227A1 (en) * | 2000-04-28 | 2001-10-31 | Lucent Technologies Inc. | Anonymous and secure electronic commerce |
US20030149576A1 (en) * | 2001-04-19 | 2003-08-07 | Sunyich Steven L. | Personalized smart room |
GB0129767D0 (en) * | 2001-12-12 | 2002-01-30 | Euro Celtique Sa | Medical after sales support |
US10535049B2 (en) * | 2003-03-21 | 2020-01-14 | Paypal, Inc. | Payment transactions via substantially instant communication system |
WO2006022734A1 (en) * | 2004-08-23 | 2006-03-02 | Sherpa Technologies, Llc | Selective displaying of item information in videos |
US20060229998A1 (en) * | 2005-03-31 | 2006-10-12 | Mark Harrison | Payment via financial service provider using network-based device |
US20090292642A1 (en) * | 2005-07-06 | 2009-11-26 | Yanchou Han | Method and system for automatically issuing digital merchant based online payment card |
WO2007050884A2 (en) * | 2005-10-26 | 2007-05-03 | Terry Paul Anderson | Method and system for granting access to personal information |
JP3919803B1 (en) * | 2006-04-17 | 2007-05-30 | 株式会社アドバンテスト | Characteristic acquisition apparatus, method and program |
US8566240B2 (en) * | 2007-01-16 | 2013-10-22 | E2Interactive, Inc. | Systems and methods for the payment of customer bills utilizing payment platform of biller |
CN101639916A (en) * | 2008-07-28 | 2010-02-03 | 北京邮电大学 | Digital media resource registering transaction management system and realizing method thereof |
US20100217623A1 (en) * | 2009-02-26 | 2010-08-26 | Ido Schoenberg | Decision Support |
WO2011085314A1 (en) * | 2010-01-08 | 2011-07-14 | Gallagher Kevin N | Guest check presenter having a wireless communication device |
US20110178863A1 (en) * | 2010-01-19 | 2011-07-21 | Daigle Mark R | Location based consumer interface for retail environment |
US8730004B2 (en) * | 2010-01-29 | 2014-05-20 | Assa Abloy Hospitality, Inc. | Method and system for permitting remote check-in and coordinating access control |
US20110302504A1 (en) * | 2010-06-08 | 2011-12-08 | Santosh Khare | Mobile Application for Proximity Based Awareness System |
US20120209685A1 (en) * | 2011-02-15 | 2012-08-16 | Microsoft Corporation | Check-ins to commercial venues |
US8856956B2 (en) * | 2011-07-08 | 2014-10-07 | Credibility Corp. | Automated entity verification |
US8498900B1 (en) * | 2011-07-25 | 2013-07-30 | Dash Software, LLC | Bar or restaurant check-in and payment systems and methods of their operation |
US20130304578A1 (en) * | 2012-05-08 | 2013-11-14 | 24/7 Customer, Inc. | Method and apparatus for enhanced in-store retail experience using location awareness |
CN102857886B (en) * | 2012-08-24 | 2016-01-20 | 北京华信傲天网络技术有限公司 | Based on information transmission system and the method thereof of focus |
CN103916416B (en) * | 2012-12-31 | 2020-02-28 | Sap欧洲公司 | Remote registration method and system of system |
CN103366274A (en) * | 2013-05-25 | 2013-10-23 | 中山市中商港科技有限公司 | Hybrid e-commerce instant payment method |
-
2014
- 2014-12-28 CN CN202110441234.XA patent/CN113378028A/en active Pending
- 2014-12-28 CN CN201480076181.4A patent/CN106030645B/en active Active
- 2014-12-28 EP EP14876003.6A patent/EP3090402A4/en not_active Ceased
- 2014-12-28 WO PCT/US2014/072464 patent/WO2015103091A1/en active Application Filing
Also Published As
Publication number | Publication date |
---|---|
CN106030645A (en) | 2016-10-12 |
CN106030645B (en) | 2021-05-11 |
WO2015103091A1 (en) | 2015-07-09 |
EP3090402A4 (en) | 2017-09-13 |
CN113378028A (en) | 2021-09-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11810025B2 (en) | Check-in systems and methods | |
US20200387887A1 (en) | Selected place on maps associated uniform resource locator (URL) or selected place associated merchant account based payment transactions, connections, offers, order, deals, reservation and call-to-actions | |
US11580526B2 (en) | Electronic identification and authentication system | |
US9972004B1 (en) | Proximity-based mobile device payments | |
US9160729B2 (en) | Systems and methods for location-based device security | |
US12067108B2 (en) | Multifactor identity authentication via cumulative dynamic contextual identity | |
JP2019204536A (en) | Facilitating sending and receiving payments using message-based contextual prompts | |
US11574309B2 (en) | Digital user identity verification | |
US20150149357A1 (en) | Mobile payment hotspot | |
US20120232965A1 (en) | Interactive valet parking management system | |
US10489746B2 (en) | Cloud based platform for vehicle related services | |
JP7063272B2 (en) | Information processing terminals, information processing devices, information processing methods, information processing systems and programs | |
US10586231B2 (en) | Receipt retrieval based on location | |
JP2015049589A (en) | Information processing system, sale assisting server, seller terminal and purchaser terminal | |
WO2021027146A1 (en) | Payment method and apparatus, calculation device, and storage medium | |
CN106030645B (en) | Registration system and method | |
US20160275493A1 (en) | Secure electronic transaction framework | |
JP7306770B2 (en) | program, information processing method, terminal | |
JP2021190132A (en) | Server, grant application method and program | |
GB2617492A (en) | Secure sharing of credential information | |
US12056631B2 (en) | Systems and methods for digital check in at a store location | |
CN114341918B (en) | Peer-to-peer authentication of unauthorized transactions | |
KR20220056086A (en) | Entrance management and order syster based on beacon |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20160801 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
AX | Request for extension of the european patent |
Extension state: BA ME |
|
DAX | Request for extension of the european patent (deleted) | ||
A4 | Supplementary search report drawn up and despatched |
Effective date: 20170816 |
|
RIC1 | Information provided on ipc code assigned before grant |
Ipc: G06Q 30/00 20120101AFI20170809BHEP Ipc: H04W 4/02 20090101ALI20170809BHEP Ipc: G06Q 50/12 20120101ALI20170809BHEP Ipc: H04W 12/08 20090101ALI20170809BHEP |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
17Q | First examination report despatched |
Effective date: 20201113 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R003 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION HAS BEEN REFUSED |
|
18R | Application refused |
Effective date: 20230114 |