FIELD: physics.
SUBSTANCE: invention relates to payment and/or access control using wireless devices. Communication network provides data exchange between an access point controlling access to a controlled access area; server; intermediate-range range wireless communication transceiver. Transceiver detects the presence of the portable electronic device outside the access point. Server receives a certificate that the user of the portable electronic device is authenticated with respect to the portable electronic device, and initiates payment approval process, which is completed before user attempts to pass through access point. Based at least partially on authentication and successful completion of payment approval process, server provides an access point with an electronic marker, which indicates that a user having a portable electronic device must allow passage through an access point to a controlled access area.
EFFECT: technical result is higher speed of access to payment management system.
19 cl, 12 dwg
Title |
Year |
Author |
Number |
REAL-TIME AUTHORISATION IN ACCESS ENVIRONMENT |
2008 |
- Khammad Ajman
- Dikson Fil
- Ehl'-Avadi Khalid
- Fehjz Patrik
- Karlson Mark
|
RU2502134C2 |
MECHANISM ALLOWING USE OF ONE-TIME CARDS IN SYSTEM INTENDED TO ACCEPT CARDS ACCORDING TO STANDARDS OF INTERNATIONAL PAYMENT INDUSTRY |
2013 |
- Tenner Kolin
- Kouen Majkl Dzh.
- Sinton Dzhejms D.
|
RU2635233C2 |
SYSTEM OF WRITING-OFF AND TRANSFER FOR X-PAY DIGITAL WALLETS |
2018 |
- Liscia, Maurice, David
- Hagmeier, Shawn, Eric
- Lakka, Sowmya, Reddy
- Fourez, Pablo
- Cardone, Gerardo
|
RU2727150C1 |
METHOD FOR REALIZATION OF MULTI-FACTOR STRICT AUTHENTICATION OF BANK CARD HOLDER WITH USAGE OF MOBILE PHONE IN MOBILE COMMUNICATION ENVIRONMENT DURING REALIZATION OF INTER-BANK FINANCIAL TRANSACTIONS IN INTERNATIONAL PAYMENT SYSTEM IN ACCORDANCE TO 3-D SECURE SPECIFICATION PROTOCOL AND THE SYSTEM FOR REALIZATION OF AFOREMENTIONED METHOD |
2005 |
- Labych Andrej Nikolaevich
- Milashevskij Igor' Anatol'Evich
|
RU2301449C2 |
METHOD OF DETECTING UNAUTHORIZED ACCESS TO SOFTWARE AND NOTIFICATION THEREOF |
2015 |
- Aabye, Christian
- Youdale, Robert
- Nosseir, Mohamed
- Singh, Brijendra
- Hillar, Paul
|
RU2705019C2 |
SECURE REMOTE PAYMENT TRANSACTION PROCESSING |
2014 |
- Shits Dzhon
- Vagner Kim
- Obyue Kristian
- Lyu Frederik
- Karpenko Igor
- Pauell Glenn
- Pirzadekh Kiushan
|
RU2674329C2 |
SYSTEMS AND METHODS FOR INTEROPERABLE NETWORK TOKEN PROCESSING |
2014 |
- Dill Mettyu
- Laksminarayanan Prasanna
- Pauell Glenn
- Shits Dzhon
- Karpenter Endryu
|
RU2669081C2 |
CRYPTOGRAPHIC AUTHENTICATION AND TOKENIZED TRANSACTIONS |
2017 |
- Collinge, Mehdi
- Johnson, Alan
|
RU2741321C2 |
REMOTE PAYMENT TRANSACTIONS PROTECTED PROCESSING, INCLUDING AUTHENTICATION OF CONSUMERS |
2014 |
- Makhotin Oleg
- Pirzadekh Kiushan
|
RU2663476C2 |
NETWORK TOKEN SYSTEM |
2014 |
- Pauell Glenn Leon
- Shits Dzhon F.
- Ruterford Bryus
- Uillyamson Gregori
- Anderson Dzhejms
|
RU2691843C2 |