Method and System of Access Management Using a Payment Transaction
20210398123 · 2021-12-23
Inventors
Cpc classification
G07C9/00309
PHYSICS
G06Q20/127
PHYSICS
G06F16/2379
PHYSICS
International classification
G06Q20/40
PHYSICS
G06Q20/10
PHYSICS
Abstract
The present disclosure relates to a method and system of access management using a payment transaction. The computer-implemented method includes receiving a payment transaction request and one or more details associated with a lock. Further, the method includes providing one of a success message or a failure message to an access management system to operate the lock based on a result of authorization of the payment transaction request and a result of a validation of the one or more details.
Claims
1. A computer-implemented method comprising: receiving, with at least one processor, a payment transaction request and one or more details associated with a lock; and providing, with at least one processor, one of a success message or a failure message to an access management system to operate the lock based on a result of authorization of the payment transaction request and a result of a validation of the one or more details.
2. The computer-implemented method of claim 1, wherein the one or more details comprise at least one of the following: an identification value, account information, a transaction amount associated with the lock, or any combination thereof.
3. The computer-implemented method of claim 1, further comprising: providing, with at least one processor, the payment transaction request to an issuer server for authorization; and receiving, with at least one processor, the result of the authorization indicative of a success or a failure from the issuer server.
4. The computer-implemented method of claim 1, wherein the validation of the one or more details comprises: verifying the one or more details comprising an identification value associated with the lock, account information associated with the payment transaction request, and a transaction amount associated with the payment transaction request with registered information stored in a database; and generating the result of the validation indicative of success or failure based on the verification of the one or more details.
5. The computer-implemented method of claim 1, wherein providing the success message comprises sending the success message comprising at least one of sender information, a timestamp, and an identification value to the access management system for unlocking the lock, when the result of authorization and the result of the validation is indicative of success, wherein the lock is unlocked by the access management system after verifying the sender information, the timestamp, and the identification value associated with the success message.
6. The computer-implemented method of claim 1, wherein providing the failure message comprises sending the failure message to the access management system associated with the lock to retain the lock in a locked state, when the result of authorization or the result of the validation is indicative of failure.
7. The computer-implemented method of claim 1, further comprising initiating, with at least one processor, an authorization reversal request after sending the success message to the access management system.
8. The computer-implemented method of claim 1, further comprising receiving, with at least one processor, a notification from the access management system about restoring the lock to a locked state after one of a predefined time period or a user manually locking the lock.
9. The computer-implemented method of claim 1, further comprising receiving, with at least one processor, a registration request for operating the lock, wherein the registration request comprises a predefined identification value, a predefined transaction amount, and predefined account information of one or more users associated with the lock; and storing, in a database, the predefined identification value, the predefined transaction amount, and the predefined account information of one or more users as registered information.
10. A payment server for operating a lock comprising: at least one processor; and a memory communicatively coupled to the at least one processor, wherein the memory stores processor instructions, which, when executed, cause the at least one processor to: receive a payment transaction request and one or more details associated with the lock; and provide one of a success message or a failure message to an access management system to operate the lock based on a result of authorization of the payment transaction request and a result of validation of the one or more details.
11. The payment server of claim 10, wherein the at least one processor is configured to receive the one or more details comprising at least one of the following: an identification value, account information, a transaction amount associated with the lock, or any combination thereof.
12. The payment server of claim 10, wherein the at least one processor is configured to: provide the payment transaction request to an issuer server for authorization; and receive the result of the authorization indicative of a success or a failure from the issuer server.
13. The payment server of claim 10, wherein the at least one processor is configured to validate the one or more details by: verifying the one or more details comprising an identification value associated with the lock, account information associated with the payment transaction request, and a transaction amount associated with the payment transaction request with registered information stored in a database; and generating the result of the validation indicative of success or failure based on the verification of the one or more details.
14. The payment server of claim 10, wherein the at least one processor is configured to provide the success message by sending the success message to the access management system for unlocking the lock, when the result of the authorization and the result of the validation is indicative of success, wherein the lock is unlocked by the access management system after verifying sender information, a timestamp, and an identification value associated with the success message.
15. The payment server of claim 10, wherein the at least one processor is configured to provide the failure message by sending the failure message to the access management system associated with the lock to retain the lock in a locked state, when the result of the authorization or the result of the validation is indicative of failure.
16. The payment server of claim 10, wherein the at least one processor is further configured to initiate an authorization reversal request after sending the success message to the access management system.
17. The payment server of claim 10, wherein the at least one processor is further configured to receive a notification from the access management system about restoring the lock to a locked state after a predefined time period.
18. The payment server of claim 10, wherein the at least one processor is further configured to: receive a registration request for operating the lock, wherein the registration request comprises a predefined identification value, a predefined transaction amount, and predefined account information of one or more users associated with the lock; and store, in a database, the predefined identification value, the predefined transaction amount, and the predefined account information of one or more users as registered information.
19. A computer-implemented method comprising: receiving, with at least one processor, a payment transaction request and one or more details associated with a lock, wherein the payment transaction request is provided to an issuer server for authorization; in response to receiving a result of the authorization, performing, with at least one processor, at least one of the following: sending a failure message to an access management system associated with the lock to retain the lock in a locked state, when the result of the authorization is indicative of failure; validating the one or more details, when the result of the authorization is indicative of success; or any combination thereof; and in response to a result of the validation, performing, with the at least one processor, at least one of the following: sending a success message to the access management system for unlocking the lock, when the result of the validation is indicative of success; sending the failure message to the access management system to retain the lock in the locked state, when the result of validation is indicative of failure; or any combination thereof.
20. The computer-implemented method of claim 19, wherein the validating the one or more details comprises: verifying, with at least one processor, the one or more details comprising an identification value associated with the lock, account information associated with the payment transaction request, and a transaction amount associated with the payment transaction request with registered information stored in a database; and generating, with at least one processor, the result of the validation indicative of success or failure based on the verification of the one or more details.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0053] The novel features and characteristics of the disclosure are set forth in the appended claims. The disclosure itself, however, as well as a preferred mode of use, further objectives and advantages thereof, may best be understood by reference to the following detailed description of non-limiting embodiments or aspects when read in conjunction with the accompanying drawings. The accompanying drawings, which are incorporated in and constitute a part of this disclosure, illustrate exemplary embodiments and, together with the description, serve to explain the disclosed principles. In the figures, the left-most digit(s) of a reference number identifies the figure in which the reference number first appears. One or more embodiments are now described, by way of example only, with reference to the accompanying figures wherein like reference numerals represent like elements and in which:
[0054]
[0055]
[0056]
[0057]
[0058]
[0059]
[0060]
[0061]
[0062]
[0063] It should be appreciated by those skilled in the art that any block diagrams herein represent conceptual views of illustrative systems embodying the principles of the present subject matter. Similarly, it will be appreciated that any flow charts, flow diagrams, state transition diagrams, pseudo code, and/or the like represent various processes which may be substantially represented in computer-readable medium and executed by a computer or processor, whether or not such computer or processor is explicitly shown. While each of the figures illustrates a particular embodiment for purposes of illustrating a clear example, other embodiments may omit, add to, reorder, and/or modify any of the elements shown in the figures.
DETAILED DESCRIPTION
[0064] In the present document, the term “exemplary” is used herein to mean “serving as an example, instance, or illustration.” Any embodiment or implementation of the present subject matter described herein as “exemplary” is not necessarily to be construed as preferred or advantageous over other embodiments.
[0065] In the following detailed description of the embodiments of the disclosure, reference is made to the accompanying drawings that form a part hereof, and in which are shown by way of illustration specific embodiments in which the disclosure may be practiced. It should be understood, however, that it is not intended to limit the disclosure to the forms disclosed, but on the contrary, the disclosure is to cover all modifications, equivalents, and alternatives falling within the spirit and the scope of the disclosure. It is to be understood that other embodiments may be utilized and that changes may be made without departing from the scope of the present disclosure. The following description is, therefore, not to be taken in a limiting sense.
[0066] The terms “comprises”, “comprising”, or any other variations thereof are intended to cover a non-exclusive inclusion such that a setup, device, or method that comprises a list of components or steps does not include only those components or steps but may include other components or steps not expressly listed or inherent to such setup, device, or method. In other words, one or more elements in a system or apparatus proceeded by “comprises . . . a” does not, without more constraints, preclude the existence of other elements or additional elements in the system or method.
[0067] The terms “includes”, “including”, or any other variations thereof are intended to cover a non-exclusive inclusion such that a setup, device, or method that includes a list of components or steps does not include only those components or steps but may include other components or steps not expressly listed or inherent to such setup, device, or method. In other words, one or more elements in a system or apparatus proceeded by “includes . . . a” does not, without more constraints, preclude the existence of other elements or additional elements in the system or method.
[0068] No aspect, component, element, structure, act, step, function, instruction, and/or the like used herein should be construed as critical or essential unless explicitly described as such. Also, as used herein, the articles “a” and “an” are intended to include one or more items and may be used interchangeably with “one or more” and “at least one.” Furthermore, as used herein, the term “set” is intended to include one or more items (e.g., related items, unrelated items, a combination of related and unrelated items, and/or the like) and may be used interchangeably with “one or more” or “at least one.” Where only one item is intended, the term “one” or similar language is used. Also, as used herein, the terms “has”, “have”, “having”, or the like are intended to be open-ended terms. Further, the phrase “based on” is intended to mean “based at least in partially on” unless explicitly stated otherwise. The term “some non-limiting embodiments or aspects” means “one or more (but not all) embodiments or aspects of the disclosure(s)” unless expressly specified otherwise. A description of some non-limiting embodiments or aspects with several components in communication with each other does not imply that all such components are required. On the contrary, a variety of optional components is described to illustrate the wide variety of possible embodiments of the disclosure.
[0069] When a single device or article is described herein, it will be clear that more than one device/article (whether they cooperate) may be used in place of a single device/article. Similarly, where more than one device or article is described herein (whether they cooperate), it will be clear that a single device/article may be used in place of the more than one device or article or a different number of devices/articles may be used instead of the shown number of devices or programs. The functionality and/or the features of a device may be alternatively embodied by one or more other devices which are not explicitly described as having such functionality/features. Thus, other embodiments of the disclosure need not include the device itself.
[0070] As used herein, the terms “communication”, “communicate”, “send”, and/or “receive” may refer to the reception, receipt, transmission, transfer, provision, and/or the like of information (e.g., data, signals, messages, instructions, commands, and/or the like). For one unit (e.g., a device, a system, a component of a device or system, combinations thereof, and/or the like) to be in communication with another unit means that the one unit is able to directly or indirectly receive information from and/or transmit information to the other unit. This may refer to a direct or indirect connection (e.g., a direct communication connection, an indirect communication connection, and/or the like) that is wired and/or wireless in nature. Additionally, two units may be in communication with each other even though the information transmitted may be modified, processed, relayed, and/or routed between the first and second unit. For example, a first unit may be in communication with a second unit even though the first unit passively receives information and does not actively transmit information to the second unit. As another example, a first unit may be in communication with a second unit if at least one intermediary unit (e.g., a third unit located between the first unit and the second unit) processes information received from the first unit and communicates the processed information to the second unit. In some non-limiting embodiments or aspects, a message may refer to a network packet (e.g., a data packet and/or the like) that includes data. It will be appreciated that numerous other arrangements are possible.
[0071] As used herein, the terms “server” and/or “processor” may refer to one or more computing devices or computing units, such as processors, storage devices, and/or similar computer components, that communicate with client devices and/or other computing devices over a network, such as the Internet or private networks, and, in some examples, facilitate communication among other servers and/or client devices. It will be appreciated that various other arrangements are possible. As used herein, the term “system” may refer to one or more computing devices or combinations of computing devices such as, but not limited to, processors, servers, client devices, software applications, and/or other like components. In addition, reference to “a server” or “a processor”, as used herein, may refer to a previously-recited server and/or processor that is recited as performing a previous step or function, a different server and/or processor, and/or a combination of servers and/or processors. For example, as used in the specification and the claims, a first server and/or a first processor that is recited as performing a first step or function may refer to the same or different server and/or a processor recited as performing a second step or function.
[0072] Non-limiting embodiments or aspects of the present disclosure relate to computer-implemented methods and/or payment servers for operating a lock. The computer-implemented method may include receiving a payment transaction request and one or more details associated with a lock. Further, the computer-implemented method may include providing one of a success message or a failure message to an access management system to operate the lock based on a result of authorization of the payment transaction request and a result of a validation of the one or more details.
[0073] In the following detailed description of the embodiments of the disclosure, reference is made to the accompanying drawings that form a part hereof, and in which are shown by way of illustration specific embodiments in which the disclosure may be practiced. These embodiments are described in sufficient detail to enable those skilled in the art to practice the disclosure, and it is to be understood that other embodiments may be utilized and that changes may be made without departing from the scope of the present disclosure. The following description is, therefore, not to be taken in a limiting sense.
[0074]
[0075] In some non-limiting embodiments or aspects, an access management system (105) is used to operate a lock (106). The lock (106) may be associated with a door, a safety locker, gate, and/or the like. The lock (106) may be used to provide physical access to a user (101). The access management system (105) relates to physical access to the user (101). The access management system (105) may be configured to operate one or more locks. For example, the access management system (105) may operate the locks associated with a building or the locks provided in a portion of the building and/or the like. The access management system (105) may include a controller (108), a memory (109), one or more sensors (110), one or more actuators (111), a communication module (112), and a power supply (113) as shown in
[0079] The user (101) may register the one or more details associated with the lock (106) using an application from a user device (102). The user device (102) may include a smartphone, a laptop, a computer, a tablet computer, a user wearable device, and/or the like. The user (101) may register one or more locks with the payment server (104). Further, the user (101) is labeled as the administrator user (101) and the administrator user (101) may register one or more users with the payment server (104). The one or more users along with the administrator users are capable of operating the lock (106) by performing the payment transaction. For example, the one or more users may be a family member of the administrator user or any person who has trusted relationship with the administrator user. In a business premises environment, the one or more users may be managers or chief security officers, for example. The payment transaction may be performed using at least one of Internet banking, a credit card, a prepaid card, an e-wallet payment application, and/or the like.
[0080] In some non-limiting embodiments or aspects, the user (101) via the user device (102) initiates the payment transaction along with the one or more details for operating the lock (106) from the locked state to the unlocked state. The payment server (104) receives a payment transaction request and the one or more details associated with the lock (106). For example, the payment transaction request and the one or more details received by the payment server (104) is [0081] Payer Account Information={Name: User-2, Account Number: 147}, [0082] Payee Account Information={Name: Psuedo_Merchant_1, Account Number: 950}, [0083] lock Identification value=1479506, [0084] Transaction amount=368 USD.
[0085] The payee account information includes the name and the account number for which the transaction amount is credited. In some non-limiting embodiments or aspects, the payee account information may be provided by the user (101) while registering the lock (106) with the payment server (104). In some non-limiting embodiments or aspects, the payment server (104) may provide the payee account information while registering the lock (106). The payment server (104) provides the payment transaction request to an issuer server (107) for authorization. The issuer server (107) verifies details of the payment transaction. For example, if the payment transaction was initiated by a payment card, the issuer server (107) verifies a card number, a CVV, an expiry date, funds available with the user (101) account, and/or the like. Further, the payment server (104) receives from the issuer server (107) the result of the authorization indicative of success or failure.
[0086] In some non-limiting embodiments or aspects, the issuer server (107) based on the payee account information identifies the payment transaction as an access management type message and authorizes the payment transaction based on the verification. Further, the issuer server (107) may not initiate a transfer of the transaction amount between the payer account and the payee account. Upon receiving the result of authorization indicative of the failure, the payment server (104) provides a failure message to the access management system (105) to retain the lock (106) in a locked state and provides a failure message to the user (101) indicating a failure to operate the lock (106) from a locked state to the unlocked state.
[0087] In some non-limiting embodiments or aspects, upon receiving the result of authorization indicative of success, the payment server (104) validates the one or more details of the lock (106) received along with the payment transaction request with the one or more details received from the user (101) during the registration of the lock (106). The payment sever provides a success message to the access management system (105) and the user (101) when the one or more details of the lock (106) received along with the payment transaction request match with the registered information. Alternatively, the payment sever provides a failure message to the access management system (105) and the user (101) when the one or more details of the lock (106) received along with the payment transaction request mismatches with the registered information. The access management system (105), upon receiving the success message, unlocks the lock (106) after verifying sender information, a timestamp, and the identification value of the lock (106) associated with the success message. The sender information, for example, includes a mobile number, an Internet Protocol (IP) address associated with the payment server (104) used for sending the success message or the failure message to the access management system (105). The payment server (104) initiates an authorization reversal request after sending the success message to the access management system (105). The authorization reversal request refunds the transaction amount to the payer account. Further, the access management system (105), upon receiving the failure message, retains the lock (106) in a locked state.
[0088] In some non-limiting embodiments or aspects, the user device (102), the payment server (104), the issuer server (107), and the access management system (105) are interconnected via a communication network (103) for communicating with each other. Further, the communication network (103) may include, for example, a direct interconnection, e-commerce network, a peer to peer (P2P) network, local area network (LAN), wide area network (WAN), wireless network (e.g., using Wireless Application Protocol), the Internet, Wi-Fi®, cellular network, wired network, short-range communication, and/or the like.
[0089]
[0090] In some non-limiting embodiments or aspects, the payment server (104) may include at least one Central Processing Unit (“CPU” or “processor”) (201) and a memory (202) storing instructions executable by the at least one processor (201). The processor (201) may comprise at least one data processor for executing program components for executing user- or system-generated requests. The memory (202) is communicatively coupled to the processor (201). The payment server (104) further comprises an Input/Output (I/O) interface (203). The I/O interface (203) is coupled with the processor (201) through which an input signal or/and an output signal is communicated. In some non-limiting embodiments or aspects, the data stored in the memory (202) may include transaction data (204), lock data (205), and other data (206).
[0091] In some non-limiting embodiments or aspects, the transaction data (204) may include details regarding the payment transaction request. For example, the payment transaction request may include the payer account information or the payer payment card details, payee account information, name of a bank associated with the payer and the payee, authentication request, authorization request, and/or the like. The person skilled in the art appreciates the use of one or more formats for initiating the payment transaction request using the payment card, the e-wallet application, and Internet banking.
[0092] In some non-limiting embodiments or aspects, the lock data (205) may include the registered information associated with the lock (106) and the one or more details received along with the payment transaction request. The registered information includes the predefined identification value, the predefined transaction amount, and the predefined account information of one or more users associated with the lock (106). The one or more details include the identification value, the transaction amount, and the account information of the user (101) received along with the payment transaction request.
[0093] In some non-limiting embodiments or aspects, other data (206) may include at least one of the success messages including at least one of the following: sender information, a timestamp, an identification value associated with the lock (106), the failure message including a timestamp, an identification value associated with the lock (106), or any combination thereof.
[0094] In some non-limiting embodiments or aspects, a registration module (207) is configured to receive the registration information from the user (101) via the application installed in the user device (102). The registration information (including the predefined identification value, the predefined transaction amount, and the predefined account information of one or more users associated with the lock (106)) is stored in the lock data (205). In some non-limiting embodiments or aspects, an authorization module (208) is configured to provide the payment transaction request to the issuer server (107) for authorization. Further, the authorization module (208) is configured to receive the result of the authorization indicative of success or failure from the issuer server (107). Furthermore, the authorization module (208) is configured to initiate the authorization reversal request after sending the success message to the access management system (105) for refunding the transaction amount to the payer account.
[0095] In some non-limiting embodiments or aspects, a validation module (209) is configured to verify the one or more details received from the user (101) with the registration information stored in the lock data (205). Further, the validation module (209) is configured to generate the result of the validation indicative of success or failure based on the verification of the one or more details. The success message or the failure message is provided to the access management system (105) and the user device (102). In some non-limiting embodiments or aspects, the other module (210) is configured to receive a notification from the access management system (105) about restoring the lock (106) to a locked state after one of a predefined time period or a user (101) manually locking the lock (106).
[0096]
[0097] The order in which the computer-implemented method 300 is described is not intended to be construed as a limitation, and any number of the described method blocks may be combined in any order to implement the computer-implemented method. Additionally, individual blocks may be deleted from the computer-implemented method without departing from the spirit and scope of the subject matter described herein. Furthermore, the computer-implemented method may be implemented in any suitable hardware, software, firmware, or combination thereof.
[0098] At step 301, the payment server (104) receives the payment transaction request and the one or more details associated with the lock (106). In some non-limiting embodiments or aspects, the payment transaction request is initiated by the user (101) using the user device (102). In some non-limiting embodiments or aspects, the user (101) registers the one or more details associated with the lock (106) for operating the lock (106) by performing the payment transaction. The one or more details include the identification value, the account information, and the transaction amount associated with the lock (106). The user (101) may register one or more users for the lock (106). Further, the user (101) may register the one or more locks with the one or more users with the payment server (104).
[0099] In some non-limiting embodiments or aspects, the payment server (104) receives the registration request from the user (101) via the application in the user device (102). The registration request includes the predefined identification value, the predefined transaction amount, and the predefined account information of the one or more users associated with the lock (106). The identification value associated with the lock (106) may be an alpha-numeric string used to uniquely identify the lock (106). The predefined transaction amount may include a value of the payment transaction amount and a type of currency associated with the value. The predefined account information may include the account number or the payment card number from which the payment transaction request will be initiated. Further, the payment server (104) stores the predefined identification value, the predefined transaction amount and the predefined account information in a database as the registered information. The database may be external to the payment server (104) or implemented in the memory (202) of the payment sever. For example, the registered information for the one or more locks is shown in
[0100] In some non-limiting embodiments or aspects, the payment transaction request may include the payer account information (e.g., the account information of the user (101)), the payee account information, the transaction amount, authentication request, and the authorization request. For example, the payment transaction request received from the user (101) via the user device (102) is shown in
[0101] In some non-limiting embodiments or aspects, the payment server (104) provides the payment transaction request to an issuer server (107) for authentication and/or authorization, as shown in step 303 of
[0102] In some non-limiting embodiments or aspects, a balance amount present in the payer account may not affect the result of authorization. For example, if the balance amount in the payer account is “300$” and the transaction amount associated with the payment transaction request is “550$”, the result of the authorization indicates success if the verification of the payer information, payee information, and the transaction amount is successful. The payment transaction request is authorized, and the transaction amount is not transferred from the payer account to the payee account. When the result of the authorization is indicative of failure, the payment server (104) may send a failure message to an access management system (105) associated with the lock (106) to retain the lock (106) in a locked state as shown in step 305 of
[0103] Referring to
[0104] Further, the payment server (104) generates the result of the validation indicative of success or failure based on the verification of the one or more details as shown in step 307 of
[0105] In some non-limiting embodiments or aspects, the payment server (104) provides the success message by sending at least one of sender information, the timestamp, and the identification value to the access management system (105) for unlocking the lock (106), as shown in step 308 of
[0106] The difference between the timestamp associated with the message and the current timestamp in the access management system (105) may be set to a predetermined value, for example, 2 minutes. If the difference is greater than the predetermined value, the access management system (105) treats the success message as invalid and does not operate the lock (106). For example, if the success message with the timestamp of “10:00 AM on 9 Dec. 2010” is received by the access management system (105) at “10:30 AM on 9 Dec. 2010” or at “10:00 AM on 10 Dec. 2010”, the access management system (105) regards the success message as invalid and does not operate the lock (106). In some non-limiting embodiments or aspects, the payment server (104) sends the failure message to the access management system (105) associated with the lock (106) to retain the lock (106) in a locked state (403), when the result of authorization or the result of validation is indicative of failure, as shown in step 309 of
[0107] In some non-limiting embodiments or aspects, the payment server (104) initiates an authorization reversal request after sending the success message to the access management system (105). The authorization reversal request refunds the transaction amount associated with the payment transaction before the final settlement is complete. The authorization reversal returns the transaction amount to the user (101), either by releasing the hold on the user (101) transaction amount in the payer account or by transferring money from the payee account to the payer account. The authorization reversal is performed by generating a void request (405) as shown in
[0108] In some non-limiting embodiments or aspects, the payment server (104) receives a notification from the access management system (105) about restoring the lock (106) to a locked state (403) after one of a predefined time period (for example, 5 minutes) or a user (101) manually locking the lock (106). The access management system (105) detects the manual locking of the lock (106) by the user (101) using the one or more sensors (for example, an infrared sensor, an ultrasound sensor, and/or the like) associated with the lock (106). In some non-limiting embodiments or aspects, the access management system (105), upon determining the absence of any user (101) in the vicinity of the lock (106) or the absence of any physical opposition to the door or the gate associated with the lock (106), may restore the lock (106) to the locked state (403) after the predefined time period.
[0109] The computer-implemented method of operating the lock (106) based on the payment transaction includes operating the lock (106) from the locked state (403) to the unlocked state (404) after the successful authorization of the payment transaction request and the validation of the one or more details with the registered information. The security associated with the lock (106) is equivalent to the security associated with the payment transaction performed by the user (101). Each lock (106) is associated with the transaction amount predetermined by the user (101), and therefore, the predetermined transaction acts as a key for unlocking the lock (106). Unauthorized users cannot operate the lock (106) without the knowledge of the predefined transaction amount. Further, the account information of the one or more users capable of operating the lock (106) is registered by the user (101). Therefore, the payment transaction request initiated by unauthorized users with the matching transaction amount will fail to operate the lock (106) as the account information of the unauthorized users is not registered by the user (101). The access management system (105) operates the lock (106) after verifying the sender of the success message and the timestamp associated with the success message. Therefore, the same success message cannot be reused by the other users or the user (101) to operate the lock (106) at a later point in time. The payment transaction enables the user (101) to remotely operate the lock (106) without the need of the physical presence of the user (101) in the vicinity of the lock. The payment transaction to operate the lock provides hassle free operation of the lock (106) without the need of remembering the pins, passwords for the one or more locks, and misplacing and forgetting of the physical key. The operation of the lock (106) made by the user (101) and the one or more users is tracked easily using the payment transaction statement provided by the issuer bank.
Computer System
[0110]
[0111] The processor (502) may be disposed in communication with one or more input/output (I/O) devices (not shown) via an I/O interface (501). The I/O interface (501) may employ communication protocols/methods such as, without limitation, audio, analog, digital, monoaural, RCA, stereo, IEEE-1394, serial bus, universal serial bus (USB), infrared, PS/2, BNC, coaxial, component, composite, digital visual interface (DVI), high-definition multimedia interface (HDMI), RF antennas, S-Video, VGA, IEEE 802.1 n /b/g/n/x, Bluetooth, cellular (e.g., code-division multiple access (CDMA), high-speed packet access (HSPA+), global system for mobile communications (GSM), long-term evolution (LTE), WiMax®, or the like), etc.
[0112] Using the I/O interface (501), the computer system (500) may communicate with one or more I/O devices. For example, an input device (510) may be an antenna, keyboard, mouse, joystick, (infrared) remote control, camera, card reader, fax machine, dongle, biometric reader, microphone, touch screen, touchpad, trackball, stylus, scanner, storage device, transceiver, video device/source, etc. The output device (511) may be a printer, fax machine, video display (e.g., cathode ray tube (CRT), liquid crystal display (LCD), light-emitting diode (LED), plasma, Plasma display panel (PDP), Organic light-emitting diode display (OLED) or the like), audio speaker, etc.
[0113] In some-non-limiting embodiments or aspects, the computer system (500) is connected to the service operator through a communication network (509). The processor (502) may be disposed in communication with the communication network (509) via a network interface (503). The network interface (503) may communicate with the communication network (509). The network interface (503) may employ connection protocols including, without limitation, direct connect, Ethernet (e.g., twisted pair 10/100/1000 Base T), transmission control protocol/Internet protocol (TCP/IP), token ring, IEEE 802.11a/b/g/n/x, etc. The communication network (509) may include, without limitation, a direct interconnection, e-commerce network, a peer to peer (P2P) network, local area network (LAN), wide area network (WAN), wireless network (e.g., using Wireless Application Protocol), the Internet, Wi-Fi®, etc. Using the network interface (503) and the communication network (509), the computer system (500) may communicate with the one or more service operators.
[0114] In some-non-limiting embodiments or aspects, the processor (502) may be disposed in communication with a memory (505) (e.g., RAM, ROM, etc. not shown in
[0115] The memory (505) may store a collection of program or database components, including, without limitation, a user interface (506), an operating system (507), a web server (508), etc. In some-non-limiting embodiments or aspects, the computer system (500) may store user/application data, such as the data, variables, records, etc. as described in this disclosure. Such databases may be implemented as fault-tolerant, relational, scalable, secure databases such as Oracle or Sybase.
[0116] The operating system (507) may facilitate resource management and operation of the computer system (500). Examples of operating systems include, without limitation, APPLE® MACINTOSH® OS X®, UNIX®, UNIX-like system distributions (E.G., BERKELEY SOFTWARE DISTRIBUTION® (BSD), FREEBSD®, NETBSD®, OPENBSD, etc.), LINUX® DISTRIBUTIONS (E.G., RED HAT®, UBUNTU®, KUBUNTU®, etc.), IBM®OS/2®, MICROSOFT® WINDOWS® (XP®, VISTA®/7/8, 10 etc.), APPLE® 10S®, GOOGLE™ ANDROID™, BLACKBERRY® OS, or the like.
[0117] In some-non-limiting embodiments or aspects, the computer system (500) may implement a web browser (not shown
[0118] Furthermore, one or more computer-readable storage media may be utilized in implementing embodiments consistent with the present disclosure. A computer-readable storage medium refers to any type of physical memory on which information or data readable by a processor may be stored. Thus, a computer-readable storage medium may store instructions for execution by one or more processors, including instructions for causing the processor(s) to perform steps or stages consistent with the embodiments described herein. The term “computer-readable medium” should be understood to include tangible items and exclude carrier waves and transient signals, e.g., non-transitory. Examples include Random Access Memory (RAM), Read-Only Memory (ROM), volatile memory, non-volatile memory, hard drives, Compact Disc (CD) ROMs, Digital Video Disc (DVDs), flash drives, disks, and any other known physical storage media.
[0119] The described operations may be implemented as a method, system, or article of manufacture using standard programming and/or engineering techniques to produce software, firmware, hardware, or any combination thereof. The described operations may be implemented as code maintained in a “non-transitory computer-readable medium”, where a processor may read and execute the code from the computer-readable medium. The processor is at least one of a microprocessor and a processor capable of processing and executing the queries. A non-transitory computer-readable medium may include media, such as magnetic storage medium (e.g., hard disk drives, floppy disks, tape, etc.), optical storage (CD-ROMs, DVDs, optical disks, etc.), volatile and non-volatile memory devices (e.g., EEPROMs, ROMs, PROMs, RAMs, DRAMs, SRAMs, Flash Memory, firmware, programmable logic, and the like), and the like. Further, non-transitory computer-readable media may include all computer-readable media except for a transitory. The code implementing the described operations may further be implemented in hardware logic (e.g., an integrated circuit chip, Programmable Gate Array (PGA), Application Specific Integrated Circuit (ASIC), and the like).
[0120] In some non-limiting embodiments or aspects, the computer system (500) may receive at least one of the payment transaction request, one or more details associated with the payment transaction, and the registered information from remote devices (512) via a communication network (509).
[0121] An “article of manufacture” includes non-transitory computer readable medium and/or hardware logic in which code may be implemented. A device in which the code implementing the described embodiments of operations are encoded may include a computer-readable medium or hardware logic. Of course, those skilled in the art will recognize that many modifications may be made to this configuration without departing from the scope of the disclosure and that the article of manufacture may include suitable information bearing medium known in the art.
[0122] The terms “some non-limiting embodiments or aspects”, “embodiment”, “embodiments”, “the embodiment”, “the embodiments”, “one or more embodiments”, “some-non-limiting embodiments or aspects”, and “one embodiment” mean “one or more (but not all) embodiments of the disclosure(s)” unless expressly specified otherwise. A description of an embodiment with several components in communication with each other does not imply that all such components are required. On the contrary, a variety of optional components is described to illustrate the wide variety of possible embodiments of the disclosure.
[0123] The terms “including”, “comprising”, “having”, and variations thereof mean “including but not limited to” unless expressly specified otherwise. The enumerated listing of items does not imply that any or all of the items are mutually exclusive unless expressly specified otherwise. The terms “a”, “an”, and “the” mean “one or more” unless expressly specified otherwise. A description of some non-limiting embodiments or aspects with several components in communication with each other does not imply that all such components are required. On the contrary, a variety of optional components is described to illustrate the wide variety of possible embodiments of the disclosure.
[0124] When a single device or article is described herein, it may be readily apparent that more than one device/article (whether or not they cooperate) may be used in place of a single device/article. Similarly, where more than one device or article is described herein (whether or not they cooperate), it may be readily apparent that a single device/article may be used in place of the more than one device or article or a different number of devices/articles may be used instead of the shown number of devices or programs. The functionality and/or the features of a device may be alternatively embodied by one or more other devices which are not explicitly described as having such functionality/features. Thus, other embodiments of the disclosure need not include the device itself.
[0125] The illustrated operations of
[0126] Finally, the language used in the specification has been principally selected for readability and instructional purposes, and it may not have been selected to delineate or circumscribe the inventive subject matter. It is therefore intended that the scope of the disclosure be limited not by this detailed description, but rather by any claims that issue on an application based hereon. Accordingly, the disclosure of the embodiments of the disclosure is intended to be illustrative, but not limiting, of the scope of the disclosure, which is set forth in the following claims.
[0127] While various aspects and embodiments have been disclosed herein, other aspects and embodiments may be apparent to those skilled in the art. The various aspects and embodiments disclosed herein are for purposes of illustration and are not intended to be limiting, with the true scope and spirit being indicated by the following claims.