When the checkout process is initiated, the shopping application validates the user's identity using the authentication data previously stored on the personal computing device 405. The authentication methodology could include numeric code entry, an alphanumeric code entry, facial recognition, fingerprint recognition, voice recognition, keystroke pattern recognition, fob authentication into a port of the personal computing device, use of the camera to view an identification document (or image or physical item), or any other authentication methodology.
Once authenticated, the shopping assistant tool decrypts the user's personal data that was previously stored on the personal computing device 406. This personal data is then transformed into form values and then transferred over the network to the retailer's site.
Optionally, the user next reviews the form to see if the data is correct and modifies the data if necessary. If the data is modified, the user is given the option to update the personal data with the modifications 407. If the user desires to modify the personal data, the personal data is updated 408. This is done with code created in
If the controller detects that one or more entities missing or incorrect in the personal data or in the form as it is being loaded that may result in errors during checkout 409, then the process returns to step 406.
Hardware Description