Patent application number | Description | Published |
20090172775 | MOBILE ANTI-PHISHING - A method for inhibiting phishing can include sending information from a mobile network device to a website server, generating a one time password at the mobile network device from the information, generating a one time password at the website server from the information, sending the one time password generated at the website server to the mobile network device when the mobile network device subsequently accesses the website, and comparing the one time password generated at the website server to the one time password generated at the mobile network device. In this manner, the website can be authenticated such that the occurrence of phishing is substantially mitigated. | 07-02-2009 |
20090182674 | FACILITATING FINANCIAL TRANSACTIONS WITH A NETWORK DEVICE - Systems and methods provide for communicating with a user device via a network, receiving a first numeric identifier from the user device, associating the first numeric identifier with a user account, and processing a financial transaction requested by the user device. The user device includes a mobile phone, and the first numeric identifier includes a mobile phone number associated with the user device. | 07-16-2009 |
20090191811 | NEAR FIELD COMMUNICATION INTIALIZATION - A method of application initialization of a near field communication (NFC) enabled device comprising loading a first NFC enabled device with an application for conducting a financial transaction over a network; and transferring the application to a second NFC enabled device via a NFC link, is described herein. | 07-30-2009 |
20090192912 | CHARGE-FOR-SERVICE NEAR FIELD COMMUNICATION TRANSACTIONS - A method for purchasing a value item using near field communication (NFC) includes placing a NFC enabled data communication device of a buyer of the item in close proximity to a NFC enabled data communication device of a seller of the item, the devices being interoperable to establish a NFC communication link between the devices when placed in close proximity to each other, transferring a request for payment for the item from the seller's device to the buyer's device via the NFC link, and transmitting the payment request, together a buyer's authorization therefor, to a third party service provider via a network. In response to receipt of the transmission, the service provider transfers money in an amount equal to the purchase price of the item from a funding account of the buyer to a receiving account of the seller and sends the parties a message confirming the transfer. | 07-30-2009 |
20090192935 | ONE STEP NEAR FIELD COMMUNICATION TRANSACTIONS - A one step method for transferring money from a sender to a recipient includes entering information relating to the transfer into a near field communication (NFC) enabled data communication device of the sender and then placing the sender's device in close proximity to a NFC enabled data communication device of the recipient. The sender's device is operable when placed in contact with or close proximity to the recipient's device to 1) establish an NFC link between the two devices, 2) gather information relating to the recipient from the recipient's device via the NFC link, and 3) transmit the information relating to the transfer and the recipient to a third party service provider via another network, such as the Internet, and thereby cause the service provider to transfer the money from a funding account of the sender to a receiving account of the recipient. | 07-30-2009 |
20090192937 | TWO STEP NEAR FIELD COMMUNICATION TRANSACTIONS - A two step method for transferring money from a sender to a recipient includes entering information relating to the transfer into a near field communication (NFC) enabled device of the sender. The device is then placed in contact with or close proximity to a recipient's device a first time, causing the sender's device to establish an NFC link between the two devices and to gather information relating to the recipient via the NFC link. The sender's device is then placed in contact with or close proximity to the recipient's device a second time, causing it to transmit the information relating to the transfer and the recipient to a third party service provider via another network, e.g., the Internet, thereby causing the service provider to transfer the money from an account of the sender to an account of the recipient. | 07-30-2009 |
20090193500 | NEAR FIELD COMMUNICATION ACTIVATION AND AUTHORIZATION - A method of activation and authorization of a near field communication (NFC) enabled device comprising: receiving login information from an NFC enabled device; sending packet data via a network in response to receiving the login information from the NFC enabled device; and receiving corresponding data from the NFC enabled device in response to the sending of the packet data, the sending of the packet data and the receiving of the corresponding code facilitates the activation and authorization of the NFC enabled device, and the subsequent activation of the NFC device via a NFC link without further authorization of the NFC enabled device, is described herein. | 07-30-2009 |
20100114775 | TEXT AUTHORIZATION FOR MOBILE PAYMENTS - A system and method enables trusted sources to easily approve requests for money transfers by simply typing in a yes or equivalent. | 05-06-2010 |
20120124676 | QUICK PAYMENT USING MOBILE DEVICE BINDING - Methods and systems are provided for secure device binding that provides user convenience through avoiding repetitive logging in when changing apps or moving from website to website. A mobile device undergoes binding to an account so that customers do not always have to enter their password when going through a financial transaction process, on a known (e.g., registered) mobile device. A device may be bound during an initial login, and once logged in, the user can select an option to be “remembered” so that the user need not re-login on the same device for future visits with an app or to a website that shares the service provider library. | 05-17-2012 |
20120260199 | METHODS AND SYSTEMS FOR STOREFRONT GENERATION - A method and a system to generate mobile storefronts are described. The storefront application is executable by a user device to allow a user of the user device to access the storefront and purchase an item from a merchant. The system comprises an initialization module that provides an initialization interface to an identified merchant that is used to initialize creation of a storefront application. A storefront module provides a generation interface that receives, from the merchant, an appearance for the storefront application. An inventory module receives an inventory information describing items for sale. A policy module provides a policy interface that receives policies of the storefront. A platform module generates source code that when compiled, becomes the storefront application. The source code is generated based at least on one or more templates and the inventory. | 10-11-2012 |
20130179956 | Mobile Anti-Phishing - A method for inhibiting phishing can include sending information from a mobile network device to a website server, generating a one time password at the mobile network device from the information, generating a one time password at the website server from the information, sending the one time password generated at the website server to the mobile network device when the mobile network device subsequently accesses the website, and comparing the one time password generated at the website server to the one time password generated at the mobile network device. In this manner, the website can be authenticated such that the occurrence of phishing is substantially mitigated. | 07-11-2013 |
20140157389 | SERVER AND/OR CLIENT DEVICE AUTHENTICATION - Embodiments of systems and methods for client and/or server authentication are provided. In one embodiment, a method includes sending information from a mobile network device to a server, wherein the information comprises a seed that is used by both the mobile network device and the server to compute a series of one time passwords. The method also includes receiving, by the mobile network device, a succession of one time passwords generated by the server throughout a session. And the method further includes comparing the received one time passwords generated by the server throughout the session to corresponding one time passwords generated at the mobile network device. In this manner, the server can be authenticated. In various embodiments, the process may be reversed to facilitate client, e.g., mobile network device, authentication | 06-05-2014 |
20150073980 | BLUETOOTH LOW ENERGY (BLE) PRE-CHECK IN - One or more Bluetooth® low energy (BLE) beacons in communication with a remote server that provides check in capabilities and payment capabilities may be installed at a location. The BLE beacons may connect with a user's mobile device when the user enters the location and allow the user to check in to the location and authorize payments to be made at the location. Once the user is checked in to the location, the user may be provided with additional functionality, benefits, offers, and applications related to the location and facilitated by the check in. Further, the user may be pre-checked in into a next location when the user is at a current location. | 03-12-2015 |