Patent application number | Description | Published |
20100303230 | Secure Identity Binding (SIB) - A system includes a tag having a machine readable tag identifier (Tag ID) configured to be read by a reader; and a device to be identified by the tag, in which: the device is configured to communicate with the reader; the device has access to a secure Tag ID; and the device communicates a verification to the reader if the machine readable Tag ID communicated to the device from the reader matches the secure Tag ID. A method includes: reading a Tag ID from a tag attached to a device; communicating the Tag ID read from the tag to the device; comparing a secure Tag ID of the device to the Tag ID read from the tag; and responding with a “match” or “no-match” message from the device, according to which the device is either trusted or not trusted as being identified by the Tag ID. A method of verifying a trusted agent (TA) on a device includes: storing a digital signature of the TA in a secure vault of the device; and verifying the TA by verifying the digital signature of the TA each time the TA is used. | 12-02-2010 |
20100306076 | Trusted Integrity Manager (TIM) - A system for use with a trusted service manager (TSM) and a mobile device having a subscriber unique identifying data, according to one embodiment, includes: a server in which the server validates an application against the unique and identifying data of the mobile device and provides the validated application for the mobile device; and a secure element (SE) acting as a client in which the SE is present in the mobile device as client; the validated application from the server is installed in the SE; and the SE is adapted to execute the validated application to perform a service process. The service process includes enablement of payment functions on the mobile device, in which enablement of payment functions includes: providing secure communication between the mobile device and the server; secure provisioning of a payment instrument on the mobile device, wherein authentication and verification for the payment instrument on the mobile device is provided by the server; and binding the payment instruments and the validated application to the mobile device to provide a strong ID management for enhanced user protection and system security and integrity. | 12-02-2010 |
20110076941 | NEAR FIELD COMMUNICATION AND NETWORK DATA/PRODUCT TRANSFER - Methods and systems utilize a shake and transfer process to provide a consumer with an enhanced user experience. In a first embodiment, a purchase is made between two devices using NFC, and a shake and transfer process downloads large data, such as a movie, video, or game, from one device to the other. In a second embodiment, the user can select information or data, such as non-user contacts, photos, or videos, on the phone to transfer during a shake and transfer process. In yet another embodiment, a user may pay for purchases from an unattended merchant, such as a vending machine, using a shake and transfer process, where the user may also receive incentives, based on the user profile and/or purchase, from the unattended merchant. | 03-31-2011 |
20110076942 | NETWORK UPDATES OF TIME AND LOCATION - Methods and systems utilize a shake and transfer process to initiate a wireless communication provide a user device with time and location information of the communication, which can be associated with contact information of a user of the other device. As a result, a user has additional information associated with a contact, and the time and location information can be used to determine or track elapsed time and distance traveled between communications. | 03-31-2011 |
20110162078 | DYNAMIC PATTERN INSERTION LAYER - Various methods and systems are provided for inserting a user-selected pattern below a main application display when sensitive information is being requested or to be communicated. The border of the main application layer may also be modified at this time, either with or without the underlying pattern. This visual change provides the user an assurance that the application or site is authentic and not a phishing attack. The user-selected patterns are stored in secure areas, such as a secure element on the user device or in a cloud accessible by the application or site. | 06-30-2011 |
20110264543 | REVERSE PAYMENT FLOW - Systems and methods for facilitating transactions using contactless proximity communication technology include information or payment flows that are reversed from the conventional sense in that information may flow in direction from a merchant via a consumer mobile device to a financial services provider (FSP). Such payment and information flows can be accomplished without needing to modify infrastructure—such as point-of-sale NFC readers, mobile handsets, or advertising tags and may provide “bridge solutions” for quickly implementing mobile proximity purchase payments. Embodiments provide for receiving some transaction information at a financial services provider in response to a contactless proximity communication that occurs between either a consumer proximity tag and a merchant device, consumer mobile device and merchant proximity tag, or consumer mobile device and merchant device, in which some of the transaction information flow is reverse; validating the transaction; sending payment confirmation to the merchant; and sending transaction confirmation to the consumer. | 10-27-2011 |
20110320345 | SMART WALLET - A user's smart phone is used for payments and holding information, similar to what is contained in a physical wallet. Depending on transaction details, user preferences, and location, one or more “best” funding instruments for the transaction are selected for the user, who may then revise if desired. Access to different functions or information within the phone may vary and require different authentication/security levels depending on type of use (e.g., payment or non-payment) and details of use (e.g., high payment amount vs. low payment amount, use of sensitive information vs. non-sensitive information). | 12-29-2011 |
20120123841 | SMART WALLET - A service provider provides one or more “best” total value suggestions for one or more items specified by a user. The suggestions are based on one or more of user preferences, user location, available funding options, available local merchant incentives, available manufacturer incentives, and local merchants offering the item. In one embodiment, the “best” total value is the lowest price available to the user. The user may make a purchase using a suggestion or a revised suggestion. | 05-17-2012 |
20130060959 | SECURE ELEMENTS BROKER (SEB) FOR APPLICATION COMMUNICATION CHANNEL SELECTOR OPTIMIZATION - Systems and methods for managing concurrent secure elements on a mobile device to coordinate with an application or “app” running on the mobile device and an appropriate communications protocol for conducting transactions using the mobile device include: informing, by the processor, the reader device of a preferred app and a communication protocol usable by the preferred app; receiving, by the processor, information about which apps and communication protocols are supported by a reader for processing a transaction; locating, by the processor, a secure element supporting an app and a communication protocol supported by the reader; channeling the communication protocol for the specific configuration of the app and the supporting secure element; activating the secure element that supports the app; and processing, with the activated secure element, using the supported app and communication channel, the transaction with the reader. | 03-07-2013 |
20130080331 | System and Method for Instantaneous Retail Payment - A system for performing a retail payment between a customer and a merchant is provided. The system includes a signed scrip having a public key, a credit value, a signed scrip validation stamp, a credit value, and a validation stamp; a signed invoice comprising a transaction list and an invoice validation stamp; and a private key complementary to the public key, wherein the public key is used to decode the signed scrip; the private key is stored in a server coupled to a network; and the private key is used by the server to validate the authenticity of the signed invoice. Also provided is a method for performing a financial transaction using a system as above; and a non-transitory machine-readable medium including a plurality of machine-readable instructions to cause a server to perform a method as above, is provided. | 03-28-2013 |
20130232066 | FINGER PRINT FUNDING SOURCE SELECTION - Each finger of a user can be uniquely associated with a funding source for a user account with a payment provider, such that the user can select or change a funding source by simply having the desired finger print read, such as on the display of a smart phone. | 09-05-2013 |
20140323052 | NETWORK UPDATES OF TIME AND LOCATION - Methods and systems utilize a shake and transfer process to initiate a wireless communication and provide a user device with time and location information of the communication, which can be associated with contact information of a user of the other device. As a result, a user has additional information associated with a contact, and the time and location information can be used to determine or track elapsed time and distance traveled between communications. | 10-30-2014 |
20150026781 | SECURE ELEMENTS BROKER (SEB) FOR APPLICATION COMMUNICATION CHANNEL SELECTOR OPTIMIZATION - Systems and methods for managing concurrent secure elements on a mobile device to coordinate with an application or “app” running on the mobile device and an appropriate communications protocol for conducting transactions using the mobile device include: informing, by the processor, the reader device of a preferred app and a communication protocol usable by the preferred app; receiving, by the processor, information about which apps and communication protocols are supported by a reader for processing a transaction; locating, by the processor, a secure element supporting an app and a communication protocol supported by the reader; channeling the communication protocol for the specific configuration of the app and the supporting secure element; activating the secure element that supports the app; and processing, with the activated secure element, using the supported app and communication channel, the transaction with the reader. | 01-22-2015 |