US20200320506A1 - Methods and arrangements to complete online transactions - Google Patents

Methods and arrangements to complete online transactions Download PDF

Info

Publication number
US20200320506A1
US20200320506A1 US16/815,440 US202016815440A US2020320506A1 US 20200320506 A1 US20200320506 A1 US 20200320506A1 US 202016815440 A US202016815440 A US 202016815440A US 2020320506 A1 US2020320506 A1 US 2020320506A1
Authority
US
United States
Prior art keywords
payment
secure element
user
communications
service provider
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
US16/815,440
Inventor
Miguel Ballesteros
John Vincent
Alan Bumgarner
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Intel Corp
Original Assignee
Intel Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Intel Corp filed Critical Intel Corp
Priority to US16/815,440 priority Critical patent/US20200320506A1/en
Publication of US20200320506A1 publication Critical patent/US20200320506A1/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/322Aspects of commerce using mobile devices [M-devices]
    • G06Q20/3227Aspects of commerce using mobile devices [M-devices] using secure elements embedded in M-devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/12Payment architectures specially adapted for electronic shopping systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/20Point-of-sale [POS] network systems
    • G06Q20/204Point-of-sale [POS] network systems comprising interface for record bearing medium or carrier for electronic funds transfer or payment credit
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/327Short range or proximity payments by means of M-devices
    • G06Q20/3278RFID or NFC payments by means of M-devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/353Payments by cards read by M-devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/409Device specific authentication in transaction processing

Definitions

  • the present disclosure relates generally to the field of wireless communications technologies. More particularly, the present disclosure relates to performing online transactions as “card present” (CP) transactions instead of “card not present” (CNP) with a consumer device.
  • CP card present
  • CNP card not present
  • Mobile Commerce is the usage of a mobile device to access a web site or app for the purpose of buying goods/services and remotely executing a payment via the web site/app's payment service.
  • Mobile Commerce is constantly growing in popularity as smartphones and tablets become more prevalent. Since mobile commerce transactions (mCommerce) are remote transactions with respect to the vendor, they are considered Card Not Present (CNP transactions) and incur a higher processing fee than transactions at a physical Point of Sale (POS), called Card Present (CP) transactions. The higher processing fees are assessed in the CNP transactions because the cardholder and the payment instrument are not physically present at a certified POS device at the time the payment is made. mCommerce transactions are also riskier transactions since it is easier to commit fraud by stealing account information and using it to make remote payments where the actual card is not needed to complete a CNP transaction.
  • CNP transactions Card Not Present
  • CP Card Present
  • FIG. 1 depicts an embodiment of a wireless network comprising a plurality of communications devices
  • FIG. 1A depicts an embodiment of communication flow to perform an mCommerce transaction in which a mobile device functions as a certified POS device to process a payment to an online vendor as a Card Present transaction;
  • FIG. 1B depicts an embodiment of a process of an mCommerce transaction device to process a payment to an online vendor as a Card Present transaction;
  • FIG. 2 depicts an embodiment of a mobile device to process a payment to an online vendor as a Card Present transaction
  • FIG. 3 depicts an embodiment of a flowchart of a transaction in which a personal processing device functions as a certified POS device to process a payment to an online vendor as a Card Present transaction.
  • TEE Trusted Execution Environment
  • Embodiments may integrate a Payment Card Industry (PCI) certified POS terminal into a consumer device itself, be it a phone, a tablet, a wearable device, etc., such that the presence of a cardholder and card are required to complete an online transaction in the same way they are required at a physical POS (i.e., the actual card is used to authorize and complete the transactions).
  • PCI Payment Card Industry
  • Some embodiments use a card reader such as a magnetic reader, contacts for a contacted connection, an optical reader, and or the like.
  • the card reader comprises a magnetic strip reader.
  • the card reader comprises contacts such as electrical signal contacts to provide for contacted communication via electrical signals.
  • Some embodiments provide support for EMV so that an EMV based payment can be conducted for online transactions.
  • NFC Near Field Communication
  • NFC Near Field Communication
  • NFC radios are being included in more and more consumer devices, such as but not limited to smartphones, tablets, and UltrabooksTM.
  • NFC technology is very flexible and has the capability of being used for countless purposes.
  • Many of the contactless use cases are for convenience (just tap to have something useful or interesting happen) and do not require a high level of security.
  • many usage cases do require a high level of security, especially when there is value associated with the information that is made available over the NFC interface.
  • contactless credit cards, contactless identity cards, and contactless access control cards may contain information that can be fraudulently exploited by a malicious third party.
  • NFC terminal equipment that guarantees that the information is safely processed (and not leaked) when accessed from an NFC tag, contactless card, or NFC device (e.g. smartphone).
  • NFC device e.g. smartphone
  • Such POS equipment is sold by the payment service provider to the vendor and requires the cardholder and the card to be at the vendor near the vendor's POS equipment.
  • this approach is expensive because the terminals are specialized and dedicated devices.
  • the vendor is effectively or actually locked into a relationship with a particular payment processing service provider for a period of time by means of a contract and/or the costs associated with the specialized, dedicated equipment that is bound to the payment service provider.
  • consumer devices are expanding their capabilities year over year, there is now a potential to leverage the native NFC capabilities of NFC devices to replace the specialized terminals.
  • Various embodiments may be designed to address different technical problems associated with CNP transactions for online purchases from online vendors. For instance, some embodiments may be designed to address one or more technical problems such as consumer devices not being designed to be as highly secure as specialized terminals, the expense of dedicated terminals for POS transactions, the dedication of terminals to specific payment service providers, the dedication of terminals to specific merchants, and the like.
  • some embodiments that address CNP transactions for online purchases from online vendors may do so by one or more different technical means such as verifying the presence of a card remotely from a vendor via a network, verifying the presence of a card without a device dedicated for a particular vendor, verifying the presence of a card without a device dedicated for a particular payment service provider, incorporating a PCI certified secure element and card reader in a device, communicating by a device with a payment service provider to process a payment as a certified Point of Sale (POS) device for an online vendor, encrypting communications to create encrypted communications to protect the communications from tampering by the applications processor of a processing device, encrypting communications to create an encrypted channel or tunnel for the communications between a secure element of a processing device and the payment service provider to verify the presence of a card of a cardholder, transmitting an authorization request to the payment service provider to process the payment with the encrypted communications via a secure element agent of the processing
  • POS Point of Sale
  • Wi-Fi Wireless Fidelity
  • Wi-Fi generally refers to devices that implement the IEEE 802.11-2012, IEEE Standard for Information technology—Telecommunications and information exchange between systems—Local and metropolitan area networks—Specific requirements—Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications (http://standards.ieee.org/getieee802/download/802.11-2012.pdf) and other related wireless standards.
  • comprise mobile devices or stations (STAs) such as netbooks, mobile devices (Laptop, Smart Phone, Tablet, and the like), as well as televisions, monitors, appliances, and the like.
  • STAs mobile devices or stations
  • netbooks such as netbooks, mobile devices (Laptop, Smart Phone, Tablet, and the like)
  • mobile devices such as netbooks, mobile devices (Laptop, Smart Phone, Tablet, and the like)
  • televisions monitors, appliances, and the like.
  • Logic, modules, devices, and interfaces herein described may perform functions that may be implemented in hardware and/or code.
  • Hardware and/or code may comprise software, firmware, microcode, processors, state machines, chipsets, or combinations thereof designed to accomplish the functionality.
  • Embodiments may facilitate wireless communications. Some embodiments may comprise low power wireless communications like Bluetooth®, wireless local area networks (WLANs), wireless metropolitan area networks (WMANs), wireless personal area networks (WPAN), cellular networks, communications in networks, messaging systems, and smart-devices to facilitate interaction between such devices. Furthermore, some wireless embodiments may incorporate a single antenna while other embodiments may employ multiple antennas.
  • the one or more antennas may couple with a processor and a radio to transmit and/or receive radio waves. For instance, multiple-input and multiple-output (MIMO) is the use of radio channels carrying signals via multiple antennas at both the transmitter and receiver to improve communication performance.
  • MIMO multiple-input and multiple-output
  • WLAN wireless wide area networks
  • cellular phone technologies This disclosure is not limited to WLAN related standards, but may also apply to wireless wide area networks (WWANs) and cellular phone technologies. The examples are not limited in this context.
  • the wireless communication system 1000 comprises a communications device 1010 that may be wire line and wirelessly connected to a network 1005 .
  • the communications device 1010 may communicate wirelessly with a plurality of communication devices such as the communication devices 1030 , 1050 , and 1055 via the network 1005 .
  • the communications device 1010 may comprise a server of a payment service provider.
  • the communications device 1030 may comprise processing devices or other devices with a contactless POS that is PCI certified as “tamper-proof” such as sensors, stations, appliances, computers, laptops, netbooks, cellular phones, smart phones, PDAs (Personal Digital Assistants), or other wireless-capable devices.
  • the communications device 1050 may comprise a server comprising a web site of an online vendor or merchant that can be reached by the communications device 1030 online via, e.g., the Internet.
  • communications devices 1055 may be a server of a payment instrument issuer such as the bank that issues a credit card or EMV card.
  • communications devices may be mobile or fixed.
  • vendor may generally sell any raw materials, goods, or services to a customer such as a consumer or user.
  • customer, consumer, and user may refer to a person or an entity that resides anywhere in the supply chain from a distributor to an end-consumer.
  • the vendor may or may not also refer to a manufacturer and/or distributor.
  • merchant as used herein, may typically refer to a seller of goods.
  • online vendor or online merchant may refer a presence of the vendor or merchant as a web site on an area network such as the Internet or other network that is accessible by multiple entities and/or persons.
  • a user of the communications device 1030 may use the touch screen 1033 on a display of the communications device 1030 to execute a web browser or app to access an online vendor web site on the communications device 1050 to purchase some goods and/or services via the network 1005 .
  • the user may choose a function for checking out, or purchasing, the items in the cart.
  • the online merchant 1150 may dynamically bind a secure element 1034 as a PCI certified POS device to the online merchant 1150 to process a payment by a user 1105 of the device 1030 for the merchant.
  • the online merchant 1150 may bind the secure element 1034 to the payment service provider 1110 by redirecting communications from the secure element 1034 to the payment service provider 1110 (represented by the communication device 1010 in FIG. 1 ).
  • Dynamic binding may involve the binding of the communications device 1030 to any online merchant during the process of making a purchase. Binding may involve temporary association of the communications device 1030 with the particular online merchant 1150 for the purposes of processing a payment to the online merchant 1150 by the payment service provider 1110 for items in the cart.
  • the online merchant 1150 redirects 1121 the communications from the communications device 1030 to the payment service provider 1110 . Binding may be temporary and may occur before or during the redirection 1121 of the communications from the communications device 1030 to the payment service provider 1110 .
  • the online merchant 1150 may establish communications with the payment service provider 1110 through a secure communications channel that uniquely identifies the online merchant 1150 .
  • the online merchant 1150 may communicate with the payment service provider 1110 to initiate a transaction for the payment that is associated with the online merchant or the online merchant's account prior to or while redirecting 1121 the communications from the communications device 1030 to the payment service provider 1110 .
  • redirection 1121 of the communications may involve communications via the same network 1005 , e.g., the Internet, as the communications between the communications device 1030 and the online merchant 1150 .
  • the redirection 1121 of the communications may involve the user 1105 connecting with the payment service provider 1110 via a different network or communications channel such as a cellular data network, a telephone line, an Ethernet network, or a wireless network to process the payment with the payment service provider 1110 .
  • the payment service provider 1110 may start a payment session 1122 with the communications device 1030 .
  • the payment service provider 1110 may dynamically bind the secure element 1034 of the communications device 1030 as a certified POS device to the payment service provider 1110 to process a payment by the user 1105 for the online merchant 1150 via direct interaction between the secure element 1034 and the payment service provider 1110 .
  • the dynamic binding may involve communicating one or more encryption/decryption keys between the mobile device 1030 and the payment service provider 1110 .
  • the direct interaction between the secure element 1034 and the payment service provider 1110 may involve the use of a secure element agent 1037 such as an application executing on the processor(s) 1002 of the communications device 1030 .
  • the secure element agent 1037 may be configured to pass encrypted communications from the payment service provider 1110 to the secure element 1034 and from the secure element 1034 to the payment service provider 1110 .
  • the secure element agent 1037 is unable to decrypt the encrypted communications between the payment service provider 1110 and the secure element 1034 .
  • the secure element 1034 may activate 1123 the card reader 1035 .
  • the card reader 1035 may comprise a contactless reader such as an NFC radio, a magnetic reader, and/or an optical reader.
  • the card reader 1035 may comprise a contacted reader such as one or more electrical contacts, one or more optical contacts, a magnetic reader, and/or an optical reader.
  • the payment service provider 1110 may transmit a message to the user 1105 via the card reader 1035 to effectively inform or prompt 1124 the user 1105 to couple the payment instrument with the card reader 1035 by placing the payment instrument near enough to or in contact with the communications device 1030 to communicate with the card reader 1035 .
  • the message may be displayed on the display 1032 of the communications device 1030 or sounded via speakers of the audio input-output (I/O) 1045 of the communications device 1030 .
  • the card reader 1035 may require physical contact with the payment instrument to interact with the payment instrument and the mobile device 1030 may prompt 1124 the user 1105 to physically couple the payment instrument with the card reader 1035 .
  • the payment instrument may be powered by the card reader 1035 and, in other embodiments, the payment instrument may include a power source to facilitate communications with the card reader 1035 .
  • the secure element 1034 and the card reader 1035 may be part of a “tamper-proof” PCI-certified element 1036 .
  • the secure element 1034 and/or the card reader 1035 may be a detachable attachment coupled with the communications device 1030 .
  • the secure element 1034 and/or the card reader 1035 may be a die in the same chip package as the processors 1002 , memory 1031 , audio I/O 1045 , MAC logic 1038 , transceiver (RX/TX) 1040 , and/or the cell transceiver 1046 .
  • FIG. 10 Further embodiments may comprise a System on a Chip (SOC) comprising the secure element 1034 and/or the card reader 1035 with the processors 1002 , memory 1031 , audio I/O 1045 , MAC logic 1038 , transceiver (RX/TX) 1040 , and/or cell transceiver 1046 .
  • the processors 1002 , memory 1031 , audio I/O 1045 , MAC logic 1038 , transceiver (RX/TX) 1040 , and/or cell transceiver 1046 are on the same die as the secure element 1034 and/or the card reader 1035 .
  • the secure element 1034 comprises an embedded system isolated via a hardware isolation scheme from a main operating system for the communications device 1030 but sharing processor cycles or utilizing one or more processors or processor cores of the processor(s) 1002 .
  • the secure element 1034 may operate independently from the main operating system of the communications device 1030 .
  • the user 1105 may tap 1125 the payment instrument on the card reader 1035 .
  • the user 1105 may couple 1125 the payment instrument or card with the card reader 1035 via contact or via another contactless protocol to proceed with the payment session 1122 .
  • the mobile device 1030 may comprise a marking or written indication on the mobile device 1030 that indicates the location of the card reader 1035 and/or how to use the card reader 1035 .
  • a card reader 1035 may comprise a magnetic and/or optic reader to read or interact with a magnetic medium or optic medium on the payment instrument or may comprise contacts to read or interact with a processor or memory on the payment instrument.
  • the card reader 1035 may transmit data, e.g., via an EMV protocol 1126 , determined from communication with the payment instrument to the secure element 1034 .
  • the data is encrypted for form an encrypted packet such as a cryptogram.
  • the secure element 1034 may transmit the encrypted packet to the payment service provider 1110 to request authorization for the payment 1127 .
  • the secure element 1034 may transmit the encrypted packet in or along with encrypted communications between the secure element 1034 and the payment service provider 1110 via the secure agent 1037 to verify that the payment card is physically present.
  • the secure element 1034 may also transmit to the payment service provider 1110 information or data requested from or determined from the user 1105 to verify the identity of the user 1105 as the cardholder.
  • the information to verify the identity of the cardholder may include one or more personal identifiers such as a personal identification number (PIN), a mother's maiden name, a portion of an identification number such as a social security number or a driver's license number, and/or the like.
  • the secure element 1034 may transmit a personal identifier such as the PIN determined from communications with the user 1105 in encrypted communications along with the encrypted packet transmitted to the payment service provider 1110 to request authorization for the payment to the online merchant 1150 .
  • the personal identifier is sent in a different packet from the encrypted packet.
  • the secure element 1034 may transmit the encrypted packet determined from communications with the payment instrument alone to the payment service provider 1110 to request authorization for the payment to the online merchant 1150 .
  • the payment service provider 1110 may select a personal identifier from a group of personal identifiers and request that the secure element return the particular personal identifier as part of a cardholder verification procedure.
  • the secure element 1034 or the payment instrument may identify one or more personal identifiers to transmit to the payment service provider 1110 to verify the identity of the cardholder.
  • the payment instrument may generate a number in addition to the encrypted packet that identifies one or more particular personal identifiers to include with the encrypted packet to verify the identity of the cardholder.
  • processing the payment may involve verifying that the data in the encrypted packet determined from the payment instrument matches data that is expected from the payment instrument to verify that the payment instrument is a valid payment instrument.
  • processing the payment may involve verifying the identity of the cardholder by verifying that the one or more personal identifiers match the expected personal identifiers associated with the payment instrument and, in some embodiments, associated with the encrypted packet.
  • the payment service provider 1110 or a server in communication with the payment service provider 1110 may present the payment information for the online merchant 1150 for authorization processing 1128 .
  • the payment information may be presented to a bank such as the bank that issued the payment instrument to the cardholder to determine if the payment to the online merchant is approved.
  • the payment service provider 1110 may transmit an indication of the approval 1129 to the secure element 1034 , an indication of the payment completion 1130 to the online merchant 1150 , and terminate the payment session 1132 between the payment service provider 1110 and the secure element 1034 .
  • the issuing bank of the payment instrument such as the communications device 1055 may process the payment to transmit the payment to the online merchants 1150 account.
  • the online merchant 1150 may transmit an indication to the user 1105 that the payment or order is completed 1131 .
  • FIG. 1B illustrates an embodiment of a process of an mCommerce transaction 1200 the may be accomplished with communication devices such as the communications devices 1010 , 1030 , 1050 , and 1055 in FIG. 1 .
  • the mCommerce transaction 1200 involves the use of one or more payment instruments 1210 to make a payment to an online merchant 1240 .
  • the one or more payment instruments 1210 may comprise, for example, a smartphone 1212 and/or a physical credit card 1214 .
  • the smartphone 1212 may include an embedded payment instrument system with an application that is protected from tampering and/or view such as a secure element (SE) or a trusted platform module (TPM) that includes a processor, code, and memory.
  • SE secure element
  • TPM trusted platform module
  • the smartphone 1212 may include a state machine in lieu of or in addition to the processor, code, and memory.
  • the physical credit card 1214 may include a processor, code, and memory or a state machine.
  • the smartphone 1212 and/or physical credit card 1214 may comprise at least one of a magnetic medium, an optical medium, a memory, another type of medium, a processor, or a state machine and an interface to facilitate communication with a card reader on the certified POS 1220 .
  • the one or more payment instruments 1210 may interact with a PCI certified POS device 1220 via an NFC card reader to provide data such as a random number that can verify the identity of the payment instrument to a payment service provider, which is embodied by a payment processor 1230 in the present embodiment.
  • the data provided by the one or more payment instruments 1210 is encrypted.
  • the PCI certified POS device 1220 may comprise a mobile device 1222 .
  • the PCI certified POS device 1220 may comprise any processing device such as a desktop computer, a notebook, a laptop, an UltrabookTM, a smartphone, a personal digital assistant, a navigation device, a wearable device, or the like.
  • the PCI certified POS device 1220 may transmit the data provided by the one or more payment instruments 1210 directly to the payment processor 1230 rather than to the online merchant 1240 unlike traditional transactions in which the data would be presented to the merchant's POS device.
  • the data provided by the one or more payment instruments 1210 may verify the presence of the payment instrument(s) 1210 due to the physical requirement to couple the one or more payment instruments 1210 with the PCI certified POS device 1220 .
  • the PCI certified POS device 1220 may also transmit information to verify the identification of the cardholder to verify the presence of the cardholder at the PCI certified POS device 1220 .
  • the payment processor 1230 may receive the data provided by the one or more payment instruments 1210 as an authorization request to process a payment for the online merchant 1240 .
  • the payment processor 1230 may include a payment processor gateway 1232 and a payment processor server 1234 .
  • the payment processor gateway 1232 may provide access to the payment processor server 1234 via one or more networks such as the Internet, another wide area network, a municipal area network, a local area network, a personal area network, wireless area network, a digital telephone line, an analog telephone line, a cellular phone line, a cellular data line, and/or the like.
  • the payment processor server 1234 may authenticate the one or more payment instruments 1210 , verify the presence of the cardholder at the PCI certified POS device 1220 , and process the payment authorization.
  • the payment authorization may be performed by other servers via the payment processor gateway 1232 such as by one or more servers representative of a Europay network, a Visa network, a MasterCard network, an American Express network, or other credit card network as well as a network representative of the bank(s) that issued the one or more payment instruments 1210 .
  • the payment processor 1230 may issue the payment to the online merchant account for one or more online merchant(s) 1240 associated with the payment from the user.
  • the online merchant 1240 may represent one or more merchants such as merchant 1242 , merchant 1244 , and merchant 1246 .
  • the payment processor 1230 may process more than one payment from the one or more payment instruments 1210 for the one or more online merchants 1240 .
  • the network 1005 may represent an interconnection of a number of networks.
  • the network 1005 may couple with a wide area network such as the Internet or an intranet and may interconnect local devices wired or wirelessly interconnected via one or more hubs, routers, or switches.
  • network 1005 communicatively couples communications devices 1010 , 1030 , 1050 , and 1055 .
  • the communication devices 1010 and 1030 comprise processor(s) 1001 and 1002 , memory 1011 and 1031 , and MAC sublayer logic 1018 and 1038 , respectively.
  • the processor(s) 1001 and 1002 may comprise one or more data processing devices such as microprocessors, microcontrollers, state machines, and the like.
  • the memory 1011 and 1031 may comprise a storage medium such as Dynamic Random Access Memory (DRAM), read only memory (ROM), buffers, registers, cache, flash memory, hard disk drives, solid-state drives, or the like.
  • DRAM Dynamic Random Access Memory
  • ROM read only memory
  • buffers registers
  • cache flash memory
  • hard disk drives solid-state drives, or the like.
  • solid-state drives or the like.
  • the memory 1011 and 1031 may comprise applications or other code that a user may generally use.
  • the communications device 1030 may comprise a smartphone and the memory 1031 may comprise an operating system and a phone application for placing calls via a cell transceiver 1046 .
  • the communications device 1030 may comprise a processing device such as a desktop or mobile computer and the memory 1031 may comprise utilities and business applications.
  • the memory 1011 and 1031 may also store frames and/or frame structures such as standard frames and frame structures identified in IEEE 802.11 for wireless communications. Note also that memory 1011 and 1031 may reside in a system or in proximity to or in the MAC sublayer logic 1018 and 1038 or the transceivers (RX/TX) 1020 and 1040 .
  • Medium access control (MAC) sublayer logic (MAC logic) 1018 and 1038 may comprise logic to implement functionality of the MAC sublayer of the data link layer of the communications devices 1010 and 1030 , respectively.
  • the MAC logic 1018 and 1038 may generate the frames such as management frames, data frames, and control frames, and may communicate with the PHY logic 1019 and 1039 , respectively, to transmit the frames.
  • the PHY logic 1019 and 1039 may generate physical layer protocol data units (PPDUs) based upon the frames.
  • PPDUs physical layer protocol data units
  • frame builders of the MAC logic 1018 and 1038 may generate the frames and data unit builders of the PHY logic 1019 and 1039 , respectively, may prepend the frames with preambles to generate PPDUs for transmission via a physical layer device such as the transceivers (RX/TX) 1020 and 1040 , respectively.
  • a physical layer device such as the transceivers (RX/TX) 1020 and 1040 , respectively.
  • the communications devices 1010 , 1030 , 1050 , and 1055 may each comprise a transceiver such as transceivers 1020 and 1040 .
  • Each transceiver 1020 and 1040 comprises a radio 1023 and 1043 , respectively, comprising an RF transmitter and an RF receiver.
  • Each RF transmitter impresses digital data onto an RF frequency for transmission of the data by electromagnetic radiation.
  • An RF receiver receives electromagnetic energy at an RF frequency and extracts the digital data therefrom.
  • the communications devices 1010 , 1030 , 1050 , and 1055 may communicate with the network 1005 wirelessly via the transceivers 1020 and 1040 , physically through network interface cards (not shown), wirelessly through cell transceivers such as the cell transceiver 1046 or by other network means.
  • FIG. 10
  • MIMO 1 may depict a number of different embodiments including a Multiple-Input, Multiple-Output (MIMO) system with, e.g., four spatial streams, and may depict degenerate systems in which one or more of the communications devices 1010 , 1030 , 1050 , and 1055 comprise a receiver and/or a transmitter with a single antenna including a Single-Input, Single Output (SISO) system, a Single-Input, Multiple Output (SIMO) system, and a Multiple-Input, Single Output (MISO) system.
  • SISO Single-Input, Single Output
  • SIMO Single-Input, Multiple Output
  • MISO Multiple-Input, Single Output
  • transceivers 1020 and 1040 implement orthogonal frequency-division multiplexing (OFDM).
  • OFDM is a method of encoding digital data on multiple carrier frequencies.
  • OFDM is a frequency-division multiplexing scheme used as a digital multi-carrier modulation method.
  • a large number of closely spaced orthogonal sub-carrier signals are used to carry data.
  • the data is divided into several parallel data streams or channels, one for each sub-carrier.
  • Each sub-carrier is modulated with a modulation scheme at a low symbol rate, maintaining total data rates similar to conventional single-carrier modulation schemes in the same bandwidth.
  • An OFDM system uses several carriers, or “tones,” for functions including data, pilot, guard, and nulling.
  • Data tones are used to transfer information between the transmitter and receiver via one of the channels.
  • Pilot tones are used to maintain the channels, and may provide information about time/frequency and channel tracking.
  • Guard interval may be inserted between symbols such as the short training field (STF) and long training field (LTF) symbols during transmission to avoid inter-symbol interference (ISI), which might result from multi-path distortion.
  • STF short training field
  • LTF long training field
  • ISI inter-symbol interference
  • Guard tones help the signal conform to a spectral mask.
  • the nulling of the direct component (DC) may be used to simplify direct conversion receiver designs.
  • the communications device 1010 optionally comprises a Beam Former (BF) 1022 , as indicated by the dashed lines.
  • the BF 1022 provides spatial filtering and is a signal processing technique used with antenna array 1024 for directional signal transmission or reception. This is achieved by combining elements in a phased antenna array 1024 in such a way that signals at particular angles experience constructive interference while others experience destructive interference. Beamforming can be used at both the transmitting and receiving ends in order to achieve spatial selectivity.
  • the antenna array 1024 is an array of individual, separately excitable antenna elements. The signals applied to the elements of the antenna array 1024 cause the antenna array 1024 to radiate one to four spatial channels.
  • Each spatial channel so formed may carry information to one or more of the communications devices 1030 , 1050 , and 1055 .
  • the communications device 1030 comprises a transceiver 1040 to receive and transmit signals from and to the communications device 1010 .
  • the transceiver 1040 may comprise an antenna array 1044 and, optionally, a BF 1042 .
  • the communications device 1030 may also comprise cellular phone communications capabilities.
  • the MAC logic 1038 may prepare audio and data packets for transmission through the cell transceiver 1046 based upon the technologies associated with the communications device 1030 .
  • the cell transceiver 1046 may comprise cell logic 1047 , a cell radio 1048 , and a cell antenna 1049 to implement 3G or 4G wireless standards that may include without limitation any of the IEEE 802.16m and 802.16p standards, 3rd Generation Partnership Project (3GPP) Long Term Evolution (LTE) and LTE-Advanced (LTE-A) standards, and International Mobile Telecommunications Advanced (IMT-ADV) standards, including their revisions, progeny and variants.
  • 3GPP 3rd Generation Partnership Project
  • LTE Long Term Evolution
  • LTE-A LTE-Advanced
  • IMT-ADV International Mobile Telecommunications Advanced
  • GSM Global System for Mobile Communications
  • EDGE Universal Mobile Telecommunications System
  • UMTS Universal Mobile Telecommunications System
  • High Speed Packet Access WiMAX II technologies
  • CDMA 2000 system technologies e.g., CDMA2000 1 ⁇ RTT, CDMA2000 EV-DO, CDMA EV-DV, and so forth
  • High Performance Radio Metropolitan Area Network HIPERMAN
  • ETSI European Telecommunications Standards Institute
  • BRAN Broadband Radio Access Networks
  • WiBro Wireless Broadband
  • HSDPA High Speed Downlink Packet Access
  • HSUPA High Speed Orthogonal Frequency-Division Multiplexing
  • HOPA High-Speed Uplink Packet Access
  • HSUPA High-Speed Uplink Packet Access
  • the cell logic 1047 may encode and modulate packets for transmission and demodulate and decode packets for reception.
  • the cell radio 1048 may amplify and convert the signals into radio signals for transmission via the cell antenna 1049 . And the cell radio 1048 may receive, amplify and convert the signals from radio signals for reception via the cell antenna 1049 .
  • the communications device 1030 may also comprise a subscriber identification module (SIM).
  • SIM may be an integrated circuit that securely stores the international mobile subscriber identity (IMSI) and the related key used to identify and authenticate subscribers on mobile telephony devices (such as mobile phones and computers).
  • the SIM may contain data that can be used to verify the presence of a cardholder for a payment transaction with an online merchant 1150 .
  • the SIM may contain data that can be used to verify the presence of a payment instrument for a payment transaction with an online merchant 1150 .
  • the cellular transceiver 1046 may be used for communications between the payment service provider 1110 and the secure element 1034 .
  • FIG. 2 depicts an embodiment of a mobile device 2000 to verify the presence of a payment instrument such as a card and, in some embodiments, a cardholder to process a payment for an online merchant as a Card Present Transaction (CP) rather than a Card Not Present (CNP) transaction even though the cardholder is not physically located at or near a POS owned by the online merchant.
  • the mobile device 2000 may be a certified POS device that the cardholder can use to verify the presence of a payment instrument as well as the presence of the cardholder so a transaction with the merchant can be verified as a CP and cardholder present transaction.
  • the mobile device 2000 may comprise a system-on-chip (SOC) processor 2010 , an embedded secure element (eSE) 2020 , a Near Field Communications (NFC) Controller 2030 , and a subscriber identification module (SIM) 2040 .
  • the mobile device 2000 may comprise the SOC processor 2010 as a main processing unit for the mobile device 2000 .
  • the SOC processor 2010 may represent one or more processors that are configured to perform general and specific operations of the phone.
  • a main operating system may execute on the SOC processor 2010 to execute applications to interface with a user via, e.g., a graphical user interface.
  • the mobile device 2000 may comprise a cellular phone, smartphone, laptop, notebook, MP3 player, wearable processing device, or other mobile processing device.
  • the mobile device 2000 may be a stationary processing device such as a desktop computer, workstation, and/or the like.
  • the SOC processor 2010 may comprise a network controller to connect to a network such as the Internet or another network via a wired and/or wireless connection. In some embodiments, the SOC processor 2010 may also comprise memory and an input-output controller to implement the functionality of the mobile device 2000 .
  • the mobile device 2000 may comprise a tamper-proof component eSE 2020 at the center of the architecture.
  • the NFC controller 2030 is physically (as opposed to virtually) isolated from the SOC processor 2010 (or main processor unit) by removing or not implementing the data path between the NFC controller 2030 and the SOC processor 2010 indicated by the “interface not wired” label on the Inter-Integrated Circuit or I-squared-C (I2C) bus connections of the SOC processor 2010 and the NFC controller 2030 .
  • the SOC processor 2010 is connected to the eSE 2020 via, e.g., a serial peripheral interface (SPI) connection and the eSE 2020 is connected to the NFC controller 2030 .
  • SPI serial peripheral interface
  • the highly sensitive data received over the NFC controller 2030 interface is sent directly and exclusively to the eSE 2020 , where it can be securely processed without exposing such sensitive data directly to the SOC Processor 2010 and the software (e.g. Android, Windows, etc.) running on the SOC processor 2010 , which may be compromised and/or malicious.
  • the software e.g. Android, Windows, etc.
  • the general purpose input-output may interconnect the SOC processor 2010 with the NFC controller 2030 without compromising the security because the GPIO interface on the NFC controller 2030 is not capable of a sufficiently complex communication with the SOC processor 2010 to compromise security.
  • the eSE 2020 may be a smart card chip that stores information, manages security and provides a firewall between NFC applications and other elements in the mobile device 2000 .
  • the eSE 2020 may also be a tamper resistant Smart Card chip that facilitates the secure storage and transaction of payment and other sensitive credentials.
  • Secure elements may be used in multi-application environment and can be available in multiple form factors like Plastic Smart Cards, UICC(SIM)s, eSEs, micro secure digital (microSD) cards, etc.
  • the eSE 2020 may comprise one or more of a Secure Microcontrollers, a processing unit, an Operating System, Memory, Immutable (ROM), Mutable Electrical Erasable Programmable Read Only Memory (EEPROM), Volatile Random Access Memory (RAM), Crypto Engine, Sensor, Timer, Communication Ports, and/or the like.
  • the eSE 2020 may be formally evaluated and certified by EMVco and/or Common Criteria standard procedures and suitable for highly secure use cases within the payment card industry (PCI) (i.e., to make and receive payment), Mobile Subscription Management, Identity Management, strong Authentication, etc.
  • PCI payment card industry
  • embodiments may comprise any tamperproof architecture to protect data from access by malicious or compromised software.
  • tamper-proof protection such as the eSE 2020 may be integrated into SOC processor 2020 thereby displacing the discrete eSE 2020 in favor of an integrated solution.
  • the eSE 2020 may comprise logic such as hardware and/or code to perform a point of sale (POS) transaction with an online vendor as a Card Present transaction rather than a Card Not Present transaction by implementing PCI certified POS functionality.
  • the eSE 2020 may couple with the NFC controller 2030 to communicate with a web site of the online vendor to process a payment to the online vendor as a certified POS device rather than transmitting payment instrument information to the online vendor to use the online vendor's POS device.
  • the online vendor may redirect communications from the eSE 2020 to the payment service provider so the eSE 2020 may communicate directly with the payment service provider associated with the online vendor to process the payment.
  • the eSE 2020 may interact with the NFC controller 2030 to obtain a packet to process the payment with a payment instrument and encrypt communications to transmit an authorization request to the payment service provider to process the payment with encrypted communications.
  • the direct interaction between the certified POS device (eSE 2020 ) and the payment instrument via the NFC controller 2030 may verify that the payment instrument is present to constitute a card present transaction.
  • the eSE 2020 may verify that the cardholder is present by prompting the cardholder to couple the payment instrument to the NFC controller 2030 . In some embodiments, the eSE 2020 may verify that the cardholder is present by prompting the cardholder for a personal identifier and either passing the personal identifier to the payment service provider or comparing the personal identifier with data on the SIM 2040 .
  • the SIM 2040 may store network-specific information used to authenticate and identify subscribers on the cellular network.
  • the network-specific information may comprise the ICCID, IMSI, Authentication Key (Ki), Local Area Identity (LAI) and Operator-Specific Emergency Number.
  • the SIM 2040 may also store other carrier-specific data such as the SMSC (Short Message Service Center) number, Service Provider Name (SPN), Service Dialing Numbers (SDN), Advice-Of-Charge parameters and Value Added Service (VAS) applications.
  • SMSC Short Message Service Center
  • SPN Service Provider Name
  • SDN Service Dialing Numbers
  • VAS Value Added Service
  • the SIM 2040 may comprise a SIM card with a unique integrated circuit card (UICC) identifier (ICCID).
  • ICCIDs may be stored in the SIM cards and also engraved or printed on the SIM card body during a process called personalization.
  • the ICCID number may be up to 22 digits long, including a single check digit calculated using a Luhn algorithm.
  • the ICCID length may be 10 octets (20 digits) with an operator-specific structure.
  • the SIM 2040 may comprise a different number or code with the same of different length.
  • FIG. 3 illustrates an embodiment of a flowchart 300 of a transaction in which a personal processing device functions as a certified POS device to process a payment to an online vendor as a Card Present transaction.
  • the flowchart 300 begins with communicating, by the personal processing device as a certified Point of Sale (POS) device, with a web site of an online vendor to process a payment to the online vendor (element 305 ).
  • POS Point of Sale
  • a cardholder may shop on the online vendor's web site with the personal processing device. After selecting one or more items to purchase, the cardholder may interact with the web site to begin a process of completing the purchase of the items.
  • the online vendor's web site may redirect the cardholder's web browser to a payment service provider's web site to complete the transaction.
  • the online vendor's web site may open a web portal to the payment service provider's web site to complete the transaction.
  • the process of redirecting the personal processing device to the payment service provider's web site to complete the transaction may involve providing sufficient information to the payment service provider to dynamically associate or bind the certified POS device to the online vendor (element 310 ).
  • the online vendor's web site may provide information about the transaction to the associate or dynamically bind the transaction with the online vendor's merchant account and the certified POS device (element 320 ).
  • the personal processing device may communicate with a payment service provider to process the payment (element 315 ).
  • the payment service provider may transmit a message or an indication of a message to the secure element of the personal processing device to prompt the cardholder to couple the payment instrument or card with the personal processing device to process the payment with the payment instrument and the card reader.
  • the direct interaction between the secure element and the payment service provider may dynamically bind the certified POS device to the payment service provider to process the payment by a user of the certified POS device for the online vendor (element 320 ).
  • the secure element may respond by activating a near field communication radio to interact with an EMV (Europay, MasterCard, and Visa) card to process the payment with the personal processing device and prompt the cardholder to couple the EMV card with the personal processing device to process the payment.
  • EMV Europay, MasterCard, and Visa
  • the secure element may then interact with EMV card of the cardholder via the card reader to obtain a packet to process the payment (element 325 ).
  • a different type of card reader may be activated to read the payment instrument of the user.
  • the EMV card may provide an encrypted packet or cryptogram to the secure element via the card reader to process the payment.
  • the secure element may encrypt communications to transmit an authorization request to the payment service provider to process the payment.
  • the secure element may transmit the authorization request with encrypted communications via a secure element agent of the certified POS device and the authorization request may comprise the encrypted packet or cryptogram to verify that the card is present for the transaction (element 330 ).
  • the secure element may also include data to verify or indicate verification that the cardholder is present at or near to secure element.
  • the coupling of the payment instrument with the personal processing device may be sufficient to indicate that the cardholder is present at the POS transaction.
  • the secure element may receive an approval of the authorization request for the payment (element 335 ). And, thereafter, the secure element may receive a completed payment session communication from the payment service provider (element 340 ). The completed payment session communication may terminate the payment session and terminate the direct communications between the personal processing device and the payment service provider.
  • some or all of the features described above and in the claims may be implemented in one embodiment.
  • alternative features may be implemented as alternatives in an embodiment along with logic or selectable preference to determine which alternative to implement.
  • Some embodiments with features that are not mutually exclusive may also include logic or a selectable preference to activate or deactivate one or more of the features.
  • some features may be selected at the time of manufacture by including or removing a circuit pathway or transistor. Further features may be selected at the time of deployment or after deployment via logic or a selectable preference such as a dipswitch or the like. A user after via a selectable preference such as a software preference, an e-fuse, or the like may select still further features.
  • a number of embodiments may have one or more advantageous effects. For instance, some embodiments may offer reduced MAC header sizes with respect to standard MAC header sizes. Further embodiments may include one or more advantageous effects such as smaller packet sizes for more efficient transmission, lower power consumption due to less data traffic on both the transmitter and receiver sides of communications, less traffic conflicts, less latency awaiting transmission or receipt of packets, and the like.
  • the apparatus may comprise a processing device comprising an application processor, a secure element agent, and a network communications device, the processing device to interact with an online vendor; a card reader; and a secure element coupled with the card reader and the secure element agent, the secure element to communicate with a web site of the online vendor to process a payment to the online vendor as a certified Point of Sale (POS) device; to communicate with a payment service provider associated with the online vendor to process the payment in response to communication with the web site; to interact with the card reader to obtain a packet to process the payment with a payment instrument; to encrypt communications to transmit an authorization request to the payment service provider to process the payment with encrypted communications via the secure element agent, the authorization request to comprise the packet to verify that the card is present for the transaction; and to receive an approval of the authorization request for the payment.
  • POS Point of Sale
  • the secure element comprises logic to start a payment session with the payment service provider and to activate the card reader to process the payment for the online vendor.
  • the card reader comprises one or more of a near field communication radio and antenna to communicate with the payment instrument, a magnetic medium reader, an optical medium reader, and contacts for a contacted connection.
  • the secure element comprises logic to communicate a message from the payment service provider to a user to prompt the user to process the payment with the payment instrument and the card reader.
  • the secure element comprises logic to dynamically bind the certified POS device to the online vendor to process the payment by a user of the certified POS device for the online vendor.
  • the secure element comprises logic to dynamically bind the certified POS device to the payment service provider to process the payment by a user of the certified POS device for online vendor.
  • Another embodiment comprises one or more tangible computer-readable non-transitory storage media comprising computer-executable instructions.
  • the computer-executable instructions may be operable to, when executed by at least one computer processor, enable the at least one computer processor to implement a method.
  • the method may involve communicating, by a certified Point of Sale (POS) device, with a web site of an online vendor to process a payment to the online vendor; communicating with a payment service provider associated with the online vendor to process the payment in response to communicating with the web site; interacting with a card reader to obtain a packet to process the payment with a payment instrument; encrypting communications to transmit an authorization request to the payment service provider to process the payment with encrypted communications via a secure element agent of the certified POS device, the authorization request to comprise the packet to verify that the card is present for the transaction; and receiving an approval of the authorization request for the payment.
  • POS Point of Sale
  • the method further comprising activating a near field communication radio or contact interface to interact with an EMV (Europay, MasterCard and Visa) card to process the payment.
  • the method further comprises communicating a message from the payment service provider to a user to prompt the user to process the payment with the payment instrument and the card reader.
  • the method further comprises dynamically binding the certified POS device to the online merchant to process the payment by a user of the certified POS device for the online vendor.
  • the method further comprises dynamically binding the secure element as a POS device to the payment service provider to process the payment by a user of the certified POS device for the online vendor.
  • Further embodiments may include a method to perform a point of sale transaction.
  • the method may involve communicating, by a certified Point of Sale (POS) device, with a web site of an online vendor to process a payment to the online vendor; communicating with a payment service provider associated with the online vendor to process the payment in response to communicating with the web site; interacting with a card reader to obtain a packet to process the payment with a payment instrument; encrypting communications to transmit an authorization request to the payment service provider to process the payment with encrypted communications via a secure element agent of the certified POS device, the authorization request to comprise the packet to verify that the card is present for the transaction; and receiving an approval of the authorization request for the payment.
  • POS Point of Sale
  • the method may further comprise activating a near field communication radio or contact interface to interact with an EMV (Europay, MasterCard, and Visa) card to process the payment.
  • the method may further comprise communicating a message from the payment service provider to a user to prompt the user to process the payment with the payment instrument and the card reader.
  • the method may further comprise dynamically binding the certified POS device to the online vendor to process the payment by a user of the certified POS device for the online vendor.
  • the method may further comprise dynamically binding the certified POS device to the payment service provider to process the payment by a user of the certified POS device for the online vendor.
  • FIG. 1 may depict a system to perform a point of sale transaction.
  • the system may comprise a processing device comprising an application processor, a secure element agent, and a network communications device, the processing device to comprise logic to interact with an online vendor; a card reader; and a secure element coupled with the card reader and the secure element agent, the secure element to communicate with a web site of the online vendor to process a payment to the online vendor as a certified Point of Sale (POS) device; to communicate with a payment service provider associated with the online vendor to process the payment in response to communication with the web site; to interact with the card reader to obtain a packet to process the payment with a payment instrument; to encrypt communications to transmit an authorization request to the payment service provider to process the payment with encrypted communications via the secure element agent, the authorization request to comprise the packet to verify that the card is present for the transaction; and to receive an approval of the authorization request for the payment; a memory coupled with the application processor; medium access control logic coupled with the memory to determine and decode wireless communications; one or more antennas; and one
  • the secure element comprises logic to start a payment session with the payment service provider and to activate the near field communication radio or contact interface to process the payment for the online vendor.
  • the card reader comprises one or more of a near field communication radio and antenna, a magnetic medium reader, an optical medium reader, and contacts for a contacted connection to communicate with the payment instrument.
  • the secure element comprises logic to communicate a message from the payment service provider to a user to prompt the user to process the payment with the payment instrument and the card reader.
  • the secure element comprises logic to dynamically bind the certified POS device to the online vendor to process the payment by a user of the certified POS device for the online vendor.
  • the secure element comprises logic to dynamically bind the certified POS device to the payment service provider to process the payment by a user of the certified POS device for online vendor.
  • the apparatus may comprise a means for communicating, by a certified Point of Sale (POS) device, with a web site of an online vendor to process a payment to the online vendor; a means for communicating with a payment service provider associated with the online vendor to process the payment in response to communicating with the web site; a means for interacting with a card reader to obtain a packet to process the payment with a payment instrument; a means for encrypting communications to transmit an authorization request to the payment service provider to process the payment with encrypted communications via a secure element agent of the certified POS device, the authorization request to comprise the packet to verify that the card is present for the transaction; a means for receiving an approval of the authorization request for the payment.
  • POS Point of Sale
  • the system may further comprise a means for activating a near field communication radio or contact interface to interact with an EMV (Europay, MasterCard and Visa) card to process the payment.
  • the system may further comprise a means for communicating a message from the payment service provider to a user to prompt the user to process the payment with the payment instrument and the card reader.
  • the system may further comprise a means for dynamically binding the certified POS device to the online vendor to process the payment by a user of the certified POS device for the online vendor.
  • the system may further comprise a means for dynamically binding the certified POS device to the payment service provider to process the payment by a user of the certified POS device for the online vendor.
  • Embodiments can take the form of an entirely hardware embodiment, a software embodiment implemented via general purpose hardware such as one or more processors and memory, or an embodiment containing both specific-purpose hardware and software elements.
  • One embodiment is implemented in software or code, which includes but is not limited to firmware, resident software, microcode, or other types of executable instructions.
  • embodiments can take the form of a computer program product accessible from a machine-accessible, computer-usable, or computer-readable medium providing program code for use by or in connection with a computer, mobile device, or any other instruction execution system.
  • a machine-accessible, computer-usable, or computer-readable medium is any apparatus or article of manufacture that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system or apparatus.
  • the medium may comprise an electronic, magnetic, optical, electromagnetic, or semiconductor system medium.
  • Examples of a machine-accessible, computer-usable, or computer-readable medium include memory such as volatile memory and non-volatile memory.
  • Memory may comprise, e.g., a semiconductor or solid-state memory like flash memory, magnetic tape, a removable computer diskette, a random access memory (RAM), a read-only memory (ROM), a rigid magnetic disk, and/or an optical disk.
  • optical disks include compact disk-read only memory (CD-ROM), compact disk-read/write memory (CD-R/W), digital video disk (DVD)-read only memory (DVD-ROM), DVD-random access memory (DVD-RAM), DVD-Recordable memory (DVD-R), and DVD-read/write memory (DVD-R/W).
  • CD-ROM compact disk-read only memory
  • CD-R/W compact disk-read/write memory
  • DVD-ROM digital video disk
  • DVD-RAM DVD-random access memory
  • DVD-R DVD-Recordable memory
  • DVD-R/W DVD-read/write memory
  • An instruction execution system suitable for storing and/or executing program code may comprise at least one processor coupled directly or indirectly to memory through a system bus.
  • the memory may comprise local memory employed during actual execution of the code, bulk storage such as dynamic random access memory (DRAM), and cache memories which provide temporary storage of at least some code in order to reduce the number of times code must be retrieved from bulk storage during execution.
  • DRAM dynamic random access memory
  • I/O devices can be coupled to the instruction execution system either directly or through intervening I/O controllers.
  • Network adapters may also be coupled to the instruction execution system to enable the instruction execution system to become coupled to other instruction execution systems or remote printers or storage devices through intervening private or public networks.
  • Modem, BluetoothTM, Ethernet, Wi-Fi, and WiDi adapter cards are just a few of the currently available types of network adapters.

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Theoretical Computer Science (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Finance (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Computer Security & Cryptography (AREA)
  • Cash Registers Or Receiving Machines (AREA)
  • Telephonic Communication Services (AREA)

Abstract

Logic to perform a point of sale (POS) transaction as Card Present. Logic may communicate with a web site of an online vendor to process a payment to the online vendor as a certified POS device. Logic may communicate with a payment service provider associated with the online vendor to process the payment in response to communicating with the web site. Logic may interact with a card reader to obtain a packet to process the payment with a payment instrument to verify the presence of the payment instrument. Logic may encrypt communications to transmit an authorization request to the payment service provider to process the payment with encrypted communications via a secure element agent of the certified POS device, the authorization request to comprise the packet to verify that the payment instrument is present for the transaction. And logic may receive an approval of the authorization request for the payment.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • This application is a continuation of, claims the benefit of and priority to previously filed U.S. patent application Ser. No. 14/476,732, filed Sep. 3, 2014, entitled “METHODS AND ARRANGEMENTS TO COMPLETE ONLINE TRANSACTIONS”, which claims the benefit of and priority to previously filed U.S. Provisional Patent Application Ser. No. 61/821,428, filed May 9, 2013, entitled “TAMPER-RESISTANT NFC READER”, which are hereby incorporated by reference in their entireties.
  • TECHNICAL FIELD
  • The present disclosure relates generally to the field of wireless communications technologies. More particularly, the present disclosure relates to performing online transactions as “card present” (CP) transactions instead of “card not present” (CNP) with a consumer device.
  • BACKGROUND
  • Mobile Commerce is the usage of a mobile device to access a web site or app for the purpose of buying goods/services and remotely executing a payment via the web site/app's payment service. Mobile Commerce is constantly growing in popularity as smartphones and tablets become more prevalent. Since mobile commerce transactions (mCommerce) are remote transactions with respect to the vendor, they are considered Card Not Present (CNP transactions) and incur a higher processing fee than transactions at a physical Point of Sale (POS), called Card Present (CP) transactions. The higher processing fees are assessed in the CNP transactions because the cardholder and the payment instrument are not physically present at a certified POS device at the time the payment is made. mCommerce transactions are also riskier transactions since it is easier to commit fraud by stealing account information and using it to make remote payments where the actual card is not needed to complete a CNP transaction.
  • There is no current solution to this problem. There are some solutions around user authentication aimed at proving the identity of the user and possession of a credit card, but for mCommerce transactions and similar transactions, the actual card is not used to conduct the transaction as is the case of a CP transaction through a physical, PCI (Payment Card Industry) certified POS, so these transactions are still considered CNP transactions.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 depicts an embodiment of a wireless network comprising a plurality of communications devices;
  • FIG. 1A depicts an embodiment of communication flow to perform an mCommerce transaction in which a mobile device functions as a certified POS device to process a payment to an online vendor as a Card Present transaction;
  • FIG. 1B depicts an embodiment of a process of an mCommerce transaction device to process a payment to an online vendor as a Card Present transaction;
  • FIG. 2 depicts an embodiment of a mobile device to process a payment to an online vendor as a Card Present transaction; and
  • FIG. 3 depicts an embodiment of a flowchart of a transaction in which a personal processing device functions as a certified POS device to process a payment to an online vendor as a Card Present transaction.
  • DETAILED DESCRIPTION OF EMBODIMENTS
  • The following is a detailed description of novel embodiments depicted in the accompanying drawings. However, the amount of detail offered is not intended to limit anticipated variations of the described embodiments; on the contrary, the claims and detailed description are to cover all modifications, equivalents, and alternatives as defined by the appended claims. The detailed descriptions below are designed to make such embodiments understandable and obvious to a person having ordinary skill in the art.
  • Some of the commonly used devices do not provide any protection for sensitive data as the data is directly sent to the Application Processor where malicious SW (software) may intercept it. Better solutions may make use of a Trusted Execution Environment (TEE) within the Application Processor to protect the sensitive data as it enters the Application Processor environment, but TEEs are not certified as tamper-proof. Finally, some other solutions rely on an NFC controller and run a modified NFC controller firmware version to manage the sensitive data, but again NFC controllers are not certified as tamper proof.
  • Embodiments may integrate a Payment Card Industry (PCI) certified POS terminal into a consumer device itself, be it a phone, a tablet, a wearable device, etc., such that the presence of a cardholder and card are required to complete an online transaction in the same way they are required at a physical POS (i.e., the actual card is used to authorize and complete the transactions). Some embodiments use a card reader such as a magnetic reader, contacts for a contacted connection, an optical reader, and or the like. For instance, in some embodiments, the card reader comprises a magnetic strip reader. In some embodiments, the card reader comprises contacts such as electrical signal contacts to provide for contacted communication via electrical signals. Some embodiments provide support for EMV so that an EMV based payment can be conducted for online transactions. And some embodiments employ NFC (Near Field Communication) to provide a contactless solution.
  • NFC (Near Field Communication) is gaining wide acceptance within mobile devices and as a result, NFC radios are being included in more and more consumer devices, such as but not limited to smartphones, tablets, and Ultrabooks™. NFC technology is very flexible and has the capability of being used for countless purposes. Many of the contactless use cases are for convenience (just tap to have something useful or interesting happen) and do not require a high level of security. However, many usage cases do require a high level of security, especially when there is value associated with the information that is made available over the NFC interface. For example, contactless credit cards, contactless identity cards, and contactless access control cards (physical and logical) may contain information that can be fraudulently exploited by a malicious third party.
  • One way to solve this problem is to have specialized, highly secure, NFC terminal equipment that guarantees that the information is safely processed (and not leaked) when accessed from an NFC tag, contactless card, or NFC device (e.g. smartphone). Such POS equipment is sold by the payment service provider to the vendor and requires the cardholder and the card to be at the vendor near the vendor's POS equipment. Furthermore, this approach is expensive because the terminals are specialized and dedicated devices. And the vendor is effectively or actually locked into a relationship with a particular payment processing service provider for a period of time by means of a contract and/or the costs associated with the specialized, dedicated equipment that is bound to the payment service provider. As consumer devices are expanding their capabilities year over year, there is now a potential to leverage the native NFC capabilities of NFC devices to replace the specialized terminals.
  • Various embodiments may be designed to address different technical problems associated with CNP transactions for online purchases from online vendors. For instance, some embodiments may be designed to address one or more technical problems such as consumer devices not being designed to be as highly secure as specialized terminals, the expense of dedicated terminals for POS transactions, the dedication of terminals to specific payment service providers, the dedication of terminals to specific merchants, and the like.
  • Different technical problems such as those discussed above may be addressed by one or more different embodiments. For instance, some embodiments that address CNP transactions for online purchases from online vendors may do so by one or more different technical means such as verifying the presence of a card remotely from a vendor via a network, verifying the presence of a card without a device dedicated for a particular vendor, verifying the presence of a card without a device dedicated for a particular payment service provider, incorporating a PCI certified secure element and card reader in a device, communicating by a device with a payment service provider to process a payment as a certified Point of Sale (POS) device for an online vendor, encrypting communications to create encrypted communications to protect the communications from tampering by the applications processor of a processing device, encrypting communications to create an encrypted channel or tunnel for the communications between a secure element of a processing device and the payment service provider to verify the presence of a card of a cardholder, transmitting an authorization request to the payment service provider to process the payment with the encrypted communications via a secure element agent of the processing device, receiving an approval of the authorization request for the payment, receiving a completed payment session communication from the payment service provider, activating a near field communication radio to interact with an EMV (Europay, MasterCard and Visa) card to process the payment, communicating a message from the payment service provider to a user to prompt the user to process the payment with the payment instrument and the card reader, dynamically binding the secure element of an apparatus as a POS device to the online vendor to process a payment by a user of the processing device for the online vendor via direct interaction between the secure element and the payment service provider, dynamically binding the secure element of a processing device as a POS device to the payment service provider to process a payment by a user of the processing device for the online vendor via direct interaction between the secure element and the payment service provider, and the like.
  • Some embodiments may take advantage of Wireless Fidelity (Wi-Fi) network ubiquity, enabling new applications that often require very low power consumption, among other unique characteristics. Wi-Fi generally refers to devices that implement the IEEE 802.11-2012, IEEE Standard for Information technology—Telecommunications and information exchange between systems—Local and metropolitan area networks—Specific requirements—Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications (http://standards.ieee.org/getieee802/download/802.11-2012.pdf) and other related wireless standards.
  • Several embodiments comprise mobile devices or stations (STAs) such as netbooks, mobile devices (Laptop, Smart Phone, Tablet, and the like), as well as televisions, monitors, appliances, and the like.
  • Logic, modules, devices, and interfaces herein described may perform functions that may be implemented in hardware and/or code. Hardware and/or code may comprise software, firmware, microcode, processors, state machines, chipsets, or combinations thereof designed to accomplish the functionality.
  • Embodiments may facilitate wireless communications. Some embodiments may comprise low power wireless communications like Bluetooth®, wireless local area networks (WLANs), wireless metropolitan area networks (WMANs), wireless personal area networks (WPAN), cellular networks, communications in networks, messaging systems, and smart-devices to facilitate interaction between such devices. Furthermore, some wireless embodiments may incorporate a single antenna while other embodiments may employ multiple antennas. The one or more antennas may couple with a processor and a radio to transmit and/or receive radio waves. For instance, multiple-input and multiple-output (MIMO) is the use of radio channels carrying signals via multiple antennas at both the transmitter and receiver to improve communication performance.
  • This disclosure is not limited to WLAN related standards, but may also apply to wireless wide area networks (WWANs) and cellular phone technologies. The examples are not limited in this context.
  • While some of the specific embodiments described below will reference the embodiments with specific configurations, those of skill in the art will realize that embodiments of the present disclosure may advantageously be implemented with other configurations with similar issues or problems.
  • Turning now to FIG. 1, there is shown an embodiment of a wireless communication system 1000. The wireless communication system 1000 comprises a communications device 1010 that may be wire line and wirelessly connected to a network 1005. The communications device 1010 may communicate wirelessly with a plurality of communication devices such as the communication devices 1030, 1050, and 1055 via the network 1005. The communications device 1010 may comprise a server of a payment service provider. The communications device 1030 may comprise processing devices or other devices with a contactless POS that is PCI certified as “tamper-proof” such as sensors, stations, appliances, computers, laptops, netbooks, cellular phones, smart phones, PDAs (Personal Digital Assistants), or other wireless-capable devices. The communications device 1050 may comprise a server comprising a web site of an online vendor or merchant that can be reached by the communications device 1030 online via, e.g., the Internet. And communications devices 1055 may be a server of a payment instrument issuer such as the bank that issues a credit card or EMV card. Thus, communications devices may be mobile or fixed.
  • Note that the term vendor, as discussed herein, may generally sell any raw materials, goods, or services to a customer such as a consumer or user. The terms customer, consumer, and user may refer to a person or an entity that resides anywhere in the supply chain from a distributor to an end-consumer. The vendor may or may not also refer to a manufacturer and/or distributor. The term merchant, as used herein, may typically refer to a seller of goods. And the phrases online vendor or online merchant may refer a presence of the vendor or merchant as a web site on an area network such as the Internet or other network that is accessible by multiple entities and/or persons.
  • A user of the communications device 1030 may use the touch screen 1033 on a display of the communications device 1030 to execute a web browser or app to access an online vendor web site on the communications device 1050 to purchase some goods and/or services via the network 1005. After placing one or more items in the cart for the online vendor, the user may choose a function for checking out, or purchasing, the items in the cart.
  • Referring also to FIG. 1A, there is shown an embodiment of communication flow 1100 to perform an mCommerce transaction as a Card Present transaction. After the user 1105 confirms the intention to purchase the items in the cart and possibly other merchant specific interactions, the online merchant 1150 (represented by the web site on the communication device 1050 in FIG. 1) may dynamically bind a secure element 1034 as a PCI certified POS device to the online merchant 1150 to process a payment by a user 1105 of the device 1030 for the merchant. In many embodiments, the online merchant 1150 may bind the secure element 1034 to the payment service provider 1110 by redirecting communications from the secure element 1034 to the payment service provider 1110 (represented by the communication device 1010 in FIG. 1). Dynamic binding may involve the binding of the communications device 1030 to any online merchant during the process of making a purchase. Binding may involve temporary association of the communications device 1030 with the particular online merchant 1150 for the purposes of processing a payment to the online merchant 1150 by the payment service provider 1110 for items in the cart.
  • Once the user 1105 confirms the purchase of the items in the cart, the online merchant 1150 redirects 1121 the communications from the communications device 1030 to the payment service provider 1110. Binding may be temporary and may occur before or during the redirection 1121 of the communications from the communications device 1030 to the payment service provider 1110. For instance, the online merchant 1150 may establish communications with the payment service provider 1110 through a secure communications channel that uniquely identifies the online merchant 1150. In further embodiments, the online merchant 1150 may communicate with the payment service provider 1110 to initiate a transaction for the payment that is associated with the online merchant or the online merchant's account prior to or while redirecting 1121 the communications from the communications device 1030 to the payment service provider 1110.
  • In some embodiments, redirection 1121 of the communications may involve communications via the same network 1005, e.g., the Internet, as the communications between the communications device 1030 and the online merchant 1150. In other embodiments, the redirection 1121 of the communications may involve the user 1105 connecting with the payment service provider 1110 via a different network or communications channel such as a cellular data network, a telephone line, an Ethernet network, or a wireless network to process the payment with the payment service provider 1110.
  • In response to redirection 1121 by the online merchant 1150 of communications with the user 1105 during the checkout process, the payment service provider 1110 may start a payment session 1122 with the communications device 1030. In some embodiments, at the start of or during the payment session 1122, the payment service provider 1110 may dynamically bind the secure element 1034 of the communications device 1030 as a certified POS device to the payment service provider 1110 to process a payment by the user 1105 for the online merchant 1150 via direct interaction between the secure element 1034 and the payment service provider 1110. In some embodiments, the dynamic binding may involve communicating one or more encryption/decryption keys between the mobile device 1030 and the payment service provider 1110.
  • The direct interaction between the secure element 1034 and the payment service provider 1110 may involve the use of a secure element agent 1037 such as an application executing on the processor(s) 1002 of the communications device 1030. The secure element agent 1037 may be configured to pass encrypted communications from the payment service provider 1110 to the secure element 1034 and from the secure element 1034 to the payment service provider 1110. In many embodiments, the secure element agent 1037 is unable to decrypt the encrypted communications between the payment service provider 1110 and the secure element 1034.
  • After the payment service provider 1110 starts a payment session 1122, the secure element 1034 may activate 1123 the card reader 1035. In some embodiments, the card reader 1035 may comprise a contactless reader such as an NFC radio, a magnetic reader, and/or an optical reader. In some embodiments, the card reader 1035 may comprise a contacted reader such as one or more electrical contacts, one or more optical contacts, a magnetic reader, and/or an optical reader.
  • The payment service provider 1110 may transmit a message to the user 1105 via the card reader 1035 to effectively inform or prompt 1124 the user 1105 to couple the payment instrument with the card reader 1035 by placing the payment instrument near enough to or in contact with the communications device 1030 to communicate with the card reader 1035. In many embodiments, the message may be displayed on the display 1032 of the communications device 1030 or sounded via speakers of the audio input-output (I/O) 1045 of the communications device 1030. In some embodiments, the card reader 1035 may require physical contact with the payment instrument to interact with the payment instrument and the mobile device 1030 may prompt 1124 the user 1105 to physically couple the payment instrument with the card reader 1035. In several embodiments, the payment instrument may be powered by the card reader 1035 and, in other embodiments, the payment instrument may include a power source to facilitate communications with the card reader 1035.
  • In several embodiments, the secure element 1034 and the card reader 1035 may be part of a “tamper-proof” PCI-certified element 1036. In some embodiments, the secure element 1034 and/or the card reader 1035 may be a detachable attachment coupled with the communications device 1030. In some embodiments, the secure element 1034 and/or the card reader 1035 may be a die in the same chip package as the processors 1002, memory 1031, audio I/O 1045, MAC logic 1038, transceiver (RX/TX) 1040, and/or the cell transceiver 1046. Further embodiments may comprise a System on a Chip (SOC) comprising the secure element 1034 and/or the card reader 1035 with the processors 1002, memory 1031, audio I/O 1045, MAC logic 1038, transceiver (RX/TX) 1040, and/or cell transceiver 1046. In one embodiment, the processors 1002, memory 1031, audio I/O 1045, MAC logic 1038, transceiver (RX/TX) 1040, and/or cell transceiver 1046 are on the same die as the secure element 1034 and/or the card reader 1035. And, in another embodiment, the secure element 1034 comprises an embedded system isolated via a hardware isolation scheme from a main operating system for the communications device 1030 but sharing processor cycles or utilizing one or more processors or processor cores of the processor(s) 1002. In several of these embodiments, the secure element 1034 may operate independently from the main operating system of the communications device 1030.
  • In response to the message, the user 1105 may tap 1125 the payment instrument on the card reader 1035. In other embodiments, the user 1105 may couple 1125 the payment instrument or card with the card reader 1035 via contact or via another contactless protocol to proceed with the payment session 1122. In some embodiments, the mobile device 1030 may comprise a marking or written indication on the mobile device 1030 that indicates the location of the card reader 1035 and/or how to use the card reader 1035. For example, a card reader 1035 may comprise a magnetic and/or optic reader to read or interact with a magnetic medium or optic medium on the payment instrument or may comprise contacts to read or interact with a processor or memory on the payment instrument.
  • After the card reader 1035 communicates with the payment instrument, the card reader 1035 may transmit data, e.g., via an EMV protocol 1126, determined from communication with the payment instrument to the secure element 1034. In many embodiments, the data is encrypted for form an encrypted packet such as a cryptogram.
  • After receipt of the encrypted packet from the card reader 1035, the secure element 1034 may transmit the encrypted packet to the payment service provider 1110 to request authorization for the payment 1127. In many embodiments, the secure element 1034 may transmit the encrypted packet in or along with encrypted communications between the secure element 1034 and the payment service provider 1110 via the secure agent 1037 to verify that the payment card is physically present.
  • In several embodiments, the secure element 1034 may also transmit to the payment service provider 1110 information or data requested from or determined from the user 1105 to verify the identity of the user 1105 as the cardholder. The information to verify the identity of the cardholder may include one or more personal identifiers such as a personal identification number (PIN), a mother's maiden name, a portion of an identification number such as a social security number or a driver's license number, and/or the like. In some embodiments, the secure element 1034 may transmit a personal identifier such as the PIN determined from communications with the user 1105 in encrypted communications along with the encrypted packet transmitted to the payment service provider 1110 to request authorization for the payment to the online merchant 1150. In many embodiments, the personal identifier is sent in a different packet from the encrypted packet. In further embodiments, the secure element 1034 may transmit the encrypted packet determined from communications with the payment instrument alone to the payment service provider 1110 to request authorization for the payment to the online merchant 1150.
  • In some embodiments, the payment service provider 1110 may select a personal identifier from a group of personal identifiers and request that the secure element return the particular personal identifier as part of a cardholder verification procedure. In other embodiments, the secure element 1034 or the payment instrument may identify one or more personal identifiers to transmit to the payment service provider 1110 to verify the identity of the cardholder. For example, the payment instrument may generate a number in addition to the encrypted packet that identifies one or more particular personal identifiers to include with the encrypted packet to verify the identity of the cardholder.
  • After receipt of the authorization request 1127 with the encrypted packet determined from the payment instrument, the payment service provider 1110 may process the payment. In several embodiments, processing the payment may involve verifying that the data in the encrypted packet determined from the payment instrument matches data that is expected from the payment instrument to verify that the payment instrument is a valid payment instrument. In several embodiments, processing the payment may involve verifying the identity of the cardholder by verifying that the one or more personal identifiers match the expected personal identifiers associated with the payment instrument and, in some embodiments, associated with the encrypted packet.
  • If the encrypted packet determined from the payment instrument validates the payment instrument and, in some embodiments, if the one or more personal identifiers verify the identity of the cardholder, the payment service provider 1110 or a server in communication with the payment service provider 1110 may present the payment information for the online merchant 1150 for authorization processing 1128. In several embodiments, the payment information may be presented to a bank such as the bank that issued the payment instrument to the cardholder to determine if the payment to the online merchant is approved.
  • If the payment is approved, the payment service provider 1110 may transmit an indication of the approval 1129 to the secure element 1034, an indication of the payment completion 1130 to the online merchant 1150, and terminate the payment session 1132 between the payment service provider 1110 and the secure element 1034. In many embodiments, the issuing bank of the payment instrument such as the communications device 1055 may process the payment to transmit the payment to the online merchants 1150 account. And, in several embodiments, the online merchant 1150 may transmit an indication to the user 1105 that the payment or order is completed 1131.
  • FIG. 1B illustrates an embodiment of a process of an mCommerce transaction 1200 the may be accomplished with communication devices such as the communications devices 1010, 1030, 1050, and 1055 in FIG. 1. The mCommerce transaction 1200 involves the use of one or more payment instruments 1210 to make a payment to an online merchant 1240. The one or more payment instruments 1210 may comprise, for example, a smartphone 1212 and/or a physical credit card 1214. To illustrate, the smartphone 1212 may include an embedded payment instrument system with an application that is protected from tampering and/or view such as a secure element (SE) or a trusted platform module (TPM) that includes a processor, code, and memory. In further embodiments, the smartphone 1212 may include a state machine in lieu of or in addition to the processor, code, and memory. The physical credit card 1214 may include a processor, code, and memory or a state machine. In other embodiments, the smartphone 1212 and/or physical credit card 1214 may comprise at least one of a magnetic medium, an optical medium, a memory, another type of medium, a processor, or a state machine and an interface to facilitate communication with a card reader on the certified POS 1220.
  • The one or more payment instruments 1210 may interact with a PCI certified POS device 1220 via an NFC card reader to provide data such as a random number that can verify the identity of the payment instrument to a payment service provider, which is embodied by a payment processor 1230 in the present embodiment. In many embodiments, the data provided by the one or more payment instruments 1210 is encrypted. In some embodiments, the PCI certified POS device 1220 may comprise a mobile device 1222. In further embodiments, the PCI certified POS device 1220 may comprise any processing device such as a desktop computer, a notebook, a laptop, an Ultrabook™, a smartphone, a personal digital assistant, a navigation device, a wearable device, or the like.
  • In the present embodiment, the PCI certified POS device 1220 may transmit the data provided by the one or more payment instruments 1210 directly to the payment processor 1230 rather than to the online merchant 1240 unlike traditional transactions in which the data would be presented to the merchant's POS device. The data provided by the one or more payment instruments 1210 may verify the presence of the payment instrument(s) 1210 due to the physical requirement to couple the one or more payment instruments 1210 with the PCI certified POS device 1220. And, in several embodiments, the PCI certified POS device 1220 may also transmit information to verify the identification of the cardholder to verify the presence of the cardholder at the PCI certified POS device 1220.
  • The payment processor 1230 may receive the data provided by the one or more payment instruments 1210 as an authorization request to process a payment for the online merchant 1240. In some embodiments, the payment processor 1230 may include a payment processor gateway 1232 and a payment processor server 1234. The payment processor gateway 1232 may provide access to the payment processor server 1234 via one or more networks such as the Internet, another wide area network, a municipal area network, a local area network, a personal area network, wireless area network, a digital telephone line, an analog telephone line, a cellular phone line, a cellular data line, and/or the like.
  • The payment processor server 1234 may authenticate the one or more payment instruments 1210, verify the presence of the cardholder at the PCI certified POS device 1220, and process the payment authorization. In many embodiments, the payment authorization may be performed by other servers via the payment processor gateway 1232 such as by one or more servers representative of a Europay network, a Visa network, a MasterCard network, an American Express network, or other credit card network as well as a network representative of the bank(s) that issued the one or more payment instruments 1210.
  • After processing the payment, the payment processor 1230 may issue the payment to the online merchant account for one or more online merchant(s) 1240 associated with the payment from the user. In some embodiments, for example, the online merchant 1240 may represent one or more merchants such as merchant 1242, merchant 1244, and merchant 1246. In some of these embodiments, the payment processor 1230 may process more than one payment from the one or more payment instruments 1210 for the one or more online merchants 1240.
  • Referring again to FIG. 1, the network 1005 may represent an interconnection of a number of networks. For instance, the network 1005 may couple with a wide area network such as the Internet or an intranet and may interconnect local devices wired or wirelessly interconnected via one or more hubs, routers, or switches. In the present embodiment, network 1005 communicatively couples communications devices 1010, 1030, 1050, and 1055.
  • The communication devices 1010 and 1030 comprise processor(s) 1001 and 1002, memory 1011 and 1031, and MAC sublayer logic 1018 and 1038, respectively. The processor(s) 1001 and 1002 may comprise one or more data processing devices such as microprocessors, microcontrollers, state machines, and the like. The memory 1011 and 1031 may comprise a storage medium such as Dynamic Random Access Memory (DRAM), read only memory (ROM), buffers, registers, cache, flash memory, hard disk drives, solid-state drives, or the like. In many embodiments, the memory 1011 and 1031 may comprise applications or other code that a user may generally use. For instance, in some embodiments, the communications device 1030 may comprise a smartphone and the memory 1031 may comprise an operating system and a phone application for placing calls via a cell transceiver 1046. In several embodiments, the communications device 1030 may comprise a processing device such as a desktop or mobile computer and the memory 1031 may comprise utilities and business applications.
  • The memory 1011 and 1031 may also store frames and/or frame structures such as standard frames and frame structures identified in IEEE 802.11 for wireless communications. Note also that memory 1011 and 1031 may reside in a system or in proximity to or in the MAC sublayer logic 1018 and 1038 or the transceivers (RX/TX) 1020 and 1040.
  • Medium access control (MAC) sublayer logic (MAC logic) 1018 and 1038 may comprise logic to implement functionality of the MAC sublayer of the data link layer of the communications devices 1010 and 1030, respectively. The MAC logic 1018 and 1038 may generate the frames such as management frames, data frames, and control frames, and may communicate with the PHY logic 1019 and 1039, respectively, to transmit the frames. The PHY logic 1019 and 1039 may generate physical layer protocol data units (PPDUs) based upon the frames. More specifically, frame builders of the MAC logic 1018 and 1038 may generate the frames and data unit builders of the PHY logic 1019 and 1039, respectively, may prepend the frames with preambles to generate PPDUs for transmission via a physical layer device such as the transceivers (RX/TX) 1020 and 1040, respectively.
  • The communications devices 1010, 1030, 1050, and 1055 may each comprise a transceiver such as transceivers 1020 and 1040. Each transceiver 1020 and 1040 comprises a radio 1023 and 1043, respectively, comprising an RF transmitter and an RF receiver. Each RF transmitter impresses digital data onto an RF frequency for transmission of the data by electromagnetic radiation. An RF receiver receives electromagnetic energy at an RF frequency and extracts the digital data therefrom.
  • The communications devices 1010, 1030, 1050, and 1055 may communicate with the network 1005 wirelessly via the transceivers 1020 and 1040, physically through network interface cards (not shown), wirelessly through cell transceivers such as the cell transceiver 1046 or by other network means. FIG. 1 may depict a number of different embodiments including a Multiple-Input, Multiple-Output (MIMO) system with, e.g., four spatial streams, and may depict degenerate systems in which one or more of the communications devices 1010, 1030, 1050, and 1055 comprise a receiver and/or a transmitter with a single antenna including a Single-Input, Single Output (SISO) system, a Single-Input, Multiple Output (SIMO) system, and a Multiple-Input, Single Output (MISO) system.
  • In many embodiments, transceivers 1020 and 1040 implement orthogonal frequency-division multiplexing (OFDM). OFDM is a method of encoding digital data on multiple carrier frequencies. OFDM is a frequency-division multiplexing scheme used as a digital multi-carrier modulation method. A large number of closely spaced orthogonal sub-carrier signals are used to carry data. The data is divided into several parallel data streams or channels, one for each sub-carrier. Each sub-carrier is modulated with a modulation scheme at a low symbol rate, maintaining total data rates similar to conventional single-carrier modulation schemes in the same bandwidth.
  • An OFDM system uses several carriers, or “tones,” for functions including data, pilot, guard, and nulling. Data tones are used to transfer information between the transmitter and receiver via one of the channels. Pilot tones are used to maintain the channels, and may provide information about time/frequency and channel tracking. Guard interval may be inserted between symbols such as the short training field (STF) and long training field (LTF) symbols during transmission to avoid inter-symbol interference (ISI), which might result from multi-path distortion. Guard tones help the signal conform to a spectral mask. The nulling of the direct component (DC) may be used to simplify direct conversion receiver designs.
  • In some embodiments, the communications device 1010 optionally comprises a Beam Former (BF) 1022, as indicated by the dashed lines. The BF 1022 provides spatial filtering and is a signal processing technique used with antenna array 1024 for directional signal transmission or reception. This is achieved by combining elements in a phased antenna array 1024 in such a way that signals at particular angles experience constructive interference while others experience destructive interference. Beamforming can be used at both the transmitting and receiving ends in order to achieve spatial selectivity. The antenna array 1024 is an array of individual, separately excitable antenna elements. The signals applied to the elements of the antenna array 1024 cause the antenna array 1024 to radiate one to four spatial channels. Each spatial channel so formed may carry information to one or more of the communications devices 1030, 1050, and 1055. Similarly, the communications device 1030 comprises a transceiver 1040 to receive and transmit signals from and to the communications device 1010. The transceiver 1040 may comprise an antenna array 1044 and, optionally, a BF 1042.
  • In the present embodiment, the communications device 1030 may also comprise cellular phone communications capabilities. The MAC logic 1038 may prepare audio and data packets for transmission through the cell transceiver 1046 based upon the technologies associated with the communications device 1030. For instance, the cell transceiver 1046 may comprise cell logic 1047, a cell radio 1048, and a cell antenna 1049 to implement 3G or 4G wireless standards that may include without limitation any of the IEEE 802.16m and 802.16p standards, 3rd Generation Partnership Project (3GPP) Long Term Evolution (LTE) and LTE-Advanced (LTE-A) standards, and International Mobile Telecommunications Advanced (IMT-ADV) standards, including their revisions, progeny and variants. Other suitable examples may include, without limitation, Global System for Mobile Communications (GSM)/Enhanced Data Rates for GSM Evolution (EDGE) technologies, Universal Mobile Telecommunications System (UMTS)/High Speed Packet Access (HSPA) technologies, Worldwide Interoperability for Microwave Access (WiMAX) or the WiMAX II technologies, Code Division Multiple Access (CDMA) 2000 system technologies (e.g., CDMA2000 1×RTT, CDMA2000 EV-DO, CDMA EV-DV, and so forth), High Performance Radio Metropolitan Area Network (HIPERMAN) technologies as defined by the European Telecommunications Standards Institute (ETSI) Broadband Radio Access Networks (BRAN), Wireless Broadband (WiBro) technologies, GSM with General Packet Radio Service (GPRS) system (GSM/GPRS) technologies, High Speed Downlink Packet Access (HSDPA) technologies, High Speed Orthogonal Frequency-Division Multiplexing (OFDM) Packet Access (HSOPA) technologies, High-Speed Uplink Packet Access (HSUPA) system technologies, 3GPP Rel. 8-12 of LTE/System Architecture Evolution (SAE), and so forth.
  • The cell logic 1047 may encode and modulate packets for transmission and demodulate and decode packets for reception. The cell radio 1048 may amplify and convert the signals into radio signals for transmission via the cell antenna 1049. And the cell radio 1048 may receive, amplify and convert the signals from radio signals for reception via the cell antenna 1049. In some embodiments, the communications device 1030 may also comprise a subscriber identification module (SIM). The SIM may be an integrated circuit that securely stores the international mobile subscriber identity (IMSI) and the related key used to identify and authenticate subscribers on mobile telephony devices (such as mobile phones and computers).
  • In some embodiments, the SIM may contain data that can be used to verify the presence of a cardholder for a payment transaction with an online merchant 1150. In further embodiments, the SIM may contain data that can be used to verify the presence of a payment instrument for a payment transaction with an online merchant 1150. In several embodiments, the cellular transceiver 1046 may be used for communications between the payment service provider 1110 and the secure element 1034.
  • FIG. 2 depicts an embodiment of a mobile device 2000 to verify the presence of a payment instrument such as a card and, in some embodiments, a cardholder to process a payment for an online merchant as a Card Present Transaction (CP) rather than a Card Not Present (CNP) transaction even though the cardholder is not physically located at or near a POS owned by the online merchant. The mobile device 2000 may be a certified POS device that the cardholder can use to verify the presence of a payment instrument as well as the presence of the cardholder so a transaction with the merchant can be verified as a CP and cardholder present transaction.
  • In the present embodiment, the mobile device 2000 may comprise a system-on-chip (SOC) processor 2010, an embedded secure element (eSE) 2020, a Near Field Communications (NFC) Controller 2030, and a subscriber identification module (SIM) 2040. The mobile device 2000 may comprise the SOC processor 2010 as a main processing unit for the mobile device 2000. The SOC processor 2010 may represent one or more processors that are configured to perform general and specific operations of the phone. In many embodiments, a main operating system may execute on the SOC processor 2010 to execute applications to interface with a user via, e.g., a graphical user interface. In some embodiments, the mobile device 2000 may comprise a cellular phone, smartphone, laptop, notebook, MP3 player, wearable processing device, or other mobile processing device. In other embodiments, the mobile device 2000 may be a stationary processing device such as a desktop computer, workstation, and/or the like.
  • In many embodiments, the SOC processor 2010 may comprise a network controller to connect to a network such as the Internet or another network via a wired and/or wireless connection. In some embodiments, the SOC processor 2010 may also comprise memory and an input-output controller to implement the functionality of the mobile device 2000.
  • The mobile device 2000 may comprise a tamper-proof component eSE 2020 at the center of the architecture. In this tamper-proof centric architecture, the NFC controller 2030 is physically (as opposed to virtually) isolated from the SOC processor 2010 (or main processor unit) by removing or not implementing the data path between the NFC controller 2030 and the SOC processor 2010 indicated by the “interface not wired” label on the Inter-Integrated Circuit or I-squared-C (I2C) bus connections of the SOC processor 2010 and the NFC controller 2030. Instead, the SOC processor 2010 is connected to the eSE 2020 via, e.g., a serial peripheral interface (SPI) connection and the eSE 2020 is connected to the NFC controller 2030. In this way, the highly sensitive data received over the NFC controller 2030 interface is sent directly and exclusively to the eSE 2020, where it can be securely processed without exposing such sensitive data directly to the SOC Processor 2010 and the software (e.g. Android, Windows, etc.) running on the SOC processor 2010, which may be compromised and/or malicious.
  • Note that the general purpose input-output (GPIO) may interconnect the SOC processor 2010 with the NFC controller 2030 without compromising the security because the GPIO interface on the NFC controller 2030 is not capable of a sufficiently complex communication with the SOC processor 2010 to compromise security.
  • The eSE 2020 may be a smart card chip that stores information, manages security and provides a firewall between NFC applications and other elements in the mobile device 2000. In several embodiments, the eSE 2020 may also be a tamper resistant Smart Card chip that facilitates the secure storage and transaction of payment and other sensitive credentials. Secure elements may be used in multi-application environment and can be available in multiple form factors like Plastic Smart Cards, UICC(SIM)s, eSEs, micro secure digital (microSD) cards, etc.
  • In several embodiments, the eSE 2020 may comprise one or more of a Secure Microcontrollers, a processing unit, an Operating System, Memory, Immutable (ROM), Mutable Electrical Erasable Programmable Read Only Memory (EEPROM), Volatile Random Access Memory (RAM), Crypto Engine, Sensor, Timer, Communication Ports, and/or the like.
  • In the present embodiment, the eSE 2020 may be formally evaluated and certified by EMVco and/or Common Criteria standard procedures and suitable for highly secure use cases within the payment card industry (PCI) (i.e., to make and receive payment), Mobile Subscription Management, Identity Management, strong Authentication, etc.
  • It is to be noted that while at present embodiment comprises the eSE 2020, embodiments may comprise any tamperproof architecture to protect data from access by malicious or compromised software. For example, tamper-proof protection such as the eSE 2020 may be integrated into SOC processor 2020 thereby displacing the discrete eSE 2020 in favor of an integrated solution.
  • In the present embodiment, the eSE 2020 may comprise logic such as hardware and/or code to perform a point of sale (POS) transaction with an online vendor as a Card Present transaction rather than a Card Not Present transaction by implementing PCI certified POS functionality. In many of these embodiments, the eSE 2020 may couple with the NFC controller 2030 to communicate with a web site of the online vendor to process a payment to the online vendor as a certified POS device rather than transmitting payment instrument information to the online vendor to use the online vendor's POS device.
  • Once the user of the mobile device 2000 indicates that the user intends to complete a payment to the online vendor such as a payment for goods or services, the online vendor may redirect communications from the eSE 2020 to the payment service provider so the eSE 2020 may communicate directly with the payment service provider associated with the online vendor to process the payment. In many embodiments, the eSE 2020 may interact with the NFC controller 2030 to obtain a packet to process the payment with a payment instrument and encrypt communications to transmit an authorization request to the payment service provider to process the payment with encrypted communications. The direct interaction between the certified POS device (eSE 2020) and the payment instrument via the NFC controller 2030 may verify that the payment instrument is present to constitute a card present transaction.
  • Furthermore, in several embodiments, the eSE 2020 may verify that the cardholder is present by prompting the cardholder to couple the payment instrument to the NFC controller 2030. In some embodiments, the eSE 2020 may verify that the cardholder is present by prompting the cardholder for a personal identifier and either passing the personal identifier to the payment service provider or comparing the personal identifier with data on the SIM 2040.
  • The SIM 2040 may store network-specific information used to authenticate and identify subscribers on the cellular network. The network-specific information may comprise the ICCID, IMSI, Authentication Key (Ki), Local Area Identity (LAI) and Operator-Specific Emergency Number. The SIM 2040 may also store other carrier-specific data such as the SMSC (Short Message Service Center) number, Service Provider Name (SPN), Service Dialing Numbers (SDN), Advice-Of-Charge parameters and Value Added Service (VAS) applications.
  • The SIM 2040 may comprise a SIM card with a unique integrated circuit card (UICC) identifier (ICCID). ICCIDs may be stored in the SIM cards and also engraved or printed on the SIM card body during a process called personalization. In many embodiments, the ICCID number may be up to 22 digits long, including a single check digit calculated using a Luhn algorithm. In some embodiments, the ICCID length may be 10 octets (20 digits) with an operator-specific structure. In other embodiments, the SIM 2040 may comprise a different number or code with the same of different length.
  • FIG. 3 illustrates an embodiment of a flowchart 300 of a transaction in which a personal processing device functions as a certified POS device to process a payment to an online vendor as a Card Present transaction. The flowchart 300 begins with communicating, by the personal processing device as a certified Point of Sale (POS) device, with a web site of an online vendor to process a payment to the online vendor (element 305). In many embodiments, a cardholder may shop on the online vendor's web site with the personal processing device. After selecting one or more items to purchase, the cardholder may interact with the web site to begin a process of completing the purchase of the items. In some embodiments, once the cardholder reaches a point at which payment is the only remaining step to complete the transaction to purchase the items, the online vendor's web site may redirect the cardholder's web browser to a payment service provider's web site to complete the transaction. In further embodiments, the online vendor's web site may open a web portal to the payment service provider's web site to complete the transaction.
  • In many embodiments, the process of redirecting the personal processing device to the payment service provider's web site to complete the transaction may involve providing sufficient information to the payment service provider to dynamically associate or bind the certified POS device to the online vendor (element 310). In several embodiments, the online vendor's web site may provide information about the transaction to the associate or dynamically bind the transaction with the online vendor's merchant account and the certified POS device (element 320).
  • After connecting to the payment service provider's web site, the personal processing device may communicate with a payment service provider to process the payment (element 315). In many embodiments, the payment service provider may transmit a message or an indication of a message to the secure element of the personal processing device to prompt the cardholder to couple the payment instrument or card with the personal processing device to process the payment with the payment instrument and the card reader. In some embodiments, the direct interaction between the secure element and the payment service provider may dynamically bind the certified POS device to the payment service provider to process the payment by a user of the certified POS device for the online vendor (element 320).
  • After the payment service provider transmits the message or indication to the secure element, the secure element may respond by activating a near field communication radio to interact with an EMV (Europay, MasterCard, and Visa) card to process the payment with the personal processing device and prompt the cardholder to couple the EMV card with the personal processing device to process the payment. The secure element may then interact with EMV card of the cardholder via the card reader to obtain a packet to process the payment (element 325). In other embodiments, a different type of card reader may be activated to read the payment instrument of the user. And, in several embodiments, the EMV card may provide an encrypted packet or cryptogram to the secure element via the card reader to process the payment.
  • The secure element may encrypt communications to transmit an authorization request to the payment service provider to process the payment. The secure element may transmit the authorization request with encrypted communications via a secure element agent of the certified POS device and the authorization request may comprise the encrypted packet or cryptogram to verify that the card is present for the transaction (element 330). In several embodiments, the secure element may also include data to verify or indicate verification that the cardholder is present at or near to secure element. In other embodiments, the coupling of the payment instrument with the personal processing device may be sufficient to indicate that the cardholder is present at the POS transaction.
  • After transmitting the authorization request to the payment service provider, the secure element may receive an approval of the authorization request for the payment (element 335). And, thereafter, the secure element may receive a completed payment session communication from the payment service provider (element 340). The completed payment session communication may terminate the payment session and terminate the direct communications between the personal processing device and the payment service provider.
  • In some embodiments, some or all of the features described above and in the claims may be implemented in one embodiment. For instance, alternative features may be implemented as alternatives in an embodiment along with logic or selectable preference to determine which alternative to implement. Some embodiments with features that are not mutually exclusive may also include logic or a selectable preference to activate or deactivate one or more of the features. For instance, some features may be selected at the time of manufacture by including or removing a circuit pathway or transistor. Further features may be selected at the time of deployment or after deployment via logic or a selectable preference such as a dipswitch or the like. A user after via a selectable preference such as a software preference, an e-fuse, or the like may select still further features.
  • A number of embodiments may have one or more advantageous effects. For instance, some embodiments may offer reduced MAC header sizes with respect to standard MAC header sizes. Further embodiments may include one or more advantageous effects such as smaller packet sizes for more efficient transmission, lower power consumption due to less data traffic on both the transmitter and receiver sides of communications, less traffic conflicts, less latency awaiting transmission or receipt of packets, and the like.
  • Further embodiments may include an apparatus to perform a point of sale transaction. The apparatus may comprise a processing device comprising an application processor, a secure element agent, and a network communications device, the processing device to interact with an online vendor; a card reader; and a secure element coupled with the card reader and the secure element agent, the secure element to communicate with a web site of the online vendor to process a payment to the online vendor as a certified Point of Sale (POS) device; to communicate with a payment service provider associated with the online vendor to process the payment in response to communication with the web site; to interact with the card reader to obtain a packet to process the payment with a payment instrument; to encrypt communications to transmit an authorization request to the payment service provider to process the payment with encrypted communications via the secure element agent, the authorization request to comprise the packet to verify that the card is present for the transaction; and to receive an approval of the authorization request for the payment.
  • In some embodiments, the secure element comprises logic to start a payment session with the payment service provider and to activate the card reader to process the payment for the online vendor. In some embodiments, the card reader comprises one or more of a near field communication radio and antenna to communicate with the payment instrument, a magnetic medium reader, an optical medium reader, and contacts for a contacted connection. In some embodiments, the secure element comprises logic to communicate a message from the payment service provider to a user to prompt the user to process the payment with the payment instrument and the card reader. In some embodiments, the secure element comprises logic to dynamically bind the certified POS device to the online vendor to process the payment by a user of the certified POS device for the online vendor. In some embodiments, the secure element comprises logic to dynamically bind the certified POS device to the payment service provider to process the payment by a user of the certified POS device for online vendor.
  • Another embodiment comprises one or more tangible computer-readable non-transitory storage media comprising computer-executable instructions. The computer-executable instructions may be operable to, when executed by at least one computer processor, enable the at least one computer processor to implement a method. The method may involve communicating, by a certified Point of Sale (POS) device, with a web site of an online vendor to process a payment to the online vendor; communicating with a payment service provider associated with the online vendor to process the payment in response to communicating with the web site; interacting with a card reader to obtain a packet to process the payment with a payment instrument; encrypting communications to transmit an authorization request to the payment service provider to process the payment with encrypted communications via a secure element agent of the certified POS device, the authorization request to comprise the packet to verify that the card is present for the transaction; and receiving an approval of the authorization request for the payment.
  • In some embodiments, the method further comprising activating a near field communication radio or contact interface to interact with an EMV (Europay, MasterCard and Visa) card to process the payment. In some embodiments, the method further comprises communicating a message from the payment service provider to a user to prompt the user to process the payment with the payment instrument and the card reader. In some embodiments, the method further comprises dynamically binding the certified POS device to the online merchant to process the payment by a user of the certified POS device for the online vendor. In some embodiments, the method further comprises dynamically binding the secure element as a POS device to the payment service provider to process the payment by a user of the certified POS device for the online vendor.
  • Further embodiments may include a method to perform a point of sale transaction. The method may involve communicating, by a certified Point of Sale (POS) device, with a web site of an online vendor to process a payment to the online vendor; communicating with a payment service provider associated with the online vendor to process the payment in response to communicating with the web site; interacting with a card reader to obtain a packet to process the payment with a payment instrument; encrypting communications to transmit an authorization request to the payment service provider to process the payment with encrypted communications via a secure element agent of the certified POS device, the authorization request to comprise the packet to verify that the card is present for the transaction; and receiving an approval of the authorization request for the payment.
  • In some embodiments, the method may further comprise activating a near field communication radio or contact interface to interact with an EMV (Europay, MasterCard, and Visa) card to process the payment. In some embodiments, the method may further comprise communicating a message from the payment service provider to a user to prompt the user to process the payment with the payment instrument and the card reader. In some embodiments, the method may further comprise dynamically binding the certified POS device to the online vendor to process the payment by a user of the certified POS device for the online vendor. In some embodiments, the method may further comprise dynamically binding the certified POS device to the payment service provider to process the payment by a user of the certified POS device for the online vendor.
  • Further embodiments may include a system to perform a point of sale transaction. The system may comprise a processing device comprising an application processor, a secure element agent, and a network communications device, the processing device to comprise logic to interact with an online vendor; a card reader; and a secure element coupled with the card reader and the secure element agent, the secure element to communicate with a web site of the online vendor to process a payment to the online vendor as a certified Point of Sale (POS) device; to communicate with a payment service provider associated with the online vendor to process the payment in response to communication with the web site; to interact with the card reader to obtain a packet to process the payment with a payment instrument; to encrypt communications to transmit an authorization request to the payment service provider to process the payment with encrypted communications via the secure element agent, the authorization request to comprise the packet to verify that the card is present for the transaction; and to receive an approval of the authorization request for the payment; a memory coupled with the application processor; medium access control logic coupled with the memory to determine and decode wireless communications; one or more antennas; and one or more radios coupled with corresponding ones of the one or more antennas to transmit and receive wireless communications.
  • In some embodiments, the secure element comprises logic to start a payment session with the payment service provider and to activate the near field communication radio or contact interface to process the payment for the online vendor. In some embodiments, the card reader comprises one or more of a near field communication radio and antenna, a magnetic medium reader, an optical medium reader, and contacts for a contacted connection to communicate with the payment instrument. In some embodiments, the secure element comprises logic to communicate a message from the payment service provider to a user to prompt the user to process the payment with the payment instrument and the card reader. In some embodiments, the secure element comprises logic to dynamically bind the certified POS device to the online vendor to process the payment by a user of the certified POS device for the online vendor. In some embodiments, the secure element comprises logic to dynamically bind the certified POS device to the payment service provider to process the payment by a user of the certified POS device for online vendor.
  • Further embodiments may include a system to perform a point of sale transaction. The apparatus may comprise a means for communicating, by a certified Point of Sale (POS) device, with a web site of an online vendor to process a payment to the online vendor; a means for communicating with a payment service provider associated with the online vendor to process the payment in response to communicating with the web site; a means for interacting with a card reader to obtain a packet to process the payment with a payment instrument; a means for encrypting communications to transmit an authorization request to the payment service provider to process the payment with encrypted communications via a secure element agent of the certified POS device, the authorization request to comprise the packet to verify that the card is present for the transaction; a means for receiving an approval of the authorization request for the payment.
  • In some embodiments, the system may further comprise a means for activating a near field communication radio or contact interface to interact with an EMV (Europay, MasterCard and Visa) card to process the payment. In some embodiments, the system may further comprise a means for communicating a message from the payment service provider to a user to prompt the user to process the payment with the payment instrument and the card reader. In some embodiments, the system may further comprise a means for dynamically binding the certified POS device to the online vendor to process the payment by a user of the certified POS device for the online vendor. In some embodiments, the system may further comprise a means for dynamically binding the certified POS device to the payment service provider to process the payment by a user of the certified POS device for the online vendor.
  • Another embodiment is implemented as a program product for implementing systems, apparatuses, and methods described with reference to FIGS. 1-3. Embodiments can take the form of an entirely hardware embodiment, a software embodiment implemented via general purpose hardware such as one or more processors and memory, or an embodiment containing both specific-purpose hardware and software elements. One embodiment is implemented in software or code, which includes but is not limited to firmware, resident software, microcode, or other types of executable instructions.
  • Furthermore, embodiments can take the form of a computer program product accessible from a machine-accessible, computer-usable, or computer-readable medium providing program code for use by or in connection with a computer, mobile device, or any other instruction execution system. For the purposes of this description, a machine-accessible, computer-usable, or computer-readable medium is any apparatus or article of manufacture that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system or apparatus.
  • The medium may comprise an electronic, magnetic, optical, electromagnetic, or semiconductor system medium. Examples of a machine-accessible, computer-usable, or computer-readable medium include memory such as volatile memory and non-volatile memory. Memory may comprise, e.g., a semiconductor or solid-state memory like flash memory, magnetic tape, a removable computer diskette, a random access memory (RAM), a read-only memory (ROM), a rigid magnetic disk, and/or an optical disk. Current examples of optical disks include compact disk-read only memory (CD-ROM), compact disk-read/write memory (CD-R/W), digital video disk (DVD)-read only memory (DVD-ROM), DVD-random access memory (DVD-RAM), DVD-Recordable memory (DVD-R), and DVD-read/write memory (DVD-R/W).
  • An instruction execution system suitable for storing and/or executing program code may comprise at least one processor coupled directly or indirectly to memory through a system bus. The memory may comprise local memory employed during actual execution of the code, bulk storage such as dynamic random access memory (DRAM), and cache memories which provide temporary storage of at least some code in order to reduce the number of times code must be retrieved from bulk storage during execution.
  • Input/output or I/O devices (including but not limited to keyboards, displays, pointing devices, etc.) can be coupled to the instruction execution system either directly or through intervening I/O controllers. Network adapters may also be coupled to the instruction execution system to enable the instruction execution system to become coupled to other instruction execution systems or remote printers or storage devices through intervening private or public networks. Modem, Bluetooth™, Ethernet, Wi-Fi, and WiDi adapter cards are just a few of the currently available types of network adapters.

Claims (54)

1.-25. (canceled)
26. An apparatus for a point of sale transaction, the apparatus comprising:
a processor;
a secure element; and
a near field communications (NFC) device,
the apparatus to securely provide communications including payment information between a secure element and a service provider via the NFC device;
the secure element operably coupled with the NFC device to communicate the payment information between the vendor and the service provider to process the payment; to associate a POS device with the service provider to process the payment by generation of a secure packet to process the payment, to verify the payment information for the transaction; and
the apparatus to receive an approval responsive to the packet for the payment.
27. The apparatus of claim 26, wherein the secure element comprises logic to start a payment session with the service provider and to activate the NFC device to process the payment for the vendor.
28. The apparatus of claim 26, wherein the NFC device comprises a near field communication radio and an antenna to communicate.
29. The apparatus of claim 26, wherein the NFC device and the secure element reside on a same die.
30. The apparatus of claim 26, wherein the NFC device and the secure element reside in a same chip package.
31. The apparatus of claim 26, further comprising a Bluetooth communications device.
32. The apparatus of claim 26, wherein the secure element comprises logic to communicate a message to a user to prompt the user for data to authenticate the user.
33. The apparatus of claim 26, wherein the apparatus comprises logic to prompt the user for a personal identifier.
34. The apparatus of claim 33, wherein the personal identifier comprises a personal identification number (PIN).
35. The apparatus of claim 26, wherein the secure element comprises logic to dynamically bind the certified POS device to the service provider to process the payment by a user of the certified POS device for the vendor.
36. An apparatus for a point of sale transaction, the apparatus comprising:
an application processor;
a secure element; and
a communications device,
the secure element operatively coupled with the communications device to communicate the payment information to process a payment to the vendor; to associate a POS device with the service provider to process the payment by a user of the POS device for the vendor via generation of a packet to process the payment; and to transmit the packet to the service provider; and
the apparatus to receive an approval for the payment.
37. The apparatus of claim 36, wherein the communications device comprises a cellular radio coupled with an antenna for cellular communications.
38. The apparatus of claim 36, wherein the communications device comprises a radio coupled with an antenna array for Wi-Fi communications.
39. The apparatus of claim 36, wherein the communications device comprises a Bluetooth communications device for Bluetooth communications.
40. The apparatus of claim 36, wherein the communications device comprises a near field communication radio and an antenna to communicate.
41. The apparatus of claim 36, further comprising a display with a touch screen for communication with a user.
42. The apparatus of claim 36, further comprising audio input-output (I/O) for communication with a user.
43. The apparatus of claim 36, further comprising a secure element agent to secure communications with the secure element.
44. The apparatus of claim 36, wherein the secure element comprises logic to start a payment session with the service provider and to activate the communications device to process the payment for the vendor.
45. The apparatus of claim 36, wherein the communications device and the secure element reside on a same die.
46. The apparatus of claim 36, wherein the communications device and the secure element reside in a same chip package.
47. The apparatus of claim 36, wherein the secure element comprises logic to communicate a message to a user to prompt the user for data to authenticate the user.
48. The apparatus of claim 36, wherein the apparatus comprises logic to prompt the user for a personal identifier.
49. The apparatus of claim 48, wherein the personal identifier comprises a personal identification number (PIN).
50. The apparatus of claim 36, wherein the secure element comprises logic to dynamically bind a certified POS device to the service provider to process the payment by a user of the certified POS device for the vendor.
51. A system for a point of sale transaction, the system comprising:
a flash memory;
an application processor coupled with the flash memory to execute one or more applications;
a secure element; and
a communications device,
the secure element operatively coupled with the communications device to communicate the payment information to process a payment to the vendor; to associate a POS device with the service provider to process the payment by a user of the POS device for the vendor via generation of a packet to process the payment; and to transmit the packet to the service provider; and
the system to receive an approval of the authorization request for the payment.
52. The system of claim 51, wherein the communications device comprises a cellular radio coupled with an antenna for cellular communications.
53. The system of claim 51, wherein the communications device comprises a radio coupled with an antenna array for Wi-Fi communications.
54. The system of claim 51, wherein the communications device comprises a Bluetooth communications device for Bluetooth communications.
55. The system of claim 51, wherein the communications device comprises a near field communication radio and an antenna to communicate.
56. The system of claim 51, further comprising a display with a touch screen for communication with a user.
57. The system of claim 51, further comprising audio input-output (I/O) for communication with a user.
58. The system of claim 51, further comprising a secure element agent to secure communications with the secure element.
59. The system of claim 51, wherein the secure element comprises logic to start a payment session with the service provider and to activate the communications device to process the payment for the vendor.
60. The system of claim 51, wherein the communications device and the secure element reside on a same die.
61. The system of claim 51, wherein the communications device and the secure element reside in a same chip package.
62. The system of claim 51, wherein the secure element comprises logic to communicate a message to a user to prompt the user for data to authenticate the user.
63. The system of claim 51, wherein the system comprises logic to prompt the user for a personal identifier.
64. The system of claim 63, wherein the personal identifier comprises a personal identification number (PIN).
65. The system of claim 51, wherein the secure element comprises logic to dynamically bind the POS device to the service provider to process the payment by a user of the POS device for the vendor.
66. A non-transitory computer-readable medium, comprising instructions, which when executed by a processor, cause the processor to perform operations to:
communicate, via a secure element, the payment information to process a payment to the vendor;
associate, via the secure element, a POS device with a service provider to process the payment by a user of the POS device for the vendor by generation of a packet; and
transmit, via a secure element, the packet to the service provider.
67. The non-transitory computer-readable medium of claim 66, wherein the operations comprise cellular communications via a cellular radio coupled with an antenna.
68. The non-transitory computer-readable medium of claim 66, wherein the operations comprise Wi-Fi communications via a radio coupled with an antenna array.
69. The non-transitory computer-readable medium of claim 66, wherein the operations comprise Bluetooth communications.
70. The non-transitory computer-readable medium of claim 66, wherein the operations comprise near-field communications (NFC).
71. The non-transitory computer-readable medium of claim 66, further comprising a display with a touch screen for communication with a user.
72. The non-transitory computer-readable medium of claim 66, further comprising audio input-output (I/O) for communication with a user.
73. The non-transitory computer-readable medium of claim 66, further comprising a secure element agent to secure communications with the secure element.
74. The non-transitory computer-readable medium of claim 66, wherein the secure element comprises logic to start a payment session with the service provider and to activate the communications device to process the payment for the vendor.
75. The non-transitory computer-readable medium of claim 66, wherein the secure element comprises logic to communicate a message to a user to prompt the user for data to authenticate the user.
76. The non-transitory computer-readable medium of claim 66, wherein the secure element comprises logic to prompt the user for a personal identifier.
77. The non-transitory computer-readable medium of claim 76, wherein the personal identifier comprises a personal identification number (PIN).
78. The non-transitory computer-readable medium of claim 66, wherein the secure element comprises logic to dynamically bind a certified POS device to the service provider to process the payment by a user of the certified POS device for the vendor.
US16/815,440 2013-05-09 2020-03-11 Methods and arrangements to complete online transactions Pending US20200320506A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US16/815,440 US20200320506A1 (en) 2013-05-09 2020-03-11 Methods and arrangements to complete online transactions

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US201361821428P 2013-05-09 2013-05-09
US14/476,732 US10592890B2 (en) 2014-09-03 2014-09-03 Methods and arrangements to complete online transactions
US16/815,440 US20200320506A1 (en) 2013-05-09 2020-03-11 Methods and arrangements to complete online transactions

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US14/476,732 Continuation US10592890B2 (en) 2013-05-09 2014-09-03 Methods and arrangements to complete online transactions

Publications (1)

Publication Number Publication Date
US20200320506A1 true US20200320506A1 (en) 2020-10-08

Family

ID=55402947

Family Applications (2)

Application Number Title Priority Date Filing Date
US14/476,732 Active 2035-12-08 US10592890B2 (en) 2013-05-09 2014-09-03 Methods and arrangements to complete online transactions
US16/815,440 Pending US20200320506A1 (en) 2013-05-09 2020-03-11 Methods and arrangements to complete online transactions

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US14/476,732 Active 2035-12-08 US10592890B2 (en) 2013-05-09 2014-09-03 Methods and arrangements to complete online transactions

Country Status (1)

Country Link
US (2) US10592890B2 (en)

Families Citing this family (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10592890B2 (en) 2014-09-03 2020-03-17 Intel Corporation Methods and arrangements to complete online transactions
US10181117B2 (en) 2013-09-12 2019-01-15 Intel Corporation Methods and arrangements for a personal point of sale device
US9037491B1 (en) 2013-11-26 2015-05-19 Square, Inc. Card reader emulation for cardless transactions
US8990121B1 (en) 2014-05-08 2015-03-24 Square, Inc. Establishment of a secure session between a card reader and a mobile device
US10515354B1 (en) 2014-12-05 2019-12-24 Square, Inc. Discounted card not present rates following failed card present attempts
FR3031612B1 (en) 2015-01-09 2018-04-06 Ingenico Group METHOD FOR PROCESSING SERVICE AUTHORIZATION, DEVICES AND CORRESPONDING COMPUTER PROGRAM.
US11736468B2 (en) * 2015-03-16 2023-08-22 Assa Abloy Ab Enhanced authorization
US20160294967A1 (en) * 2015-03-31 2016-10-06 Toshiba Global Commerce Solutions Holdings Corporation Discoverable and shareable device brokers in pos system
EP3086254A1 (en) * 2015-04-22 2016-10-26 Gemalto Sa Method of managing applications in a secure element when updating the operating system
US10009179B2 (en) * 2015-11-30 2018-06-26 Microsoft Technology Licensing, Llc Trusted platform module (TPM) protected device
US11593780B1 (en) 2015-12-10 2023-02-28 Block, Inc. Creation and validation of a secure list of security certificates
ITUB20160900A1 (en) * 2016-02-19 2017-08-19 Eng Team Srl SMART BRACELET WITH ELECTRONIC CIRCUIT FOR MULTIFUNCTION ACTIVITY WITH SMARTPHONE NFC, AND COMBINED DATA AUTHENTICATION (CDA) FOR SECURITY PAYMENTS AND CONTACTLESS.
US10163107B1 (en) 2016-03-31 2018-12-25 Square, Inc. Technical fallback infrastructure
US9940612B1 (en) * 2016-09-30 2018-04-10 Square, Inc. Fraud detection in portable payment readers
US10803461B2 (en) 2016-09-30 2020-10-13 Square, Inc. Fraud detection in portable payment readers
US10679201B2 (en) * 2016-11-04 2020-06-09 Nxp B.V. Personal point of sale (pPOS) device that provides for card present E-commerce transaction
US9996829B1 (en) * 2016-12-27 2018-06-12 Square, Inc. System for global point-of-sale capabilities
US11514418B2 (en) * 2017-03-19 2022-11-29 Nxp B.V. Personal point of sale (pPOS) device with a local and/or remote payment kernel that provides for card present e-commerce transaction
US10755281B1 (en) 2017-03-31 2020-08-25 Square, Inc. Payment transaction authentication system and method
US11593773B1 (en) 2017-03-31 2023-02-28 Block, Inc. Payment transaction authentication system and method
US20180315038A1 (en) 2017-04-28 2018-11-01 Square, Inc. Multi-source transaction processing
US20180365679A1 (en) * 2017-06-19 2018-12-20 Nxp B.V. Merchant authenication to vehicle based personal point of sale (ppos) device that provides for card present e-commerce transaction
US20190114606A1 (en) * 2017-10-13 2019-04-18 Nxp B.V. Personal point of sale (ppos) with dynamic payment kernel configuration for card present e-commerce and in vehicle transaction
FR3081246B1 (en) * 2018-05-18 2020-11-06 Ingenico Group PROCESS FOR CARRYING OUT A TRANSACTION, TERMINAL, SERVER AND CORRESPONDING COMPUTER PROGRAM
US11620623B2 (en) 2018-05-31 2023-04-04 Nxp B.V. Merchant transaction mirroring for personal point of sale (pPOS) for card present e-commerce and in vehicle transaction
EP3777282B1 (en) * 2019-05-13 2022-07-13 Lambda: 4 Entwicklungen GmbH Detection of attacks on wireless authorisation systems
WO2022208238A1 (en) * 2021-03-31 2022-10-06 Jio Platforms Limited System and method for secure and contactless fund transfer in open and closed loop transactions
US11880479B2 (en) 2021-08-05 2024-01-23 Bank Of America Corporation Access control for updating documents in a digital document repository
US11790098B2 (en) 2021-08-05 2023-10-17 Bank Of America Corporation Digital document repository access control using encoded graphical codes

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140101047A1 (en) * 2012-10-09 2014-04-10 Barclays Bank Plc System and Method for Authenticating a Payment Transaction
US20140324698A1 (en) * 2012-02-29 2014-10-30 Mobeewave, Inc. Method, device, add-on and secure element for conducting a secured financial transaction on a device
US20150348000A1 (en) * 2014-05-29 2015-12-03 Apple Inc. Financial-transaction notifications
US11018724B2 (en) * 2006-09-24 2021-05-25 Rfcyber Corp. Method and apparatus for emulating multiple cards in mobile devices

Family Cites Families (41)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FI981902A (en) 1998-09-04 2000-03-05 Sonera Oyj Security module, security system and mobile station
ES2216459T3 (en) 1999-05-21 2004-10-16 Alcatel METHOD FOR IMPROVING THE PERFORMANCE OF A MOBILE RADIOCOMMUNICATION SYSTEM USING THE CONVERGENCE ASSESSMENT OF THE POWER CONTROL LOOP.
US7292999B2 (en) * 2001-03-15 2007-11-06 American Express Travel Related Services Company, Inc. Online card present transaction
US7325250B1 (en) 2001-07-09 2008-01-29 Advanced Micro Devices, Inc. Method and apparatus for preventing radio communication system access by an unauthorized modem
JP3912509B2 (en) 2002-06-24 2007-05-09 日本電気株式会社 Mobile communication system, radio switching method, mobile base station, and portable terminal
CN1170372C (en) 2002-12-31 2004-10-06 艾威梯软件技术(北京)有限公司 Multi-functional USB bluetooth RF communication module
US8676249B2 (en) * 2003-05-19 2014-03-18 Tahnk Wireless Co., Llc Apparatus and method for increased security of wireless transactions
US7762470B2 (en) 2003-11-17 2010-07-27 Dpd Patent Trust Ltd. RFID token with multiple interface controller
US8700729B2 (en) 2005-01-21 2014-04-15 Robin Dua Method and apparatus for managing credentials through a wireless network
KR20070027156A (en) 2005-09-06 2007-03-09 (주)넥스지텔레콤 Usb memory having smart card and usb smart card reader chip
US8001584B2 (en) 2005-09-30 2011-08-16 Intel Corporation Method for secure device discovery and introduction
JP4255470B2 (en) 2005-11-30 2009-04-15 富士通株式会社 Digital content recording device and tamper resistant module
GB0525635D0 (en) 2005-12-16 2006-01-25 Innovision Res & Tech Plc Chip card and method of data communication
US8352323B2 (en) * 2007-11-30 2013-01-08 Blaze Mobile, Inc. Conducting an online payment transaction using an NFC enabled mobile communication device
JP4945718B2 (en) 2006-04-05 2012-06-06 エスティー‐エリクソン、ソシエテ、アノニム Dynamic designation process for subscriber smart card contacts in mobile terminals
US8118218B2 (en) 2006-09-24 2012-02-21 Rich House Global Technology Ltd. Method and apparatus for providing electronic purse
US20130139230A1 (en) 2006-09-24 2013-05-30 Rfcyber Corporation Trusted Service Management Process
US20120130838A1 (en) * 2006-09-24 2012-05-24 Rfcyber Corp. Method and apparatus for personalizing secure elements in mobile devices
EP2068576A1 (en) 2006-10-03 2009-06-10 Panasonic Corporation Relay station in mobile communication system and relay transmission channel setting method
US8078873B2 (en) 2008-06-30 2011-12-13 Intel Corporation Two-way authentication between two communication endpoints using a one-way out-of-band (OOB) channel
EP3668130B1 (en) 2008-07-20 2023-12-20 Samsung Electronics Co., Ltd. Method and near field communication controller for managing multiple applications in near field communication
CN201408549Y (en) 2009-05-13 2010-02-17 深圳市江波龙电子有限公司 U flash drive and smart card combined equipment
CN101667163A (en) 2009-10-19 2010-03-10 北京华大智宝电子系统有限公司 Encrypting and authenticating equipment with dual safety chips
JP5782698B2 (en) 2009-11-20 2015-09-24 ソニー株式会社 COMMUNICATION DEVICE, PROGRAM, AND COMMUNICATION METHOD
US8996002B2 (en) 2010-06-14 2015-03-31 Apple Inc. Apparatus and methods for provisioning subscriber identity data in a wireless network
US8666368B2 (en) 2010-05-03 2014-03-04 Apple Inc. Wireless network authentication apparatus and methods
US9100393B2 (en) 2010-11-04 2015-08-04 Apple Inc. Simulacrum of physical security device and methods
US8831677B2 (en) 2010-11-17 2014-09-09 Antony-Euclid C. Villa-Real Customer-controlled instant-response anti-fraud/anti-identity theft devices (with true-personal identity verification), method and systems for secured global applications in personal/business e-banking, e-commerce, e-medical/health insurance checker, e-education/research/invention, e-disaster advisor, e-immigration, e-airport/aircraft security, e-military/e-law enforcement, with or without NFC component and system, with cellular/satellite phone/internet/multi-media functions
US20120238206A1 (en) 2011-03-14 2012-09-20 Research In Motion Limited Communications device providing near field communication (nfc) secure element disabling features related methods
WO2012149219A2 (en) 2011-04-26 2012-11-01 Apple Inc. Electronic access client distribution apparatus and methods
US9106632B2 (en) * 2011-05-26 2015-08-11 First Data Corporation Provisioning by delivered items
JP5177270B2 (en) 2011-09-08 2013-04-03 ソニー株式会社 COMMUNICATION DEVICE, COMMUNICATION SYSTEM, AND COMMUNICATION METHOD
US8942628B2 (en) 2011-11-28 2015-01-27 Qualcomm Incorporated Reducing power consumption for connection establishment in near field communication systems
US8918855B2 (en) 2011-12-09 2014-12-23 Blackberry Limited Transaction provisioning for mobile wireless communications devices and related methods
US20130257589A1 (en) 2012-03-29 2013-10-03 Mohammad MOHIUDDIN Access control using an electronic lock employing short range communication with mobile device
CN202795600U (en) * 2012-06-29 2013-03-13 巫少芬 Card swiping payment mobile phone system
WO2014076584A2 (en) * 2012-11-14 2014-05-22 Savolainen Risto K System and method for secure mobile contactless payment
US9792603B1 (en) * 2013-02-04 2017-10-17 Sprint Communications Company L.P. Companion applets for web-based transactions
US9319088B2 (en) 2013-05-09 2016-04-19 Intel Corporation Radio communication devices and methods for controlling a radio communication device
US10592890B2 (en) 2014-09-03 2020-03-17 Intel Corporation Methods and arrangements to complete online transactions
US10181117B2 (en) 2013-09-12 2019-01-15 Intel Corporation Methods and arrangements for a personal point of sale device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11018724B2 (en) * 2006-09-24 2021-05-25 Rfcyber Corp. Method and apparatus for emulating multiple cards in mobile devices
US20140324698A1 (en) * 2012-02-29 2014-10-30 Mobeewave, Inc. Method, device, add-on and secure element for conducting a secured financial transaction on a device
US20140101047A1 (en) * 2012-10-09 2014-04-10 Barclays Bank Plc System and Method for Authenticating a Payment Transaction
US20150348000A1 (en) * 2014-05-29 2015-12-03 Apple Inc. Financial-transaction notifications

Also Published As

Publication number Publication date
US20160063480A1 (en) 2016-03-03
US10592890B2 (en) 2020-03-17

Similar Documents

Publication Publication Date Title
US20200320506A1 (en) Methods and arrangements to complete online transactions
US20220245609A1 (en) Methods and arrangements for a personal point of sale device
US11138587B2 (en) Wireless payment with a portable device
US10515352B2 (en) System and method for providing diverse secure data communication permissions to trusted applications on a portable communication device
US9123041B2 (en) System and method for presentation of multiple NFC credentials during a single NFC transaction
US20150339659A1 (en) System And Method For Payment Credential-Based Mobile Commerce
US10740746B2 (en) Secure NFC forwarding from a mobile terminal through an electronic accessory
US9445262B2 (en) Authentication server, mobile terminal and method for issuing radio frequency card key using authentication server and mobile terminal
US20190116046A1 (en) Privacy preserving tag
US20120123868A1 (en) System and Method for Physical-World Based Dynamic Contactless Data Emulation in a Portable Communication Device
US20120124394A1 (en) System and Method for Providing a Virtual Secure Element on a Portable Communication Device
US20160192119A1 (en) Method and system of generating nfc-transaction remotely
WO2016141865A1 (en) Data transmission method for mobile near field payment and user equipment
CN105376059A (en) Method and system for performing application signature based on electronic key
CN103685211B (en) Mobile terminal plug-in secure payment authentication device, mobile terminal secure payment authentication system and mobile terminal secure payment authentication method
TWI650715B (en) Payment system based on near field communication and method thereof
CN110636491A (en) Service-oriented trusted execution module and communication method
CN102685704A (en) Method and system for mobile phone trading
CN106534602B (en) A kind of terminal and information processing method
TWI650722B (en) Communication card network silver key and its working method
KR102076313B1 (en) Method for Processing Electronic Signature based on Universal Subscriber Identity Module of Mobile Device
TWI496481B (en) Mobile electronic device authentication system and mobile electronic device applying the same
Pan et al. A New Mobile Information Security Solution Based on External Electronic Key

Legal Events

Date Code Title Description
STPP Information on status: patent application and granting procedure in general

Free format text: APPLICATION DISPATCHED FROM PREEXAM, NOT YET DOCKETED

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER