US20140370876A1 - Provisioning User Attributes for use with Mobile Computing Device - Google Patents

Provisioning User Attributes for use with Mobile Computing Device Download PDF

Info

Publication number
US20140370876A1
US20140370876A1 US14/475,826 US201414475826A US2014370876A1 US 20140370876 A1 US20140370876 A1 US 20140370876A1 US 201414475826 A US201414475826 A US 201414475826A US 2014370876 A1 US2014370876 A1 US 2014370876A1
Authority
US
United States
Prior art keywords
users
attributes
computing device
provisioning application
mobile computing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US14/475,826
Inventor
Forrest Steely
Samuel Leo Rhodus
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lexmark International Inc
Original Assignee
Lexmark International Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lexmark International Inc filed Critical Lexmark International Inc
Priority to US14/475,826 priority Critical patent/US20140370876A1/en
Assigned to LEXMARK INTERNATIONAL, INC. reassignment LEXMARK INTERNATIONAL, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: RHODUS, SAMUEL LEO, STEELY, FORREST
Publication of US20140370876A1 publication Critical patent/US20140370876A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • H04W4/001
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/0482Interaction with lists of selectable items, e.g. menus
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72406User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by software upgrading or downloading
    • H04M1/72525
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • H04W4/008
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/50Service provisioning or reconfiguring
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/183Processing at user equipment or user record carrier
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/40Security arrangements using identity modules
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/63Location-dependent; Proximity-dependent

Definitions

  • the present invention relates to mobile computing devices, such as smart phones. It relates also to applications on mobile devices requiring personal attributes supplied by users. Software, interfaces, methods, and apparatus enable users to discriminately select relevant attributes for delivery to third party recipients.
  • Modern society requires users to provide personal information to enroll in various processes. Examples include admission to hospitals, registering at hotels, applying for bank loans/mortgages, appointments with physicians, checking-in for flights, and the like. Users are commonly asked to provide basic information such as name, address, phone number, etc. Users are also asked to provide specific information relevant to the recipient's process, such as social security number, driver's license number/state, automobile license plate number, insurance group/policy number, checking and savings account numbers, frequent flyer number, etc. The specific information is also typically private or sensitive in nature.
  • NFC NFC terminals the details of a user's credit card, e.g., credit card number, expiration date, three digit card security code, etc.
  • the phone pulls the information from a secure area of memory known as the “secure element.”
  • the secure element facilitates logical partitions between different cards and their information.
  • Phones equipped with NFC are presently inflexible. By design, users cannot adjust financial information so monetary transactions between phones and terminals occur according to a very rigid and tightly orchestrated protocol. A further need exists, therefore, to facilitate robustness in smart phones to leverage NFC and secure elements. Additional benefits and alternatives are also sought when devising solutions.
  • mobile computing devices host operating systems and mobile applications. They include a data transport protocol, such as an NFC subsystem and secure elements. Provisioning applications communicate with the secure elements and the NFC subsystem. The applications cause display of interfaces for users to enter personal attributes for storage in the secure elements. Users later discriminately select items from their personal attributes for NFC transmissions. Third parties receive only those attributes that are relative to their process. Techniques for selecting items include individual selection, by profiles of aggregated attributes, by location, or by recipient, to name a few. Selection occurs in real time or upon user convenience. Third parties contribute to the process by pre-specifying which attributes they would like to receive and/or formatting of the attributes.
  • Alternate designs note other data transfer protocols such as Bluetooth, wireless USB, etc.
  • Use-cases describe provisioning of user attributes on-demand, by aggregating together multiple attributes according to a type of information typically solicited by businesses, by a geographic or present location of the computing device, and by recipients of the attributes known or selected by the user.
  • the provisioning application further notes a computing system environment able to recognize a standardized format such as structured XML files transmitted/received according to a predefined schema or a robust environment able to solicit and receive input from third party recipients so as to pre-specify formats of user-information.
  • Still other designs contemplate user options, menus, interfaces, and convenience functions, to name a few. Examples include pages to solicit user attributes according to types of transactions with third parties, automatically configuring attributes having been earlier specified, allowing view/edit functionality at times before sending, and suggestions for types of attributes.
  • FIG. 1 is a diagrammatic view of a computing system environment for provisioning user attributes for use with a mobile computing device
  • FIG. 2 is a diagrammatic view of an interface for provisioning user attributes, including options for creating and selecting user profiles;
  • FIG. 3 is a diagrammatic view of an interface for provisioning user attributes, including options for selecting user preferences;
  • FIG. 4 is a diagrammatic view of an interface for provisioning user attributes, including selecting preferences by location;
  • FIG. 5 is a diagrammatic view of an interface for provisioning user attributes, including selecting preferences by recipients of the attributes.
  • a computing system environment 10 includes a service provider 12 of mobile applications (colloquially “mobile ‘apps’”).
  • the provider makes available a provisioning application 14 that users 5 download onto a mobile computing device 16 .
  • the download resides as executable code on a computing device 18 such as a server or imprinted on a computer readable medium 19 such as a CD, smart card, USB stick, etc.
  • Users retrieve the medium and load the provisioning application directly onto their mobile device or with assistance from still another computing device.
  • users execute a series of functions on their mobile device and obtain the requisite code by way of an attendant computing network 25 .
  • the network includes or not a variety of software such as an “app store” and hardware such as routers, servers, switches, desktop/laptop computers, phone transmission towers, satellites, etc.
  • the connections typify wired and wireless communications between a few or many devices in an internet, intranet or other environment. Skilled artisans readily understand the process and the requisite actions for downloading applications.
  • the mobile computing device 16 Upon successful receipt of the provisioning application 14 , the mobile computing device 16 hosts it on one or more controllers 20 resident in a housing 28 .
  • the controller(s) also host an operating system (O.S.) and one or more additional mobile applications, as is typical.
  • a near field communication (NFC) subsystem 30 resides in the housing 28 . It is configured physically with the controller(s), on other existing components such as a SIM card, U-Rim card, SD card or other smart card, or independently as a stand-alone component such as an embedded chip. (External cards or other inputs to the smart phone can come from an external slot, such as at 31 on the housing of the phone.) In any configuration, the NFC 30 serves to communicate with a near field communications terminal 40 external to the housing of the mobile computing device.
  • the mobile computing device further includes a secure element 32 that resides with the controller(s), other existing components (e.g., aforementioned cards), or as a stand alone component. It functions as a memory device where data objects 35 can be securely stored and retrieved.
  • GSM Global System for Mobile Communications
  • the provisioning application 14 communicates with both the secure element 32 and near field communicator 30 .
  • the application causes display of an interface on the mobile device whereby users enter personal attributes 37 , 39 , 41 for storage in the secure element. Users later discriminately select items from their personal attributes and the provisioning application 14 bundles them together for NFC transmission to a third party recipient 50 . Third parties receive only those attributes that are pertinent to their business processes.
  • the provisioning application is also configured to receive input from the third parties recommending which attributes of the personal attributes are relevant for receipt.
  • the third parties 50 provide input to the application provider 12 by way of the network 25 .
  • the third parties notify the application provider 12 as to both the type of information sought from users and the format for sending/receiving.
  • the provider then structures the provisioning application resident on the computing device 18 / 20 to seek the user attributes in an appropriate fashion and to transmit them in manner recognized by the third parties. It is preferred that the communications environment recognizes a standardized format such as structured XML files transmitted/received according to a predefined schema.
  • the input from third parties 50 arrives in real time at the provisioning application 14 by way of the terminal 40 communicated directly to the mobile device 16 . In this way, the application robustly configures together formatting options to solicit user attributes in a manner sought by the third parties.
  • the following figures illustrate use-cases where users provision their attributes according to a variety of needs.
  • profiles are an aggregation together of multiple user attributes according to a type of information typically solicited by businesses (or by any other manner of grouping).
  • a first use-case notes a “medical” profile for user attributes when visiting a physician's office or gaining admission to a hospital.
  • a later use-case notes a “financial” profile having attributes relevant to basic banking needs. Skilled artisans will readily imagine similar or other profiles depending upon the situation.
  • the provisioning application first causes display of an interface 51 on a viewing area 17 ( FIG. 1 ) of the mobile computing device 16 .
  • the interface is any of a variety whereby users engage the application to navigate pages and enter, save, edit, and retrieve data, etc.
  • Tools envisioned include fields 52 for users to enter letters, symbols, numbers, etc. by way of a keyboard.
  • the keyboard (not shown) is known to skilled artisans. It is often a tactile keyboard on the housing of the mobile device having traditional qwerty or ABC formats or an electronic keyboard in the device's viewing area that users tap or swipe to cause entry of characters.
  • selection boxes 54 that users “check” or “x” to indicate selections; navigation arrows 56 to move forward or backward from one viewing screen to a next; or “press-to-select” or “tap” functions, often accompanied by a change of color 57 on the viewing area of the computing device that indicate user selections (sometimes in conjunction with other tools such as selection box 54 ).
  • buttons 58 are still further tools that provide a variety of intuitive actions.
  • users Upon “depressing” a button, users are navigated 100 direct to a specific page of the viewing screen such as the “home” page upon depressing the home button (H).
  • Any page can serve as the home page for the application and can be equipped with a variety of functions.
  • a home page might be stylized as a page to undertake provisioning actions, a page to display an advertisement, a page to accept/reject a license or other contractual agreement, a page to display a company or other logo, etc.
  • the provisioning application undertakes actions that correspond to the names of the buttons.
  • Buttons of this design have names such as “save” 58 - 1 , “send” 58 - 2 , “view” 58 - 3 , “edit” 58 - 4 , “set profile” 58 - 5 , or the like.
  • the provisioning application causes the “saving” of data.
  • pressing a “view” button allows users to view data, etc.
  • Titles 60 are also useful tools in the provisioning application to indicate current actions being taken on a particular page. For example, a title “create profile” 60 - 1 indicates to users that a profile is being created upon selection of items displayed on the viewing area. Similarly, a title “select profile” 60 - 2 indicates to users that they are to select a profile for communication to a third party. The names of the titles are made as intuitive as possible. “Prompts” 62 are related to titles in that they also indicate actions to users. A “name” prompt 62 - 1 next to a field 52 - 1 lets users know to enter their name or lets users know to enter comments in field 52 - 2 next to the “comments” prompt 62 - 2 .
  • “Status” pages 68 also find utility to let users know a success or failure of an event such as whether user attributes were successfully “sent” 70 .
  • Status may also reflect an amount of an activity, such as how much a user has completed a profile under construction. Status indicators may also be fleeting in nature and only momentarily displayed or may exist during an entirety of a process to reflect progress, etc.
  • the application causes display of a page P 200 on the viewing area where users enter general information about themselves.
  • Representative attributes include, but are not limited to, name, address, home and cell phone numbers, social security number, date of birth, birthplace location, or the like.
  • the application solicits the data in a preliminary step such as upon the display of an initialization or generalization page.
  • the provisioning application safe keeps the attributes in the secure element (e.g., “save” 58 - 1 ) and the attributes are now made available for immediate selection for communication to a third party or to be aggregated together into a “profile.”
  • the provisioning application provides users with a menu of options for taking provisioning actions, page P 202 .
  • users can create or select profiles, select individual preferences, provision attributes by a particular location, or provision attributes by a known third party recipient of the information.
  • the provisioning application can display an appropriate page notifying users of this procedural order if users first accidentally “select profile” before having “created” a profile.
  • the option of selecting a profile may be held in abeyance by the provisioning application until such time as the user first creates a profile.
  • users are able to immediately undertake the other provisioning actions of “select preferences,” select “by location” or “by recipient” as will be seen in the other figures.
  • the provisioning application Upon selecting “create profile,” the provisioning application provides 203 users with a page P 204 that gathers preliminary information about the profile to-be-created.
  • a profile name 206 is designated as is a profile type 208 .
  • the name is governed by the user's choice, while the type is governed by pre-packaged selections that the application provides to users. In this instance, the type relates to “medical” attributes about the user and corresponds to the name “John's Medical.” Other types of profiles include financial profiles, insurance profiles, commerce profiles, etc. or self-named profiles under the selection “other.”
  • the provisioning application Upon designating the name and type of profile, the provisioning application transits 205 the user through a variety of pages in order to aggregate together multiple attributes.
  • the attributes retrieved by the application can be information of a type that is typically solicited by medical businesses or can be prescribed in advance by third parties, such as doctors' offices who will eventually receive such data.
  • the third parties can contribute directly to the application by way of the network 25 ( FIG. 1 ) or in real time by way of its NFC terminal 40 ( FIG. 1 ) by making contemporaneous requests for attributes according to a convention of the provisioning application.
  • representative pages of the provisioning application are continued in the example of a “medical” profile.
  • attributes of a user's insurance company and primary physician is gathered. This includes policy names and numbers, names of insured persons, co-pay amounts, primary physician's name/address/phone, etc.
  • attributes of a user's physical being are solicited and collected. Representative items of interest here include gender, height, weight, eye color, glasses, cholesterol levels, blood pressure and blood type, etc.
  • family history attributes for a user are gathered at page P 214 as are surgical information attributes at page P 216 .
  • the provisioning application proceeds 217 to display further pages, e.g., page P 218 , requesting attributes of further interest.
  • a user having had an appendectomy surgery at page P 216 will be further asked to indicate at page P 218 when such occurred, who performed the surgery and where, and provide any additional comments.
  • the provisioning application will finish displaying its pages to the user.
  • users will indicate their desire to “save” 219 or finish their selections of their profile for later retrieval.
  • users are asked to confirm their selections by either setting their entries as a profile 58 - 5 or whether they want to edit their selections 58 - 4 .
  • the provisioning application bundles together all the relevant attributes having been selected by the users on the various pages and saves them as a single profile in the secure element 32 ( FIG. 1 ) for safekeeping and later transmission.
  • the application also displays 221 a page P 222 whereby users can select any of their profiles 110 for immediate communication to third party recipients.
  • users can be displayed the home page P 202 to ascertain what provisioning actions they may seek to undertake and from here they can select the option “select profile.” In either instance, once “select profile” is the action taken by users, saved profiles 110 from the secure element are presented to the user for their selection.
  • the provisioning application Upon selecting the profile “John's Medical,” the provisioning application “sends” it 58 - 2 to third parties such as a physician's office where the physician's office securely receives attributes pertinent to the physician's office (e.g. at terminal 40 , FIG. 1 ). The process saves the user from ever needing to again fill out forms of this type as all user attributes relevant to recipients of this type are now safely stored in the secure element.
  • a status page P 224 then indicates to users that their “sending” of their profile was a success or failure. If successful, users are notified and returned to the home page P 202 . If not, a “failure” message is displayed where users can be prompted to “try again,” “cancel” or take some further corrective action. Users can also “view” 58 - 3 their selected profile before sending. Viewing selected attributes will be described according to page P 314 , FIG. 3 .
  • FIG. 3 Another use-case scenario for taking provisioning action from page P 202 relates to users “selecting preferences.”
  • the provisioning application displays 301 to users a menu or options on page P 310 for “on-demand” selecting individual attributes for communication to a third party.
  • users select ones of their attributes 303 having been earlier stored as part of the initial gathering of general attributes and/or selecting attributes by way of any saved profiles 305 .
  • From the general attributes the user selects their name: John Doe; address: 102 Maple; and their cell phone number: 111-1111. They also seek to select attributes from a saved profile named “John's Banking.”
  • the provisioning application displays 307 the attributes of the user's financial profile at page P 312 .
  • the provisioning application 14 is further configured to communicate with a positioning system of the mobile device 16 .
  • a positioning system of the mobile device 16 As a GPS (global positioning satellite) or other coordinate system 60 is often integrated within smart phones to precise a whereabouts of the housing of the phone at all times, the provisioning application 14 will use this feature to facilitate a user convenience option for users.
  • the functionality of the positioning system is invoked 401 by the provisioning application so users can select items from their personal attributes according to a present location of the housing of the smart phone. To do this, the provisioning application first ascertains the geographic location of the phone from input of the positioning system.
  • the provisioning application displays this to the user on a page P 410 .
  • the provisioning application can make no associations of profiles and the location of the mobile device, the application can further consider whether an association might make sense between existing profiles and businesses nearby the present location. To the extent the location of the mobile device is noted nearby an address of a banking institution, the provisioning application might suggest an associated profile of the type noted as a financial profile, such as “John's Banking.” Of course other schema and associations could be used for functionality of this type.
  • the provisioning application will have access to other elements 70 ( FIG. 1 ) of the mobile computing device. These elements include, but are not limited to, a user's address book, list of contacts, calendar, clock, mapping function, etc.
  • a further use-case includes the provisioning application noting that the present location of the smart phone matches an address stored in the user's address book that corresponds to the user's dentist and that a current time matches (or fits within a margin of error, say 30 minutes, 1 day, etc.) an appointment time stored in the user's calendar.
  • the provisioning application can then suggest to the user or automatically select a medical or dental profile for transmission to the dentist.
  • users can provision their attributes according to known recipients.
  • the provisioning application proceeds 501 to populate a list 503 of possible recipients.
  • the recipients are gathered variously. They are gathered by noting well known businesses such as those found by ranking services, e.g., Forbes, Standard & Poor's, etc., by correlation to nearby addresses located by the smart phone, by association in which the user has earlier conducted transactions, etc.
  • rankings services e.g., Forbes, Standard & Poor's, etc.
  • users are free to select a recipient for transmitting their user attributes.
  • the user selects Delta Airlines in the example and the provisioning application displays 505 a page P 512 .
  • the provisioning application is aware of user attributes that the recipient (Delta Airlines) seeks to receive. If at an airport for check-in for a flight, Delta Airlines may want to know 1) a user's name, address and cell phone to contact the user, 2) a credit card number and expiration date for baggage fees, 3) a frequent flyer number to associate with points, and 4) whether or not the user is a preferred traveler according to the Transportation Security Administration (TSA). To the extent the attributes are already known to the provisioning application, further functionality of the application includes automatically populating fields from the secure element for as many attributes as possible 520 to speed the process for both the user and recipient.
  • TSA Transportation Security Administration
  • Users then merely finish completing relevant fields of the page according to the attributes not already known, e.g., frequent flyer number 530 and TSA preferred traveler barcode 540 .
  • users “Send” their attributes to the noted third party or “View” their attributes before sending. Users at this time may also want to save their new attributes in a profile for later usage in a similar situation such as upon a next instance of checking-in at an airport for a flight.

Abstract

A mobile computing device hosts an operating system and mobile applications. A provisioning application communicates with a secure element and near field communication (NFC) subsystem. It causes display of an interface for users to enter personal attributes for storage in the secure element. Users discriminately select items from their personal attributes for transmission to a third party recipient so only attributes relative to the third party are sent. Software, interfaces, methods, and apparatus typify the embodiments.

Description

    FIELD OF THE INVENTION
  • The present invention relates to mobile computing devices, such as smart phones. It relates also to applications on mobile devices requiring personal attributes supplied by users. Software, interfaces, methods, and apparatus enable users to discriminately select relevant attributes for delivery to third party recipients.
  • BACKGROUND
  • Modern society requires users to provide personal information to enroll in various processes. Examples include admission to hospitals, registering at hotels, applying for bank loans/mortgages, appointments with physicians, checking-in for flights, and the like. Users are commonly asked to provide basic information such as name, address, phone number, etc. Users are also asked to provide specific information relevant to the recipient's process, such as social security number, driver's license number/state, automobile license plate number, insurance group/policy number, checking and savings account numbers, frequent flyer number, etc. The specific information is also typically private or sensitive in nature.
  • Recipients manually key in information received verbally from users. They also capture it with semi-automated techniques (computer scan) that read entries submitted on paper forms/questionnaires. The former is tedious, time consuming, subject to memory failures of the recipient, keystroke errors, etc. The latter requires movement of personnel back and forth to scanning equipment and sometimes requires waiting for equipment to become available. Both are also insecure as others can overhear verbal information and catch sight of forms. Users sometimes become annoyed at the processes as they are often asked for the same exact information from the same recipients, sometimes in a same day. A need exists to conveniently and securely convey information from users to third parties, especially basic information.
  • In mobile computing devices, manufacturers are outfitting smart phones with NFC devices to securely transfer information from one device to another in very close proximity. A prominent use of the technology, known as electronic wallets or “eWallets,” enables smart phones to pay for goods/services instead of cash or swipes of credit cards. During times of payment, phones transfer to near field communication
  • (NFC) terminals the details of a user's credit card, e.g., credit card number, expiration date, three digit card security code, etc. The phone pulls the information from a secure area of memory known as the “secure element.” As users often store more than one credit card, the secure element facilitates logical partitions between different cards and their information. Phones equipped with NFC, however, are presently inflexible. By design, users cannot adjust financial information so monetary transactions between phones and terminals occur according to a very rigid and tightly orchestrated protocol. A further need exists, therefore, to facilitate robustness in smart phones to leverage NFC and secure elements. Additional benefits and alternatives are also sought when devising solutions.
  • SUMMARY
  • Provisioning applications for use with mobile computing devices solve the above-mentioned and other problems. In representative embodiments, mobile computing devices host operating systems and mobile applications. They include a data transport protocol, such as an NFC subsystem and secure elements. Provisioning applications communicate with the secure elements and the NFC subsystem. The applications cause display of interfaces for users to enter personal attributes for storage in the secure elements. Users later discriminately select items from their personal attributes for NFC transmissions. Third parties receive only those attributes that are relative to their process. Techniques for selecting items include individual selection, by profiles of aggregated attributes, by location, or by recipient, to name a few. Selection occurs in real time or upon user convenience. Third parties contribute to the process by pre-specifying which attributes they would like to receive and/or formatting of the attributes. They can also contemporaneously engage phones for the same purpose. The foregoing obviates the need for users to continually transcribe personal items for third parties. It gives third parties control to dictate only user items of interest. It eliminates extraneous information. It saves on processing manpower and effort. Software, executable code, interfaces, computing system environments, methods, and apparatus typify the embodiments.
  • Alternate designs note other data transfer protocols such as Bluetooth, wireless USB, etc. Use-cases describe provisioning of user attributes on-demand, by aggregating together multiple attributes according to a type of information typically solicited by businesses, by a geographic or present location of the computing device, and by recipients of the attributes known or selected by the user. For recognition across a wide spectrum of uses, the provisioning application further notes a computing system environment able to recognize a standardized format such as structured XML files transmitted/received according to a predefined schema or a robust environment able to solicit and receive input from third party recipients so as to pre-specify formats of user-information. Still other designs contemplate user options, menus, interfaces, and convenience functions, to name a few. Examples include pages to solicit user attributes according to types of transactions with third parties, automatically configuring attributes having been earlier specified, allowing view/edit functionality at times before sending, and suggestions for types of attributes.
  • These and other embodiments are set forth in the description below. Their advantages and features will become readily apparent to skilled artisans. The claims set forth particular limitations.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a diagrammatic view of a computing system environment for provisioning user attributes for use with a mobile computing device;
  • FIG. 2 is a diagrammatic view of an interface for provisioning user attributes, including options for creating and selecting user profiles;
  • FIG. 3 is a diagrammatic view of an interface for provisioning user attributes, including options for selecting user preferences;
  • FIG. 4 is a diagrammatic view of an interface for provisioning user attributes, including selecting preferences by location; and
  • FIG. 5 is a diagrammatic view of an interface for provisioning user attributes, including selecting preferences by recipients of the attributes.
  • DETAILED DESCRIPTION OF THE ILLUSTRATED EMBODIMENTS
  • In the following detailed description, reference is made to the accompanying drawings where like numerals represent like details. The embodiments are described in sufficient detail to enable those skilled in the art to practice the invention. It is to be understood that other embodiments may be utilized and that changes may be made without departing from the scope of the invention. The following detailed description, therefore, is not to be taken in a limiting sense and the scope of the invention is defined only by the appended claims and their equivalents. In accordance with the features of the invention, mobile applications are described for provisioning user attributes. Upon entry and secure storage of the attributes, users discriminately select items for transmission to third party recipients. Only those attributes relative to third parties are sent thus giving control regarding items pertinent to the processes at hand and obviating the need for users to continually transcribe personal items of common interest.
  • With reference to FIG. 1 a computing system environment 10 includes a service provider 12 of mobile applications (colloquially “mobile ‘apps’”). The provider makes available a provisioning application 14 that users 5 download onto a mobile computing device 16. The download resides as executable code on a computing device 18 such as a server or imprinted on a computer readable medium 19 such as a CD, smart card, USB stick, etc. Users retrieve the medium and load the provisioning application directly onto their mobile device or with assistance from still another computing device. Alternatively, users execute a series of functions on their mobile device and obtain the requisite code by way of an attendant computing network 25. The network includes or not a variety of software such as an “app store” and hardware such as routers, servers, switches, desktop/laptop computers, phone transmission towers, satellites, etc. The connections typify wired and wireless communications between a few or many devices in an internet, intranet or other environment. Skilled artisans readily understand the process and the requisite actions for downloading applications.
  • Upon successful receipt of the provisioning application 14, the mobile computing device 16 hosts it on one or more controllers 20 resident in a housing 28. The controller(s) also host an operating system (O.S.) and one or more additional mobile applications, as is typical. A near field communication (NFC) subsystem 30 resides in the housing 28. It is configured physically with the controller(s), on other existing components such as a SIM card, U-Rim card, SD card or other smart card, or independently as a stand-alone component such as an embedded chip. (External cards or other inputs to the smart phone can come from an external slot, such as at 31 on the housing of the phone.) In any configuration, the NFC 30 serves to communicate with a near field communications terminal 40 external to the housing of the mobile computing device. It incorporates proximity communications between two closely situated NFC devices to authenticate and facilitate payment for goods or services. It is readily supported by the Global System for Mobile Communications (GSM) Association and found in a variety of smart phones. Similar to the NFC, the mobile computing device further includes a secure element 32 that resides with the controller(s), other existing components (e.g., aforementioned cards), or as a stand alone component. It functions as a memory device where data objects 35 can be securely stored and retrieved.
  • During use, the provisioning application 14 communicates with both the secure element 32 and near field communicator 30. The application causes display of an interface on the mobile device whereby users enter personal attributes 37, 39, 41 for storage in the secure element. Users later discriminately select items from their personal attributes and the provisioning application 14 bundles them together for NFC transmission to a third party recipient 50. Third parties receive only those attributes that are pertinent to their business processes.
  • The provisioning application is also configured to receive input from the third parties recommending which attributes of the personal attributes are relevant for receipt. In one embodiment, the third parties 50 provide input to the application provider 12 by way of the network 25. The third parties notify the application provider 12 as to both the type of information sought from users and the format for sending/receiving. The provider then structures the provisioning application resident on the computing device 18/20 to seek the user attributes in an appropriate fashion and to transmit them in manner recognized by the third parties. It is preferred that the communications environment recognizes a standardized format such as structured XML files transmitted/received according to a predefined schema. Alternatively, the input from third parties 50 arrives in real time at the provisioning application 14 by way of the terminal 40 communicated directly to the mobile device 16. In this way, the application robustly configures together formatting options to solicit user attributes in a manner sought by the third parties. In either, the following figures illustrate use-cases where users provision their attributes according to a variety of needs.
  • With reference to FIG. 2, users create and select “profiles.” Profiles are an aggregation together of multiple user attributes according to a type of information typically solicited by businesses (or by any other manner of grouping). A first use-case notes a “medical” profile for user attributes when visiting a physician's office or gaining admission to a hospital. A later use-case notes a “financial” profile having attributes relevant to basic banking needs. Skilled artisans will readily imagine similar or other profiles depending upon the situation.
  • The provisioning application first causes display of an interface 51 on a viewing area 17 (FIG. 1) of the mobile computing device 16. The interface is any of a variety whereby users engage the application to navigate pages and enter, save, edit, and retrieve data, etc. Tools envisioned include fields 52 for users to enter letters, symbols, numbers, etc. by way of a keyboard. The keyboard (not shown) is known to skilled artisans. It is often a tactile keyboard on the housing of the mobile device having traditional qwerty or ABC formats or an electronic keyboard in the device's viewing area that users tap or swipe to cause entry of characters.
  • Other tools include “selection boxes” 54 that users “check” or “x” to indicate selections; navigation arrows 56 to move forward or backward from one viewing screen to a next; or “press-to-select” or “tap” functions, often accompanied by a change of color 57 on the viewing area of the computing device that indicate user selections (sometimes in conjunction with other tools such as selection box 54).
  • “Buttons” 58 are still further tools that provide a variety of intuitive actions. Upon “depressing” a button, users are navigated 100 direct to a specific page of the viewing screen such as the “home” page upon depressing the home button (H). Any page can serve as the home page for the application and can be equipped with a variety of functions. A home page might be stylized as a page to undertake provisioning actions, a page to display an advertisement, a page to accept/reject a license or other contractual agreement, a page to display a company or other logo, etc. In other buttons, the provisioning application undertakes actions that correspond to the names of the buttons. Buttons of this design have names such as “save” 58-1, “send” 58-2, “view” 58-3, “edit” 58-4, “set profile” 58-5, or the like. Upon users pressing the “save” button, for example, the provisioning application causes the “saving” of data. Similarly, pressing a “view” button allows users to view data, etc.
  • Titles 60 are also useful tools in the provisioning application to indicate current actions being taken on a particular page. For example, a title “create profile” 60-1 indicates to users that a profile is being created upon selection of items displayed on the viewing area. Similarly, a title “select profile” 60-2 indicates to users that they are to select a profile for communication to a third party. The names of the titles are made as intuitive as possible. “Prompts” 62 are related to titles in that they also indicate actions to users. A “name” prompt 62-1 next to a field 52-1 lets users know to enter their name or lets users know to enter comments in field 52-2 next to the “comments” prompt 62-2. “Status” pages 68 also find utility to let users know a success or failure of an event such as whether user attributes were successfully “sent” 70. Status may also reflect an amount of an activity, such as how much a user has completed a profile under construction. Status indicators may also be fleeting in nature and only momentarily displayed or may exist during an entirety of a process to reflect progress, etc.
  • By utilizing these and similar tools to engage the provisioning application, the following describes how users create and select profiles for provisioning user attributes. Initially, the application causes display of a page P200 on the viewing area where users enter general information about themselves. Representative attributes include, but are not limited to, name, address, home and cell phone numbers, social security number, date of birth, birthplace location, or the like. As many third parties commonly request information of this type from users, it is gained by the provisioning application in a manner that need not be particularly associated to a named profile or a third party. Hence, the application solicits the data in a preliminary step such as upon the display of an initialization or generalization page. Thereafter, the provisioning application safe keeps the attributes in the secure element (e.g., “save” 58-1) and the attributes are now made available for immediate selection for communication to a third party or to be aggregated together into a “profile.”
  • At action 201, the provisioning application provides users with a menu of options for taking provisioning actions, page P202. Among representative actions, users can create or select profiles, select individual preferences, provision attributes by a particular location, or provision attributes by a known third party recipient of the information. As a user profile need first be “created” before it can be “selected,” the provisioning application can display an appropriate page notifying users of this procedural order if users first accidentally “select profile” before having “created” a profile. Alternatively, the option of selecting a profile may be held in abeyance by the provisioning application until such time as the user first creates a profile. On the other hand, users are able to immediately undertake the other provisioning actions of “select preferences,” select “by location” or “by recipient” as will be seen in the other figures.
  • Upon selecting “create profile,” the provisioning application provides 203 users with a page P204 that gathers preliminary information about the profile to-be-created. A profile name 206 is designated as is a profile type 208. The name is governed by the user's choice, while the type is governed by pre-packaged selections that the application provides to users. In this instance, the type relates to “medical” attributes about the user and corresponds to the name “John's Medical.” Other types of profiles include financial profiles, insurance profiles, commerce profiles, etc. or self-named profiles under the selection “other.” Upon designating the name and type of profile, the provisioning application transits 205 the user through a variety of pages in order to aggregate together multiple attributes. The attributes retrieved by the application can be information of a type that is typically solicited by medical businesses or can be prescribed in advance by third parties, such as doctors' offices who will eventually receive such data. The third parties can contribute directly to the application by way of the network 25 (FIG. 1) or in real time by way of its NFC terminal 40 (FIG. 1) by making contemporaneous requests for attributes according to a convention of the provisioning application. In any situation, representative pages of the provisioning application are continued in the example of a “medical” profile.
  • At page P210, attributes of a user's insurance company and primary physician is gathered. This includes policy names and numbers, names of insured persons, co-pay amounts, primary physician's name/address/phone, etc. At page P212, attributes of a user's physical being are solicited and collected. Representative items of interest here include gender, height, weight, eye color, glasses, cholesterol levels, blood pressure and blood type, etc. Upon entry 213, family history attributes for a user are gathered at page P214 as are surgical information attributes at page P216. Upon the positive indication by the user of a particular item on a page, the provisioning application proceeds 217 to display further pages, e.g., page P218, requesting attributes of further interest. For example, a user having had an appendectomy surgery at page P216 will be further asked to indicate at page P218 when such occurred, who performed the surgery and where, and provide any additional comments. Eventually the provisioning application will finish displaying its pages to the user. At that time users will indicate their desire to “save” 219 or finish their selections of their profile for later retrieval. At page P220 users are asked to confirm their selections by either setting their entries as a profile 58-5 or whether they want to edit their selections 58-4.
  • If the latter, users are taken back through relevant pages of the profile-under-construction. If the former, the provisioning application bundles together all the relevant attributes having been selected by the users on the various pages and saves them as a single profile in the secure element 32 (FIG. 1) for safekeeping and later transmission. The application also displays 221 a page P222 whereby users can select any of their profiles 110 for immediate communication to third party recipients. Alternatively, users can be displayed the home page P202 to ascertain what provisioning actions they may seek to undertake and from here they can select the option “select profile.” In either instance, once “select profile” is the action taken by users, saved profiles 110 from the secure element are presented to the user for their selection. Upon selecting the profile “John's Medical,” the provisioning application “sends” it 58-2 to third parties such as a physician's office where the physician's office securely receives attributes pertinent to the physician's office (e.g. at terminal 40, FIG. 1). The process saves the user from ever needing to again fill out forms of this type as all user attributes relevant to recipients of this type are now safely stored in the secure element. A status page P224 then indicates to users that their “sending” of their profile was a success or failure. If successful, users are notified and returned to the home page P202. If not, a “failure” message is displayed where users can be prompted to “try again,” “cancel” or take some further corrective action. Users can also “view” 58-3 their selected profile before sending. Viewing selected attributes will be described according to page P314, FIG. 3.
  • With reference to FIG. 3, another use-case scenario for taking provisioning action from page P202 relates to users “selecting preferences.” The provisioning application displays 301 to users a menu or options on page P310 for “on-demand” selecting individual attributes for communication to a third party. In this example, users select ones of their attributes 303 having been earlier stored as part of the initial gathering of general attributes and/or selecting attributes by way of any saved profiles 305. From the general attributes the user selects their name: John Doe; address: 102 Maple; and their cell phone number: 111-1111. They also seek to select attributes from a saved profile named “John's Banking.” The provisioning application displays 307 the attributes of the user's financial profile at page P312. Here the user decides to select his Bank Name, Checking Account and Routing Number. As many and diverse attributes have been individually noted by the user, selection of “done” at button 58-6 causes the display 313 of a “Selected” page P314 noting a list of all attributes that the provisioning application has aggregated together for sending to a third party. As seen, the user's name, address, cell phone number, bank name, checking account number and routing number are compiled. Users can now “Send” or “Edit” their attributes.
  • With reference to FIG. 1, the provisioning application 14 is further configured to communicate with a positioning system of the mobile device 16. As a GPS (global positioning satellite) or other coordinate system 60 is often integrated within smart phones to precise a whereabouts of the housing of the phone at all times, the provisioning application 14 will use this feature to facilitate a user convenience option for users. With reference to FIG. 4, the functionality of the positioning system is invoked 401 by the provisioning application so users can select items from their personal attributes according to a present location of the housing of the smart phone. To do this, the provisioning application first ascertains the geographic location of the phone from input of the positioning system. It next determines whether any profiles have been earlier sent by the user at this same location (within a margin of distance, say 500 feet, 1 mile, etc.). If so, the provisioning application displays this to the user on a page P410. This includes the location of the mobile device at 412, including or not a picture of a map, phone number, name of any business at this location, etc., and any Profiles associated with this location at 414. Users can then “Send” their attributes to the third party noted at 412 or they can “View” their attributes before sending. On the other hand, if the provisioning application can make no associations of profiles and the location of the mobile device, the application can further consider whether an association might make sense between existing profiles and businesses nearby the present location. To the extent the location of the mobile device is noted nearby an address of a banking institution, the provisioning application might suggest an associated profile of the type noted as a financial profile, such as “John's Banking.” Of course other schema and associations could be used for functionality of this type.
  • For example, it is contemplated that the provisioning application will have access to other elements 70 (FIG. 1) of the mobile computing device. These elements include, but are not limited to, a user's address book, list of contacts, calendar, clock, mapping function, etc. A further use-case includes the provisioning application noting that the present location of the smart phone matches an address stored in the user's address book that corresponds to the user's dentist and that a current time matches (or fits within a margin of error, say 30 minutes, 1 day, etc.) an appointment time stored in the user's calendar. The provisioning application can then suggest to the user or automatically select a medical or dental profile for transmission to the dentist.
  • With reference to FIG. 5, users can provision their attributes according to known recipients. By selecting “by recipient” on page P202, the provisioning application proceeds 501 to populate a list 503 of possible recipients. The recipients are gathered variously. They are gathered by noting well known businesses such as those found by ranking services, e.g., Forbes, Standard & Poor's, etc., by correlation to nearby addresses located by the smart phone, by association in which the user has earlier conducted transactions, etc. Once populated, users are free to select a recipient for transmitting their user attributes. The user selects Delta Airlines in the example and the provisioning application displays 505 a page P512.
  • According to input contemporaneously provided or earlier pre-specified by the recipient (Delta Airlines), the provisioning application is aware of user attributes that the recipient (Delta Airlines) seeks to receive. If at an airport for check-in for a flight, Delta Airlines may want to know 1) a user's name, address and cell phone to contact the user, 2) a credit card number and expiration date for baggage fees, 3) a frequent flyer number to associate with points, and 4) whether or not the user is a preferred traveler according to the Transportation Security Administration (TSA). To the extent the attributes are already known to the provisioning application, further functionality of the application includes automatically populating fields from the secure element for as many attributes as possible 520 to speed the process for both the user and recipient. Users then merely finish completing relevant fields of the page according to the attributes not already known, e.g., frequent flyer number 530 and TSA preferred traveler barcode 540. When finished, users “Send” their attributes to the noted third party or “View” their attributes before sending. Users at this time may also want to save their new attributes in a profile for later usage in a similar situation such as upon a next instance of checking-in at an airport for a flight.
  • Relative advantages of the many embodiments should now be apparent to skilled artisans. They include but are not limited to: (1) users being able to discriminately select items from their personal attributes for transmission to a third party recipient so that only attributes relative to the third party are sent; (2) obviating the need for users to continually transcribe personal items that are commonly requested by third parties; (3) updating profiles or attributes at a user's convenience so that upon needing to provide information to a third party, attributes are current and users need not waste time readying information for recipients; and (4) supporting the provisioning application by recipients to contemporaneously or pre-specify user attributes of interest to speed processing in providing goods or services and minimizing manpower to receive data.
  • The foregoing illustrates various aspects of the invention. It is not intended to be exhaustive. Rather, it is chosen to provide the best illustration of the principles of the invention and its practical application to enable one of ordinary skill in the art to utilize the invention. All modifications and variations are contemplated within the scope of the invention as determined by the appended claims. Relatively apparent modifications include combining one or more features of various embodiments with features of other embodiments.

Claims (7)

1. A provisioning application available on a computer readable medium or hosted on a computing device having memory for download onto a mobile computing device, comprising:
executable code for displaying an interface to users to receive personal attributes from the users for storage in a secure element of the mobile computing device and to enable the users to discriminately select items from said personal attributes; and
executable code that can bundle together only said select items of the personal attributes for communication by a near field communicator of the mobile computing device to third party recipients so the third party recipients receive information pertinent to the third party recipients.
2. The provisioning application of claim 1, further including executable code to communicate with a positioning system of the mobile computing device so the users can make selections from said personal attributes according to a present location of the mobile computing device.
3. The provisioning application of claim 1, further including executable code configured to receive input from the third party recipients recommending which attributes of the personal attributes are relevant to the third party recipients.
4. The provisioning application of claim 3, further including executable code to automatically populate from the secure element as many attributes as possible according to the recommendations by the third party recipients.
5. The provisioning application of claim 1, further including executable code configured to allow the users to create one or more profiles of aggregated personal attributes that can be communicated to the third party recipients.
6. The provisioning application of claim 1, further including executable code to communicate with an address book, list of contacts, calendar, clock, or mapping function in the mobile computing device.
7. The provisioning application of claim 6, further including executable code to make suggestions to the users or automatically select a profile of multiple said personal attributes based upon said communication with the address book, list of contacts, calendar, clock, or mapping function.
US14/475,826 2013-02-25 2014-09-03 Provisioning User Attributes for use with Mobile Computing Device Abandoned US20140370876A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US14/475,826 US20140370876A1 (en) 2013-02-25 2014-09-03 Provisioning User Attributes for use with Mobile Computing Device

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US13/775,342 US8909143B2 (en) 2013-02-25 2013-02-25 Provisioning user attributes for use with mobile computing device
US14/475,826 US20140370876A1 (en) 2013-02-25 2014-09-03 Provisioning User Attributes for use with Mobile Computing Device

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US13/775,342 Continuation US8909143B2 (en) 2013-02-25 2013-02-25 Provisioning user attributes for use with mobile computing device

Publications (1)

Publication Number Publication Date
US20140370876A1 true US20140370876A1 (en) 2014-12-18

Family

ID=51388668

Family Applications (3)

Application Number Title Priority Date Filing Date
US13/775,342 Active 2033-06-15 US8909143B2 (en) 2013-02-25 2013-02-25 Provisioning user attributes for use with mobile computing device
US14/475,826 Abandoned US20140370876A1 (en) 2013-02-25 2014-09-03 Provisioning User Attributes for use with Mobile Computing Device
US14/475,812 Active US9154941B2 (en) 2013-02-25 2014-09-03 Provisioning user attributes for use with mobile computing device

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US13/775,342 Active 2033-06-15 US8909143B2 (en) 2013-02-25 2013-02-25 Provisioning user attributes for use with mobile computing device

Family Applications After (1)

Application Number Title Priority Date Filing Date
US14/475,812 Active US9154941B2 (en) 2013-02-25 2014-09-03 Provisioning user attributes for use with mobile computing device

Country Status (1)

Country Link
US (3) US8909143B2 (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014146266A1 (en) * 2013-03-20 2014-09-25 Nokia Corporation Application recommendations
GB2521614B (en) * 2013-12-23 2021-01-13 Arm Ip Ltd Controlling authorisation within computer systems
US9800292B2 (en) 2014-12-10 2017-10-24 Pixart Imaging Inc Capacitive communication system and Bluetooth pairing method
US9952732B2 (en) 2014-12-10 2018-04-24 Pixart Imaging Inc. Capacitive touch device, capacitive communication device and communication system
US9389742B2 (en) * 2014-12-10 2016-07-12 Pixart Imaging Inc. Capacitive touch device, capacitive communication device and communication system
CN106327102A (en) * 2016-08-31 2017-01-11 合肥美菱股份有限公司 Sign-in management system and method for replenishment staff at multiple display cabinets based on NFC technology
CN110162705B (en) * 2019-05-20 2021-07-30 梁志鹏 Automatic balance method and device based on intelligent kitchen and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050281237A1 (en) * 2002-02-27 2005-12-22 Tomi Heinonen Personal profile sharing and management for short-range wireless terminals
US20120129493A1 (en) * 2010-11-23 2012-05-24 Microsoft Corporation Access techniques using a mobile communication device
US8196131B1 (en) * 2010-12-17 2012-06-05 Google Inc. Payment application lifecycle management in a contactless smart card
US20140148098A1 (en) * 2011-07-25 2014-05-29 Lg Electronics Inc Electronic device and operating method thereof
US20140155038A1 (en) * 2009-12-01 2014-06-05 At & T Intellectual Property I, L.P. Service Models for Roaming Mobile Device
US20140222670A1 (en) * 2013-02-01 2014-08-07 Barclays Bank Plc Contactless payment application management

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8275312B2 (en) 2005-12-31 2012-09-25 Blaze Mobile, Inc. Induction triggered transactions using an external NFC device
US20080208742A1 (en) 2007-02-22 2008-08-28 First Data Corporation Provisioning of a device for mobile commerce
US8127982B1 (en) 2009-01-09 2012-03-06 Apple Inc. Parental controls
US8255323B1 (en) 2009-01-09 2012-08-28 Apple Inc. Motion based payment confirmation
US10204327B2 (en) 2011-02-05 2019-02-12 Visa International Service Association Merchant-consumer bridging platform apparatuses, methods and systems
US20130030828A1 (en) 2011-03-04 2013-01-31 Pourfallah Stacy S Healthcare incentive apparatuses, methods and systems
US9106632B2 (en) 2011-05-26 2015-08-11 First Data Corporation Provisioning by delivered items
WO2013006725A2 (en) 2011-07-05 2013-01-10 Visa International Service Association Electronic wallet checkout platform apparatuses, methods and systems

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050281237A1 (en) * 2002-02-27 2005-12-22 Tomi Heinonen Personal profile sharing and management for short-range wireless terminals
US20140155038A1 (en) * 2009-12-01 2014-06-05 At & T Intellectual Property I, L.P. Service Models for Roaming Mobile Device
US20120129493A1 (en) * 2010-11-23 2012-05-24 Microsoft Corporation Access techniques using a mobile communication device
US8196131B1 (en) * 2010-12-17 2012-06-05 Google Inc. Payment application lifecycle management in a contactless smart card
US20140148098A1 (en) * 2011-07-25 2014-05-29 Lg Electronics Inc Electronic device and operating method thereof
US20140222670A1 (en) * 2013-02-01 2014-08-07 Barclays Bank Plc Contactless payment application management

Also Published As

Publication number Publication date
US20140243046A1 (en) 2014-08-28
US9154941B2 (en) 2015-10-06
US20140378062A1 (en) 2014-12-25
US8909143B2 (en) 2014-12-09

Similar Documents

Publication Publication Date Title
US9154941B2 (en) Provisioning user attributes for use with mobile computing device
US9058410B2 (en) Integrated electronic patient health care data coordination system
US9959385B2 (en) Messaging within a multi-access health care provider portal
US20160005028A1 (en) Systems and Methods for Providing Gifts Via a Mobile Messaging Platform
US11874949B2 (en) Self-controlled digital authorization over communication networks
US20230252553A1 (en) Systems and methods for managing lists using an information storage and communication system
US20120253831A1 (en) Systems and methods for determining pharmacy locations based upon a current location for use with a virtual pharmacy
US11127493B2 (en) Methods and systems for claim adjudication
US20120253830A1 (en) Systems and methods for variable customer pricing for virtual pharmacies
US20080319794A1 (en) Health information services using phone
US20170344948A1 (en) Coordinated mobile access to electronic medical records
US20170278210A1 (en) Method and system for providing home care service
US20190362828A1 (en) Systems and methods for electronic prescriptions
US8645163B1 (en) Systems and methods for determining information regarding drugs
US10628796B2 (en) Systems and processes of importing and comparing benefit options
JP6473840B1 (en) Unoccupied house determination system, unoccupied house determination method, and unoccupied house determination program
US20090228302A1 (en) System and method of prescribing alternative medications
US9270336B2 (en) Provisioning user attributes for use with mobile computing device
US20140236612A1 (en) Multi-access health care provider portal
WO2013036851A1 (en) Provision of a mobile health product
US20220327584A1 (en) Machine-Learning Driven Pricing Guidance
JP2019207675A (en) Unoccupied house determination system, unoccupied house determination method, and unoccupied house determination program
US20150205935A1 (en) Prescribed recovery continuum care plan compliance apparatus and method of use
WO2022221097A1 (en) Machine-learning driven pricing guidance
JP5003212B2 (en) Online trading terminal, online trading system

Legal Events

Date Code Title Description
AS Assignment

Owner name: LEXMARK INTERNATIONAL, INC., KENTUCKY

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:STEELY, FORREST;RHODUS, SAMUEL LEO;REEL/FRAME:033656/0966

Effective date: 20130225

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION