WO2009039419A1 - Wireless smart card and integrated personal area network, near field communication and contactless payment system - Google Patents

Wireless smart card and integrated personal area network, near field communication and contactless payment system Download PDF

Info

Publication number
WO2009039419A1
WO2009039419A1 PCT/US2008/077089 US2008077089W WO2009039419A1 WO 2009039419 A1 WO2009039419 A1 WO 2009039419A1 US 2008077089 W US2008077089 W US 2008077089W WO 2009039419 A1 WO2009039419 A1 WO 2009039419A1
Authority
WO
WIPO (PCT)
Prior art keywords
smart card
wireless smart
wireless
transceiver
secure element
Prior art date
Application number
PCT/US2008/077089
Other languages
French (fr)
Inventor
Michael Loh
Ambrose Tam
Original Assignee
Wireless Dynamics, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wireless Dynamics, Inc. filed Critical Wireless Dynamics, Inc.
Priority to EP08831911A priority Critical patent/EP2201543A1/en
Publication of WO2009039419A1 publication Critical patent/WO2009039419A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/0723Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips the record carrier comprising an arrangement for non-contact communication, e.g. wireless communication circuits on transponder cards, non-contact smart cards or RFIDs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/326Payment applications installed on the mobile devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/325Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices using wireless networks
    • G06Q20/3255Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices using wireless networks using mobile network messaging services for payment, e.g. SMS
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/327Short range or proximity payments by means of M-devices
    • G06Q20/3278RFID or NFC payments by means of M-devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/352Contactless payments by cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/385Payment protocols; Details thereof using an alias or single-use codes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/42Confirmation, e.g. check or permission by the legal debtor of payment
    • G06Q20/425Confirmation, e.g. check or permission by the legal debtor of payment using two different networks, one for transaction and one for security confirmation
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/0873Details of the card reader
    • G07F7/088Details of the card reader the card reader being part of the point of sale [POS] terminal or electronic cash register [ECR] itself
    • G07F7/0886Details of the card reader the card reader being part of the point of sale [POS] terminal or electronic cash register [ECR] itself the card reader being portable for interacting with a POS or ECR in realizing a payment transaction
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system

Definitions

  • the subject invention relates to a wireless smart card configured for contactless payment transactions, methods for contactless transactions using the wireless smart card and a system for contactless transactions using the wireless smart card,
  • Mobile communication devices including cellular phones, personal digital assistants (PDAs), other types of mobile phones, and the like, (herein collectively referred to as mobile communication devices or mobile phones) are being used not just for communication (voice and text), but also to take photos, send text messages, listen to music, surf the Web, do word processing, watch movies and the like. Consumers have also become interested in using their mobile communication devices to perform various transactions (e.g., transfer funds, purchase products, etc.).
  • Contactless payment standards have recently been developed for contactless payment systems that optionally can be used with these mobile communication devices. In order to carry out a contactless transaction, any transponder or contactless transaction component must comply with these standards.
  • the contactless payment systems and standards have been implemented by credit card issuers such as Mastercard (PayPass), Visa, etc, which have issued special credit cards that have passive contactless transponders that can be used for the contactless payment transactions.
  • contactless payment has been implemented by integrating near field communications (NFC) into mobile communication devices or by using a Bluetooth proprietary feature of the mobile communication devices.
  • NFC near field communications
  • the contactiess payment systems have been used with various communication standards.
  • NFC is an open standard communication system that was designed by Philips and Sony Corporation, and enhanced by the NFC forum.
  • NFC uses Radio Frequency Identification (RFID) based technology and must comply with various standards and operating protocol/frequency for RFID.
  • RFID Radio Frequency Identification
  • a wireless smart card comprises a persona] area network (PAN) interface; a near field communication (NFC) and radio frequency identification (RFlD) transceiver; a secure element coupled to the NFC and RFID transceiver: a processor coupled to the PAN transceiver, the NFC and RFID transceiver and the secure element: and a memory coupled to the processor.
  • PAN persona] area network
  • NFC near field communication
  • RFID radio frequency identification
  • a method for receiving a request to activate a secure communication link at a secure element of a wireless smart card from a mobile device; establishing the secure link to the mobile device through a personal area network (PAN) transceiver; and storing applets and user credentials at the secure element through the secure link.
  • PAN personal area network
  • a wireless smart card comprises a first wireless transceiver to wirelessly communicate with a mobile communication device through a first communication protocol; a second wireless transceiver to wirelessly communicate with a transaction device through a second communication protocol; a secure element having a processor and a secured flash memory to store applets and user credentials, the secure element coupled to the first wireless transceiver and the second wireless transceiver; and a logic and processing controller coupled to the first wireless transceiver, second wireless transceiver and the secure element.
  • a wireless smart card comprises a first wireless transceiver to wirelessiy communicate with a mobile communication device through a first communication protocol; a second wireless transceiver to wirelessiy communicate with a transaction device through a second communication protocol; and a secure element to store secure data and to enable secure operations to be conducted via wireless communications between the mobile communication device, the wireless smart card, and the transaction device,
  • a wireless smart card system comprises a mobile communication device; a transaction device; and a wireless smart card comprising a first wireless transceiver to wirelessiy communicate with said mobile communication device through a first communication protocol; a second wireless transceiver to wirelessiy communicate with said transaction device through a second communication protocol; and a secure element to store secure data and enable secure operations to be conducted by said system via wireless communications between the mobile communication device, the wireless smart card, and the transaction device.
  • FIG. 1 is a block diagram of a wireless smart card system in accordance with one embodiment of the invention.
  • FIG. 2 is a block diagram of a wireless smart card system in accordance with one embodiment of the invention.
  • FIG. 3 is a more detailed block diagram of the wireless smart card shown in Figs. 1 and 2 in accordance with one embodiment of the invention.
  • Figures 4 A and 4 B are flow diagrams of a power on procedure in accordance with one embodiment of the invention.
  • FIGS. 5A and 5B are flow diagrams of a pairing procedure in accordance with one embodiment of the invention.
  • Figures 6A and 6B are flow diagrams of a provisioning procedure in accordance with one embodiment of the invention.
  • Figure 7 is a data flow diagram for the provisioning process of Figures 6A and 6B in accordance with one embodiment of the invention.
  • Figures 8A and 8B are flow diagrams of a network transaction procedure in accordance with one embodiment of the invention.
  • Figure 9 is a data flow diagram for the network transaction process of Figures 8A and 8B in accordance with one embodiment of the invention.
  • Figures I OA and 1OB are flow diagrams of a contactless transaction procedure in accordance with one embodiment of the invention.
  • Figure 1 1 is a data flow diagram for the contactless transaction process of Figures 1OA and 1OB in accordance with one embodiment of the invention;
  • Figures 12A and 32B are flow diagrams of a contactless read/write procedure in accordance with one embodiment of the invention.
  • Figure 13 is a data flow diagram for the contactless read/write process of Figures 12A and 12B in accordance with one embodiment of the invention.
  • Figures 14A and 14B are flow diagrams of a peer to peer procedure in accordance with one embodiment of the invention.
  • Figure 15 is a data flow diagram for the peer to peer process of Figures 14A and 14B in accordance with one embodiment of the invention.
  • Figure 16 is a data flow diagram for a local transaction process in accordance with one embodiment of the invention.
  • Figure 17 is a schematic drawing of a key fob wireless smart card in accordance with one embodiment of the invention.
  • Figure 18 is a block diagram of a wireless smart card system in accordance with another embodiment of the invention.
  • Figure 19 is a block diagram of a wireless smart card in accordance with one embodiment of the invention.
  • Embodiments of the invention relate to a wireless smart card that can be used to conduct contactless transactions, etc., which also includes the ability to communicate with and be managed by a mobile communication device, such as a cellular phone via a conventional personal communication network (PCN) or personal area network (PAN).
  • the wireless smart card communicates with the mobile communication device through use of the well known Bluetooth wireless protocol.
  • Contactless transactions that can be performed with the wireless smart card include contactless payment, near field communication (NFC) with other NFC devices (i.e. peer- to-peer communication), and Radio Identification (RFlD) reading/writing, which can be made in a secure and efficient manner.
  • NFC near field communication
  • RFID Radio Identification
  • the wireless smart card can be used to provision or modify secure personal credentials, store and modify monetary values, upload or review transactions, and read and download information from external transaction devices, such as smart posters and other NFC or RFID devices. Because the wireless smart card can communicate with both the mobile communication device and the external transaction devices, users are not required to change their mobile communication devices. In addition, users who have multiple mobile communication devices can use the wireless smart card for contactless payment, near field communication or other transaction functions using any of their mobile communication devices that support PCN's.
  • FIG. 1 and 2 illustrate an exemplary smart card contactless transaction system 100.
  • the contactless transaction system J00 may include additional or fewer components and the arrangement of the components may differ from that shown in Figures 1 and 2.
  • the contactless transaction system 100 includes a wireless smart card 104, a mobile communication device 108, a transaction device 1 12, a cellular network 116 (or other wireless communication network) and a transaction processing center 120.
  • the wireless smart card 304 is configured to read, upload download, or exchange information between the transaction device 112 and the mobile communication device 108.
  • the wireless smart card 104 includes a personal area network (PAN) transceiver 124, a PAN antenna 126, a USB port 127, a near field communication (NFC) and radio frequency identification (RFID) interface 128, a NFC antenna 130, a transponder with a secure element 132, a logic and communication processing control 136, a power management and battery 140 and a manually operable input device 144, e.g. a switch, button or keyboard.
  • PAN personal area network
  • NFC near field communication
  • RFID radio frequency identification
  • the NFC and RFID interface 328 is shown as one NFC and RFID transceiver, the NFC and RFID interface 128 may include multiple transceivers, such as one NFC transceiver and one RFID transceiver, or one or more NFC transceivers and one or more RFID transceivers, or just one NFC transceiver or just one RFID transceiver.
  • USB port 127 enables an external device to be connected to wireless smart card 304 via a wired ⁇ nk.
  • the logic and communication processing control 136 includes a CPU and memory.
  • the wireless smart card 104 includes multi-mode operation controls and corresponding software/protocols that automatically detect, switch and enable various modes of operations, transactions and applications.
  • the power management and battery circuit 140 may include a charger and/or a rechargeable battery.
  • the rechargeable battery may be, for example, a lithium ion battery.
  • the secure element 132 is a Secure Access Module (SAM) known in the art.
  • SAM Secure Access Module
  • the secure element 132 is configured to store applets that are configured to enable the wireless smart card 104 to enable transaction and communication functions.
  • the secure element 132 is also configured to store secure data, such as user credentials, transaction data, and the like.
  • the wireless smart card 104 can be packaged into various form factors to suit the look, feel and operation required for the user and such that the wireless smart card 104 is portable.
  • the wireless smart card 104 is, for example, a key fob, a card (e.g., credit card size), a wrist or watch band, a phone attachment, and the like.
  • the mobile communication device 108 is typically a cellular phone, but it will be appreciated that the mobile communication device 108 may be other mobile computing devices, such as a Personal Digital Assistant (PDA), Tablet Personal Computer (Tablet PC), and the like.
  • the mobile communication device 108 includes a transceiver (not shown) for communicating with the wireless smart card 104 through the PAN transceiver 124 of the wireless smart card 104.
  • the mobile communication device 108 and wireless smart card communicate via Bluetooth.
  • Bluetooth is a wireless communication protocol for creating personal area networks using a frequency hopping spread spectrum at about 2.4GHz. It will be appreciated that other wireless peer-to-peer communication methods may be used including, for example, a Personal Communication Network (PCN), Ultra Wide Band, WiFi, etc.
  • PCN Personal Communication Network
  • WiFi Ultra Wide Band
  • the mobile communication device 108 and wireless smart card 104 may also communicate through a USB connection, as shown at 127, or via some other wired connection.
  • the transaction device 3 12 and the wireless smart card 104 communicate using NFC or RFID at the NFC and RFID interface 128.
  • the transaction device 1 12 may be, for example, a contactless payment terminal 112a, an NFC or RFID transponder 112b, a near field communication (NFC) device 1 12c, and the like, and combinations thereof.
  • Exemplary NFC or RFID transponder devices 112b include e-Posters, contactless labels, RFID tags, etc.
  • the wireless smart card 104 also includes a transponder with secure element 132 configured to store credit credentials, user authentication information and the like, to enable secure communications between the wireless smart card and a transaction processing center 120 using the wireless networks of the mobile communication device 108 and the transaction device 1 12 (e.g., Bluetooth and NFC and/or RFID networks, respectively).
  • a transponder with secure element 132 configured to store credit credentials, user authentication information and the like, to enable secure communications between the wireless smart card and a transaction processing center 120 using the wireless networks of the mobile communication device 108 and the transaction device 1 12 (e.g., Bluetooth and NFC and/or RFID networks, respectively).
  • the transaction processing center 120 includes, for example, banks, credit card issuers, cellular operators and/or payment service providers that are involved in processing transactions, as known in the art. As shown in Figure 2, the transaction processing center 120 may include a service server 256, an institution server 260, and financial transaction servers 264.
  • the transaction processing center 120 opens a secure communication channel to the wireless smart card 104 via a dedicated or virtual private network (from the transaction processing center 120 to the cellular operating statioji), a cellular network (from the cellular operating station to the mobile communication device 108), and Bluetooth (from the mobile communication device 108 to the wireless smart card 104).
  • the transaction processing center 120 can exchange secure protocols with the wireless smart card 104, and download or modify the applets in the flash memory of the secured secure element in the wireless smart card 104.
  • the transaction processing center 120 can also activate, download or modify other secure content such as payment account credentials, coupons, or monetary credits to the wireless smart card 104 for payment or other transactions.
  • the transaction processing center 120 can also activate, store or modify the applets, user credentials or other transaction contents via Near Field Communication or RFID between the transaction device 112 (e.g., contactless payment terminal 112a) and the wireless smart card 104.
  • the wireless smart card 104 can be used for transactions (e.g., credit or debit payments) by presenting the wireless smart card 104 at the contactless payment terminal 112a.
  • the contactless payment terminal 1 12a communicates with the applets and credentials stored in the secure element 132 through the NFC and/or RFID interface 328 using NFC according to a standard transaction protocol.
  • the transaction and authorization is then processed between the contactless payment terminal 1 12a and transaction processing center 120 using standard transaction processing.
  • Transaction information can be communicated from the wireless smart card 104 to the mobile communication device (e.g., cellular phone) via Bluetooth communication using the PAN transceiver 124. Clearance of transactions can be performed by communication with the transaction processing center 120 through a wireless network (e.g., cellular network 1 16). Transaction information can also be sent from the transaction process center 120 to the mobile communication device 108 using SMS (Short Messages Services) or other cellular data services. Clearance of the transaction can be performed by contactless transaction modes. Transaction information (or most recent information) can also be stored in the wireless smart card 104 for iater retrieval through a mobile device or a PC.
  • a wireless network e.g., cellular network 1 16
  • SMS Short Messages Services
  • Clearance of the transaction can be performed by contactless transaction modes.
  • Transaction information (or most recent information) can also be stored in the wireless smart card 104 for iater retrieval through a mobile device or a PC.
  • FIG. 3 illustrates a more detailed block diagram of the wireless smart card 104, as seen at 300.
  • the wireless smart card 104 may include additional or fewer components than those shown in Figure 3, and that the arrangement of the components may also differ from that shown in Figure 3.
  • the illustrated wireless smart card 300 includes a logic/controller 304, a display 308, a manually operable input device 312, a biometric sensor 316, a Bluetooth transceiver 320, a Universal Serial Bus (USB) connection 324, a power control 328, a battery 332, a NFC/RFID transceiver 336 and a secure element 340.
  • USB Universal Serial Bus
  • the logic/control Ser 304 is configured to control operation of the wireless smart card 300.
  • the logic/controller 304 performs logic operations including, for example, user authentication, Bluetooth pairing, applet selection and power management.
  • the logic/controller 304 may also be configured to control communications with other external devices in the transaction processing center 120.
  • Firmware may be embedded in a flash memory of the controller to provide the intelligence, secure protocol and operation for the controller.
  • the controller and memory of the logic/controller 304 comprises a digital signal processor (DSP).
  • DSP digital signal processor
  • the wireless smart card 104 may optionally include a user interface.
  • the user interface includes one or more of the display 308, manually operable input device 312 and biometric sensor 316.
  • the display 308 may include status LEDs and/or a full liquid crystal display (LCD) to provide user feedback of the current operation of the wireless smart card 300.
  • the display 308 can be used to display one time password (OTP) information, as will be described in further detail below.
  • OTP can also be provided through the use of a mobile phone or PC through the USB port 127.
  • the manually operable input device 312 can comprise one or more simple buttons and/or a full keypad.
  • the input device 312 may be an activation pushbutton connected to the logic/controller 304 that is configured to power on and/or activate the wireless smart card 104.
  • the input device 312 can be used to wake up the device and/or for navigating and selecting operations.
  • the input device 312 can be used to manually select various modes of operations of the wireless smart card 300.
  • the display 308 can also be used for user input (i.e., touch screen).
  • the biometric sensor 316 is a fingerprint sensor that is used for inputting security credentials. Biometric sensor 316 can also be used to select or control operations. For example, the direction of swipe or which finger is used can be detected to enable predetermined operations to be selected by a user. At initial set up, the user's biometric information may be entered and stored in the flash memory of the secure element 340. Once the wireless smart card 300 is configured, the biometric information from the sensor 316 can be used to compare and match a fingerprint at a later time to authenticate the user.
  • the biometric information can also be used to authenticate secure communication lines.
  • the transceiver 320 is described as a Bluetooth transceiver, it will be appreciated that the transceiver 320 may operate under other communication protocols.
  • the wireless transceiver 320 is configured to communicate with a mobile communication device, such as a cellular phone, via the antenna 322.
  • the transceiver 320 can be a Bluetooth, WiFi, Ultra Wide Band, Infrared, or other wireless communication transceivers.
  • Data communication via the transceiver 320 can be encrypted to augment security between a mobile communication device and the wireless smart card 300.
  • the Universal Serial Bus (USB) connection 324 is also an optional feature of the wireless smart card 300.
  • the USB connection 324 can be used to connect the wireless smart card 300 with the mobile communication device (e.g., cellular phone) and/or a PC through a wired connection.
  • the USB connection 324 can also be used to charge the battery 332 or provide power to the smart card 300 through a PC, some other external computing device, or a wall adaptor.
  • the power control 328 is configured to distribute power from the battery 332 or USB connection 324 to the components of the wireless smart card 300, The power control 328 also manages the charging of the battery 332 when the USB connection 324 is used to recharge the battery 332 or power the other components of the wireless smart card 300. It will be appreciated that if power is through the USB connection 324, the power will be a DC charge. Induction coupling or radio coupling can also be used to charge the battery 332 without a direct wire connection to the wireless smart card 300.
  • the power control 328 is also configured to control power saving functions that shut down unnecessary circuitry of the wireless smart card 300 to save power and thus prolong the need for charging. The power saving operation can be enhanced by an event trigger design, as known in the art.
  • a near field signal from an external NFC device can be coupled to the power control 328 via the NFC antenna to energize the transponder circuit of the wireless smart card and trigger the power management to wake up the required circuitry.
  • the NFC and RFID transceiver 336 provides NFC and RFID communications.
  • An NFC Antenna 344 is connected to the transceiver to transmit or receive the NFC or RFID signal.
  • the NFC/RFID transceiver 336 can be operated as the transponder to interact with external NFC/RFID devices. Also, standard RFlD functions can be performed, enabling the device to be an RFID reader to scan and interact with other compatible tags.
  • the secure element 340 preferably includes a processor with access to various types of hardware encryption algorithms and secure flash memory.
  • the secure element 340 allows the NFC transceiver 336 to operate like a transponder (tags) for contactless payment or other transactions.
  • the secure element 340 stores applets, user credentials, transaction content or other secure information.
  • the applets stored in the secure element 340 can preferably be configured to enable the wireless smart card 300 to perform various functions including coupon, rebate, loyalty programs, transit payment tokens, credit and debit card transactions, eT ⁇ cketing, access control, etc.
  • the applets are small application programs that enable the payment function and communications with the transaction device 112.
  • the wireless smart card can be used to generate a One-Time-Password (OTP).
  • OTP One-Time-Password
  • the OTP parameter and counter elements can be stored in the secure element 340 and displayed by the wireless smart card 300 or the mobile communication device 108.
  • an OTP is required by the transaction processing system for authentication of the transaction.
  • the wireless smart card 104 and the transaction processing system 100 can be used to perform transactions relating to Smart Posters, eTicketing, contactless payment, loyalty, etc.
  • customer credentials e.g., credit card number, etc.
  • the payment terminal 112a communicates the information to the transaction processing center 120 which processes the transaction using applicable standards.
  • the details of the transaction can be communicated back to the wireless smart card 104 for review or verification by the consumer.
  • customers can use the wireless smart card 104 for network payments.
  • the mobile communication device 108 can communicate with the wireless smart card 104 to make online purchases at the mobile communication device 108.
  • the wireless smart card 104 transmits the transaction credentials stored at the wireless smart card 104 through the Bluetooth (or other personal area network) between the mobile communication device 108 and the wireless smart card 104).
  • the transaction is processed by the transaction processing center 120 as known in the art.
  • customers can use the wireless smart card 104 for loyalty or preferred customer programs.
  • the consumer's loyalty programs or preferred customer details can be stored at the wireless smart card 104.
  • a transaction device 112 can query the wireless smart card 104 for the loyalty program information to provide loyalty points, discounts or access.
  • the consumer may use the points to purchase products or services that support the loyalty point program using the wireless smart card 104.
  • the consumer can also review their loyalty points balance or offering at the wireless smart card 104 or through the wireless smart card 104 at the mobile communication device 108.
  • the wireless smart card 104 can be used for e- ticketing.
  • the consumer can store purchased eTickets on their wireless smart card 104.
  • the user can request the wireless smart card 104 display the eTicket at the mobile communication device 108 (or at the wireless smart card 104) to enter.
  • the consumer can also exchange eTickets with other wireless smart cards 104 or other transaction devices that have NFC (e.g., transaction device 112c).
  • consumers can use the wireless smart card to store E-Coupons, which can be extracted at the appropriate time by the coupon offering company through their transaction device 112
  • the wireless smart card 104 can also be used to interact with smart posters.
  • Smart posters are typically used to advertise an event, offering or product.
  • the consumer can present the wireless smart card 304 to the tag location of the smart poster. Additional details can then be provided to the consumer or an offer to purchase may be provided to the user at the mobile communication device 108 through the wireless smart card 104 or by a link to more information from the net. For example, if a smart poster is advertising a new movie or show and the consumer presents the wireless smart card at the tag of the smart poster, a synopsis of the movie and local showings may be presented to the consumer at the mobile communication device 108.
  • the user can also use the wireless smart card 104 to purchase tickets for the event electronically and use the eTicket to enter the movie.
  • the wireless smart card 104 can also be used for network pairing. Devices connected through Bluetooth or other personal area networks typically need to be paired. The wireless smart card 104 can allow pairing of other devices with the mobile communication device 108 through the Bluetooth or other personal area network by providing the key information in a secure manner.
  • the wireless smart card 104 can also be used to exchange business cards.
  • the user can present their wireless smart card 104 to a NFC device (e.g., transaction device 112c) or another wireless smart card 104 to transmit the business card.
  • Each wireless smart card 104 can then store the contact information in the contacts of the mobile communication device 308.
  • the wireless smart card 104 can also be used to securely store passwords. The passwords can then be accessed through the mobile communication device 108.
  • the wireless smart card 104 can be used for server authentication.
  • a secure user access key can be associated with and stored on a wireless smart card 104 for secure access to online services, such as online banking, credit and financial information.
  • the wireless smart card 104 can be queried in a secure manner for dynamic authentication of the user.
  • the wireless smart card 104 is configured to allow for manual and/or automatic mode-switching. Exemplary modes include a power-on mode, a pairing mode, a provisioning and activation mode, a transaction mode, a contactless reader and writer mode, a peer to peer communication mode and a local transaction mode.
  • Each mode involves processes and data exchange between the wireless smart card 104 and the mobile communication de ⁇ 'ice 108 and/or transaction device 1 12.
  • the operations modes are controlled by the logic and communication processing controller 136.
  • the controller 136 can determine the modes based on the interaction or information of the external devices 1 12 (e.g., payment terminal 112a, NFC/RFID tags 1 12b, NFC devices 112c, etc). Modes can be manually selected by the user through the input functions of the wireless smart card 104 or mobile communication device 108.
  • FIGs 4A and 4B illustrate a preferred process 400 for powering on the wireless smart card (Figure 4A) and mobile communication device ( Figure 4B).
  • the process 400 begins at block 404.
  • an exemplary power on event includes a button press for, in one example, 1 second.
  • the process continues at block 412 by determining whether a pairing relationship exists. If a pair relationship does not exist, an event error occurs (block 416). If a pair relationship exists, the process 400 continues to enable the wireless smart card to attempt pairing using a Bluetooth protocol (block 420). The process 400 continues by establishing a Bluetooth connection (block 424). The process 400 then verifies whether a connection is established (block 428).
  • the process 400 continues to block 416 (an event error). If a connection is verified, then the process 400 continues to Event: Ready (block 432). The process continues at block 436 at the handheld (see Figure 4B). The process also continues at the wireless smart card, by the host controlled event processing (block 440). The process 400 then continues by determining whether the event process is complete (block 444). If no, the process 400 returns to block 440. If yes, the process 400 continues to power off (block 448). If an event error (block 416) occurred, the process 400 also continues to power off (block 448). The process 400 then ends (block 452) at the wireless smart card.
  • the process 400 includes operations at the handheld wireless communication device, as shown in Figure 4B.
  • the process 400 continues by determining whether a handheld application residing on a service server, e.g., EZWallet, is active (block 456). If no. the EZWallet application is launched (block 460) and the process 400 continues back to block 456. If yes, the process continues to Event: Smart wireless transponder ready (block 464). The process 400 continues to the EZWallet Event processing (block 468), The process 400 then ends (block 472) at the host handheld.
  • a handheld application residing on a service server, e.g., EZWallet
  • Event Smart wireless transponder ready
  • the process 400 continues to the EZWallet Event processing (block 468), The process 400 then ends (block 472) at the host handheld.
  • FIGs 5A and 5B illustrate a preferred pairing process 500 at the wireless smart card ( Figure 5A) and the host handheld wireless communication device ( Figure 5B).
  • the pairing process 500 preferably begins at block 504 by a long button press (e.g., five seconds or more) at the wireless smart card (block 508), The process 500 continues by seeking a partner (block 512). The process 500 then determines whether a partner is found (block 516). If no, the process 500 returns to block 512. If yes, the process continues by establishing pairing (block 520). The process 500 then continues to a connection state, CONN (block 524), which occurs after the wireless smart card is turned on (see Figure 4A).
  • CONN block 524
  • the pairing process 500 includes starting a Bluetooth wireless protocol communication at the host handheld device (block 528). The process 500 continues by seeking devices (block 532). The process 500 then determines whether there is a pairing request from a wireless smart card (block 536). If no, the process returns back to block 532. If yes, the process continues by requesting/receiving a device PIN from the wireless smart card (block 540). The process 500 then continues by completing the pairing of the host handheld with the wireless smart card (block 544). The pairings process then ends (block 548).
  • Figures 6A and 6B illustrate a provisioning and activation process 600 for the wireless smart card and host handheld mobile communication device.
  • Figure 7 illustrates the communication flow of the provisioning and activation process 600 with reference to Figure 2.
  • the provisioning and activation mode allows the transaction processing center (e.g., Banks, Credit Card Issuers, Cellular Operators or Payment Service Providers), to activate, store or modify the applets stored in the secure element 340.
  • the transaction processing center e.g., Banks, Credit Card Issuers, Cellular Operators or Payment Service Providers
  • Figure 6A illustrates one embodiment Bf provisioning and activation at the wireless smart card 104 and Figure 6B illustrates one embodiment of provisioning and activation at the host handheld (i.e., mobile communication device 108).
  • the process 600 begins at the wireless smart card device at block 604.
  • the process 600 continues by enabling the NFC and secure element (block 608).
  • the process 600 continues by instructing the NFC for wired connection to the secure element (block 612).
  • the process 600 continues with the Event: Secure element Ready (block 616).
  • the process 600 continues by passing communications to the secure element (block 620).
  • the process 600 determines whether provisioning is complete (block 624). If no, the process 600 returns to block 620.
  • the process 600 continues by disabling the NFC and secure element (block 626) and ends (block 628).
  • the provisioning process 600 for the handheld mobile communication device begins at block 632.
  • the process 600 continues by the user selecting a new applet for the secure element (block 636).
  • the process 600 continues by negotiating with the transaction processing center (block 640),
  • the process 600 continues by determining whether the wireless smart card is ready (block 644). If no, the process 600 continues with the power on process (block 648) and then returns to block 644. It will be appreciated that the power on process at block 648 is the power on process described above with reference to Figures 4 A and 4B.
  • the process 600 continues to Event: Connect Secure element (block 652), which causes the process at the wireless smart card to begin at block 604 as described with reference to Figure 6A.
  • the process 600 also continues by determining whether the secure element is connected (block 656). If no, the process 600 waits (block 660) and returns to block 656. If yes, the process 600 continues to Event: Signal transaction processing center ready (block 664). The process 600 then continues to pass communications from the transaction processing center to the secure element (block 668). The process 600 then determines whether provisioning is complete (block 672). If no, the process 600 returns to block 668, If yes, the provisioning and activating process ends at block 676.
  • a mobile communication device user uses the mobile communication device 108 to surf to a desired activation site of an institution, such as a bank, department store, loyalty program, eTicket provider or other contactless enabled institution, at the institution server 260.
  • the user provides or has pre-arranged criteria for allocation of contactless cards, such as a credit card or other payment card.
  • the institution server 260 submits the request to the service server 256 (e.g., EZWallet service server).
  • the service server 256 establishes a relationship with the appropriate financial transaction server(s) 264 with tokens provided by the institution server 260.
  • the financial transaction server(s) 264 approve the transaction to load, provision and activate the service, which is communicated back to the service server 256.
  • the service server 256 then establishes a secure link to the mobile communication device 108.
  • the interface of the mobile communication device 308 prompts the user to activate the wireless smart card 104 (e.g., by pushing an activation button of the smart wireless transponder).
  • the smart wireless transponder establishes a secure link to the mobile communication device 108 through the PAN (Bluetooth) wireless connection via the PAN transceiver 124,
  • the control interface of the mobile communication device 108 requests to establish a communication link with the secure element 132.
  • the mobile communication device 108 indicates to the financial transaction server(s) 264 through the service server 256 that communication to the secure element 132 is ready.
  • the financial transaction server(s) 264 interacts directly with the secure element 132 through the secure communications established through the mobile communication device 108, and loads the appropriate applet to the secure element 132, provisions the applet with the user credentials and activates them for future use.
  • Figures 8A and 8B illustrate a network transaction process 800.
  • Figure 9 illustrates the communication flow of the network transaction process 800 with reference to Figure 2.
  • An exemplary network transaction is the exchange of secure information with web services or online transactions through the mobile communication device 108.
  • Figure 8A illustrates a preferred network transaction process at the wireless smart card 104
  • Figure 8B illustrates a preferred network transaction process at the host handheld (e.g., mobile communication device 108).
  • the process 800 begins at the wireless smart card 104 at block 804.
  • the process 800 continues by enabling the NFC and secure element (block 808).
  • the process 800 continues by instructing the NFC for wired connection to the secure element (block 812).
  • the process 800 continues with the Event: Secure element Ready (block 816).
  • the process 800 continues by passing communications to the secure element (block 820). The process 800 then determines whether the transaction is complete (block 824). If no, the process 800 returns to block 820. If yes, the process 800 continues by disabling the NFC and secure element (block 826) and ends (block 828). As shown in Figure 8B, the network transaction process 800 begins at block 832. The process 800 continues with the user selecting an online purchase (block 836). The process 800 continues by negotiating with the transaction processing center (block 840). The process 800 then determines whether the wireless smart card is ready (block 844), If no, the process 800 continues with the power on process (block848) and then returns to block 844.
  • the power on process at block 848 is the power on process described above with reference to Figures 4A and 4B. If yes, the process 800 continues to Event: Connect Secure element (block 852), which causes the process at the wireless smart card to begin at block 804 as described with reference to Figure 8 A. The process 800 also continues by determining whether the secure element is connected (block 856). If no, the process 800 waits (block 860) and returns to block 856, If yes, the process 800 continues to Event: Signal transaction processing center ready (block 864). The process 800 then continues to pass communications from the transaction processing center to the secure element (block 868). The process 800 then determines whether the transaction is complete (block 872), If no, the process 800 returns to block 868. If yes, the process ends at block 876.
  • Event: Connect Secure element block 852
  • the process 800 also continues by determining whether the secure element is connected (block 856). If no, the process 800 waits (block 860) and returns to block 856, If yes, the process 800 continues to Event: Signal transaction processing center
  • the user preferably establishes an online session at the mobile communication device 108 as shown to, for example, make a purchase or transfer funds with an institution at the institution server 260.
  • the institution server 260 requests to clear the transaction at the service server 256.
  • the service server 256 using tokens from the institution server 260, requests for processing of the transaction at the financial transaction server(s) 264.
  • the service server 256 requests the mobile communication device 108 establish connection with the secure element 132 of the wireless smart card 104.
  • the mobile communication device 108 may prompt the user to activate secure element 132 by, for example, pressing a button.
  • the secure element 132 When the secure element 132 is activated, the secure element 132 establishes a secure connection through the PAN (Bluetooth) transceiver 124 to the mobile communication device 108. Upon connection, the service application of the mobile communication device 108 requests connection with the secure element 132. Through the established secure connection, the financial transaction server(s) 264 process the transaction with the users preloaded criteria stored at the secure element 132.
  • PAN Bluetooth
  • Figures 1 OA and 1 OB illustrate a preferred contactless transaction process 1000.
  • Figure 11 illustrates the communication flow of the coniactiess transaction process 1000 with reference to Figure 2.
  • Figure 1 OA illustrates the process 1000 at the wireless smart card 104 and
  • Figure 1OB illustrates the process 1000 at the host handheld (i.e., mobile communication device 108). As shown in Figure 1OB, no activity is required unless interaction for security verification is needed at the mobile communication device 308.
  • the process 1000 begins at block 1004 by, for example, pressing a button for a shore time (e.g., less than 0.5s) at block 1008. The process 1000 continues by determining whether security is enabled (block 1012).
  • the process 1000 continues to enable the secure element for contactless card operation (block 1016). If yes, the process 1000 continues to proceed with as defined security verification (block 1020). The process 1000 then determines whether security credentials passed (block 1024). If no, the process ends (block 1036). If yes, the process 1000 returns to block 1016. From block 1016, the process 1000 continues to wait Xs (block 1028). The process 1000 continues to disable the secure element (block 1032) and ends (block 1036).
  • FIG. 11 illustrates a preferred process for contactless transactions through a contactless payment terminal 112a.
  • a user of the wireless smart card 104 e.g., by pressing a button or entering a passcode on the smart card 104
  • information from the users account or other transaction details are provided to the host terminal 1 12a through a network communication packet (e.g., SMS).
  • SMS network communication packet
  • the payment credentials are passed in a defined, secure way to the payment terminal 1 12a through the NFC and RFID interface 128 from the secure element 132.
  • the payment terminal 1 12a authenticates transaction with the financial transaction server(s) 256.
  • the terminal 112a may pass the transaction details back to the secure element 132 for record keeping.
  • the financial transaction server(s) 256 may pass the transaction details to mobile communication device 108 over the cellular network 116 through, for example, SMS.
  • Figures 12A and 12B illustrate a preferred contactless reader and writer mode process 1200.
  • Figure 13 illustrates the communication flow of the contactless reader and writer mode process 1200 with reference to Figure 2.
  • Figure 12A illustrates the contactless reader and writer process at the wireless smart card 104 and Figure 12B illustrates the contactless reader and writer process at the host handheld (i.e.. mobile communication device 108).
  • the process 1200 begins at the wireless smart card 104 at block 1204.
  • the process 1200 continues by enabling the NFC transceiver (block 1208).
  • the process 1200 continues by instructing the NFC for contactless read/write (block 1212).
  • the process 1200 continues by Event: Tag in Field (block 1216).
  • the process 1200 continues by passing data between the host and tag (block 1220).
  • the process 1200 continues by determining whether the transaction is complete at block 1224. If no, the process 1200 returns to block 1220.
  • the process 1200 continues by disabling NFC (block 1226) and ends (block 1228). As shown in Figure 12B, the network transaction process 1200 begins at block 1232. The process 1200 continues with the user negotiating for contactless operation (block 1236). The process 1200 then determines whether the wireless smart card is ready (block 1240). If no, the process 1200 continues with the power on process (block 1244) and then returns to block 1240. It will be appreciated that the power on process at block 1244 is the power on process described above with reference to Figures 4A and 4B. If yes, the process 1200 continues to Event: Contactless Operation (block 1248), which causes the process at the wireless smart card to begin at block 1204 as described with reference to Figure 12A.
  • the process 1200 also continues by determining whether the tag is in field (block 1252). If no, the process 1200 waits (block 1256) and returns to block 1252. If yes, the process 1200 continues to Data Exchange (block 3260). The process 1200 then continues to Event: Terminate Connection (block 1264) and ends (block 1268).
  • the NFC and RFID interface 128 when the contactless (NFC or RFID) reader and writer mode of the wireless smart card 104 is activated, the NFC and RFID interface 128 generates a radio signal that energizes the NFC or RFID tag 1 12b (transponder, e.g., e- Poster, RFID product label, etc.).
  • the wireless smart card 104 can read or write data from/to the tag 1 12b.
  • the wireless smart card 104 can then also communicate with the mobile communication device 108 via Bluetooth through the PAN transceiver 124 to open the corresponding application of the mobile communication device 108 according to the tag information being processed by the wireless smart card 104.
  • the user can view, store, or use the tag information (e.g., eTicket, product price, URL, etc.) to enter a transaction (e.g purchase the ticket or product, or access the web for more information based on the URL).
  • the user when the user wants to read a smart poster or other RFID tagged device 112b, the user utilizes the contactless read/write operation of the wireless smart card 104.
  • the user activates the secure element 132 by, for example, pushing a button on the wireless smart card 104 to activate the eZWallet system by establishing a connection to the mobile communication device 108 through the PAN transceiver 124, The mobile communication device 108 automatically launches the eZWallet application.
  • the wireless smart card 104 also activates the NFC or RFID interaction mode, enabling the NFC/RFID interface 128.
  • the NFC or RFID tag information is read or data is exchanged based on the policies of the information stored in tag.
  • the tag information is exchanged with the application running on the mobile communication device 108.
  • the mobile communication device 108 can then, for example, establish exchange of information with a Web or SMS service (e.g., Figures 8A-9), list information in the mobile communication device application for later processing, create a transaction process with a web service or with the wireless smart card 104 for interaction with a contactless payment terminal 112a (e.g., Figures lOA-1 1), or the like.
  • a Web or SMS service e.g., Figures 8A-9
  • list information in the mobile communication device application for later processing
  • create a transaction process with a web service or with the wireless smart card 104 for interaction with a contactless payment terminal 112a (e.g., Figures lOA-1 1), or the like.
  • Figures 14A and 14B illustrate a preferred peer to peer communication process 1200.
  • Figure 15 illustrates the data flow of the peer to peer communication process 1400 with reference to Figure 2.
  • the peer to peer communication mode is used when the wireless smart card 104 is establishing two-way communication with another NFC enabled device.
  • Figure 14A illustrates peer to peer communication at the wireless smart card 104 and Figure 14B illustrates peer to peer communication at the host handheld (i.e., mobile communication device 108),
  • the process 1400 begins at the wireless device at block 1404.
  • the process 1400 continues by enabling the NFC and secure element (block 1408).
  • the process 1400 continues by instructing the NFC to seek and connect to a peer (block 1412).
  • the process 1400 continues with the Event: Connection established (block 1416).
  • the process 1400 continues by passing communications to and from the peer (block 1420).
  • the process 1400 determines whether connection is terminated (block 1424). If no, the process 1400 returns to block 1420.
  • the process 1400 continues by disabling the NFC and secure element (block 1426) and ends (block 1428). As shown in Figure 14B, the peer to peer communication process 1400 begins at block 1432. The process 1400 continues by the user negotiating for NFC peer connection (block 1436). The process 1400 continues by determining whether the wireless smart card is ready (block 1440). If no, the process 1400 continues with the power on process (block 1444) and then returns to block 1440, It will be appreciated that the power on process at block 3444 is the power on process described above with reference to Figures 4A and 4B.
  • the process 1400 continues to Event: Connect Io Other Peer (block 1448), which causes the process at the wireless smart card to begin at block 1404 as described with reference to Figure 14A.
  • the process 1400 also continues by determining whether the peer is connected (block 1452). If no, the process 1400 waits (block 1456) and returns to block 1452. If yes, the process 1400 continues to Data Exchange (block 1460). The process 1400 then continues to Event: Terminate connection (block 1464) and ends at block 1468.
  • the wireless smart card 104 through the NFC and Bluetooth communication links through the NFC and RFlD interface 128 and the PAN transceiver 124, respectively, acts as a communication agent to relay, process, interpret or exchange information from the other NFC device(s) 1 12c to the mobile communication device 108.
  • the user may activate the secure element 132 by, for example, pressing a button on the wireless smart card 104. Connection is established between the wireless smart card 104 and the mobile communication device 108 through the PAN (Bluetooth) transceiver 124.
  • the mobile communication device 108 launches an application, e.g., the eZWallet application.
  • the wireless smart card 104 also activates the NFC or RFID interaction mode, enabling the NFC/RFID interface 128.
  • Another NFC device 112c is presented to field of the wireless smart card 104 and a peer to peer connection link is established between the other NFC device 1 12c and mobile communication device 108 for peer to peer exchange of information.
  • the eZWallet application can then utilize local information for data exchange or communicate through the network 1 16 to other services (e.g., service server 256, institution server 256 and/or financial transaction servers 264).
  • FIG 16 illustrates the data flow for a preferred embodiment of a local transaction mode 1600.
  • the wireless smart card 104 can also be utilized for local transactions (i.e., transactions between the mobile communication device 108 or other user host device, handheld or PC that utilize the secure element 132 to access specialized or personal applets). Examples of localized transactions include a password container, a one-time password and preference settings.
  • the password container allows users to enter a single password to access an applet that is a container of all passwords for that user. The user can access and remind themselves about their passwords when needed.
  • the wireless smart card 104 can be used to generate the One-Time-Password (OTP).
  • OTP One-Time-Password
  • OTP is an established means of creating dynamic credentials for authentication, which is used by many financial institutions have the OTP option for added security of online transactions.
  • the OTP parameter and counter elements can be stored in the secure element 132 of the wireless smart card 104 and displayed by the wireless smart card 104 or by the mobile communication device 108 (OTP information is communicated to the mobile communication device via Bluetooth and PAN transceiver 124).
  • the preference settings of the secure element 132 may involve interaction with a local applet. Examples of preference settings include setting a default credit card to MasterCard first, Arnex second or a personal credit card first, business credit card second.
  • Other exemplary local transactions include picture storage/transfer, application storage/transfer (e.g., patient logs, insurance information, timecards, inventory systems, asset tracking, etc.), note pad data, reminder (tasks), scheduling, and the like.
  • the user first activates the wireless smart card 104 by, for example, pressing a button.
  • the user selects operation for a local transaction mode on the mobile communication device 108.
  • the mobile communication device 108 instructs the wireless smart card 104 to connect the secure element 132.
  • the mobile communication device 108 then communicates directly with the secure element 132 through Bluetooth using the PAN transceiver 124 or through a USB connection to exchange data between the wireless smart card 104 and the mobile communication device 108.
  • FIG 17 illustrates an exemplary configuration of a key fob wireless smart card 1700.
  • the illustrated wireless smart card 1700 includes a housing 1704 that includes a key chain feature 1708, a fingerprint sensor 1712, status LEDs 1716, an activation pushbutton 1720, and a USB port 1724. It will be appreciated that the wireless smart card, however, may have a number of different configurations and the one shown in Figure 17 is merely exemplary.
  • Figure 18 illustrates another embodiment of the wireless smart card system 100 in which the wireless smart card 304 has a different arrangement from that shown in Figures 1 and 2.
  • the secure element transponder 1800 of the wireless smart card 104 may be independent of the NFC and RFID transceiver 128.
  • the secure element transponder 1800 includes a secure element antenna 1804.
  • the secure element transponder 1800 is a dua] interface integrated circuit (IC) that supports both direct and contactless communications.
  • the logic controller 336 controls the secure element transponder 1800 and NFC and RFID transceiver 128 to isolate operation such that one or the other (i.e., secure element transponder 1800 or NFC and RFID transceiver 128) is operating at a given time.
  • wireless smart card 104 includes both secure element antenna 1804 and NFC antenna 130
  • sharing of antenna e.g., wireless smart card 104 includes NFC antenna 130 or secure element antenna 1804
  • the secure element transponder 1800 can be also be used in contactless transactions with limited or no power requirements as described above with respect to the NFC and RFID transceiver 128.
  • FIG 19 illustrates another embodiment of the wireless smart card 104 in which the wireless smart card 104 includes a real time clock (RTC) 1900 coupled to the logic/controller 304. It will be appreciated that the RTC 1900 may be needed when a one-time password (OTP) is being used at the wireless smart card 104.
  • RTC real time clock
  • An advantage of the wireless smart card and wireless transaction systems and methods described herein includes the early adoption or realization in the contactless / NFC / contactless payment industry. Users are able to utilize NFC and contactless payment processes through their mobile communication device or other handheld device without getting a new phone, by using technology already existing in the user's phone (e.g., Bluetooth).
  • processes and techniques described herein are not inherently related to any particular apparatus and may be implemented by any suitable combination of components. Further, various types of general purpose devices may be used in accordance with the teachings described herein. It may also prove advantageous to construct specialized apparatus to perform the method steps described herein.
  • the present invention has been described in relation to particular examples, which are intended in all respects to be illustrative rather than restrictive. Those skilled in the art will appreciate that many different combinations of hardware, software, and firmware will be suitable for practicing the present invention.

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Finance (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A wireless smart card having a personal area network transceiver, such as a Bluetooth transceiver, to couple the wireless smart card with a mobile communication device, and a near field communication (NFC) and radio-frequency identification (RFID) transceiver to couple the wireless smart card to a wireless transaction device, and a transponder with a secure element to allow secure communications between the mobile communication device with the wireless smart card and the wireless smart card and the wireless transaction device is described. The wireless smart card allows, for example, contactless payment through a Bluetooth-enabled mobile communication device without modification to the mobile communication device.

Description

WIRELESS SMART CARD AND INTEGRATED PERSONAL AREA NETWORK, NEAR FIELD COMMUNICATION AND CONTACTLESS
PAYMENT SYSTEM
PRIORITY
[0001] The present application claims priority to U.S. Provisional Application No. 60/974,424, filed September 21, 2007, entitled "WIRELESS SMART CARD AND INTEGRATED PERSONAL AREA NETWORK, NEAR FIELD COMMUNICATION AND CONTACTLESS PAYMENT SYSTEM," the entirety of which is hereby incorporated by reference.
BACKGROUND
1. Field
[0002] The subject invention relates to a wireless smart card configured for contactless payment transactions, methods for contactless transactions using the wireless smart card and a system for contactless transactions using the wireless smart card,
2. Related Art
[0003] Mobile communication devices, including cellular phones, personal digital assistants (PDAs), other types of mobile phones, and the like, (herein collectively referred to as mobile communication devices or mobile phones) are being used not just for communication (voice and text), but also to take photos, send text messages, listen to music, surf the Web, do word processing, watch movies and the like. Consumers have also become interested in using their mobile communication devices to perform various transactions (e.g., transfer funds, purchase products, etc.). Contactless payment standards have recently been developed for contactless payment systems that optionally can be used with these mobile communication devices. In order to carry out a contactless transaction, any transponder or contactless transaction component must comply with these standards. The contactless payment systems and standards have been implemented by credit card issuers such as Mastercard (PayPass), Visa, etc, which have issued special credit cards that have passive contactless transponders that can be used for the contactless payment transactions. In addition, contactless payment has been implemented by integrating near field communications (NFC) into mobile communication devices or by using a Bluetooth proprietary feature of the mobile communication devices. The contactiess payment systems have been used with various communication standards. NFC is an open standard communication system that was designed by Philips and Sony Corporation, and enhanced by the NFC forum. NFC uses Radio Frequency Identification (RFID) based technology and must comply with various standards and operating protocol/frequency for RFID.
[0004] Adoption of mobile communication devices that are capable of contactless payment, however, has been slow. Few mobile communication devices have implemented the technology due to technical, certification, standardization and other business issues. Also, users are required to replace their existing mobile communication devices with the mobile communication devices that have the technology to perform the transactions before they can conduct these contactless transactions. Users will also have to cancel or transfer their payment accounts, stored coupon or stored monetary credits when they change phones.
SUMMARY
[0005] The following summary of the invention is included in order to provide a basic understanding of some aspects and features of the invention. This summary is not an extensive overview of the invention and, as such, it is not intended to particularly identify key or critical elements of the invention or to delineate the scope of the invention. Its sole purpose is to present some concepts of the invention in a simplified form as a prelude to the more detailed description that is presented below.
[0006] According to one aspect of the invention, a wireless smart card comprises a persona] area network (PAN) interface; a near field communication (NFC) and radio frequency identification (RFlD) transceiver; a secure element coupled to the NFC and RFID transceiver: a processor coupled to the PAN transceiver, the NFC and RFID transceiver and the secure element: and a memory coupled to the processor.
[0007] According to an aspect of the invention, a method is provided for receiving a request to activate a secure communication link at a secure element of a wireless smart card from a mobile device; establishing the secure link to the mobile device through a personal area network (PAN) transceiver; and storing applets and user credentials at the secure element through the secure link.
[0008] According to another aspect of the invention, a wireless smart card comprises a first wireless transceiver to wirelessly communicate with a mobile communication device through a first communication protocol; a second wireless transceiver to wirelessly communicate with a transaction device through a second communication protocol; a secure element having a processor and a secured flash memory to store applets and user credentials, the secure element coupled to the first wireless transceiver and the second wireless transceiver; and a logic and processing controller coupled to the first wireless transceiver, second wireless transceiver and the secure element. [0009] According to yet another embodiment, of the invention, a wireless smart card comprises a first wireless transceiver to wirelessiy communicate with a mobile communication device through a first communication protocol; a second wireless transceiver to wirelessiy communicate with a transaction device through a second communication protocol; and a secure element to store secure data and to enable secure operations to be conducted via wireless communications between the mobile communication device, the wireless smart card, and the transaction device,
[0010] According to another aspect of the invention, a wireless smart card system comprises a mobile communication device; a transaction device; and a wireless smart card comprising a first wireless transceiver to wirelessiy communicate with said mobile communication device through a first communication protocol; a second wireless transceiver to wirelessiy communicate with said transaction device through a second communication protocol; and a secure element to store secure data and enable secure operations to be conducted by said system via wireless communications between the mobile communication device, the wireless smart card, and the transaction device.
BRIEF DESCRIPTION OF THE DRAWINGS
[0011] The accompanying drawings, which are incorporated in and constitute a part of this specification, exemplify the embodiments of the present invention and, together with the description, serve to explain and illustrate principles of the invention. The drawings are intended to illustrate major features of the exemplary embodiments in a diagrammatic manner. The drawings are not intended to depict every feature of actual embodiments nor relative dimensions of the depicted elements, and are not drawn to scale. [0012] Figure 1 is a block diagram of a wireless smart card system in accordance with one embodiment of the invention;
[0013] Figure 2 is a block diagram of a wireless smart card system in accordance with one embodiment of the invention;
[0014] Figure 3 is a more detailed block diagram of the wireless smart card shown in Figs. 1 and 2 in accordance with one embodiment of the invention;
[0015] Figures 4 A and 4 B are flow diagrams of a power on procedure in accordance with one embodiment of the invention;
[0016] Figures 5A and 5B are flow diagrams of a pairing procedure in accordance with one embodiment of the invention;
[0017] Figures 6A and 6B are flow diagrams of a provisioning procedure in accordance with one embodiment of the invention;
[0018] Figure 7 is a data flow diagram for the provisioning process of Figures 6A and 6B in accordance with one embodiment of the invention;
[0019] Figures 8A and 8B are flow diagrams of a network transaction procedure in accordance with one embodiment of the invention;
[0020] Figure 9 is a data flow diagram for the network transaction process of Figures 8A and 8B in accordance with one embodiment of the invention;
[0021] Figures I OA and 1OB are flow diagrams of a contactless transaction procedure in accordance with one embodiment of the invention; [0022] Figure 1 1 is a data flow diagram for the contactless transaction process of Figures 1OA and 1OB in accordance with one embodiment of the invention;
[0023] Figures 12A and 32B are flow diagrams of a contactless read/write procedure in accordance with one embodiment of the invention;
[0024] Figure 13 is a data flow diagram for the contactless read/write process of Figures 12A and 12B in accordance with one embodiment of the invention;
[0025] Figures 14A and 14B are flow diagrams of a peer to peer procedure in accordance with one embodiment of the invention;
[0026] Figure 15 is a data flow diagram for the peer to peer process of Figures 14A and 14B in accordance with one embodiment of the invention;
[0027] Figure 16 is a data flow diagram for a local transaction process in accordance with one embodiment of the invention;
[0028] Figure 17 is a schematic drawing of a key fob wireless smart card in accordance with one embodiment of the invention;
[0029] Figure 18 is a block diagram of a wireless smart card system in accordance with another embodiment of the invention; and
[0030] Figure 19 is a block diagram of a wireless smart card in accordance with one embodiment of the invention.
DETAILED DESCRIPTION [0031] Embodiments of the invention relate to a wireless smart card that can be used to conduct contactless transactions, etc., which also includes the ability to communicate with and be managed by a mobile communication device, such as a cellular phone via a conventional personal communication network (PCN) or personal area network (PAN). In one embodiment, the wireless smart card communicates with the mobile communication device through use of the well known Bluetooth wireless protocol. Contactless transactions that can be performed with the wireless smart card include contactless payment, near field communication (NFC) with other NFC devices (i.e. peer- to-peer communication), and Radio Identification (RFlD) reading/writing, which can be made in a secure and efficient manner. The wireless smart card can be used to provision or modify secure personal credentials, store and modify monetary values, upload or review transactions, and read and download information from external transaction devices, such as smart posters and other NFC or RFID devices. Because the wireless smart card can communicate with both the mobile communication device and the external transaction devices, users are not required to change their mobile communication devices. In addition, users who have multiple mobile communication devices can use the wireless smart card for contactless payment, near field communication or other transaction functions using any of their mobile communication devices that support PCN's.
[0032] An embodiment of the invention will now be described in detail with reference to Figures 1 and 2. Figures 1 and 2 illustrate an exemplary smart card contactless transaction system 100. It will be appreciated that the contactless transaction system J00 may include additional or fewer components and the arrangement of the components may differ from that shown in Figures 1 and 2. In Figure 1, the contactless transaction system 100 includes a wireless smart card 104, a mobile communication device 108, a transaction device 1 12, a cellular network 116 (or other wireless communication network) and a transaction processing center 120. The wireless smart card 304 is configured to read, upload download, or exchange information between the transaction device 112 and the mobile communication device 108.
[0033] The wireless smart card 104 includes a personal area network (PAN) transceiver 124, a PAN antenna 126, a USB port 127, a near field communication (NFC) and radio frequency identification (RFID) interface 128, a NFC antenna 130, a transponder with a secure element 132, a logic and communication processing control 136, a power management and battery 140 and a manually operable input device 144, e.g. a switch, button or keyboard. It will be appreciated that although the NFC and RFID interface 328 is shown as one NFC and RFID transceiver, the NFC and RFID interface 128 may include multiple transceivers, such as one NFC transceiver and one RFID transceiver, or one or more NFC transceivers and one or more RFID transceivers, or just one NFC transceiver or just one RFID transceiver. USB port 127 enables an external device to be connected to wireless smart card 304 via a wired ϋnk.
[0034] In one embodiment, the logic and communication processing control 136 includes a CPU and memory. The wireless smart card 104 includes multi-mode operation controls and corresponding software/protocols that automatically detect, switch and enable various modes of operations, transactions and applications. The power management and battery circuit 140 may include a charger and/or a rechargeable battery. The rechargeable battery may be, for example, a lithium ion battery. [0035] In one embodiment, the secure element 132 is a Secure Access Module (SAM) known in the art. The secure element 132 is configured to store applets that are configured to enable the wireless smart card 104 to enable transaction and communication functions. The secure element 132 is also configured to store secure data, such as user credentials, transaction data, and the like.
[0036] The wireless smart card 104 can be packaged into various form factors to suit the look, feel and operation required for the user and such that the wireless smart card 104 is portable. In one embodiment, the wireless smart card 104 is, for example, a key fob, a card (e.g., credit card size), a wrist or watch band, a phone attachment, and the like.
[0037] The mobile communication device 108 is typically a cellular phone, but it will be appreciated that the mobile communication device 108 may be other mobile computing devices, such as a Personal Digital Assistant (PDA), Tablet Personal Computer (Tablet PC), and the like. The mobile communication device 108 includes a transceiver (not shown) for communicating with the wireless smart card 104 through the PAN transceiver 124 of the wireless smart card 104. In one embodiment, the mobile communication device 108 and wireless smart card communicate via Bluetooth. Bluetooth is a wireless communication protocol for creating personal area networks using a frequency hopping spread spectrum at about 2.4GHz. It will be appreciated that other wireless peer-to-peer communication methods may be used including, for example, a Personal Communication Network (PCN), Ultra Wide Band, WiFi, etc. It will be appreciated that the mobile communication device 108 and wireless smart card 104 may also communicate through a USB connection, as shown at 127, or via some other wired connection. [0038] The transaction device 3 12 and the wireless smart card 104 communicate using NFC or RFID at the NFC and RFID interface 128. The transaction device 1 12 may be, for example, a contactless payment terminal 112a, an NFC or RFID transponder 112b, a near field communication (NFC) device 1 12c, and the like, and combinations thereof. Exemplary NFC or RFID transponder devices 112b include e-Posters, contactless labels, RFID tags, etc.
[0039] The wireless smart card 104 also includes a transponder with secure element 132 configured to store credit credentials, user authentication information and the like, to enable secure communications between the wireless smart card and a transaction processing center 120 using the wireless networks of the mobile communication device 108 and the transaction device 1 12 (e.g., Bluetooth and NFC and/or RFID networks, respectively).
[0040] The transaction processing center 120 includes, for example, banks, credit card issuers, cellular operators and/or payment service providers that are involved in processing transactions, as known in the art. As shown in Figure 2, the transaction processing center 120 may include a service server 256, an institution server 260, and financial transaction servers 264.
[0041] In operation of a system according to the present invention, the transaction processing center 120 opens a secure communication channel to the wireless smart card 104 via a dedicated or virtual private network (from the transaction processing center 120 to the cellular operating statioji), a cellular network (from the cellular operating station to the mobile communication device 108), and Bluetooth (from the mobile communication device 108 to the wireless smart card 104). Through the secure communication channel, the transaction processing center 120 can exchange secure protocols with the wireless smart card 104, and download or modify the applets in the flash memory of the secured secure element in the wireless smart card 104. The transaction processing center 120 can also activate, download or modify other secure content such as payment account credentials, coupons, or monetary credits to the wireless smart card 104 for payment or other transactions. The transaction processing center 120 can also activate, store or modify the applets, user credentials or other transaction contents via Near Field Communication or RFID between the transaction device 112 (e.g., contactless payment terminal 112a) and the wireless smart card 104.
[0042] The wireless smart card 104 can be used for transactions (e.g., credit or debit payments) by presenting the wireless smart card 104 at the contactless payment terminal 112a. In the transaction mode of operation, the contactless payment terminal 1 12a communicates with the applets and credentials stored in the secure element 132 through the NFC and/or RFID interface 328 using NFC according to a standard transaction protocol. The transaction and authorization is then processed between the contactless payment terminal 1 12a and transaction processing center 120 using standard transaction processing.
[0043] Transaction information (e.g., payment, balance, coupon, etc) can be communicated from the wireless smart card 104 to the mobile communication device (e.g., cellular phone) via Bluetooth communication using the PAN transceiver 124. Clearance of transactions can be performed by communication with the transaction processing center 120 through a wireless network (e.g., cellular network 1 16). Transaction information can also be sent from the transaction process center 120 to the mobile communication device 108 using SMS (Short Messages Services) or other cellular data services. Clearance of the transaction can be performed by contactless transaction modes. Transaction information (or most recent information) can also be stored in the wireless smart card 104 for iater retrieval through a mobile device or a PC.
[0044] Figure 3 illustrates a more detailed block diagram of the wireless smart card 104, as seen at 300. It will be appreciated that the wireless smart card 104 may include additional or fewer components than those shown in Figure 3, and that the arrangement of the components may also differ from that shown in Figure 3. The illustrated wireless smart card 300 includes a logic/controller 304, a display 308, a manually operable input device 312, a biometric sensor 316, a Bluetooth transceiver 320, a Universal Serial Bus (USB) connection 324, a power control 328, a battery 332, a NFC/RFID transceiver 336 and a secure element 340.
[0045] The logic/control Ser 304 is configured to control operation of the wireless smart card 300. In particular, the logic/controller 304 performs logic operations including, for example, user authentication, Bluetooth pairing, applet selection and power management. The logic/controller 304 may also be configured to control communications with other external devices in the transaction processing center 120. Firmware may be embedded in a flash memory of the controller to provide the intelligence, secure protocol and operation for the controller. In one particular embodiment, the controller and memory of the logic/controller 304 comprises a digital signal processor (DSP). [0046] The wireless smart card 104 may optionally include a user interface. The user interface includes one or more of the display 308, manually operable input device 312 and biometric sensor 316. The display 308 may include status LEDs and/or a full liquid crystal display (LCD) to provide user feedback of the current operation of the wireless smart card 300. In one embodiment, the display 308 can be used to display one time password (OTP) information, as will be described in further detail below. The OTP can also be provided through the use of a mobile phone or PC through the USB port 127. The manually operable input device 312 can comprise one or more simple buttons and/or a full keypad. For example, the input device 312 may be an activation pushbutton connected to the logic/controller 304 that is configured to power on and/or activate the wireless smart card 104. The input device 312 can be used to wake up the device and/or for navigating and selecting operations. Also, the input device 312 can be used to manually select various modes of operations of the wireless smart card 300. as will be described in further detail below. It will be appreciated that the display 308 can also be used for user input (i.e., touch screen). In one embodiment, the biometric sensor 316 is a fingerprint sensor that is used for inputting security credentials. Biometric sensor 316 can also be used to select or control operations. For example, the direction of swipe or which finger is used can be detected to enable predetermined operations to be selected by a user. At initial set up, the user's biometric information may be entered and stored in the flash memory of the secure element 340. Once the wireless smart card 300 is configured, the biometric information from the sensor 316 can be used to compare and match a fingerprint at a later time to authenticate the user. The biometric information can also be used to authenticate secure communication lines. [0047] Although the transceiver 320 is described as a Bluetooth transceiver, it will be appreciated that the transceiver 320 may operate under other communication protocols. The wireless transceiver 320 is configured to communicate with a mobile communication device, such as a cellular phone, via the antenna 322. The transceiver 320 can be a Bluetooth, WiFi, Ultra Wide Band, Infrared, or other wireless communication transceivers. Data communication via the transceiver 320 can be encrypted to augment security between a mobile communication device and the wireless smart card 300.
[0048] The Universal Serial Bus (USB) connection 324 is also an optional feature of the wireless smart card 300. The USB connection 324 can be used to connect the wireless smart card 300 with the mobile communication device (e.g., cellular phone) and/or a PC through a wired connection. The USB connection 324 can also be used to charge the battery 332 or provide power to the smart card 300 through a PC, some other external computing device, or a wall adaptor.
[0049] The power control 328 is configured to distribute power from the battery 332 or USB connection 324 to the components of the wireless smart card 300, The power control 328 also manages the charging of the battery 332 when the USB connection 324 is used to recharge the battery 332 or power the other components of the wireless smart card 300. It will be appreciated that if power is through the USB connection 324, the power will be a DC charge. Induction coupling or radio coupling can also be used to charge the battery 332 without a direct wire connection to the wireless smart card 300. The power control 328 is also configured to control power saving functions that shut down unnecessary circuitry of the wireless smart card 300 to save power and thus prolong the need for charging. The power saving operation can be enhanced by an event trigger design, as known in the art. In one embodiment, a near field signal from an external NFC device can be coupled to the power control 328 via the NFC antenna to energize the transponder circuit of the wireless smart card and trigger the power management to wake up the required circuitry.
[0050] The NFC and RFID transceiver 336 provides NFC and RFID communications. An NFC Antenna 344 is connected to the transceiver to transmit or receive the NFC or RFID signal. When connected to the secure element 340, the NFC/RFID transceiver 336 can be operated as the transponder to interact with external NFC/RFID devices. Also, standard RFlD functions can be performed, enabling the device to be an RFID reader to scan and interact with other compatible tags.
[0051] The secure element 340 preferably includes a processor with access to various types of hardware encryption algorithms and secure flash memory. The secure element 340 allows the NFC transceiver 336 to operate like a transponder (tags) for contactless payment or other transactions. The secure element 340 stores applets, user credentials, transaction content or other secure information. The applets stored in the secure element 340 can preferably be configured to enable the wireless smart card 300 to perform various functions including coupon, rebate, loyalty programs, transit payment tokens, credit and debit card transactions, eTϊcketing, access control, etc. The applets are small application programs that enable the payment function and communications with the transaction device 112.
[0052] The wireless smart card can be used to generate a One-Time-Password (OTP). The OTP parameter and counter elements can be stored in the secure element 340 and displayed by the wireless smart card 300 or the mobile communication device 108. In certain secure transactions, an OTP is required by the transaction processing system for authentication of the transaction.
[0053] With reference to Figures 1-3, the wireless smart card 104 and the transaction processing system 100 can be used to perform transactions relating to Smart Posters, eTicketing, contactless payment, loyalty, etc. For example, in contactless payment transactions, customer credentials (e.g., credit card number, etc.) are passed from the wireless smart card 104 to the payment terminal 1 12a through the secure, wireless communication channel, by presenting the wireless smart card at the payment terminal 112a in a tap or wave fashion. The payment terminal 112a communicates the information to the transaction processing center 120 which processes the transaction using applicable standards. The details of the transaction can be communicated back to the wireless smart card 104 for review or verification by the consumer.
[0054] In another example, customers can use the wireless smart card 104 for network payments. The mobile communication device 108 can communicate with the wireless smart card 104 to make online purchases at the mobile communication device 108. The wireless smart card 104 transmits the transaction credentials stored at the wireless smart card 104 through the Bluetooth (or other personal area network) between the mobile communication device 108 and the wireless smart card 104). The transaction is processed by the transaction processing center 120 as known in the art.
[0055] In a further example, customers can use the wireless smart card 104 for loyalty or preferred customer programs. The consumer's loyalty programs or preferred customer details can be stored at the wireless smart card 104. A transaction device 112 can query the wireless smart card 104 for the loyalty program information to provide loyalty points, discounts or access. In addition, the consumer may use the points to purchase products or services that support the loyalty point program using the wireless smart card 104. The consumer can also review their loyalty points balance or offering at the wireless smart card 104 or through the wireless smart card 104 at the mobile communication device 108.
[0056] In yet another example, the wireless smart card 104 can be used for e- ticketing. The consumer can store purchased eTickets on their wireless smart card 104. When the user arrives at the event, the user can request the wireless smart card 104 display the eTicket at the mobile communication device 108 (or at the wireless smart card 104) to enter. The consumer can also exchange eTickets with other wireless smart cards 104 or other transaction devices that have NFC (e.g., transaction device 112c). Similarly, consumers can use the wireless smart card to store E-Coupons, which can be extracted at the appropriate time by the coupon offering company through their transaction device 112
[0057] The wireless smart card 104 can also be used to interact with smart posters. Smart posters are typically used to advertise an event, offering or product. The consumer can present the wireless smart card 304 to the tag location of the smart poster. Additional details can then be provided to the consumer or an offer to purchase may be provided to the user at the mobile communication device 108 through the wireless smart card 104 or by a link to more information from the net. For example, if a smart poster is advertising a new movie or show and the consumer presents the wireless smart card at the tag of the smart poster, a synopsis of the movie and local showings may be presented to the consumer at the mobile communication device 108. The user can also use the wireless smart card 104 to purchase tickets for the event electronically and use the eTicket to enter the movie.
[0058] The wireless smart card 104 can also be used for network pairing. Devices connected through Bluetooth or other personal area networks typically need to be paired. The wireless smart card 104 can allow pairing of other devices with the mobile communication device 108 through the Bluetooth or other personal area network by providing the key information in a secure manner.
[0059] The wireless smart card 104 can also be used to exchange business cards. The user can present their wireless smart card 104 to a NFC device (e.g., transaction device 112c) or another wireless smart card 104 to transmit the business card. Each wireless smart card 104 can then store the contact information in the contacts of the mobile communication device 308.
[0060] The wireless smart card 104 can also be used to securely store passwords. The passwords can then be accessed through the mobile communication device 108.
[0061] The wireless smart card 104 can be used for server authentication. A secure user access key can be associated with and stored on a wireless smart card 104 for secure access to online services, such as online banking, credit and financial information. When the user accesses the secure service, the wireless smart card 104 can be queried in a secure manner for dynamic authentication of the user. [0062] The wireless smart card 104 is configured to allow for manual and/or automatic mode-switching. Exemplary modes include a power-on mode, a pairing mode, a provisioning and activation mode, a transaction mode, a contactless reader and writer mode, a peer to peer communication mode and a local transaction mode. Each mode involves processes and data exchange between the wireless smart card 104 and the mobile communication deλ'ice 108 and/or transaction device 1 12. The operations modes are controlled by the logic and communication processing controller 136. The controller 136 can determine the modes based on the interaction or information of the external devices 1 12 (e.g., payment terminal 112a, NFC/RFID tags 1 12b, NFC devices 112c, etc). Modes can be manually selected by the user through the input functions of the wireless smart card 104 or mobile communication device 108.
[0063] Figures 4A and 4B illustrate a preferred process 400 for powering on the wireless smart card (Figure 4A) and mobile communication device (Figure 4B). As shown in Figure 4A, the process 400 begins at block 404. As shown in block 408. an exemplary power on event includes a button press for, in one example, 1 second. The process continues at block 412 by determining whether a pairing relationship exists. If a pair relationship does not exist, an event error occurs (block 416). If a pair relationship exists, the process 400 continues to enable the wireless smart card to attempt pairing using a Bluetooth protocol (block 420). The process 400 continues by establishing a Bluetooth connection (block 424). The process 400 then verifies whether a connection is established (block 428). If a connection is not established, the process 400 continues to block 416 (an event error). If a connection is verified, then the process 400 continues to Event: Ready (block 432). The process continues at block 436 at the handheld (see Figure 4B). The process also continues at the wireless smart card, by the host controlled event processing (block 440). The process 400 then continues by determining whether the event process is complete (block 444). If no, the process 400 returns to block 440. If yes, the process 400 continues to power off (block 448). If an event error (block 416) occurred, the process 400 also continues to power off (block 448). The process 400 then ends (block 452) at the wireless smart card.
[0064] As described above, the process 400, at block 436, includes operations at the handheld wireless communication device, as shown in Figure 4B. As shown in Figure 4B, the process 400 continues by determining whether a handheld application residing on a service server, e.g., EZWallet, is active (block 456). If no. the EZWallet application is launched (block 460) and the process 400 continues back to block 456. If yes, the process continues to Event: Smart wireless transponder ready (block 464). The process 400 continues to the EZWallet Event processing (block 468), The process 400 then ends (block 472) at the host handheld.
[0065] Figures 5A and 5B illustrate a preferred pairing process 500 at the wireless smart card (Figure 5A) and the host handheld wireless communication device (Figure 5B). The pairing process 500 preferably begins at block 504 by a long button press (e.g., five seconds or more) at the wireless smart card (block 508), The process 500 continues by seeking a partner (block 512). The process 500 then determines whether a partner is found (block 516). If no, the process 500 returns to block 512. If yes, the process continues by establishing pairing (block 520). The process 500 then continues to a connection state, CONN (block 524), which occurs after the wireless smart card is turned on (see Figure 4A). As shown in Figure 5B, the pairing process 500 includes starting a Bluetooth wireless protocol communication at the host handheld device (block 528). The process 500 continues by seeking devices (block 532). The process 500 then determines whether there is a pairing request from a wireless smart card (block 536). If no, the process returns back to block 532. If yes, the process continues by requesting/receiving a device PIN from the wireless smart card (block 540). The process 500 then continues by completing the pairing of the host handheld with the wireless smart card (block 544). The pairings process then ends (block 548).
[0066] Figures 6A and 6B illustrate a provisioning and activation process 600 for the wireless smart card and host handheld mobile communication device. Figure 7 illustrates the communication flow of the provisioning and activation process 600 with reference to Figure 2. The provisioning and activation mode allows the transaction processing center (e.g., Banks, Credit Card Issuers, Cellular Operators or Payment Service Providers), to activate, store or modify the applets stored in the secure element 340.
[0067] Figure 6A illustrates one embodiment Bf provisioning and activation at the wireless smart card 104 and Figure 6B illustrates one embodiment of provisioning and activation at the host handheld (i.e., mobile communication device 108). As shown in Figure 6A3 the process 600 begins at the wireless smart card device at block 604. The process 600 continues by enabling the NFC and secure element (block 608). The process 600 continues by instructing the NFC for wired connection to the secure element (block 612). The process 600 continues with the Event: Secure element Ready (block 616). The process 600 continues by passing communications to the secure element (block 620). The process 600 then determines whether provisioning is complete (block 624). If no, the process 600 returns to block 620. If yes, the process 600 continues by disabling the NFC and secure element (block 626) and ends (block 628). As shown in Figure 6B, the provisioning process 600 for the handheld mobile communication device begins at block 632. The process 600 continues by the user selecting a new applet for the secure element (block 636). The process 600 continues by negotiating with the transaction processing center (block 640), The process 600 continues by determining whether the wireless smart card is ready (block 644). If no, the process 600 continues with the power on process (block 648) and then returns to block 644. It will be appreciated that the power on process at block 648 is the power on process described above with reference to Figures 4 A and 4B. If the wireless smart card is ready, the process 600 continues to Event: Connect Secure element (block 652), which causes the process at the wireless smart card to begin at block 604 as described with reference to Figure 6A. The process 600 also continues by determining whether the secure element is connected (block 656). If no, the process 600 waits (block 660) and returns to block 656. If yes, the process 600 continues to Event: Signal transaction processing center ready (block 664). The process 600 then continues to pass communications from the transaction processing center to the secure element (block 668). The process 600 then determines whether provisioning is complete (block 672). If no, the process 600 returns to block 668, If yes, the provisioning and activating process ends at block 676.
[0068] With reference to Figure 7, a mobile communication device user uses the mobile communication device 108 to surf to a desired activation site of an institution, such as a bank, department store, loyalty program, eTicket provider or other contactless enabled institution, at the institution server 260. The user provides or has pre-arranged criteria for allocation of contactless cards, such as a credit card or other payment card. The institution server 260 submits the request to the service server 256 (e.g., EZWallet service server). The service server 256 establishes a relationship with the appropriate financial transaction server(s) 264 with tokens provided by the institution server 260. The financial transaction server(s) 264 approve the transaction to load, provision and activate the service, which is communicated back to the service server 256. The service server 256 then establishes a secure link to the mobile communication device 108. On request of the service server 256, the interface of the mobile communication device 308 prompts the user to activate the wireless smart card 104 (e.g., by pushing an activation button of the smart wireless transponder). Upon user activation, the smart wireless transponder establishes a secure link to the mobile communication device 108 through the PAN (Bluetooth) wireless connection via the PAN transceiver 124, The control interface of the mobile communication device 108 then requests to establish a communication link with the secure element 132. Once all links are established, the mobile communication device 108 indicates to the financial transaction server(s) 264 through the service server 256 that communication to the secure element 132 is ready. The financial transaction server(s) 264 interacts directly with the secure element 132 through the secure communications established through the mobile communication device 108, and loads the appropriate applet to the secure element 132, provisions the applet with the user credentials and activates them for future use.
[0069] Figures 8A and 8B illustrate a network transaction process 800. Figure 9 illustrates the communication flow of the network transaction process 800 with reference to Figure 2. An exemplary network transaction is the exchange of secure information with web services or online transactions through the mobile communication device 108. [0070] Figure 8A illustrates a preferred network transaction process at the wireless smart card 104 and Figure 8B illustrates a preferred network transaction process at the host handheld (e.g., mobile communication device 108). The process 800 begins at the wireless smart card 104 at block 804. The process 800 continues by enabling the NFC and secure element (block 808). The process 800 continues by instructing the NFC for wired connection to the secure element (block 812). The process 800 continues with the Event: Secure element Ready (block 816). The process 800 continues by passing communications to the secure element (block 820). The process 800 then determines whether the transaction is complete (block 824). If no, the process 800 returns to block 820. If yes, the process 800 continues by disabling the NFC and secure element (block 826) and ends (block 828). As shown in Figure 8B, the network transaction process 800 begins at block 832. The process 800 continues with the user selecting an online purchase (block 836). The process 800 continues by negotiating with the transaction processing center (block 840). The process 800 then determines whether the wireless smart card is ready (block 844), If no, the process 800 continues with the power on process (block848) and then returns to block 844. It will be appreciated that the power on process at block 848 is the power on process described above with reference to Figures 4A and 4B. If yes, the process 800 continues to Event: Connect Secure element (block 852), which causes the process at the wireless smart card to begin at block 804 as described with reference to Figure 8 A. The process 800 also continues by determining whether the secure element is connected (block 856). If no, the process 800 waits (block 860) and returns to block 856, If yes, the process 800 continues to Event: Signal transaction processing center ready (block 864). The process 800 then continues to pass communications from the transaction processing center to the secure element (block 868). The process 800 then determines whether the transaction is complete (block 872), If no, the process 800 returns to block 868. If yes, the process ends at block 876.
[0071] With reference to Figure 9, the user preferably establishes an online session at the mobile communication device 108 as shown to, for example, make a purchase or transfer funds with an institution at the institution server 260. The institution server 260 requests to clear the transaction at the service server 256. The service server 256, using tokens from the institution server 260, requests for processing of the transaction at the financial transaction server(s) 264. On approval to proceed with the transaction from the institution 260, the service server 256 requests the mobile communication device 108 establish connection with the secure element 132 of the wireless smart card 104. The mobile communication device 108 may prompt the user to activate secure element 132 by, for example, pressing a button. When the secure element 132 is activated, the secure element 132 establishes a secure connection through the PAN (Bluetooth) transceiver 124 to the mobile communication device 108. Upon connection, the service application of the mobile communication device 108 requests connection with the secure element 132. Through the established secure connection, the financial transaction server(s) 264 process the transaction with the users preloaded criteria stored at the secure element 132.
[0072] Figures 1 OA and 1 OB illustrate a preferred contactless transaction process 1000. Figure 11 illustrates the communication flow of the coniactiess transaction process 1000 with reference to Figure 2. Figure 1 OA illustrates the process 1000 at the wireless smart card 104 and Figure 1OB illustrates the process 1000 at the host handheld (i.e., mobile communication device 108). As shown in Figure 1OB, no activity is required unless interaction for security verification is needed at the mobile communication device 308. Referring to Figure 1OA, the process 1000 begins at block 1004 by, for example, pressing a button for a shore time (e.g., less than 0.5s) at block 1008. The process 1000 continues by determining whether security is enabled (block 1012). If no, the process 1000 continues to enable the secure element for contactless card operation (block 1016). If yes, the process 1000 continues to proceed with as defined security verification (block 1020). The process 1000 then determines whether security credentials passed (block 1024). If no, the process ends (block 1036). If yes, the process 1000 returns to block 1016. From block 1016, the process 1000 continues to wait Xs (block 1028). The process 1000 continues to disable the secure element (block 1032) and ends (block 1036).
[0073] Figure 11 illustrates a preferred process for contactless transactions through a contactless payment terminal 112a. In response to an activation step initiated by a user of the wireless smart card 104, e.g., by pressing a button or entering a passcode on the smart card 104, information from the users account or other transaction details are provided to the host terminal 1 12a through a network communication packet (e.g., SMS). When the user is at the contactiess payment terminal 112a at a kiosk or retailer and the retailer has entered the transaction amount at the payment terminal 112a, the user presents the wireless smart card 104 within the field of the contactless payment terminal 112a. The payment credentials are passed in a defined, secure way to the payment terminal 1 12a through the NFC and RFID interface 128 from the secure element 132. The payment terminal 1 12a authenticates transaction with the financial transaction server(s) 256. In one embodiment, the terminal 112a may pass the transaction details back to the secure element 132 for record keeping. In another embodiment, the financial transaction server(s) 256 may pass the transaction details to mobile communication device 108 over the cellular network 116 through, for example, SMS.
[0074] Figures 12A and 12B illustrate a preferred contactless reader and writer mode process 1200. Figure 13 illustrates the communication flow of the contactless reader and writer mode process 1200 with reference to Figure 2.
[0075] Figure 12A illustrates the contactless reader and writer process at the wireless smart card 104 and Figure 12B illustrates the contactless reader and writer process at the host handheld (i.e.. mobile communication device 108). The process 1200 begins at the wireless smart card 104 at block 1204. The process 1200 continues by enabling the NFC transceiver (block 1208). The process 1200 continues by instructing the NFC for contactless read/write (block 1212). The process 1200 continues by Event: Tag in Field (block 1216). The process 1200 continues by passing data between the host and tag (block 1220). The process 1200 continues by determining whether the transaction is complete at block 1224. If no, the process 1200 returns to block 1220. If yes, the process 1200 continues by disabling NFC (block 1226) and ends (block 1228). As shown in Figure 12B, the network transaction process 1200 begins at block 1232. The process 1200 continues with the user negotiating for contactless operation (block 1236). The process 1200 then determines whether the wireless smart card is ready (block 1240). If no, the process 1200 continues with the power on process (block 1244) and then returns to block 1240. It will be appreciated that the power on process at block 1244 is the power on process described above with reference to Figures 4A and 4B. If yes, the process 1200 continues to Event: Contactless Operation (block 1248), which causes the process at the wireless smart card to begin at block 1204 as described with reference to Figure 12A. The process 1200 also continues by determining whether the tag is in field (block 1252). If no, the process 1200 waits (block 1256) and returns to block 1252. If yes, the process 1200 continues to Data Exchange (block 3260). The process 1200 then continues to Event: Terminate Connection (block 1264) and ends (block 1268).
[0076] With reference to Figure 13, when the contactless (NFC or RFID) reader and writer mode of the wireless smart card 104 is activated, the NFC and RFID interface 128 generates a radio signal that energizes the NFC or RFID tag 1 12b (transponder, e.g., e- Poster, RFID product label, etc.). When the tag 1 12b is energized, the wireless smart card 104 can read or write data from/to the tag 1 12b. The wireless smart card 104 can then also communicate with the mobile communication device 108 via Bluetooth through the PAN transceiver 124 to open the corresponding application of the mobile communication device 108 according to the tag information being processed by the wireless smart card 104. The user can view, store, or use the tag information (e.g., eTicket, product price, URL, etc.) to enter a transaction (e.g purchase the ticket or product, or access the web for more information based on the URL).
[0077^ For example, when the user wants to read a smart poster or other RFID tagged device 112b, the user utilizes the contactless read/write operation of the wireless smart card 104. The user activates the secure element 132 by, for example, pushing a button on the wireless smart card 104 to activate the eZWallet system by establishing a connection to the mobile communication device 108 through the PAN transceiver 124, The mobile communication device 108 automatically launches the eZWallet application. The wireless smart card 104 also activates the NFC or RFID interaction mode, enabling the NFC/RFID interface 128. When the NFC or RFlD transponder tag 1 12b is presented in the field of the secure element 132, the NFC or RFID tag information is read or data is exchanged based on the policies of the information stored in tag. The tag information is exchanged with the application running on the mobile communication device 108. The mobile communication device 108 can then, for example, establish exchange of information with a Web or SMS service (e.g., Figures 8A-9), list information in the mobile communication device application for later processing, create a transaction process with a web service or with the wireless smart card 104 for interaction with a contactless payment terminal 112a (e.g., Figures lOA-1 1), or the like.
[0078] Figures 14A and 14B illustrate a preferred peer to peer communication process 1200. Figure 15 illustrates the data flow of the peer to peer communication process 1400 with reference to Figure 2. The peer to peer communication mode is used when the wireless smart card 104 is establishing two-way communication with another NFC enabled device.
[0079] Figure 14A illustrates peer to peer communication at the wireless smart card 104 and Figure 14B illustrates peer to peer communication at the host handheld (i.e., mobile communication device 108), As shown in Figure 14 A. the process 1400 begins at the wireless device at block 1404. The process 1400 continues by enabling the NFC and secure element (block 1408). The process 1400 continues by instructing the NFC to seek and connect to a peer (block 1412). The process 1400 continues with the Event: Connection established (block 1416). The process 1400 continues by passing communications to and from the peer (block 1420). The process 1400 then determines whether connection is terminated (block 1424). If no, the process 1400 returns to block 1420. if yes, the process 1400 continues by disabling the NFC and secure element (block 1426) and ends (block 1428). As shown in Figure 14B, the peer to peer communication process 1400 begins at block 1432. The process 1400 continues by the user negotiating for NFC peer connection (block 1436). The process 1400 continues by determining whether the wireless smart card is ready (block 1440). If no, the process 1400 continues with the power on process (block 1444) and then returns to block 1440, It will be appreciated that the power on process at block 3444 is the power on process described above with reference to Figures 4A and 4B. If yes, the process 1400 continues to Event: Connect Io Other Peer (block 1448), which causes the process at the wireless smart card to begin at block 1404 as described with reference to Figure 14A. The process 1400 also continues by determining whether the peer is connected (block 1452). If no, the process 1400 waits (block 1456) and returns to block 1452. If yes, the process 1400 continues to Data Exchange (block 1460). The process 1400 then continues to Event: Terminate connection (block 1464) and ends at block 1468.
[0080] Referring to Figure 15, the wireless smart card 104 through the NFC and Bluetooth communication links through the NFC and RFlD interface 128 and the PAN transceiver 124, respectively, acts as a communication agent to relay, process, interpret or exchange information from the other NFC device(s) 1 12c to the mobile communication device 108. The user may activate the secure element 132 by, for example, pressing a button on the wireless smart card 104. Connection is established between the wireless smart card 104 and the mobile communication device 108 through the PAN (Bluetooth) transceiver 124. The mobile communication device 108 launches an application, e.g., the eZWallet application. The wireless smart card 104 also activates the NFC or RFID interaction mode, enabling the NFC/RFID interface 128. Another NFC device 112c is presented to field of the wireless smart card 104 and a peer to peer connection link is established between the other NFC device 1 12c and mobile communication device 108 for peer to peer exchange of information. The eZWallet application can then utilize local information for data exchange or communicate through the network 1 16 to other services (e.g., service server 256, institution server 256 and/or financial transaction servers 264).
[0081] Figure 16 illustrates the data flow for a preferred embodiment of a local transaction mode 1600. The wireless smart card 104 can also be utilized for local transactions (i.e., transactions between the mobile communication device 108 or other user host device, handheld or PC that utilize the secure element 132 to access specialized or personal applets). Examples of localized transactions include a password container, a one-time password and preference settings. The password container allows users to enter a single password to access an applet that is a container of all passwords for that user. The user can access and remind themselves about their passwords when needed. The wireless smart card 104 can be used to generate the One-Time-Password (OTP). OTP is an established means of creating dynamic credentials for authentication, which is used by many financial institutions have the OTP option for added security of online transactions. The OTP parameter and counter elements can be stored in the secure element 132 of the wireless smart card 104 and displayed by the wireless smart card 104 or by the mobile communication device 108 (OTP information is communicated to the mobile communication device via Bluetooth and PAN transceiver 124). The preference settings of the secure element 132 may involve interaction with a local applet. Examples of preference settings include setting a default credit card to MasterCard first, Arnex second or a personal credit card first, business credit card second. Other exemplary local transactions include picture storage/transfer, application storage/transfer (e.g., patient logs, insurance information, timecards, inventory systems, asset tracking, etc.), note pad data, reminder (tasks), scheduling, and the like.
[0082] In Figure 16, the user first activates the wireless smart card 104 by, for example, pressing a button. The user selects operation for a local transaction mode on the mobile communication device 108. The mobile communication device 108 instructs the wireless smart card 104 to connect the secure element 132. The mobile communication device 108 then communicates directly with the secure element 132 through Bluetooth using the PAN transceiver 124 or through a USB connection to exchange data between the wireless smart card 104 and the mobile communication device 108.
[0083] Figure 17 illustrates an exemplary configuration of a key fob wireless smart card 1700. The illustrated wireless smart card 1700 includes a housing 1704 that includes a key chain feature 1708, a fingerprint sensor 1712, status LEDs 1716, an activation pushbutton 1720, and a USB port 1724. It will be appreciated that the wireless smart card, however, may have a number of different configurations and the one shown in Figure 17 is merely exemplary.
[0084] Figure 18 illustrates another embodiment of the wireless smart card system 100 in which the wireless smart card 304 has a different arrangement from that shown in Figures 1 and 2. As shown in Figure 18, the secure element transponder 1800 of the wireless smart card 104 may be independent of the NFC and RFID transceiver 128. In Figure 18, the secure element transponder 1800 includes a secure element antenna 1804. [0085] The secure element transponder 1800 is a dua] interface integrated circuit (IC) that supports both direct and contactless communications. In this embodiment, the logic controller 336 controls the secure element transponder 1800 and NFC and RFID transceiver 128 to isolate operation such that one or the other (i.e., secure element transponder 1800 or NFC and RFID transceiver 128) is operating at a given time. This allows the coexistence of antennas (e.g., wireless smart card 104 includes both secure element antenna 1804 and NFC antenna 130) or sharing of antenna (e.g., wireless smart card 104 includes NFC antenna 130 or secure element antenna 1804). In the embodiment illustrated in Figure 18, the secure element transponder 1800 can be also be used in contactless transactions with limited or no power requirements as described above with respect to the NFC and RFID transceiver 128.
[0086] Figure 19 illustrates another embodiment of the wireless smart card 104 in which the wireless smart card 104 includes a real time clock (RTC) 1900 coupled to the logic/controller 304. It will be appreciated that the RTC 1900 may be needed when a one-time password (OTP) is being used at the wireless smart card 104.
[0087] An advantage of the wireless smart card and wireless transaction systems and methods described herein includes the early adoption or realization in the contactless / NFC / contactless payment industry. Users are able to utilize NFC and contactless payment processes through their mobile communication device or other handheld device without getting a new phone, by using technology already existing in the user's phone (e.g., Bluetooth). [0088] It should be understood that processes and techniques described herein are not inherently related to any particular apparatus and may be implemented by any suitable combination of components. Further, various types of general purpose devices may be used in accordance with the teachings described herein. It may also prove advantageous to construct specialized apparatus to perform the method steps described herein. The present invention has been described in relation to particular examples, which are intended in all respects to be illustrative rather than restrictive. Those skilled in the art will appreciate that many different combinations of hardware, software, and firmware will be suitable for practicing the present invention.
[0089] Moreover, other implementations of the invention will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. Various aspects and/or components of the described embodiments may be used singly or in any combination, ϊt is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the invention being indicated by the following claims.

Claims

CLAIMSWhat is claimed is:
1. A wireless smart card comprising: a personal area network (PAN) interface; a near field communication (NFC) and radio frequency identification (RPID) transceiver; a secure element coupled to the NFC and RFlD transceiver; a processor coupled to the PAN transceiver, the NFC and RFID transceiver and the secure element; and a memory coupled to the processor.
2. The wireless smart card of claim 1, wherein the secure element is coupled to the NFC and RFID transceiver through the processor.
3. The wireless smart card of claim 1, further comprising a real-time clock coupled to the processor.
4. The wireless smart card of claim 1 , wherein the PAN interface is for enabling the wireless smart card to communicate with a wireless mobile communication device.
5. The wireless smart card of claim 1 , wherein the PAN interface comprises a PAN transceiver,
6. The wireless smart card of claim 1 , wherein the PAN interface comprises a USB connector.
7. The wireless smart card of claim 1 , further comprising a display coupled to the processor.
8. The wireless smart card of claim 1 , further comprising a rechargeable battery and charger circuit coupled to the processor,
9. The wireless smart card of claim 1, further comprising a biometric fingerprint reader coupled to the processor.
10. The wireless smart card of claim 1 , further comprising a manually operable input device coupled to the processor.
11. The wireless smart card of claim 10, wherein the manually operable input device comprises an activation button.
12. The wireless smart card of claim 1 , wherein the PAN transceiver is a Bluetooth transceiver.
13. The wireless smart card of claim 1 , wherein the PAN transceiver is configured to be wirelessly connected to a mobile communication device.
14. The wireless smart card of claim 1 , wherein the NFC and RFID transceiver comprises a NFC transceiver or an RFlD transceiver.
15. The wireless smart card of claim 1 , wherein the NFC and RFID transceiver is configured to be wirelessiy connected to a contactless transaction terminal.
16. The wireless smart card of claim 1, wherein the secure element is configured to be wirelessly connected to a transaction server through the NFC and RFlD transceiver.
17. The wireless smart card of claim 1 , wherein the secure element is configured to be wirelessly connected to a service server through the PAN transceiver.
18. The wireless smart card of claim 1 , wherein the secure element comprises applets configured to enable a payment function.
19. The wireless smart card of claim 1, wherein the secure element comprises applets configured to enable a communication function.
20. A method comprising: receiving a request to activate a secure communication link at a secure element of a wireless smart card from a mobile device; establishing the secure link to the mobile device through a personal area network (PAN) transceiver; and storing applets and user credentials at the secure element through the secure link.
21. The method of claim 20 further comprising detecting a user request to initiate a transaction.
22. The method of claim 20 further comprising: transmitting the user credentials from the secure element through a near field communication (NFC) and radio frequency identification (RFID) transceiver of the wireless smart card to a transaction process center.
23. The method of claim 22 further comprising: receiving an indication that the transaction process is complete; and transmitting the indication that the transaction process is complete to the
PAN transceiver.
24. The method of claim 22 further comprising authenticating a user before receiving a transaction operation.
25. The method of claim 20 further comprising providing user credentials from a secure element of the wireless smart card.
26. The method of claim 20 further comprising establishing a secure connection between the mobile device and a transaction device through a near field communication (NFC) and radio frequency identification (RFID) transceiver.
27. The method of claim 26 wherein the transaction device is selected from the group consisting of a contactless payment terminal, a NFC-enabled device and a RFID -enabled device.
28. A wireless smart card comprising: a first wireless transceiver to wireless Iy communicate with a mobile communication device through a first communication protocol; a second wireless transceiver to wirelessly communicate with a transaction device through a second communication protocol; a secure element having a processor and a secured flash memory to store applets and user credentials, the secure element coupled to the first wireless transceiver and the second wireless transceiver; and a logic and processing controller coupled to the first wireless transceiver, second wireless transceiver and the secure element.
29. The wireless smart card of claim 28 further comprising a real-time clock coupled to the logic and processing controller,
30. The wireless smart card of claim 28 wherein the secure element is coupled to the first wireless transceiver and the second wireless transceiver through the logic and processing controller.
31. The wireless smart card of claim 28 wherein the secure element is coupled to the first wireless transceiver through the logic and processing controller and wherein the secure element is connected directly to the second wireless transceiver.
32. The wireless smart card of claim 28 wherein the secure element is configured to enable provisioning and activation operations via the first wireless transceiver under the control of the logic and processing controller.
33. The wireless smart card of claim 28 wherein the secure element is configured to enable local transaction operations via the first wireless transceiver under the control of the logic and processing controller.
34. The wireless smart card of claim 28 wherein the secure element is configured to enable transaction operations via the second wireless transceiver under the control of the logic and processing controller.
35. The wireless smart card of claim 28 wherein the secure element is configured to enable secure communications between the mobile communication device and the transaction device via the first and second wireless transceivers under the control of the logic and processing controller.
36. The wireless smart card of claim 28 wherein the first wireless transceiver is selected from the group consisting of Bluetooth, WiFi, Ultra Wide Band, Infrared and combinations thereof,
37. The wireless smart card of claim 28 wherein the secured flash memory is further to store transaction content.
38. The wireless smart card of claim 28 wherein the second wireless transceiver comprises a near field communication and radio frequency identification (RFID) transceiver.
39. The wireless smart card of claim 28 wherein the second wireless transceiver comprises a near field communication transceiver and a radio frequency identification (RFID) transceiver.
40. The wireless smart card of claim 28 wherein the transaction device is selected from the group consisting of a contactless payment terminal, a near field communication (NFC) transponder, a radio frequency identification (RFID) transponder and a NFC device.
41. The wireless smart card of claim 28 wherein the secure element transmits data stored in the secure element to the mobile communication device.
42. The wireless smart card of claim 28 wherein the secure element transmits data stored in the secure element to the transaction device.
43. The wireless smart card of claim 28 wherein the secure element is configured to be connected to a server through the mobile communication device, and wherein the server loads applets to the secure element.
44. The wireless smart card of claim 28 wherein the secure element is configured to be connected to a server through the mobile communication device, and wherein the server is configured to pair the secure element and the first transceiver with the mobile communication device.
45. The wireless smart card of claim 28 wherein the mobile communication device is a cellular phone.
46. The wireless smart card of claim 28 wherein the wireless smart card is configured to operate in one of a plurality of modes.
47. A wireless smart card comprising: a first wireless transceiver to wirelessly communicate with a mobile communication device through a first communication protocol; a second wireless transceiver to wirelessly communicate with a transaction device through a second communication protocol; and a secure element to store secure data and to enable secure operations to be conducted via wireless communications between the mobile communication device, the wireless smart card, and the transaction device.
48. The wireless smart card of claim 47 wherein the wireless smart card is configured to operate in one of a plurality of modes.
49. The wireless smart card of claim 48 wherein the wireless smart card is configured to automatically detect the one of the plurality of modes for a transaction.
50. The wireless smart card of claim 48 wherein the plurality of modes comprises a passivation and activation mode, a network transaction mode, a contactless payment mode, a read/write mode, and a peer-to-peer communication mode.
51. A wireless smart card system comprising: a mobile communication device; a transaction device; and a wireless smart card comprising a first wireless transceiver to wirelessly communicate with said mobile communication device through a first communication protocol; a second wireless transceiver to wirelessly communicate with said transaction device through a second communication protocol; and a secure element to store secure data and enable secure operations to be conducted by said system via wireless communications between the mobile communication device, the wireless smart card, and the transaction device.
PCT/US2008/077089 2007-09-21 2008-09-19 Wireless smart card and integrated personal area network, near field communication and contactless payment system WO2009039419A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP08831911A EP2201543A1 (en) 2007-09-21 2008-09-19 Wireless smart card and integrated personal area network, near field communication and contactless payment system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US97442407P 2007-09-21 2007-09-21
US60/974,424 2007-09-21

Publications (1)

Publication Number Publication Date
WO2009039419A1 true WO2009039419A1 (en) 2009-03-26

Family

ID=40202034

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2008/077089 WO2009039419A1 (en) 2007-09-21 2008-09-19 Wireless smart card and integrated personal area network, near field communication and contactless payment system

Country Status (3)

Country Link
US (2) US20090143104A1 (en)
EP (1) EP2201543A1 (en)
WO (1) WO2009039419A1 (en)

Cited By (51)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2339521A1 (en) * 2009-12-09 2011-06-29 Vodafone Holding GmbH Cash-less payment for a purchase by a buyer from a seller of products and/or services
CN102256001A (en) * 2011-04-02 2011-11-23 上海华申智能卡应用系统有限公司 Near field payment method for smart phone
US8068011B1 (en) 2010-08-27 2011-11-29 Q Street, LLC System and method for interactive user-directed interfacing between handheld devices and RFID media
WO2012048122A1 (en) 2010-10-06 2012-04-12 Vivotech Inc. Methods, systems, and computer readable media for provisioning location specific content information to a mobile device
WO2012069918A1 (en) * 2010-11-26 2012-05-31 Damon Adams Multi-mode communications system for a mobile phone
WO2012122656A1 (en) * 2011-03-17 2012-09-20 Research In Motion Limited Methods and apparatus to obtain transaction confirmation
CN102713920A (en) * 2009-09-04 2012-10-03 托马斯·索克 A personalized multifunctional access device possessing an individualized form of authenticating and controlling data exchange
WO2012148304A1 (en) * 2011-04-26 2012-11-01 Общество С Ограниченной Ответственностью "Усп Компьюлинк" Payment system involving a smart card and a sim card substrate
WO2012163452A1 (en) * 2011-05-31 2012-12-06 Smartrac Ip B.V. Method and arrangement for providing and managing information linked to rfid data storage media in a network
US8392259B2 (en) 2011-03-17 2013-03-05 Research In Motion Limited Methods and apparatus to obtain transaction confirmation
WO2013050151A1 (en) * 2011-10-06 2013-04-11 Giesecke & Devrient Gmbh Transaction system
EP2388744A3 (en) * 2010-05-21 2013-07-10 Intel Corporation Method and device for conducting trusted remote payment transactions
WO2013189523A1 (en) * 2012-06-19 2013-12-27 Markus Lobmaier Method for managing an electronic coupon
WO2013189522A1 (en) * 2012-06-19 2013-12-27 Kadona Gmbh Method for managing an electronic coupon
EP2733654A1 (en) * 2012-11-20 2014-05-21 Nagravision S.A. Electronic payment method, system and device for securely exchanging payment information
WO2014091106A1 (en) * 2012-12-14 2014-06-19 Schneider Electric Industries Sas System for exchanging data remotely with an nfc radio tag
CN103886455A (en) * 2012-12-19 2014-06-25 Nxp股份有限公司 Digital wallet device for virtual wallet
WO2014105162A1 (en) 2012-12-27 2014-07-03 Intel Corporation Method and system of generating nfc-transaction remotely
WO2014141158A1 (en) * 2013-03-14 2014-09-18 Ologn Technologies Ag Methods, apparatuses and systems for providing user authentication
EP2780872A1 (en) * 2011-11-15 2014-09-24 Famoco Nfc device and connection system of nfc devices
EP2782034A1 (en) * 2012-05-10 2014-09-24 Tokyo Mechatronics Co., Ltd Method and system for authentication and payment by using portable terminal
EP2787473A1 (en) * 2013-04-02 2014-10-08 Nxp B.V. Digital wallet bridge
WO2014204369A1 (en) * 2013-06-20 2014-12-24 Telefonaktiebolaget L M Ericsson (Publ) Electronic device, grid of communication points and methods for providing assistance to an electronic device
CN104424696A (en) * 2013-09-02 2015-03-18 陈业军 Wearable mobile payment equipment and payment method
EP2903302A1 (en) * 2014-01-30 2015-08-05 Gemalto SA Method of managing a transaction between a secure element and a NFC terminal
CN104838398A (en) * 2012-10-15 2015-08-12 驱动卡解决方案有限公司 System and method for secure remote access and remote payment using a mobile device and a powered display card
WO2015119834A1 (en) * 2014-02-04 2015-08-13 Microsoft Technology Licensing, Llc Multi-use card and system
US20150348025A1 (en) * 2014-05-29 2015-12-03 Apple Inc. Apparatuses and Methods for Using a Primary User Device to Provision Credentials onto a Secondary User Device
WO2015189678A1 (en) 2014-06-14 2015-12-17 Manfred Rietzler Method and arrangement for carrying out a digital payment process
WO2015192066A1 (en) * 2014-06-12 2015-12-17 Franwell, Inc. Method and apparatus for tracking one or more plants and/or plant based products and/or tracking the sale of products derived from the same, utilizing rfid technology
WO2016038758A1 (en) * 2014-09-09 2016-03-17 Sony Corporation Secure nfc forwarding from a mobile terminal through an electronic accessory
US9299072B2 (en) 2014-05-29 2016-03-29 Apple Inc. Apparatuses and methods for operating a portable electronic device to conduct mobile payment transactions
EP2494509A4 (en) * 2009-10-30 2016-06-08 Mastercard International Inc Methods, systems, and computer readable media for facilitating use of wireless smart devices to purchase goods or services
US9400977B2 (en) 2014-05-29 2016-07-26 Apple Inc. User device enabling access to payment information in response to mechanical input detection
KR20160106013A (en) 2016-08-22 2016-09-09 천정서 Mobile relay system supporting multi-channel point-to-point communication, and the operating method thereof
EP3104320A1 (en) * 2015-06-12 2016-12-14 EM Microelectronic-Marin SA Method for programming bank data in an integrated circuit of a watch
US9536243B2 (en) 2010-06-28 2017-01-03 Mastercard International Incorporated Methods, systems, and computer readable media for facilitating in-store or near-store ordering and payment of goods and services through a single-tap of a near field communication (NFC) device
US20170053277A1 (en) * 2015-08-21 2017-02-23 Samsung Electronics Co., Ltd. Reference-based card enrollment for secondary devices
EP3240352A4 (en) * 2014-12-26 2018-01-10 Nationz Technologies Inc. Wireless communication method and apparatus and application system and device thereof
EP2455922B1 (en) * 2010-11-17 2018-12-05 Inside Secure NFC transaction method and system
US10650443B2 (en) 2014-03-31 2020-05-12 Monticello Enterprises LLC System and method for providing data to a merchant device from a user device over a wireless link
US10977716B2 (en) 2014-03-31 2021-04-13 Monticello Enterprises LLC System and method for providing multiple application programming interfaces for a browser to manage payments from a payment service
US11200500B2 (en) * 2017-12-15 2021-12-14 Paypal, Inc. Self learning data loading optimization for a rule engine
WO2022005762A1 (en) * 2020-06-29 2022-01-06 Capital One Services, Llc System and method for handling point of sale card rejections
US11227220B2 (en) * 2017-12-15 2022-01-18 Paypal, Inc. Automatic discovery of data required by a rule engine
US11282131B2 (en) 2014-03-31 2022-03-22 Monticello Enterprises LLC User device enabling access to payment information in response to user input
US11343370B1 (en) 2012-11-02 2022-05-24 Majen Tech, LLC Screen interface for a mobile device apparatus
WO2022164375A1 (en) * 2021-01-29 2022-08-04 Crunchfish Digital Cash Ab Transfer of digital cash between mobile communication device and smart card
US11431834B1 (en) 2013-01-10 2022-08-30 Majen Tech, LLC Screen interface for a mobile device apparatus
US11836784B2 (en) 2014-03-31 2023-12-05 Monticello Enterprises LLC System and method for providing a search entity-based payment process
US11978035B2 (en) 2013-03-15 2024-05-07 Apple Inc. Facilitating transactions with a user account using a wireless device

Families Citing this family (359)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI284843B (en) * 2005-07-22 2007-08-01 Ind Tech Res Inst Radio frequency identification reader/writer and financial transaction method using the same
US20070156436A1 (en) 2005-12-31 2007-07-05 Michelle Fisher Method And Apparatus For Completing A Transaction Using A Wireless Mobile Communication Channel And Another Communication Channel
US8275312B2 (en) 2005-12-31 2012-09-25 Blaze Mobile, Inc. Induction triggered transactions using an external NFC device
US8290433B2 (en) * 2007-11-14 2012-10-16 Blaze Mobile, Inc. Method and system for securing transactions made through a mobile communication device
US8352323B2 (en) * 2007-11-30 2013-01-08 Blaze Mobile, Inc. Conducting an online payment transaction using an NFC enabled mobile communication device
US8949146B2 (en) * 2005-12-31 2015-02-03 Michelle Fisher Method for purchasing tickets using a mobile communication device
FR2910747B1 (en) * 2006-12-20 2011-05-20 Smart Packaging Solutions Sps LOCAL RADIO FREQUENCY COMMUNICATION INTERFACE BETWEEN A MOBILE TELEPHONE AND A CONTACTLESS READER.
US8820638B1 (en) * 2007-07-27 2014-09-02 United Services Automobile Association (Usaa) System and methods related to an available balance debit/credit card
US8915447B2 (en) 2007-09-12 2014-12-23 Devicefidelity, Inc. Amplifying radio frequency signals
US8070057B2 (en) 2007-09-12 2011-12-06 Devicefidelity, Inc. Switching between internal and external antennas
US20090069049A1 (en) 2007-09-12 2009-03-12 Devicefidelity, Inc. Interfacing transaction cards with host devices
US9304555B2 (en) 2007-09-12 2016-04-05 Devicefidelity, Inc. Magnetically coupling radio frequency antennas
US9311766B2 (en) * 2007-09-12 2016-04-12 Devicefidelity, Inc. Wireless communicating radio frequency signals
US8370254B1 (en) * 2007-09-26 2013-02-05 United Services Automobile Association Enhanced vehicle identification card
US8025226B1 (en) 2007-09-26 2011-09-27 United States Automobile Association (USAA) Enhanced vehicle identification card
US8011577B2 (en) 2007-12-24 2011-09-06 Dynamics Inc. Payment cards and devices with gift card, global integration, and magnetic stripe reader communication functionality
KR101478144B1 (en) * 2007-12-27 2015-01-02 삼성전자주식회사 Rfid communication method
US20090172678A1 (en) * 2007-12-28 2009-07-02 Mastercard International, Inc. Method And System For Controlling The Functionality Of A Transaction Device
US8367235B2 (en) 2008-01-18 2013-02-05 Mophie, Inc. Battery pack, holster, and extendible processing and interface platform for mobile devices
US8233841B2 (en) * 2008-01-30 2012-07-31 Ebay Inc. Near field communication initialization
SK288721B6 (en) * 2008-03-25 2020-01-07 Smk Kk Method, circuit and carrier for perform multiple operations on the keypad of mobile communication equipment
US8365988B1 (en) * 2008-04-11 2013-02-05 United Services Automobile Association (Usaa) Dynamic credit card security code via mobile device
JP5277715B2 (en) * 2008-05-13 2013-08-28 ソニー株式会社 Information processing system, information processing apparatus, information processing method, and computer program
US7979899B2 (en) 2008-06-02 2011-07-12 Microsoft Corporation Trusted device-specific authentication
US20090307140A1 (en) * 2008-06-06 2009-12-10 Upendra Mardikar Mobile device over-the-air (ota) registration and point-of-sale (pos) payment
US9054408B2 (en) * 2008-08-29 2015-06-09 Logomotion, S.R.O. Removable card for a contactless communication, its utilization and the method of production
US8090616B2 (en) 2008-09-08 2012-01-03 Proctor Jr James Arthur Visual identification information used as confirmation in a wireless communication
SK50862008A3 (en) * 2008-09-19 2010-06-07 Logomotion, S. R. O. System for electronic payment applications and method for payment authorization
SK288747B6 (en) * 2009-04-24 2020-04-02 Smk Kk Method and system for cashless payment transactions, particularly with contactless payment device using
US9098845B2 (en) * 2008-09-19 2015-08-04 Logomotion, S.R.O. Process of selling in electronic shop accessible from the mobile communication device
SK288757B6 (en) * 2008-09-19 2020-05-04 Smk Kk System and method for contactless payment authorization
US10706402B2 (en) * 2008-09-22 2020-07-07 Visa International Service Association Over the air update of payment transaction data stored in secure memory
US9824355B2 (en) * 2008-09-22 2017-11-21 Visa International Service Association Method of performing transactions with contactless payment devices using pre-tap and two-tap operations
US8977567B2 (en) 2008-09-22 2015-03-10 Visa International Service Association Recordation of electronic payment transaction information
WO2010039598A2 (en) * 2008-09-30 2010-04-08 Honeywell International Inc. Systems and methods for interacting with access control devices
SK288641B6 (en) * 2008-10-15 2019-02-04 Smk Corporation Communication method with POS terminal and frequency convertor for POS terminal
US8706588B1 (en) * 2008-10-20 2014-04-22 Sprint Communications Company L.P. System and method of provisioning confidential information via a mobile device
US7782610B2 (en) 2008-11-17 2010-08-24 Incase Designs Corp. Portable electronic device case with battery
US20100153721A1 (en) * 2008-12-12 2010-06-17 Anders Mellqvist Portable Electronic Devices, Systems, Methods and Computer Program Products for Accessing Remote Secure Elements
US8768845B1 (en) 2009-02-16 2014-07-01 Sprint Communications Company L.P. Electronic wallet removal from mobile electronic devices
SK500092009A3 (en) * 2009-02-27 2010-09-07 Logomotion, S. R. O. Computer mouse for data transmission, preferably at electronic payment, method for data transmission
US20100250789A1 (en) * 2009-03-27 2010-09-30 Qualcomm Incorporated System and method of managing memory at a portable computing device and a portable computing device docking station
US20100251243A1 (en) * 2009-03-27 2010-09-30 Qualcomm Incorporated System and method of managing the execution of applications at a portable computing device and a portable computing device docking station
US20100250817A1 (en) * 2009-03-27 2010-09-30 Qualcomm Incorporated System and method of managing data communication at a portable computing device and a portable computing device docking station
US9128669B2 (en) * 2009-03-27 2015-09-08 Qualcomm Incorporated System and method of managing security between a portable computing device and a portable computing device docking station
US9201593B2 (en) * 2009-03-27 2015-12-01 Qualcomm Incorporated System and method of managing displays at a portable computing device and a portable computing device docking station
US20100250818A1 (en) * 2009-03-27 2010-09-30 Qualcomm Incorporated System and method of providing wireless connectivity between a portable computing device and a portable computing device docking station
US8653785B2 (en) 2009-03-27 2014-02-18 Qualcomm Incorporated System and method of managing power at a portable computing device and a portable computing device docking station
DE102009016532A1 (en) * 2009-04-06 2010-10-07 Giesecke & Devrient Gmbh Method for carrying out an application using a portable data carrier
MX2011004702A (en) * 2009-05-03 2011-09-02 Logomotion Sro A payment terminal using a mobile communication device, such as a mobile phone; a method of direct debit payment transaction.
US9105027B2 (en) 2009-05-15 2015-08-11 Visa International Service Association Verification of portable consumer device for secure services
US10846683B2 (en) * 2009-05-15 2020-11-24 Visa International Service Association Integration of verification tokens with mobile communication devices
AU2015264873B2 (en) * 2009-06-05 2017-06-01 Visa International Service Association Contactless disablement
AU2014240220B2 (en) * 2009-06-05 2015-09-17 Visa International Service Association Contactless disablement
US8320962B2 (en) * 2009-06-05 2012-11-27 Visa International Service Association Contactless disablement
US20100312634A1 (en) * 2009-06-08 2010-12-09 Cervenka Karen L Coupon card point of service terminal processing
US10169558B2 (en) * 2009-09-30 2019-01-01 Intel Corporation Enhancing biometric security of a system
US8907768B2 (en) 2009-11-25 2014-12-09 Visa International Service Association Access using a mobile device with an accelerometer
US20110137804A1 (en) 2009-12-03 2011-06-09 Recursion Software, Inc. System and method for approving transactions
IN2012DN01925A (en) * 2009-12-04 2015-07-24 Ericsson Telefon Ab L M
HK1145130A2 (en) * 2010-01-05 2011-04-01 Shining Union Ltd Wireless fingerprint card
WO2011088565A1 (en) * 2010-01-22 2011-07-28 Spqkumar Inc. A portable device for secure storage of user provided data
CA2690784A1 (en) * 2010-01-22 2011-07-22 Spqkumar Inc. Network and method for data input, storage and retrieval
CN102137515B (en) * 2010-01-27 2013-12-18 国民技术股份有限公司 IC (Integrated Circuit) card device
US9177316B2 (en) * 2010-02-19 2015-11-03 Bindu Rama Rao Mobile monetary transactions and banking for rural populations
CN103229329B (en) * 2010-05-19 2016-05-11 摩飞公司 For the modularization movable accessory of mobile device
US10552809B2 (en) * 2010-07-26 2020-02-04 Visa International Service Association Programmable card
JP2012039257A (en) * 2010-08-04 2012-02-23 Sony Corp Portable terminal, information processing method and computer program
US8706033B2 (en) * 2010-08-17 2014-04-22 Dearborn Group Technology TK wireless adapter for providing wireless communication between a transducer and a computer
WO2012027708A2 (en) * 2010-08-27 2012-03-01 Wherepro, Llc Operation of a computing device involving wireless tokens
TWI446271B (en) * 2010-09-14 2014-07-21 Icon Minsky Luo Near field communication device, authentication system using the same and method thereof
EP2625660A4 (en) 2010-10-05 2014-06-11 Centric Software Inc Interactive collection book for mobile devices
US9525548B2 (en) 2010-10-21 2016-12-20 Microsoft Technology Licensing, Llc Provisioning techniques
US9916573B2 (en) 2010-11-24 2018-03-13 International Business Machines Corporation Wireless establishment of identity via bi-directional RFID
US20120143769A1 (en) * 2010-12-02 2012-06-07 Microsoft Corporation Commerce card
US9489669B2 (en) 2010-12-27 2016-11-08 The Western Union Company Secure contactless payment systems and methods
US20120095855A1 (en) * 2010-12-28 2012-04-19 Jacob Matthew Sterling Systems and methods for buyer-initiated mobile payments without sensitive information exchange between buyer and seller
WO2012092293A2 (en) * 2010-12-30 2012-07-05 Visa International Service Association Mixed mode transaction protocol
WO2012093773A2 (en) * 2011-01-04 2012-07-12 에이큐 주식회사 System for providing advertisement information
US20130293191A1 (en) 2011-01-26 2013-11-07 Panasonic Corporation Non-contact charging module and non-contact charging instrument
AU2011200445B8 (en) * 2011-02-03 2013-03-07 Idondemand Pty Ltd Method and apparatus for dynamic authentication
US8934835B2 (en) * 2011-02-24 2015-01-13 Blackberry Limited Communications system including display with NFC device associated therewith and associated methods
CN102694781B (en) * 2011-03-24 2015-12-16 中国银联股份有限公司 Based on security information interaction system and the method for the Internet
US10223743B2 (en) 2011-03-29 2019-03-05 Blackberry Limited Communication system providing near field communication (NFC) transaction features and related methods
EP2506203B1 (en) * 2011-03-29 2013-06-19 Research In Motion Limited Communication system providing near field communication (NFC) transaction features and related methods
PT105677A (en) * 2011-05-06 2012-11-06 Manuel Janssen Valadas Preto TELEMATIC PAYMENT CARD
WO2012154915A1 (en) * 2011-05-10 2012-11-15 Dynamics Inc. Systems, devices, and methods for mobile payment acceptance, mobile authorizations, mobile wallets, and contactless communication mechanisms
US20120317628A1 (en) * 2011-06-09 2012-12-13 Yeager C Douglas Systems and methods for authorizing a transaction
EP2717734A4 (en) 2011-06-10 2015-03-04 Mophie Inc Wireless communication accessory for a mobile device
EP2712053A4 (en) 2011-06-14 2014-11-05 Panasonic Corp Communication apparatus
US8978975B2 (en) * 2011-07-18 2015-03-17 Accullink, Inc. Systems and methods for authenticating near field communcation financial transactions
EP2751754A4 (en) 2011-08-30 2015-06-03 C Douglas Yeager Systems and methods for authorizing a transaction with an unexpected cryptogram
US8862767B2 (en) * 2011-09-02 2014-10-14 Ebay Inc. Secure elements broker (SEB) for application communication channel selector optimization
US9524499B2 (en) * 2011-09-28 2016-12-20 Paypal, Inc. Systems, methods, and computer program products providing electronic communication during transactions
US8880055B1 (en) * 2011-10-06 2014-11-04 Marvell International Ltd. Method and apparatus for using near field communication (NFC) to perform transactions on a mobile device
DE102011114990A1 (en) * 2011-10-06 2013-04-11 Giesecke & Devrient Gmbh transaction system
DE102011114989A1 (en) 2011-10-06 2013-04-11 Giesecke & Devrient Gmbh transaction system
GB2495704B (en) * 2011-10-12 2014-03-26 Technology Business Man Ltd ID Authentication
US10204734B2 (en) * 2011-11-02 2019-02-12 Panasonic Corporation Electronic device including non-contact charging module and near field communication antenna
USD718289S1 (en) 2011-11-11 2014-11-25 Mophie, Inc. Multi-piece case
US8818867B2 (en) 2011-11-14 2014-08-26 At&T Intellectual Property I, L.P. Security token for mobile near field communication transactions
US9129273B2 (en) 2011-12-01 2015-09-08 At&T Intellectual Property I, L.P. Point of sale for mobile transactions
US8918855B2 (en) * 2011-12-09 2014-12-23 Blackberry Limited Transaction provisioning for mobile wireless communications devices and related methods
US9385786B2 (en) 2011-12-14 2016-07-05 Marvell World Trade Ltd. Method and apparatus for charging a battery in a mobile device through a near field communication (NFC) antenna
USD711819S1 (en) 2012-01-09 2014-08-26 Mophie Inc. Mobile battery charger
USD714215S1 (en) 2012-01-09 2014-09-30 Mophie, Inc. Mobile battery charger
US20130207778A1 (en) * 2012-02-13 2013-08-15 Xceedid Corporation Accessory for a mobile device
JP2013169122A (en) 2012-02-17 2013-08-29 Panasonic Corp Non-contact charge module and portable terminal having the same
EP2820600A1 (en) * 2012-02-28 2015-01-07 Giesecke & Devrient GmbH Authenticated transaction approval
US9811827B2 (en) 2012-02-28 2017-11-07 Google Inc. System and method for providing transaction verification
US8959034B2 (en) 2012-02-29 2015-02-17 Google Inc. Transaction signature for offline payment processing system
US8898088B2 (en) * 2012-02-29 2014-11-25 Google Inc. In-card access control and monotonic counters for offline payment processing system
KR102088451B1 (en) * 2012-02-29 2020-03-12 모비웨이브 인코포레이티드 Method, device and secure element for conducting a secured financial transaction on a device
US9020858B2 (en) 2012-02-29 2015-04-28 Google Inc. Presence-of-card code for offline payment processing system
US9633247B2 (en) 2012-03-01 2017-04-25 Apple Inc. Electronic device with shared near field communications and sensor structures
US10282724B2 (en) * 2012-03-06 2019-05-07 Visa International Service Association Security system incorporating mobile device
CN103379491A (en) * 2012-04-12 2013-10-30 中兴通讯股份有限公司 User terminal, cipher transaction terminal, system and method used for cipher verification
KR20130116602A (en) * 2012-04-16 2013-10-24 삼성전자주식회사 Method for controlling card emulation mode and an electronic device thereof
US20130293347A1 (en) * 2012-05-01 2013-11-07 William Barnes Keyless vehicle entry device
US9047546B2 (en) 2012-05-08 2015-06-02 Kuo-Ching Chiang Method of money transfer via a mobile phone having security code generator
KR101385723B1 (en) 2012-05-11 2014-04-29 주식회사 씽크풀 Digital system having financial transaction function, pair system making a pair with the digital system, and method for financial transaction
WO2013169053A1 (en) * 2012-05-11 2013-11-14 주식회사 씽크풀 Digital system for carrying out financial transactions, pair system making pair with the digital system, and financial transaction method
USD728467S1 (en) 2012-05-24 2015-05-05 Mophie, Inc. Mobile battery charger
USD720687S1 (en) 2012-05-24 2015-01-06 Mophie, Inc. Mobile battery charger
USD721356S1 (en) 2012-05-25 2015-01-20 Mophie, Inc. Mobile phone case
USD721685S1 (en) 2012-05-25 2015-01-27 Mophie, Inc. Mobile phone case
JP6112383B2 (en) 2012-06-28 2017-04-12 パナソニックIpマネジメント株式会社 Mobile device
WO2014007710A1 (en) * 2012-07-06 2014-01-09 Telefonaktiebolaget L M Ericsson (Publ) Data transfer using near field communications
US9191052B2 (en) * 2012-07-17 2015-11-17 Electronics And Telecommunications Research Institute Universal subscriber identification module card, including security chip, for mobile terminal and communication method using the same
USD727883S1 (en) 2012-07-20 2015-04-28 Mophie, Inc. Mobile phone case
KR101421568B1 (en) * 2012-07-27 2014-07-22 주식회사 케이티 Smart card, device and method for smart card service
WO2014021747A1 (en) * 2012-08-03 2014-02-06 Telefonaktiebolaget L M Ericsson (Publ) Flexible payment in pricing system
WO2014036248A1 (en) 2012-09-01 2014-03-06 Mophie, Inc. Wireless communication accessory for a mobile device
KR102013419B1 (en) * 2012-09-19 2019-08-23 한국전자통신연구원 Method for choosing RFID communication mode and RFID device which supports near-field and far-field communication
US8792936B2 (en) 2012-10-01 2014-07-29 Xerox Corporation Establishing communication between devices using close proximity protocol
USD723530S1 (en) 2012-10-03 2015-03-03 Mophie, Inc. Unbanded battery case for a mobile device
US20140108241A1 (en) * 2012-10-08 2014-04-17 NXT-ID, Inc. Method for Replacing Traditional Payment and Identity Management Systems and Components to Provide Additional Security and a System Implementing Said Method
USD721687S1 (en) 2012-10-30 2015-01-27 Mophie, Inc. High capacity banded battery case for a mobile device
USD718754S1 (en) 2012-10-30 2014-12-02 Mophie, Inc. Thin banded battery case for a mobile device
WO2014085617A1 (en) 2012-11-27 2014-06-05 Geist Wyatt D Method and apparatus for providing a toll service and flexible toll device
USD718293S1 (en) 2012-11-30 2014-11-25 Mophie, Inc. Unbanded snap battery case for a mobile device
USD718230S1 (en) 2012-12-04 2014-11-25 Mophie, Inc. High capacity banded snap battery case for a mobile device
USD718755S1 (en) 2012-12-18 2014-12-02 Mophie, Inc. Thin banded snap battery case for a mobile device
EP2747362B1 (en) * 2012-12-21 2019-02-20 Certicom Corp. Two factor authentication using near field communications
US9594896B2 (en) 2012-12-21 2017-03-14 Blackberry Limited Two factor authentication using near field communications
US9021563B2 (en) 2013-01-02 2015-04-28 Htc Corporation Accessory interface system
US9716530B2 (en) * 2013-01-07 2017-07-25 Samsung Electronics Co., Ltd. Home automation using near field communication
KR20140097832A (en) 2013-01-30 2014-08-07 주식회사 케이티 Device of generating and terminating a virtual card transferred to a physical card
MX359597B (en) * 2013-02-08 2018-09-21 Schlage Lock Co Llc Control system and method.
KR20140103210A (en) 2013-02-14 2014-08-26 주식회사 케이티 Apparatus and method for setting a primary payment means
US9755444B2 (en) 2013-02-25 2017-09-05 Mophie, Inc. Protective case with switch cover
US10192214B2 (en) 2013-03-11 2019-01-29 Google Llc Pending deposit for payment processing system
US9086689B2 (en) 2013-03-15 2015-07-21 Tyfone, Inc. Configurable personal digital identity device with imager responsive to user interaction
US9781598B2 (en) 2013-03-15 2017-10-03 Tyfone, Inc. Personal digital identity device with fingerprint sensor responsive to user interaction
US9215592B2 (en) 2013-03-15 2015-12-15 Tyfone, Inc. Configurable personal digital identity device responsive to user interaction
US9448543B2 (en) 2013-03-15 2016-09-20 Tyfone, Inc. Configurable personal digital identity device with motion sensor responsive to user interaction
US9319881B2 (en) * 2013-03-15 2016-04-19 Tyfone, Inc. Personal digital identity device with fingerprint sensor
US9207650B2 (en) 2013-03-15 2015-12-08 Tyfone, Inc. Configurable personal digital identity device responsive to user interaction with user authentication factor captured in mobile device
US9231945B2 (en) 2013-03-15 2016-01-05 Tyfone, Inc. Personal digital identity device with motion sensor
US9559544B2 (en) * 2013-03-15 2017-01-31 Jay Marketing Associates, Inc. Wireless interrogation and wireless charging of electronic devices
US9436165B2 (en) 2013-03-15 2016-09-06 Tyfone, Inc. Personal digital identity device with motion sensor responsive to user interaction
US9154500B2 (en) 2013-03-15 2015-10-06 Tyfone, Inc. Personal digital identity device with microphone responsive to user interaction
EP2974044A4 (en) 2013-03-15 2016-11-09 Mophie Inc Protective case for mobile device
US9183371B2 (en) 2013-03-15 2015-11-10 Tyfone, Inc. Personal digital identity device with microphone
US9143938B2 (en) 2013-03-15 2015-09-22 Tyfone, Inc. Personal digital identity device responsive to user interaction
EP2782035B1 (en) * 2013-03-19 2021-06-09 Nxp B.V. Smartcard, smartcard system and method for configuring a smartcard
IN2013MU00927A (en) 2013-03-20 2015-05-08 Tata Consultancy Services Ltd
USD732012S1 (en) 2013-04-06 2015-06-16 Mophie, Inc. Curved battery case for a mobile device
US9282086B2 (en) * 2013-04-26 2016-03-08 Broadcom Corporation Methods and systems for secured authentication of applications on a network
US9052891B2 (en) * 2013-05-14 2015-06-09 International Business Machines Corporation Declarative configuration and execution of card content management operations for trusted service manager
CN104219256A (en) * 2013-05-29 2014-12-17 朱江 Interaction control method based on cloud database and auxiliary device thereof
US20140358794A1 (en) * 2013-06-04 2014-12-04 Ncr Corporation Techniques for credit card processing
WO2014197935A1 (en) * 2013-06-14 2014-12-18 Point Of Pay Pty Ltd Secure data entry and display for a communication device
JP2015023450A (en) * 2013-07-19 2015-02-02 レノボ・シンガポール・プライベート・リミテッド Method and electronic apparatus for short distance radio communication
US10489778B2 (en) * 2013-11-24 2019-11-26 Zanguli Llc Secure payment card
US10956896B2 (en) 2013-11-27 2021-03-23 Geotoll, Inc. Method and apparatus for providing a toll service and flexible toll device
US9495375B2 (en) 2013-11-27 2016-11-15 Mophie, Inc. Battery pack with supplemental memory
USD733043S1 (en) 2013-12-09 2015-06-30 Mophie, Inc. Battery pack
FR3015725A1 (en) * 2013-12-19 2015-06-26 Orange SYSTEM AND METHOD FOR PROVIDING SERVICE TO THE USER OF A MOBILE TERMINAL
EP3090521B1 (en) * 2013-12-31 2020-04-01 OneSpan International GmbH A method and apparatus for securing a mobile application
USD721646S1 (en) 2014-01-02 2015-01-27 Mophie, Inc. Battery pack with integrated connector
US11580518B2 (en) * 2014-01-03 2023-02-14 Apple Inc. Disabling mobile payments for lost electronic devices
US9824246B2 (en) 2014-01-03 2017-11-21 Kt Corporation Radio frequency identification tag having input device
US10027722B2 (en) * 2014-01-09 2018-07-17 International Business Machines Corporation Communication transaction continuity using multiple cross-modal services
US20170046684A1 (en) * 2014-04-17 2017-02-16 Wise-Sec Ltd. Using a client terminal wireless personal area network (wpan) transceiver for secure element communication
US10410216B2 (en) 2014-04-29 2019-09-10 Mastercard International Incorporated Methods and systems for verifying individuals prior to benefits distribution
US10055567B2 (en) * 2014-05-30 2018-08-21 Apple Inc. Proximity unlock and lock operations for electronic devices
US9997933B2 (en) 2014-09-03 2018-06-12 Mophie, Inc. Systems and methods for battery charging and management
CN105426932A (en) * 2014-09-22 2016-03-23 天地融科技股份有限公司 Data interaction system
CN204731814U (en) * 2014-09-22 2015-10-28 天地融科技股份有限公司 Cutting ferrule
US9953323B2 (en) * 2014-09-23 2018-04-24 Sony Corporation Limiting e-card transactions based on lack of proximity to associated CE device
US9355424B2 (en) 2014-09-23 2016-05-31 Sony Corporation Analyzing hack attempts of E-cards
US9367845B2 (en) 2014-09-23 2016-06-14 Sony Corporation Messaging customer mobile device when electronic bank card used
US9558488B2 (en) 2014-09-23 2017-01-31 Sony Corporation Customer's CE device interrogating customer's e-card for transaction information
US10262316B2 (en) 2014-09-23 2019-04-16 Sony Corporation Automatic notification of transaction by bank card to customer device
US9646307B2 (en) 2014-09-23 2017-05-09 Sony Corporation Receiving fingerprints through touch screen of CE device
US9317847B2 (en) 2014-09-23 2016-04-19 Sony Corporation E-card transaction authorization based on geographic location
US9378502B2 (en) 2014-09-23 2016-06-28 Sony Corporation Using biometrics to recover password in customer mobile device
US9153985B1 (en) 2014-09-30 2015-10-06 Mophie, Inc. Portable charging device
US20170337545A1 (en) * 2014-11-07 2017-11-23 Tendyron Corporation Data interaction method and system
USD797092S1 (en) 2014-11-25 2017-09-12 Mophie, Inc. Case for a mobile electronic device
USD797091S1 (en) 2014-11-25 2017-09-12 Mophie, Inc. Case for a mobile electronic device
USD797093S1 (en) 2014-12-03 2017-09-12 Mophie, Inc. Case for a mobile electronic device
CN105740165A (en) 2014-12-10 2016-07-06 国际商业机器公司 Method and apparatus for managing file system of unified storage system
US9356267B1 (en) 2014-12-17 2016-05-31 Mophie, Inc. Protective battery case to partially enclose a mobile electronic device
US10748191B2 (en) * 2014-12-19 2020-08-18 Capital One Services, Llc Systems and methods for detecting and tracking customer interaction
CA2971865A1 (en) * 2014-12-22 2016-06-30 Capital One Services, Llc A system, method, and apparatus for locating a bluetooth enabled transaction card
EP3238151A4 (en) 2014-12-22 2018-06-06 Capital One Services, LLC A system, method and apparatus for reprogramming a transaction card
CN105989381B (en) * 2015-02-03 2019-05-17 天地融科技股份有限公司 Truth cards manager
US20160267486A1 (en) * 2015-03-13 2016-09-15 Radiius Corp Smartcard Payment System and Method
US11037139B1 (en) 2015-03-19 2021-06-15 Wells Fargo Bank, N.A. Systems and methods for smart card mobile device authentication
GB2536643A (en) * 2015-03-23 2016-09-28 Mastercard International Inc Device content provisioning system
US11188919B1 (en) 2015-03-27 2021-11-30 Wells Fargo Bank, N.A. Systems and methods for contactless smart card authentication
USD766819S1 (en) 2015-04-06 2016-09-20 Mophie, Inc. Protective battery case
USD767485S1 (en) 2015-04-07 2016-09-27 Mophie, Inc. Battery case
WO2016172466A1 (en) * 2015-04-22 2016-10-27 Touchstone Id Corp. Antenna decoupled from programmable smart card
USD861653S1 (en) 2015-05-27 2019-10-01 Mophie Inc. Protective battery case for mobile communications device
US10817878B2 (en) 2015-06-09 2020-10-27 Mastercard International Incorporated Systems and methods for verifying users, in connection with transactions using payment devices
FR3038099A1 (en) * 2015-06-26 2016-12-30 Orange METHOD AND DEVICE FOR MANAGING NON-CONTACT APPLICATIONS
EP3115951A1 (en) * 2015-07-07 2017-01-11 Nxp B.V. Relay device
WO2017010170A1 (en) * 2015-07-10 2017-01-19 ソニー株式会社 Information communicating medium, information communicating method, and information communicating system
US10834584B2 (en) * 2015-07-16 2020-11-10 Thinxtream Technologies Pte. Ltd. System and method for contextual service delivery via mobile communication devices
WO2017015131A1 (en) * 2015-07-17 2017-01-26 Google Inc. Merchant-specific functionality services
WO2017042629A1 (en) * 2015-09-10 2017-03-16 Transworld Holdings Pcc (S1 Technology Cell) Proxy device for representing multiple credentials
US12118533B1 (en) 2015-09-25 2024-10-15 Wells Fargo Bank, N.A. Behavior based allocation of payment tokens
FR3046267B1 (en) * 2015-12-28 2018-02-16 Proton World International N.V. STORING DATA IN A FLASH MEMORY
US11868989B1 (en) 2015-12-30 2024-01-09 Wells Fargo Bank, N.A. Mobile wallets and companion smart cards
PH22016000048Y1 (en) * 2016-01-13 2016-02-05 Renato C Valencia A system for proximate and/or remote electronic transaction authorization based on user authentication and/or biometric identification
DE102016000879A1 (en) * 2016-01-28 2017-08-03 Giesecke & Devrient Gmbh Wearable
EP3206305A1 (en) * 2016-02-11 2017-08-16 Gemalto Sa Method for managing communication between a contactless reader and a portable contactless device
CA3014650A1 (en) * 2016-02-29 2017-09-08 Capital One Services, Llc Batteryless payment device with wirelessly powered token provisioning
USD950538S1 (en) * 2016-03-03 2022-05-03 Mophie Inc. Case for a mobile electronic device
US11113688B1 (en) 2016-04-22 2021-09-07 Wells Fargo Bank, N.A. Systems and methods for mobile wallet provisioning
TWI635444B (en) * 2016-11-03 2018-09-11 動信科技股份有限公司 Touch smart card
IT201600127809A1 (en) * 2016-12-19 2018-06-19 DEVICE FOR PAYMENT TRANSACTIONS WITH CONTACTLESS TECHNOLOGY (NFC), WITH GENERATING ALGORITHM OTP CODE UNIQUE INTEGRAL TEXT STRING TEMPLATE GENERATED BY BIOMETRIC SCANNING OF THE DIGITAL FOOTPRINT, WITH TOKEN OTP FUNCTION, RECOGNITION OF IDENTITY AND SUBSCRIPTION FEATURE PUBLIC AND RELATED PROCESSES OF OPERATION, ASSOCIATION AND USE
US10373146B2 (en) 2016-12-29 2019-08-06 Capital One Services, Llc Smart card NFC secure money transfer
US11030609B2 (en) * 2017-02-17 2021-06-08 Apple Inc. Preventing duplicate wireless transactions
KR101970152B1 (en) * 2017-09-22 2019-04-17 코나아이 (주) Multi card and payment method using it
US9990632B1 (en) 2017-10-25 2018-06-05 Capital One Services, Llc Dynamic modification of a verification method associated with a transaction card
US10516431B2 (en) 2017-11-21 2019-12-24 Mophie Inc. Mobile device case for receiving wireless signals
TWI709928B (en) * 2017-12-27 2020-11-11 鴻驊科技股份有限公司 Online payment method, program product and mobile payment card
EP3782106A4 (en) * 2018-04-20 2021-04-28 Visa International Service Association Portable device loading mechanism for account access
US10546444B2 (en) 2018-06-21 2020-01-28 Capital One Services, Llc Systems and methods for secure read-only authentication
US11188908B2 (en) 2018-07-12 2021-11-30 Capital One Services, Llc Multi-function transaction card
CA3050480A1 (en) * 2018-07-24 2020-01-24 Edison U. Ortiz Payment card with secure element and replenishable tokens
WO2020072552A1 (en) 2018-10-02 2020-04-09 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
CA3115084A1 (en) 2018-10-02 2020-04-09 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10581611B1 (en) 2018-10-02 2020-03-03 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US11210664B2 (en) 2018-10-02 2021-12-28 Capital One Services, Llc Systems and methods for amplifying the strength of cryptographic algorithms
US10511443B1 (en) 2018-10-02 2019-12-17 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
WO2020072670A1 (en) 2018-10-02 2020-04-09 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
AU2019351911A1 (en) 2018-10-02 2021-02-25 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10565587B1 (en) 2018-10-02 2020-02-18 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10733645B2 (en) 2018-10-02 2020-08-04 Capital One Services, Llc Systems and methods for establishing identity for order pick up
KR20210068391A (en) 2018-10-02 2021-06-09 캐피탈 원 서비시즈, 엘엘씨 System and method for cryptographic authentication of contactless card
WO2020072626A1 (en) 2018-10-02 2020-04-09 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10771253B2 (en) 2018-10-02 2020-09-08 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
WO2020072474A1 (en) 2018-10-02 2020-04-09 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10554411B1 (en) 2018-10-02 2020-02-04 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
WO2020072537A1 (en) 2018-10-02 2020-04-09 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10579998B1 (en) 2018-10-02 2020-03-03 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10860814B2 (en) 2018-10-02 2020-12-08 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10686603B2 (en) 2018-10-02 2020-06-16 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
KR20210068028A (en) 2018-10-02 2021-06-08 캐피탈 원 서비시즈, 엘엘씨 System and method for cryptographic authentication of contactless card
JP2022511281A (en) 2018-10-02 2022-01-31 キャピタル・ワン・サービシーズ・リミテッド・ライアビリティ・カンパニー Systems and methods for cryptographic authentication of non-contact cards
US10592710B1 (en) 2018-10-02 2020-03-17 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10582386B1 (en) 2018-10-02 2020-03-03 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10542036B1 (en) 2018-10-02 2020-01-21 Capital One Services, Llc Systems and methods for signaling an attack on contactless cards
US10505738B1 (en) 2018-10-02 2019-12-10 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10489781B1 (en) 2018-10-02 2019-11-26 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10949520B2 (en) 2018-10-02 2021-03-16 Capital One Services, Llc Systems and methods for cross coupling risk analytics and one-time-passcodes
WO2020072694A1 (en) 2018-10-02 2020-04-09 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10909527B2 (en) 2018-10-02 2021-02-02 Capital One Services, Llc Systems and methods for performing a reissue of a contactless card
US10607214B1 (en) 2018-10-02 2020-03-31 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10771254B2 (en) 2018-10-02 2020-09-08 Capital One Services, Llc Systems and methods for email-based card activation
USD940647S1 (en) 2019-01-07 2022-01-11 Mophie Inc. Battery pack
US11361302B2 (en) 2019-01-11 2022-06-14 Capital One Services, Llc Systems and methods for touch screen interface interaction using a card overlay
US11037136B2 (en) 2019-01-24 2021-06-15 Capital One Services, Llc Tap to autofill card data
US10467622B1 (en) 2019-02-01 2019-11-05 Capital One Services, Llc Using on-demand applications to generate virtual numbers for a contactless card to securely autofill forms
US10510074B1 (en) 2019-02-01 2019-12-17 Capital One Services, Llc One-tap payment using a contactless card
US11120453B2 (en) 2019-02-01 2021-09-14 Capital One Services, Llc Tap card to securely generate card data to copy to clipboard
US10425129B1 (en) 2019-02-27 2019-09-24 Capital One Services, Llc Techniques to reduce power consumption in near field communication systems
US12086797B2 (en) * 2019-03-14 2024-09-10 Ncr Atleos Corporation Secure wireless audio and speech at a transaction terminal
US10523708B1 (en) 2019-03-18 2019-12-31 Capital One Services, Llc System and method for second factor authentication of customer support calls
US10535062B1 (en) 2019-03-20 2020-01-14 Capital One Services, Llc Using a contactless card to securely share personal data stored in a blockchain
US10984416B2 (en) 2019-03-20 2021-04-20 Capital One Services, Llc NFC mobile currency transfer
US10643420B1 (en) 2019-03-20 2020-05-05 Capital One Services, Llc Contextual tapping engine
US10438437B1 (en) 2019-03-20 2019-10-08 Capital One Services, Llc Tap to copy data to clipboard via NFC
US10970712B2 (en) 2019-03-21 2021-04-06 Capital One Services, Llc Delegated administration of permissions using a contactless card
US10467445B1 (en) 2019-03-28 2019-11-05 Capital One Services, Llc Devices and methods for contactless card alignment with a foldable mobile device
US11521262B2 (en) 2019-05-28 2022-12-06 Capital One Services, Llc NFC enhanced augmented reality information overlays
US10516447B1 (en) 2019-06-17 2019-12-24 Capital One Services, Llc Dynamic power levels in NFC card communications
US11392933B2 (en) 2019-07-03 2022-07-19 Capital One Services, Llc Systems and methods for providing online and hybridcard interactions
US11694187B2 (en) 2019-07-03 2023-07-04 Capital One Services, Llc Constraining transactional capabilities for contactless cards
US10871958B1 (en) 2019-07-03 2020-12-22 Capital One Services, Llc Techniques to perform applet programming
US12086852B2 (en) 2019-07-08 2024-09-10 Capital One Services, Llc Authenticating voice transactions with payment card
US10713649B1 (en) 2019-07-09 2020-07-14 Capital One Services, Llc System and method enabling mobile near-field communication to update display on a payment card
US10885514B1 (en) 2019-07-15 2021-01-05 Capital One Services, Llc System and method for using image data to trigger contactless card transactions
US10498401B1 (en) 2019-07-15 2019-12-03 Capital One Services, Llc System and method for guiding card positioning using phone sensors
US11182771B2 (en) 2019-07-17 2021-11-23 Capital One Services, Llc System for value loading onto in-vehicle device
US10733601B1 (en) 2019-07-17 2020-08-04 Capital One Services, Llc Body area network facilitated authentication or payment authorization
US10832271B1 (en) 2019-07-17 2020-11-10 Capital One Services, Llc Verified reviews using a contactless card
US11521213B2 (en) 2019-07-18 2022-12-06 Capital One Services, Llc Continuous authentication for digital services based on contactless card positioning
US10506426B1 (en) 2019-07-19 2019-12-10 Capital One Services, Llc Techniques for call authentication
US10541995B1 (en) 2019-07-23 2020-01-21 Capital One Services, Llc First factor contactless card authentication system and method
US11928666B1 (en) 2019-09-18 2024-03-12 Wells Fargo Bank, N.A. Systems and methods for passwordless login via a contactless card
KR20210039109A (en) 2019-10-01 2021-04-09 삼성전자주식회사 Electronic device for transmitting/receiving data and method thereof
KR20220071211A (en) 2019-10-02 2022-05-31 캐피탈 원 서비시즈, 엘엘씨 Client Device Authentication Using Contactless Legacy Magnetic Stripe Data
CN110730441B (en) * 2019-10-18 2021-07-02 飞天诚信科技股份有限公司 Bluetooth device and working method thereof
CN114501123A (en) * 2019-11-08 2022-05-13 广州视源电子科技股份有限公司 Data transmission method and data transmission equipment
US10862540B1 (en) 2019-12-23 2020-12-08 Capital One Services, Llc Method for mapping NFC field strength and location on mobile devices
US10733283B1 (en) 2019-12-23 2020-08-04 Capital One Services, Llc Secure password generation and management using NFC and contactless smart cards
US11651361B2 (en) 2019-12-23 2023-05-16 Capital One Services, Llc Secure authentication based on passport data stored in a contactless card
US11615395B2 (en) * 2019-12-23 2023-03-28 Capital One Services, Llc Authentication for third party digital wallet provisioning
US11113685B2 (en) * 2019-12-23 2021-09-07 Capital One Services, Llc Card issuing with restricted virtual numbers
US10657754B1 (en) 2019-12-23 2020-05-19 Capital One Services, Llc Contactless card and personal identification system
US10885410B1 (en) 2019-12-23 2021-01-05 Capital One Services, Llc Generating barcodes utilizing cryptographic techniques
US11200563B2 (en) 2019-12-24 2021-12-14 Capital One Services, Llc Account registration using a contactless card
US10853795B1 (en) 2019-12-24 2020-12-01 Capital One Services, Llc Secure authentication based on identity data stored in a contactless card
US10664941B1 (en) 2019-12-24 2020-05-26 Capital One Services, Llc Steganographic image encoding of biometric template information on a card
US10757574B1 (en) 2019-12-26 2020-08-25 Capital One Services, Llc Multi-factor authentication providing a credential via a contactless card for secure messaging
US10909544B1 (en) 2019-12-26 2021-02-02 Capital One Services, Llc Accessing and utilizing multiple loyalty point accounts
US11038688B1 (en) 2019-12-30 2021-06-15 Capital One Services, Llc Techniques to control applets for contactless cards
US10860914B1 (en) 2019-12-31 2020-12-08 Capital One Services, Llc Contactless card and method of assembly
US11455620B2 (en) 2019-12-31 2022-09-27 Capital One Services, Llc Tapping a contactless card to a computing device to provision a virtual number
US11210656B2 (en) 2020-04-13 2021-12-28 Capital One Services, Llc Determining specific terms for contactless card activation
US11030339B1 (en) 2020-04-30 2021-06-08 Capital One Services, Llc Systems and methods for data access control of personal user data using a short-range transceiver
US10915888B1 (en) 2020-04-30 2021-02-09 Capital One Services, Llc Contactless card with multiple rotating security keys
US10861006B1 (en) 2020-04-30 2020-12-08 Capital One Services, Llc Systems and methods for data access control using a short-range transceiver
US11222342B2 (en) 2020-04-30 2022-01-11 Capital One Services, Llc Accurate images in graphical user interfaces to enable data transfer
US11823175B2 (en) 2020-04-30 2023-11-21 Capital One Services, Llc Intelligent card unlock
US10963865B1 (en) 2020-05-12 2021-03-30 Capital One Services, Llc Augmented reality card activation experience
US11063979B1 (en) 2020-05-18 2021-07-13 Capital One Services, Llc Enabling communications between applications in a mobile operating system
US11100511B1 (en) 2020-05-18 2021-08-24 Capital One Services, Llc Application-based point of sale system in mobile operating systems
CN113766468B (en) * 2020-06-04 2023-10-20 华为技术有限公司 Smart card sharing method, electronic device and computer readable storage medium
US11062098B1 (en) 2020-08-11 2021-07-13 Capital One Services, Llc Augmented reality information display and interaction via NFC based authentication
US11165586B1 (en) 2020-10-30 2021-11-02 Capital One Services, Llc Call center web-based authentication using a contactless card
US11482312B2 (en) 2020-10-30 2022-10-25 Capital One Services, Llc Secure verification of medical status using a contactless card
US11373169B2 (en) 2020-11-03 2022-06-28 Capital One Services, Llc Web-based activation of contactless cards
US11423392B1 (en) 2020-12-01 2022-08-23 Wells Fargo Bank, N.A. Systems and methods for information verification using a contactless card
US11216799B1 (en) 2021-01-04 2022-01-04 Capital One Services, Llc Secure generation of one-time passcodes using a contactless card
WO2022154646A1 (en) * 2021-01-18 2022-07-21 삼성전자 주식회사 Method and device for secure ranging based on ultra-wideband communication
US11682012B2 (en) 2021-01-27 2023-06-20 Capital One Services, Llc Contactless delivery systems and methods
US11687930B2 (en) 2021-01-28 2023-06-27 Capital One Services, Llc Systems and methods for authentication of access tokens
US11562358B2 (en) 2021-01-28 2023-01-24 Capital One Services, Llc Systems and methods for near field contactless card communication and cryptographic authentication
US11792001B2 (en) 2021-01-28 2023-10-17 Capital One Services, Llc Systems and methods for secure reprovisioning
US11438329B2 (en) 2021-01-29 2022-09-06 Capital One Services, Llc Systems and methods for authenticated peer-to-peer data transfer using resource locators
US11777933B2 (en) 2021-02-03 2023-10-03 Capital One Services, Llc URL-based authentication for payment cards
US11637826B2 (en) 2021-02-24 2023-04-25 Capital One Services, Llc Establishing authentication persistence
US11245438B1 (en) 2021-03-26 2022-02-08 Capital One Services, Llc Network-enabled smart apparatus and systems and methods for activating and provisioning same
US11935035B2 (en) 2021-04-20 2024-03-19 Capital One Services, Llc Techniques to utilize resource locators by a contactless card to perform a sequence of operations
US11961089B2 (en) 2021-04-20 2024-04-16 Capital One Services, Llc On-demand applications to extend web services
US11902442B2 (en) 2021-04-22 2024-02-13 Capital One Services, Llc Secure management of accounts on display devices using a contactless card
US11354555B1 (en) 2021-05-04 2022-06-07 Capital One Services, Llc Methods, mediums, and systems for applying a display to a transaction card
US12041172B2 (en) 2021-06-25 2024-07-16 Capital One Services, Llc Cryptographic authentication to control access to storage devices
US12061682B2 (en) 2021-07-19 2024-08-13 Capital One Services, Llc System and method to perform digital authentication using multiple channels of communication
US12062258B2 (en) 2021-09-16 2024-08-13 Capital One Services, Llc Use of a payment card to unlock a lock
WO2023048721A1 (en) * 2021-09-24 2023-03-30 Visa International Service Association System and methods for enabling ultra-wide band in passive devices
US12069173B2 (en) 2021-12-15 2024-08-20 Capital One Services, Llc Key recovery based on contactless card authentication

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1244043A2 (en) * 2001-03-19 2002-09-25 Accenture LLP Method, carrier and system for accessing advertising information using a product identifier
US20020140542A1 (en) * 2001-04-02 2002-10-03 Prokoski Francine J. Personal biometric key
GB2396472A (en) * 2002-12-18 2004-06-23 Ncr Int Inc System for cash withdrawal
US20040203352A1 (en) * 2001-06-18 2004-10-14 Hall Eric S. System and method for wireless data transfer for a mobile unit
WO2004114190A1 (en) * 2003-06-16 2004-12-29 Uru Technology Incorporated Method and system for creating and operating biometrically enabled multi-purpose credential management devices
EP1503352A1 (en) * 2003-07-31 2005-02-02 Matsushita Electric Industrial Co., Ltd. Portable device, IC module, IC card, and method for using services
US20060091223A1 (en) * 2004-10-28 2006-05-04 Samuel Zellner Multiple function electronic cards
WO2006095212A1 (en) * 2005-03-07 2006-09-14 Nokia Corporation Method and mobile terminal device including smartcard module and near field communications means
US20060208066A1 (en) * 2003-11-17 2006-09-21 Dpd Patent Trust RFID token with multiple interface controller
WO2007068993A1 (en) * 2005-12-16 2007-06-21 Nokia Corporation Method and device for controlling and providing indications of communication events

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6705520B1 (en) * 1999-11-15 2004-03-16 Satyan G. Pitroda Point of sale adapter for electronic transaction device
DK200300384A (en) * 2003-03-13 2004-09-14 Quard Technology I S Self-Approving Biometric Device with Dynamic PIN Code Creation
US7213766B2 (en) * 2003-11-17 2007-05-08 Dpd Patent Trust Ltd Multi-interface compact personal token apparatus and methods of use
TWI250768B (en) * 2004-11-01 2006-03-01 Inventec Appliances Corp Method and device to combine mobile phone with contactless IC card
US7581678B2 (en) * 2005-02-22 2009-09-01 Tyfone, Inc. Electronic transaction card
JP2007148680A (en) * 2005-11-25 2007-06-14 Fujitsu Ltd Card with integrated circuit, portable communication terminal, transaction system and unauthorized use preventive method therefor
US7527208B2 (en) * 2006-12-04 2009-05-05 Visa U.S.A. Inc. Bank issued contactless payment card used in transit fare collection
US20090069049A1 (en) * 2007-09-12 2009-03-12 Devicefidelity, Inc. Interfacing transaction cards with host devices
US7860793B2 (en) * 2008-04-02 2010-12-28 Microsoft Corporation Smart secure storage

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1244043A2 (en) * 2001-03-19 2002-09-25 Accenture LLP Method, carrier and system for accessing advertising information using a product identifier
US20020140542A1 (en) * 2001-04-02 2002-10-03 Prokoski Francine J. Personal biometric key
US20040203352A1 (en) * 2001-06-18 2004-10-14 Hall Eric S. System and method for wireless data transfer for a mobile unit
GB2396472A (en) * 2002-12-18 2004-06-23 Ncr Int Inc System for cash withdrawal
WO2004114190A1 (en) * 2003-06-16 2004-12-29 Uru Technology Incorporated Method and system for creating and operating biometrically enabled multi-purpose credential management devices
EP1503352A1 (en) * 2003-07-31 2005-02-02 Matsushita Electric Industrial Co., Ltd. Portable device, IC module, IC card, and method for using services
US20060208066A1 (en) * 2003-11-17 2006-09-21 Dpd Patent Trust RFID token with multiple interface controller
US20060091223A1 (en) * 2004-10-28 2006-05-04 Samuel Zellner Multiple function electronic cards
WO2006095212A1 (en) * 2005-03-07 2006-09-14 Nokia Corporation Method and mobile terminal device including smartcard module and near field communications means
WO2007068993A1 (en) * 2005-12-16 2007-06-21 Nokia Corporation Method and device for controlling and providing indications of communication events

Cited By (115)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102713920A (en) * 2009-09-04 2012-10-03 托马斯·索克 A personalized multifunctional access device possessing an individualized form of authenticating and controlling data exchange
EP2494509A4 (en) * 2009-10-30 2016-06-08 Mastercard International Inc Methods, systems, and computer readable media for facilitating use of wireless smart devices to purchase goods or services
EP2339521A1 (en) * 2009-12-09 2011-06-29 Vodafone Holding GmbH Cash-less payment for a purchase by a buyer from a seller of products and/or services
US9665864B2 (en) 2010-05-21 2017-05-30 Intel Corporation Method and device for conducting trusted remote payment transactions
US11935030B2 (en) 2010-05-21 2024-03-19 Intel Corporation Method and device for conducting trusted remote payment transactions
EP2388744A3 (en) * 2010-05-21 2013-07-10 Intel Corporation Method and device for conducting trusted remote payment transactions
US9536243B2 (en) 2010-06-28 2017-01-03 Mastercard International Incorporated Methods, systems, and computer readable media for facilitating in-store or near-store ordering and payment of goods and services through a single-tap of a near field communication (NFC) device
US10423951B2 (en) 2010-06-28 2019-09-24 Mastercard International Incorporated Methods, systems, and computer readable media for facilitating in-store or near-store ordering and payment of goods and services through a single-tap of a near field communication (NFC) device
US8395486B2 (en) 2010-08-27 2013-03-12 Q Street, LLC System and method for interactive user-directed interfacing between handheld devices and RFID media
US8068011B1 (en) 2010-08-27 2011-11-29 Q Street, LLC System and method for interactive user-directed interfacing between handheld devices and RFID media
US9858455B2 (en) 2010-08-27 2018-01-02 Q Street, LLC System and method for interactive user-directed interfacing between handheld devices and RFID media
US10674326B2 (en) 2010-10-06 2020-06-02 Mastercard International Incorporated Methods, systems, and computer readable media for provisioning location specific content information to a mobile device
WO2012048122A1 (en) 2010-10-06 2012-04-12 Vivotech Inc. Methods, systems, and computer readable media for provisioning location specific content information to a mobile device
EP2625668A4 (en) * 2010-10-06 2015-12-30 Mastercard International Inc Methods, systems, and computer readable media for provisioning location specific content information to a mobile device
EP2455922B1 (en) * 2010-11-17 2018-12-05 Inside Secure NFC transaction method and system
US10169754B2 (en) 2010-11-17 2019-01-01 Inside Secure Method and system for NFC transaction
EP2646990B1 (en) * 2010-11-17 2020-02-12 Verimatrix Improved method and system for nfc transaction
EP2455923B1 (en) * 2010-11-17 2018-12-05 Inside Secure NFC transaction server
US9402278B2 (en) 2010-11-26 2016-07-26 Wireless Dynamics, Inc. Multi-mode communication system for a mobile phone
WO2012069918A1 (en) * 2010-11-26 2012-05-31 Damon Adams Multi-mode communications system for a mobile phone
US9818096B2 (en) 2011-03-17 2017-11-14 Blackberry Limited Methods and apparatus to obtain transaction confirmation
US9747594B2 (en) 2011-03-17 2017-08-29 Blackberry Limited Methods and apparatus to obtain transaction confirmation
US10614439B2 (en) 2011-03-17 2020-04-07 Blackberry Limited Methods and apparatus to obtain transaction confirmation
US8392259B2 (en) 2011-03-17 2013-03-05 Research In Motion Limited Methods and apparatus to obtain transaction confirmation
WO2012122656A1 (en) * 2011-03-17 2012-09-20 Research In Motion Limited Methods and apparatus to obtain transaction confirmation
CN102256001B (en) * 2011-04-02 2013-06-05 上海华申智能卡应用系统有限公司 Near field payment method for smart phone
CN102256001A (en) * 2011-04-02 2011-11-23 上海华申智能卡应用系统有限公司 Near field payment method for smart phone
WO2012148304A1 (en) * 2011-04-26 2012-11-01 Общество С Ограниченной Ответственностью "Усп Компьюлинк" Payment system involving a smart card and a sim card substrate
WO2012163452A1 (en) * 2011-05-31 2012-12-06 Smartrac Ip B.V. Method and arrangement for providing and managing information linked to rfid data storage media in a network
US9582690B2 (en) 2011-05-31 2017-02-28 Smartrac Ip B.V. Method and arrangement for providing and managing information linked to RFID data storage media in a network
CN103620628A (en) * 2011-05-31 2014-03-05 斯迈达Ip有限公司 Method and arrangement for providing and managing information linked to RFID data storage media in a network
WO2013050151A1 (en) * 2011-10-06 2013-04-11 Giesecke & Devrient Gmbh Transaction system
EP2780872A1 (en) * 2011-11-15 2014-09-24 Famoco Nfc device and connection system of nfc devices
EP2782034A4 (en) * 2012-05-10 2015-04-29 Tokyo Mechatronics Co Ltd Method and system for authentication and payment by using portable terminal
EP2782034A1 (en) * 2012-05-10 2014-09-24 Tokyo Mechatronics Co., Ltd Method and system for authentication and payment by using portable terminal
WO2013189523A1 (en) * 2012-06-19 2013-12-27 Markus Lobmaier Method for managing an electronic coupon
WO2013189522A1 (en) * 2012-06-19 2013-12-27 Kadona Gmbh Method for managing an electronic coupon
CN104838398A (en) * 2012-10-15 2015-08-12 驱动卡解决方案有限公司 System and method for secure remote access and remote payment using a mobile device and a powered display card
EP2907094A4 (en) * 2012-10-15 2016-05-25 Powered Card Solutions Llc System and method for secure remote access and remote payment using a mobile device and a powered display card
US11652916B1 (en) 2012-11-02 2023-05-16 W74 Technology, Llc Screen interface for a mobile device apparatus
US11343370B1 (en) 2012-11-02 2022-05-24 Majen Tech, LLC Screen interface for a mobile device apparatus
EP2733655A1 (en) * 2012-11-20 2014-05-21 Nagravision S.A. Electronic payment method and device for securely exchanging payment information
EP2733654A1 (en) * 2012-11-20 2014-05-21 Nagravision S.A. Electronic payment method, system and device for securely exchanging payment information
FR2999840A1 (en) * 2012-12-14 2014-06-20 Schneider Electric Ind Sas SYSTEM FOR EXCHANGING REMOTE DATA WITH AN NFC RADIO LABEL
US9736623B2 (en) 2012-12-14 2017-08-15 Schneider Electric Industries Sas System for exchanging data remotely with an NFC radio tag
WO2014091106A1 (en) * 2012-12-14 2014-06-19 Schneider Electric Industries Sas System for exchanging data remotely with an nfc radio tag
EP2747015A2 (en) * 2012-12-19 2014-06-25 Nxp B.V. Digital wallet device for virtual wallet
US10147086B2 (en) 2012-12-19 2018-12-04 Nxp B.V. Digital wallet device for virtual wallet
CN103886455A (en) * 2012-12-19 2014-06-25 Nxp股份有限公司 Digital wallet device for virtual wallet
US10750340B2 (en) 2012-12-27 2020-08-18 Intel Corporation Method and system of generating NFC-transaction remotely
EP2939348A4 (en) * 2012-12-27 2016-07-27 Intel Corp Method and system of generating nfc-transaction remotely
WO2014105162A1 (en) 2012-12-27 2014-07-03 Intel Corporation Method and system of generating nfc-transaction remotely
US11431834B1 (en) 2013-01-10 2022-08-30 Majen Tech, LLC Screen interface for a mobile device apparatus
US10057235B2 (en) 2013-03-14 2018-08-21 Ologn Technologies Ag Methods apparatuses and systems for providing user authentication
WO2014141158A1 (en) * 2013-03-14 2014-09-18 Ologn Technologies Ag Methods, apparatuses and systems for providing user authentication
US9699159B2 (en) 2013-03-14 2017-07-04 Ologn Technologies Ag Methods, apparatuses and systems for providing user authentication
US10560444B2 (en) 2013-03-14 2020-02-11 Ologn Technologies Ag Methods, apparatuses and systems for providing user authentication
US11978035B2 (en) 2013-03-15 2024-05-07 Apple Inc. Facilitating transactions with a user account using a wireless device
EP2787473A1 (en) * 2013-04-02 2014-10-08 Nxp B.V. Digital wallet bridge
US10102522B2 (en) 2013-04-02 2018-10-16 Nxp B.V. Digital wallet bridge
WO2014204369A1 (en) * 2013-06-20 2014-12-24 Telefonaktiebolaget L M Ericsson (Publ) Electronic device, grid of communication points and methods for providing assistance to an electronic device
CN104424696A (en) * 2013-09-02 2015-03-18 陈业军 Wearable mobile payment equipment and payment method
WO2015113841A1 (en) * 2014-01-30 2015-08-06 Gemalto Sa Method of managing a transaction between a secure element and a nfc terminal
EP2903302A1 (en) * 2014-01-30 2015-08-05 Gemalto SA Method of managing a transaction between a secure element and a NFC terminal
WO2015119834A1 (en) * 2014-02-04 2015-08-13 Microsoft Technology Licensing, Llc Multi-use card and system
US11461828B2 (en) 2014-03-31 2022-10-04 Monticello Enterprises LLC System and method for receiving data at a merchant device from a user device over a wireless link
US11669884B2 (en) 2014-03-31 2023-06-06 Monticello Enterprises LLC System and method for providing data to a merchant device from a user device over a wireless link
US10650443B2 (en) 2014-03-31 2020-05-12 Monticello Enterprises LLC System and method for providing data to a merchant device from a user device over a wireless link
US11468497B2 (en) 2014-03-31 2022-10-11 Monticello Enterprises LLC System and method for receiving data at a merchant device from a user device over a wireless link
US11989769B2 (en) 2014-03-31 2024-05-21 Monticello Enterprises LLC System and method for providing simplified in-store, product-based and rental payment processes
US11836784B2 (en) 2014-03-31 2023-12-05 Monticello Enterprises LLC System and method for providing a search entity-based payment process
US11282131B2 (en) 2014-03-31 2022-03-22 Monticello Enterprises LLC User device enabling access to payment information in response to user input
US11074640B2 (en) 2014-03-31 2021-07-27 Monticello Enterprises LLC System and method for providing a universal shopping cart across multiple search platforms
US10977716B2 (en) 2014-03-31 2021-04-13 Monticello Enterprises LLC System and method for providing multiple application programming interfaces for a browser to manage payments from a payment service
US10825079B2 (en) 2014-03-31 2020-11-03 Monticello Enterprises LLC System and method for providing data to a merchant device from a user device over a wireless link
US10769717B2 (en) 2014-03-31 2020-09-08 Monticello Enterprises LLC System and method for providing data to a merchant device from a user device over a wireless link
US20150348025A1 (en) * 2014-05-29 2015-12-03 Apple Inc. Apparatuses and Methods for Using a Primary User Device to Provision Credentials onto a Secondary User Device
US9299072B2 (en) 2014-05-29 2016-03-29 Apple Inc. Apparatuses and methods for operating a portable electronic device to conduct mobile payment transactions
CN106233313A (en) * 2014-05-29 2016-12-14 苹果公司 For using primary user device that authority provides the apparatus and method on auxiliary subscriber equipment
US9400977B2 (en) 2014-05-29 2016-07-26 Apple Inc. User device enabling access to payment information in response to mechanical input detection
US10489769B2 (en) 2014-05-29 2019-11-26 Apple Inc. User device enabling access to payment information in response to mechanical input detection
US10223682B2 (en) 2014-05-29 2019-03-05 Apple Inc. User device enabling access to payment information in response to mechanical input detection
US10699262B2 (en) 2014-05-29 2020-06-30 Apple Inc. User device enabling access to payment information in response to mechanical input detection
CN106233313B (en) * 2014-05-29 2020-07-10 苹果公司 Apparatus and method for provisioning credentials onto secondary user devices using primary user devices
US9864984B2 (en) 2014-05-29 2018-01-09 Apple Inc. Apparatuses and methods for operating a portable electronic device to conduct mobile payment transactions
WO2015183574A1 (en) * 2014-05-29 2015-12-03 Apple Inc. Apparatuses and methods for using a primary user device to provision credentials onto a secondary user device
US11922408B2 (en) 2014-05-29 2024-03-05 Apple Inc. Apparatuses and methods for using a primary user device to provision credentials onto a secondary user device
US10289996B2 (en) 2014-05-29 2019-05-14 Apple Inc. Apparatuses and methods for operating a portable electronic device to conduct mobile payment transactions
US10977642B2 (en) 2014-05-29 2021-04-13 Apple Inc. Apparatuses and methods for operating a portable electronic device to conduct mobile payment transactions
EP3149676A1 (en) * 2014-05-29 2017-04-05 Apple Inc. Apparatuses and methods for using a primary user device to provision credentials onto a secondary user device
US11017384B2 (en) 2014-05-29 2021-05-25 Apple Inc. Apparatuses and methods for using a primary user device to provision credentials onto a secondary user device
US11687745B2 (en) 2014-06-12 2023-06-27 Metrc Llc Method and apparatus for tracking one or more plants and/or plant based products and/or tracking the sale of products derived from the same, utilizing RFID technology
US10402607B2 (en) 2014-06-12 2019-09-03 Metrc Llc Method and apparatus for tracking one or more plants and/or plant based products and/or tracking the sale of products derived from the same, utilizing RFID technology
US11138396B2 (en) 2014-06-12 2021-10-05 Metrc Llc Method and apparatus for tracking one or more plants and/or plant based products and/or tracking the sale of products derived from the same, utilizing RFID technology
US9959438B2 (en) 2014-06-12 2018-05-01 Franwell, Inc. Method and apparatus for tracking one or more plants and/or plant based products and/or tracking the sale of products derived from the same, utilizing RFID technology
US10474854B2 (en) 2014-06-12 2019-11-12 Metrc Llc Method and apparatus for tracking one or more plants and/or plant based products and/or tracking the sale of products derived from the same, utilizing RFID technology
US10474855B2 (en) 2014-06-12 2019-11-12 Metrc Llc Method and apparatus for tracking one or more plants and/or plant based products and/or tracking the sale of products derived from the same, utilizing RFID technology
US12067447B2 (en) 2014-06-12 2024-08-20 Metrc, Llc Method and apparatus for tracking one or more plants and/or plant based products and/or tracking the sale of products derived from the same, utilizing RFID technology
WO2015192066A1 (en) * 2014-06-12 2015-12-17 Franwell, Inc. Method and apparatus for tracking one or more plants and/or plant based products and/or tracking the sale of products derived from the same, utilizing rfid technology
WO2015189678A1 (en) 2014-06-14 2015-12-17 Manfred Rietzler Method and arrangement for carrying out a digital payment process
DE102014008419A1 (en) 2014-06-14 2015-12-17 Manfred Rietzler Method and arrangement for executing a digital payment transaction
WO2016038758A1 (en) * 2014-09-09 2016-03-17 Sony Corporation Secure nfc forwarding from a mobile terminal through an electronic accessory
US10740746B2 (en) 2014-09-09 2020-08-11 Sony Corporation Secure NFC forwarding from a mobile terminal through an electronic accessory
EP3240352A4 (en) * 2014-12-26 2018-01-10 Nationz Technologies Inc. Wireless communication method and apparatus and application system and device thereof
EP3104320A1 (en) * 2015-06-12 2016-12-14 EM Microelectronic-Marin SA Method for programming bank data in an integrated circuit of a watch
US11308465B2 (en) 2015-06-12 2022-04-19 Em Microelectronic-Marin S.A. Method for programming banking data in an integrated circuit of a watch
TWI727953B (en) * 2015-06-12 2021-05-21 瑞士商艾姆微體電子 馬林公司 Method for programming banking data in an integrated circuit of a watch
US11657386B2 (en) * 2015-08-21 2023-05-23 Samsung Electronics Co., Ltd. Reference-based card enrollment for secondary devices
US20170053277A1 (en) * 2015-08-21 2017-02-23 Samsung Electronics Co., Ltd. Reference-based card enrollment for secondary devices
KR20160106013A (en) 2016-08-22 2016-09-09 천정서 Mobile relay system supporting multi-channel point-to-point communication, and the operating method thereof
US11900271B2 (en) 2017-12-15 2024-02-13 Paypal, Inc. Self learning data loading optimization for a rule engine
US11227220B2 (en) * 2017-12-15 2022-01-18 Paypal, Inc. Automatic discovery of data required by a rule engine
US11200500B2 (en) * 2017-12-15 2021-12-14 Paypal, Inc. Self learning data loading optimization for a rule engine
WO2022005762A1 (en) * 2020-06-29 2022-01-06 Capital One Services, Llc System and method for handling point of sale card rejections
WO2022164375A1 (en) * 2021-01-29 2022-08-04 Crunchfish Digital Cash Ab Transfer of digital cash between mobile communication device and smart card

Also Published As

Publication number Publication date
EP2201543A1 (en) 2010-06-30
US20130092741A1 (en) 2013-04-18
US20090143104A1 (en) 2009-06-04

Similar Documents

Publication Publication Date Title
US20090143104A1 (en) Wireless smart card and integrated personal area network, near field communication and contactless payment system
US9552579B2 (en) Near field communication activation and authorization
US10043175B2 (en) Enhanced near field communications attachment
US9280772B2 (en) Security token for mobile near field communication transactions
EP1856903B1 (en) Method and mobile terminal device including smartcard module and near field communications means
US9842356B2 (en) System, method, apparatus and computer program product for interfacing a multi-card radio frequency (RF) device with a mobile communications device
WO2008014279A2 (en) Mobile payment device with magnetic stripe
CA3050132C (en) Enhanced near field communications attachment
CN203366457U (en) A multifunctional financial terminal
CN104156741A (en) Method for controlling mobile terminal equipment comprising smart card module and near field communication device as well as mobile terminal equipment

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 08831911

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2008831911

Country of ref document: EP