WO2016101009A1 - Unlocking of a computer readable medium or of an electronic process using a computer readable medium - Google Patents
Unlocking of a computer readable medium or of an electronic process using a computer readable medium Download PDFInfo
- Publication number
- WO2016101009A1 WO2016101009A1 PCT/AU2015/000759 AU2015000759W WO2016101009A1 WO 2016101009 A1 WO2016101009 A1 WO 2016101009A1 AU 2015000759 W AU2015000759 W AU 2015000759W WO 2016101009 A1 WO2016101009 A1 WO 2016101009A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- cash
- computing device
- token
- factors
- readable medium
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/326—Payment applications installed on the mobile devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/327—Short range or proximity payments by means of M-devices
- G06Q20/3276—Short range or proximity payments by means of M-devices using a pictured code, e.g. barcode or QR-code, being read by the M-device
Definitions
- the present invention relates to unlocking a computer readable medium or an electronic process using a computer readable medium. More particularly, the invention relates to unlocking the computer readable medium or electronic process using one or more stored or acquired factors to confirm the computer readable medium or process is to be unlocked for a client device.
- the increase in total number of networked devices and in the type of devices that are being networked means that more and more processes are being carried out electronically and more electronic tokens are being used. Furthermore, this level of networking provides greater opportunities for dissemination of information including promotional or other offers relating to goods and services.
- the present invention is broadly directed to unlocking a computer readable medium or an electronic process using the computer readable medium.
- the invention relates to unlocking a computer readable medium or an electronic process using a computer readable medium using one or more stored or acquired factors to confirm the computer readable medium or process is to be unlocked.
- a preferred advantage of the present invention is that access can be controlled intelligently and fluidly.
- the present invention provides a method of unlocking a computer readable medium or an electronic process using a computer readable medium comprising: using one or more stored or acquired factors to unlock the computer readable medium or electronic process using the computer readable medium for a user computing device.
- the method further comprises:
- the method further comprises:
- the present invention provides a method of unlocking a computer readable medium or an electronic process using a computer readable medium comprising:
- the one or more stored or acquired factors may be entered on or captured by the user computing device or receiver computing device or may be obtained from the user computing device or receiver computing device by a software application running on the user computing device or receiver computing device.
- the one or more stored or acquired factors may comprise a location, a time, or a number.
- the one or more stored or acquired factors comprises an acquired factor it may be matched with a stored factor comprised in a database.
- the one or more stored or acquired factors comprise one or more user computing device acquired factors and one or more receiver computing device acquired factors.
- the one or more user computing device acquired factors and one or more receiver computing device acquired factors may comprise complementary user computing device and receiver computing device factors.
- Complementary user computing device and received computing device factors may comprise identical or similar values such as, identical or similar location or time.
- the unlocking may be temporally or numerically limited. That is, the unlocking may only occur for a selected time period or for only a limited number of events.
- the one or more computer readable medium may comprise a barcode such as, a QR code, the barcode may be captured using a camera comprised on the user computing device.
- the barcode may be captured from advertising displayed for example in print or television media.
- any request, token, confirmation, confirmation code or unique token identification may be encrypted.
- the encryption may comprise Public IUKeys or Public OUKeys. Any received encoded request, token or confirmation may be decrypted using Private IUKeys or Private OUKeys.
- the sending and receiving may be performed through an application stored on the mobile computing device or through a mobile communications system such as, SMS (short messaging service), Bluetooth or NFC (Near Field Communication).
- SMS short messaging service
- Bluetooth Wireless Fidelity
- NFC Near Field Communication
- the method of any above aspect may further include a step of sending a confirmation message.
- the confirmation message may be sent by SMS, Bluetooth or NFC.
- the computer readable medium or an electronic process using a computer readable medium may be for authorising a service.
- the service may for example comprise: a governmental service; a professional service; a trade service; a healthcare service; or a childcare and/or education service.
- the one or more stored or acquired factors may comprise a device unique ID (DU- ID).
- the (DU-ID) may comprise one or more of a manufacturer serial number (MSN); an international mobile subscriber identity (1MSI) and a integrated circuit card identifier (ICCID).
- MSN manufacturer serial number
- MSI international mobile subscriber identity
- ICCID integrated circuit card identifier
- the (DU-ID) may be encrypted with the Public IUKey.
- a software application comprised on the user computing device may comprise a user account and a Issuer Unique Public/Private Keys.
- the user account may comprise one or more acquired user computing device factors and a Owner Unique ID and a computer readable medium storage.
- the computer readable medium storage may comprise one or more computer readable medium comprising respective one or more Alias-URL and computer readable medium UID.
- the computer readable medium Image may point to a shortened URL that has an ID.
- the shortened URL may itself point to a (True-QR-UID) or a (False-QR-UID) depending on the computer readable medium locking status.
- the matching may comprise matching with one or more stored or acquired factors comprised on one or more databases.
- the one or more databases may comprise an Info- Action section; an Info-Action Request section; and a computer readable medium section.
- the Info-Action section may comprise an Info -Action-URL; A computer readable medium-UID; an Owner Unique ID (OU-ID); a Issuer Unique ID (IU-ID); and a Device Unique ID (DU-ID).
- the Info-Action Request section may comprise computer readable medium-UID and one or more user computing device Factors.
- the QR Image section may comprises an Alias-URL and a (QR-UID).
- the database may also comprise a computer readable medium Domain comprising Issuer Unique Public/Private Keys.
- a server computer may decrypt a received Owner (DU-ID) using Private IUKey.
- the user computing device may be registered by sending Owner Name and Owner Mobile Number, (DU-ID) encrypted with Public IUKey. Upon registration, the user computing device may receive a Registration Confirmation Code.
- DU-ID Owner Name and Owner Mobile Number
- the server computer may generate one or more Unique Public/Private Keys for the user computing device Owner Public OUKeys / Private OUKeys.
- the Unique Public/Private Keys for the user computing device Owner Public OUKeys / Private OUKeys may be stores in a database.
- the user computing device may receive a Registration-Confirmation-Code by SMS which is sent to the server computer to activate the account.
- the server computer may validate and activate the account in response to the received Registration-Confirmation- Codes and respond by sending a secured URL to download the Public and Private OUKeys to the user computing device.
- the user computing device may then download the Public and Private OUKeys and send an Activate-Account command to the server computer.
- the server computer receives the Activate-Account command the Public and Private OUKeys may be deleted.
- the Registration-Confirmation-Code may be received by SMS.
- An issuer of the locked computer readable medium may maintain a consumer account on the server computer.
- the server computer may send notification to a consumer computing device comprising account credentials.
- the consumer computing device may generate a Device Unique ID Consumer (DU-ID) using a software application and stores it encrypted using Public IUKey.
- the encrypted (DU-ID) stored on consumer computing device may be sent to the sever computer.
- the server computer may send a Registration- Confirmation-Code to the consumer computing device.
- the server computer may decrypt the Consumer (DU-ID) using Private IUKey and check if it is not associated with Consumer-Mobile-Number then create a temporary device entry in the database and store in it the decrypted database.
- the platform may send a Registration-Confirmation-Code to a Consumer-Mobile-Number which is directed to the consumer computing device.
- the consumer computing device may enter the Registration-Confirmation-Code in the software application and send an Account-Activation-Request to the server computer.
- the sever computer may validate the activation request and sending a secured URL to download the Public and Private OUKeys to the consumer computing device.
- the consumer computer device may download the Public and Private OUKey and then activate the consumer user account.
- An owner computing device may encrypt an Info-Action and Owner (DU-ID) using Public IUKey and send a QR-Generation-Request to the server.
- the server computer may decrypt Info-Action and Owner (DU-ID) and generate (QR-UID), associate Info-Action and Owner (DU-ID) with (QR-UID) and store them in the database.
- the server computer may associate the Info-Action-URL with the Info-Action, and associate the Alias-URL with (QR-UID) and decodes the Alias-URL which comprises the (QR-UID) as a QR- Image, and store the QR-Image in the database.
- the server computer may send the QR- Image-URL and (QR-UID) encrypted using Public OUKey to the owner computing device.
- the owner computing device may receive and decrypt the QR-Image-URL and (QR-UID) using Private OUKey and fetch the QR-Image from the server computer.
- the fetched QR- image may be displayed on a screen of the owner computer device.
- the owner computing device may encrypt the (QR-UID) and Owner (DU-ID) using Public IUKey and send a QR-Lock-Request to the server computer.
- the server computer may receive the QR-Lock-Request, decrypt the (QR-UID) and Owner (DU-ID) and fetch from the database the Owner (DU-ID) associated with (QR-UID), if matched with the received Owner (DU-ID), the Alias-URL is updated to point to False-(QR-UID).
- the server computer responds to owner computing device by sending QR-Lock- Confirmation.
- the owner computing device receives QR-Lock-Confirmation from the server computer and displays the QR-Lock-Icon.
- the owner computing device may encrypt the (QR-UID) and the Owner (DU-ID) using Public lUKey and send a QR-Unlock-Request to the server computer.
- the server computer may decrypt the (QR-UID) and Owner (DU-ID), fetch from the database the Owner (DU-ID) associated with (QR-UID) and if matched with the received Owner (DU- ID), the Alias-URL may be updated to point to (True-QR-UID).
- the server computer may respond to owner computing device by sending QR-Unlock-Confirmation.
- the consumer computer device may scan the QR-Image using the computer software and the consumer computing device may display Info-Action if the Alias-URL points to the (True-QR-UID).
- the consumer computing device may select action from the Info-Action and the software application may encrypt the (QR-UID) and Consumer (DU-ID) using Public IU ey and submit an Info-Action-Request to the server computer.
- the server computer may decrypt the (QR-UID) and Consumer (DU-ID), and if Consumer computing device is authorised to perform the Info-Action, the Info-Action is performed.
- the present invention provides a method for transferring an electronic cash token comprising:
- a cash-to request comprising the electronic cash token or a unique token identification associated with the electronic cash token, one or more user computing device factors, a Device Unique Identifier (DU-ID) associated with a current owner of the electronic cash token and a recipient mobile telephone number;
- DU-ID Device Unique Identifier
- one or more of the recipient mobile number, one or more user computing device factors and one or more receiver device factors may be received at a different time to the cash-to request.
- the method may further comprise recoding a computer readable medium associated with the electronic cash token.
- the computer readable medium may be associated with the current owner and/or the recipient.
- the invention provides a method of authorising cash dispensing comprising:
- a cash-out request comprising a cash token or a unique token identification associated with the electronic cash token and one or more receiver device factors from a cash dispenser
- the method of the fourth aspect may further comprise a step of the cash dispenser obtaining the cash token or the unique token identification from the cash token owner.
- the obtaining may comprise scanning for example, an electronic barcode such as QR-Image displayed on the owner's personal computing device.
- the method of the fourth aspect may further comprise sending an electronic cash- out token to the dispenser.
- the receiving from the cash dispenser a cash-out confirmation further comprises receiving a cash-out token.
- the method for transferring an electronic cash token or authorising a cash dispensing may be for payment or part payment for goods or a service.
- the service may comprise: a governmental service; a professional service; a trade service; a healthcare service; or a childcare and/or education service.
- the service may be for vehicle licensing and/or renewal.
- Figure 1A and IB shows a graphical representation of one embodiment of a personal mobile computing device suitable for use with the invention.
- Figure 2A and Figure 2B shows the structure of a personal mobile computing device and a server computer accordin g to one embodiment of the invention.
- Figure 3A, 3B and 3C shows various embodiments of a system according to the invention.
- Figure 4 shows a flowchart illustrating the method according to one embodiment of the invention.
- the present invention relates to unlocking a computer readable medium or an electronic process using the computer readable medium.
- the invention relates to unlocking a computer readable medium or an electronic process using a computer readable medium using one or more stored or acquired factors to confirm the computer readable medium or process is to be unlocked.
- the present invention is partly predicated on the present inventor's diligent study which has resulted in discovery that application of a factor such as, location or time, can be used to validate a user.
- access can be controlled intelligently and fluidly. That is, a lock manager can readily inspect any factor to confirm or override any unlocking and can amend any limitations placed on the unlocking. For example, unlocking may be for a limited time period and/or for a limited location range.
- FIG. 1A and IB One embodiment of a personal mobile computing device 200 suitable for use in the present invention is shown in Figs. 1A and IB.
- personal mobile computing device 200 comprises a computer module 201 comprising input devices such as a keyboard 202, a mouse pointer device 203, a scanner 226, a camera 281, an external hard drive 227, a touchscreen video display 214 and a microphone 280; and output devices including a printer 215, the touchscreen video display device 214 and loudspeakers 217.
- video display 214 may comprise a touchscreen.
- a Modulator-Demodulator (Modem) transceiver device 216 may be used by the computer module 201 for communicating to and from a communications network 220 via a connection 221.
- the network 220 may be a wide-area network (WAN), such as the Internet, a cellular telecommunications network, or a private WAN.
- WAN wide-area network
- computer module 201 may be connected to; and may have system interaction 293 with; other similar personal mobile computing devices 290 or server computers 291 and may have user interaction 294 with user 295.
- the connection 221 is a telephone line
- the modem 216 may be a traditional "dial-up" modem.
- the modem 216 may be a broadband modem.
- a wireless modem may also be used for wireless connection to network 220.
- the computer module 201 typically includes at least one processor 205, and a memory 206 for example formed from semiconductor random access memory (RAM) and semiconductor read only memory (ROM).
- the module 201 also includes a number of input/output (I/O) interfaces including: an audio-video interface 207 that couples to the touchscreen video display 214, loudspeakers 217 and microphone 280; an I/O interface 213 for the keyboard 202, mouse 203, scanner 226 and external hard drive 227; and an interface 208 for the external modem 216 and printer 215.
- modem 216 may be incorporated within the computer module 201 , for example within the interface 208.
- the computer module 201 also has a local network interface 21 1 which, via a connection 223, permits coupling of the personal mobile computing device 200 to a local computer network 222, known as a Local Area Network (LAN).
- LAN Local Area Network
- the local network 222 may also couple to the wide network 220 via a connection 224, which would typically include a so-called "firewall” device or device of similar functionality.
- the interface 21 1 may be formed by an Ethernet circuit card, a Bluetooth wireless arrangement or an IEEE 802.1 1 wireless arrangement, a Near Field Communication, NFC, arrangement or other suitable interface.
- the I/O interfaces 208 and 213 may afford either or both of serial and parallel connectivity, the former typically being implemented according to the Universal Serial Bus (USB) standards and having corresponding USB connectors (not illustrated).
- USB Universal Serial Bus
- Storage devices 209 are provided and typically include a hard disk drive (HDD) 210.
- HDD hard disk drive
- Other storage devices such as, an external HD 227, a disk drive (not shown) and a magnetic tape drive (not shown) may also be used.
- An optical disk drive 212 is typically provided to act as a non-volatile source of data.
- Portable memory devices such as optical disks (e.g.: CD-ROM, DVD, Blu-Ray Disc), USB-RAM, external hard drives and floppy disks for example, may be used as appropriate sources of data to the personal mobile computing device 200.
- Another source of data to personal mobile computing device 200 is provided by the at least one server computer 291 through network 220.
- the components 205 to 213 of the computer module 201 typically communicate vi a an interconnected bus 204 in a manner which results in a conventional mode of operation of personal mobile computing device 200.
- processor 205 is coupled to system bus 204 through connections 218.
- memory 206 and optical disk drive 212 are coupled to the system bus 204 by connections 219.
- Examples of a personal mobile computing device 200 on which the described arrangements can be practiced include smart phones; tablet computers, gaming consoles, media players, TVs, wearable devices such as watches and glasses or a like device comprising a computer module like computer module 201. It is to be understood that when personal mobile computing device 200 comprises a smart phone or a tablet computer some illustrated input and output devices may not be included such as, mouse pointer device 201 ; keyboard 202; scanner 226; and printer 215.
- Fig. I B is a detailed schematic block diagram of processor 205 and a memory 234.
- the memory 234 represents a logical aggregation of all the memory modules, including the storage device 209 and semiconductor memory 206, which can be accessed by the computer module 201 in Fig. 1A.
- the methods of the invention may be implemented using personal mobile computing device 200 wherein the methods may be implemented as one or more software application programs 233 executable within computer module 201.
- the steps of the methods of the invention may be effected by instructions 231 in the software carried out within the computer module 201
- the software instructions 231 may be formed as one or more code modules, each for performing one or more particular tasks.
- the software 233 may also be divided into two separate parts, in which a first part and the corresponding code modules performs the method of the invention and a second part and the corresponding code modules manage a graphical user interface between the first part and the user.
- the software 233 may be stored in a computer readable medium, including in a storage device of a type described herein.
- the software is loaded into the personal mobile computing device 200 from the computer readable medium or through network 221 or 223, and then executed by personal mobile computing device 200.
- the software 233 is stored on storage medium 225 that is read by optical disk drive 212.
- Software 233 is typically stored in the HDD 210 or the memory 206.
- a computer readable medium having such software 233 or computer program recorded on it is a computer program product.
- the use of the computer program product in the personal mobile computing device 200 preferably effects a device or apparatus for implementing the methods of the invention.
- the software application programs 233 may be supplied to the user encoded on one or more disk storage medium 225 such as a CD-ROM, DVD or Blu- Ray disc, and read via the corresponding drive 212, or alternatively may be read by the user from the networks 220 or 222. Still further, the software can also be loaded into the personal mobile computing device 200 from other computer readable media.
- Computer readable storage media refers to any non-transitory tangible storage medium that provides recorded instructions and/or data to the computer module 201 or personal mobile computing device 200 for execution and/or processing.
- Examples of such storage media include floppy disks, magnetic tape, CD-ROM, DVD, Blu-ray Disc, a hard disk drive, a ROM or integrated circuit, USB memory, a magneto -optical disk, or a computer readable card such as a PCMCIA card and the like, whether or not such devices are internal or external of the computer module 201.
- Examples of transitory or non-tangible computer readable transmission media that may also participate in the provision of software application programs 233, instructions 231 and/or data to the computer module 201 include radio or infra-red transmission channels as well as a network connection 221, 223, 334, to another computer or networked device 290, 291 and the Internet or an Intranet including email transmissions and information recorded on Websites and the like.
- GUIs graphical user interfaces
- a user of personal mobile computing device 200 and the methods of the invention may manipulate the interface in a functionally adaptable manner to provide controlling commands and/or input to the applications associated with the GUI(s).
- Other forms of functionally adaptable user interfaces may also be implemented, such as an audio interface utilizing speech prompts output via loudspeakers 217 and user voice commands input via microphone 280.
- the manipulations including screen touches, speech prompts, device movement gestures and/or user voice commands may be transmitted via network 220 or 222.
- a power-on self-test (POST) program 250 may execute.
- the POST program 250 is typically stored in a ROM 249 of the semiconductor memory 206.
- a hardware device such as the ROM 249 is sometimes referred to as firmware.
- the POST program 250 examines hardware within the computer module 201 to ensure proper functioning, and typically checks processor 205, memory 234 (209, 206), and a basic input-output systems software (BIOS) module 251 , also typically stored in ROM 249, for correct operation. Once the POST program 250 has run successfully, BIOS 251 activates hard disk drive 210.
- BIOS basic input-output systems software
- Hard disk drive 210 Activation of hard disk drive 210 causes a bootstrap loader program 252 that is resident on hard disk drive 210 to execute via processor 205. This loads an operating system 253 into RAM memory 206 upon which operating system 253 commences operation.
- Operating system 253 is a system level application, executable by processor 205, to fulfill various high level functions, including processor management, memory management, device management, storage management, software application interface, and generic user interface.
- Operating system 253 manages memory 234 (209, 206) in order to ensure that each process or application running on computer module 201 has sufficient memory in which to execute without colliding with memory allocated to another process. Furthermore, the different types of memory available in the personal mobile computing device 200 must be used properly so that each process can run effectively. Accordingly, the aggregated memory 234 is not intended to illustrate how particular segments of memory are allocated, but rather to provide a general view of the memory accessible by computer module 201 and how such is used.
- Processor 205 includes a number of functional modules including a control unit 239, an arithmetic logic unit (ALU) 240, and a local or internal memory 248, sometimes called a cache memory.
- the cache memory 248 typically includes a number of storage registers 244, 245, 246 in a register section storing data 247.
- One or more internal busses 241 functionally interconnect these functional modules.
- the processor 205 typically also has one or more interfaces 242 for communicating with external devices via the system bus 204, using a connection 218.
- the memory 234 is connected to the bus 204 by connection 219.
- Application program 233 includes a sequence of instructions 231 that may include conditional branch and loop instructions.
- Program 233 may also include data 232 which is used in execution of the program 233.
- the instructions 231 and the data 232 are stored in memory locations 228, 229, 230 and 235, 236, 237, respectively.
- a particular instruction may be stored in a single memory location as depicted by the instruction shown in the memory location 230.
- an instruction may be segmented into a number of parts each of which is stored in a separate memory location, as depicted by the instruction segments shown in the memory locations 228 and 229.
- processor 205 is given a set of instructions 243 which are executed therein. The processor 205 then waits for a subsequent input, to which processor 205 reacts by executing another set of instructions.
- Each input may be provided from one or more of a number of sources, including data generated by one or more of the input devices 202, 203, or 214 when comprising a touchscreen, data received from an external source across one of the networks 220, 222, data retrieved from one of the storage devices 206, 209 or data retrieved from a storage medium 225 inserted into the corresponding reader 212.
- the execution of a set of the instructions may in some cases result in output of data. Execution may also involve storing data or variables to the memory 234.
- the disclosed arrangements use input variables 254 that are stored in the memory 234 in corresponding memory locations 255, 256, 257, 258.
- the described arrangements produce output variables 261 that are stored in the memory 234 in corresponding memory locations 262, 263, 264, 265.
- Intermediate variables 268 may be stored in memory locations 259, 260, 266 and 267.
- the register section 244, 245, 246, the arithmetic logic unit (ALU) 240, and the control unit 239 of the processor 205 work together to perform sequences of micro- operations needed to perform "fetch, decode, and execute" cycles for every instruction in the instruction set making up the program 233.
- Each fetch, decode, and execute cycle comprises:
- control unit 239 determines which instruction has been fetched
- a further fetch, decode, and execute cycle for the next instruction may be executed.
- a store cycle may be performed by which the control unit 239 stores or writes a value to a memory location 232.
- Each step or sub-process in the methods of the invention may be associated with one or more segments of the program 233, and may be performed by register section 244- 246, the ALU 240, and the control unit 239 in the processor 205 working together to perform the fetch, decode, and execute cycles for every instruction in the instruction set for the noted segments of program 233.
- One or more other personal mobile computer device 290 may be connected to the communications network 220 as seen in Fig. lA. Each such personal mobile computer device 290 may have a similar configuration to personal mobile computer device 200 comprising a computer module 201 and corresponding peripherals.
- One or more other server computer 291 may be connected to the communications network 220. These server computers 291 respond to requests from personal mobile computing device 200, 290 or other server computers to provide information. Each server computer 291 may comprise or be associated with one or more database 292.
- the methods of the invention may alternatively be implemented in dedicated hardware such as one or more integrated circuits performing the functions or sub functions of the described methods.
- dedicated hardware may include graphic processors, digital signal processors, or one or more microprocessors and associated memories.
- FIGs. 2A and 2B show the structure of personal mobile computing device 290 and server computer 291 , respectively, according to one embodiment of the invention.
- personal mobile computing device 290 comprises a software application 233 and a device unique identifier (DU-1D) 269 that may be used by software application 233 and the methods of the invention.
- the (DU-ID) 269 identifies personal mobile computing device 200 and may comprise a manufacturer serial number (MSN) and/or an international mobile subscriber identity (IMSI).
- MSN manufacturer serial number
- IMSI international mobile subscriber identity
- remote computing device 200 is a smartphone or tablet comprising a subscriber identification module (SIM)
- SIM subscriber identification module
- the unique identification number may comprise the international mobile subscriber identity (IMSI) or the integrated circuit card identifier (ICCID).
- Software application 233 comprises user account 1 10 and Issuer Unique ID (IU-ID) 1 12.
- the user account 1 10 comprises one or more acquired user computing device factors 104 and a Owner Unique ID (OU-ID) 106 and a QR Box 108.
- QR Box 108 comprises one or more QR image 130 comprising respective one or more Alias-URL 131 and (QR-UID) 132.
- the (QR-Image) may point to a shortened URL that has an ID.
- the shortened URL may itself point to a (True-QR-UID) 133 or a (False-QR-UID) 134 depending on the QR locking status.
- the Info-Action section 120 comprises an Info-Action-URL 121 ; A (QR-UID) 132; a Owner Unique ID (OU-ID) 106; a Issuer Unique ID (IU-ID) 1 12; and a Device Unique ID (DU- ID) 269.
- the Info-Action Request section 122 comprises (QR-UID) 132 and one or more User computing device Factors 100.
- the QR Image 130 section comprises an Alias-URL 131 and a (QR-UID) 132.
- Fig. 3A shows a graphical representation of one embodiment of system 10 of the invention.
- a user 295 operates a camera 281 comprised on their mobile computing device 290 to photograph a QR image 130 comprised on a gift voucher 131.
- QR image 130 may be displayed in a television or printed advertisement.
- the user 295 wishes to exchange the electronic copy of the (QR-UID) 132 captured on device 290 for a discount on a purchase at store 300.
- Both store computer 291 and user mobile computing device 290 are connected to computer network 220 and thereby may have one or more system interactions 293 (not shown in FIG. 3A) with the lock manager computer 296.
- lock manager computer 296 may unlock the electronic copy of the QR image 130 captured. The unlocking may only be performed if the one or more factors are validated. For example, the lock manager computer 296 may only allow the QR image 130 to be unlocked and the discount to be obtained within a defined geographical location or for limited time offer.
- the transmitted factor 100a, 100b, 100s may comprises the time or location; which may be obtained using GPS (Global Positioning System); of device 290 or 291 or both.
- GPS Global Positioning System
- Fig. 3B shows a graphical representation of another embodiment of system 10 of the invention.
- Fig. 3B shows an example of the exchange of an electronic cash token 140.
- the electronic cash token 140 may be as explained in the Australian provisional patent application filed by IN4MA PTY LTD on 31 October 2014 assigned Patent Number 2014904388 or PCT patent application PCT/AU2015/000618. For further information on the electronic cash tokens and methods using the tokens see that application.
- a user wishes to exchange unreadable public electronic cash token 140, comprising a QR image 130 stored on mobile computing device 290 for the associated cash amount and displays the QR image 130 associated with token 140 to cash dispenser 400 along with a request that the token 140 be unlocked.
- the cash dispenser 400 obtains a copy of the token 140 by photographing or scanning and transmits the associated (QR-UID) 132 to lock manager computer 296.
- lock manager computer 296 may unlock the token 140 only if one or more factors 100 (100a, 100b, 100s) are validated.
- the one or more factors 100 may comprise one or more receiver device factors 100b.
- the one or more receiver device factors 100b may be stored on or provided by the mobile computing device 290 operated by the receiver of the cash token 140.
- Fig. 3C shows an example in which services are authorised for payment according to another embodiment of a system 10 according to the invention.
- childcare services are authorised for payment using QR image 130 and one or more factors 100.
- a parent 295 operating mobile computing device 290 uses a QR image 130 to pay or partly pay for childcare services.
- the QR image 130 may have been provided to the parent 295 by a public service department, government agency or other provider of such benefits.
- the provider of the childcare services uses camera 281 to obtain a copy of the QR image 130 from parent 295 of they QR image they received and sends the copy to lock manager computer 296.
- the received copy of QR image 130 along with one or more of user computing device factor 100a; receiver device factors 100b and stored factor 100s may be reviewed by the lock manager computer 296 for a match before the payment or part-payment is authorised or actioned.
- the one or more factors 100 may comprise a location, a time, or a number.
- the one or more factors 100 may be a stored or acquired factor.
- the one or more factors 100a When the one or more factors 100a are received from the user computing device 290, it may be matched with one or more stored factors 100s and or one or more receiver device factors 100b.
- the one or more stored factors 100s may comprise a geographical location, a Device Unique ID (DU-ID) 269 identifying a personal mobile computing device.
- DU-ID Device Unique ID
- the one or more factors 100 may be entered on or captured by the user computing device 290 or receiver device 290, 291 or may be obtained from the user computing device 200, 290 or recipient by a process running on the user computing device 290, 291 or receiver device 290, 291.
- the one or more factors comprise an acquired factor 100a, 100b it may be matched with a stored factor 100s comprised in a database.
- the one or more factors 100 comprise one or more user computing device acquired factors 100a and one or more receiver device acquired factors 100b.
- the one or more user computing device acquired factors 100a and one or more receiver device acquired factors 100b may comprise complementary user computing device and receiver device factors 105 (not shown).
- Complementary user computing device and exchange device factors 105 may comprise identical or similar values such as, identical or similar location.
- the unlocking may be temporally or numerically limited. That is, the unlocking may only occur for a selected time period or for only a limited number of events. In this way, an administrator may ensure only a set number of offers are redeemed or that the offer remains open for only a limited period of time or for within only a limited geographical area.
- the one or more computer readable medium that may be unlocked using the invention may comprise a barcode such as, a QR image 130, the barcode may be captured using a camera 281 comprised on the user computing device 290.
- the barcode may be captured from advertising displayed 131 for example in print or television media.
- Issuer Registration Use Case The Issuer registers their domain on the platform comprised, for example, on server computer 291 and database 292.
- the platform, method and systems of the invention may be referred to as the IN4Scan Platform, IN4Scan Method and IN4Scan System.
- the platform then creates the Domain and generates Unique Public/Private Keys for the Issuer (Public IUKey / Private IUKey), which is stored in database 292.
- the Developer then embeds (Public IUKey) in (Owner App) 233 and compiles a distribution copy of the owner smart application 233.
- the Developer then also embeds (Public IUKey) in (Private App) 233 and compiles a distribution copy of the consumer smart application 233.
- the Owner 295 Installs the application 233 on their device, e.g. device 200, 290, and initiates the application 233 for the first time.
- the Owner App 233 generates Device Unique ID Owner (DU-ID) 269, stores it locally on the device 200, 290, e.g. in storage device 209, encrypts it using (Public IUKey) and sends it to the platform for device registration.
- the platform decrypts the Owner (DU-ID) 269 using (Private IUKey) and checks if it is not associated with a mobile number then creates a temporary device entry in database 292 and stores in it the Owner (DU-ID) 269.
- the Owner 295 submits a new user registration form with (Owner Name) and (Owner Mobile Number) specified, encrypts the Owner (DU-ID) 269 using (Public IUKey) and includes it in their submission to server computer 291 , then waits for (Registration-Confirmation-Code).
- the Platform decrypts the Owner (DU-ID) 269 using (Private IUKey) and checks if it exists in the temporary device list database 292 then completes device registration and associates Owner (DU-ID) 269 with (Owner Mobile Number).
- the Platform generates a Unique Public/Private Keys for the Owner (Public OUKey / Private OUKey), stores the (Public OUKey) in database 292, keeps the (Private OUKey) in Database 292 which comprises a Trust-base and sends (Registration-Confirmation-Code) to (Owner Mobile Number), for example mobile computer Device 200, 290.
- the Trust- base is a highly restricted access database that temporarily stores the Owner's generated Private keys (OU-ID) till they are downloaded by their associated devices 200, 290 and then deleted from the Trust-base.
- the Owner 295 receives (Registration-Confirmation-Code) by SMS, enters it in the application 233 and sends to the platform (Account-Activation-Request).
- the Platform 291 validates (Account-Activation-Request) and responds by sending a secured URL to download the (Private OUKey) to the device 200, 290.
- the Owner App 233 downloads the (Private OUKey) and stores it in the device 200, 290 and then sends (Activate- Account) command to the platform 291.
- Device & Consumer Registration Use Case The Issuer maintains consumer accounts and activation on the platform.
- the platform sends notification to the consumer 295 with account credentials 108.
- the Consumer 295 installs application 233 on their device 290, and initiates the application 233 for the first time.
- the Private App 233 generates a Device Unique ID Consumer (DU-ID) 269, stores it locally on the device 290, encrypts it using (Public IUKey) and sends it to the platform and waits for (Registration- Confirmation-Code).
- DU-ID Device Unique ID Consumer
- the platform decrypts the Consumer (DU-ID) 269 using (Private IUKey) and checks if it is not associated with (Consumer-Mobile-Number) then creates a temporary device entry in the database 292 and stores in it the decrypted database.
- the platform sends (Registration-Confirmation-Code) to (Consumer-Mobile-Number) which is directed to device 290.
- the consumer 295 receives a (Registration-Confirmation-Code) by, for example, SMS, enters it in the application 233 and sends an (Account-Activation- Request).
- the platform validates the activation request and responds by sending a secured URL to download the (Private IUKey) to the device 290.
- the Private App 233 downloads the (Private IUKey) and stores it in the device 290 and then activates the user account.
- QR Code Generation Use Case The Owner 295 provides (Info-Action) 120 to be decoded as (QR-Image) 130 and presses (Generate-QR-Button).
- the Owner App 233 encrypts the (Info-Action) 120 and Owner (DU-ID) 269 using (Public IUKey) and submits the (QR-Generation-Request) to the platform and waits for the platform response.
- the platform receives (QR-Generation-Request), decrypts (Info-Action) 120 and Owner (DU- ID) 269, generates (QR-UID) 132, associates (Info-Action) 120 and Owner (DU-ID) 269 with (QR-UID) 132 and stores them in database 292.
- the platform associates (Info- Action- URL) 121 with the (Info-Action) 120, associates (Alias-URL) 131 with (QR-UID) 132, decodes (Alias-URL) 131 which includes (QR-UID) 132 as (QR-Image) 130, and stores it in the platform.
- the platform responds to owner 295 request by sending the (QR-Image- URL) and (QR-UID) 132 both encrypted using (Public OUKey).
- the Owner App 233 receives and decrypts (QR-Image-URL) 131 and (QR-UID) 132 using (Private OUKey) and fetches the (QR-Image) 130 from platform and displays it on screen 214 of device 290.
- QR Code Locking Use Case The Owner 295 views (QR-Image) 130, presses on (Lock-Button).
- the Owner App 233 encrypts the (QR-UID) 132 and Owner (DU-ID) 269 using (Public IUKey) and submits the (QR-Lock-Request) to the platform and waits for the platform response.
- the platform receives (QR-Lock-Request), decrypts (QR-UID) 132 and Owner (DU-ID) 269, fetches from the database 292 the Owner (DU- ID) 269 associated with (QR-UID) 132; if matched with the received Owner (DU-ID) 269 the (Alias-URL) 131 is updated to point to (False-QR-UID) 134.
- the platform responds to (Owner-App) 233 by sending (QR-Lock-Confirmation).
- the Owner App 233 receives (QR-Lock-Confirmation) from the platform 291 and displays the (QR-Lock- Icon) on the screen 214.
- QR Code Unlocking Use Case The owner 295 views (QR-Image) 130 on device 200 or 290, presses on (Unlock-Button).
- the Owner App 233 encrypts the (QR- UID) 132 and Owner (DU-ID) 269 using (Public IUKey) and submits the (QR-Unlock- Request) to the platform and waits for the platform response.
- the platform receives (QR- Unlock-Request), decrypts (QR-UID) 132 and Owner (DU-ID) 269, fetches from the database 292 the Owner (DU-ID) 269 associated with (QR-UID) 132; if matched with the received Owner (DU-ID) 269 updates the (Alias-URL) 131 to point to (True-QR-UID) 133.
- the platform responds to (Owner-App) 233 by sending (QR-Unlock-Confirmation).
- the owner App 233 receives (QR-Unlock-Confirmation) from the platform and displays the (QR- Unlock- Icon) on the screen 214.
- QR-scan Public-App
- the public app 233 displays (Info-Action) 120 if (Alias-URL) 131 is pointing to (True-QR-UID) 133, otherwise if (Alias-URL) 131 is pointing to (False-QR-UID) 134 it will display (System-Lock -Message).
- [001 12] Private QR Code Scanning Use Case The consumer 295 scans (QR-Image) 130 using QR-scan (Private-App) 233.
- the Private App 233 displays (Info-Action) 120 if (Alias-URL) 131 is pointing to (True-QR-UID) 133, otherwise if (Alias-URL) 131 is pointing to (False-QR-UID) 134 it will display (System-Lock -Message).
- the consumer 295 selects action from the (Info- Action) 120 and presses (Submit-Button).
- the Private App 233 encrypts the (QR-UID) 132 and Consumer (DU-ID) 269 using (Public IUKey) and submits the (Info-Action-Request) 122 to the platform and waits for the platform response.
- the platform receives (Info-Action-Request) 122, decrypts (QR-UID) 132 and Consumer (DU-ID) 269, if Consumer 295 is authorised to perform the (Info-Action) 120, the (Info-Action) 120 is performed.
- the platform responds to (Private-App) 233 by sending (Action-Result-Message).
- the Private App 233 receives (Action-Result-Message) from the platform and displays it on the screen 214.
- a user computing device such as mobile computing device 290, comprises a (DU-ID) 269 and is loaded with a (IU-ID) as described herein.
- the Owner 295 has their own (OU-1D) 106 Key comprised on, for example, device 290.
- the Info-Action 120 comprises a URL 121 and generates a (QR UID) 132.
- the (QR-UID) 132 comprises a generateAliasURL. As described above, if the Alias-URL 131 is pointing to a (True-QR-UID) 133, the (Info-Action) 121 is displayed, otherwise a Lock Message is displayed.
- the invention defined herein is applicable to unlocking electronic cash tokens.
- the invention provides a method for transferring an electronic cash token 140.
- the method may be a secure method involving selective and secure unlocking of the token 100.
- the personal mobile computer device 290 encrypts (Cash-Token-ID), one or more user computing device factors 100 and the sender Owner (DU-ID) 269 using (Public IUKey) and includes them to request 293 a (Cash-To-Token-ID) from the server computer 291 .
- the server computer 291 encrypts (Cash-Token-ID) 102, the one or more user computing device factors 100 and the sender (Owner UDID) 269 using (Private UIKey), generates (Cash-To-Token-ID), associates it with (Cash-Token-ID) 102 and the sender Owner (DU-ID) 269, stores it in Database 292, encrypts (Cash-To-Token-ID) using (Public OUKey) and sends 293 it as a response to the Owner software application program 233 on personal mobile computer device 290.
- the personal mobile computer device 290 decrypts the (Cash-To-Token-ID) using (Private OUKey) and displays the (Cash-To-Form) on touchscreen 214.
- the Owner 295 then specifies 293 the (Receiver-Mobile-Number) and presses 293 the (Send-Button).
- the personal mobile computer device 290 encrypts the (Cash-Token-ID) 140, (Cash-To-Token-ID) and the sender Owner (DU-ID) 269 using (Public IUKey) and submits 294 the (Cash-to-Request) to the server computer 291, and waits for the (Cash-To-Confirmation-Code).
- the server computer 291 decrypts the (Cash-Token-ID) 140, (Cash-To-
- Token-ID and the sender Owner (DU-ID) 269, validates the ownership and the intention to send a specific (Cash-Token) 140, fetches the receiver Owner (DU-ID) 269 associated with the (Receiver-Mobile-Number), associates it with the (Cash-To-Token-ID), saves to the Database 292, then sends 294 a (Cash-To-Confirmation-Code) to (Sender-Mobile- Number) by SMS.
- a specific (Cash-Token) 140 fetches the receiver Owner (DU-ID) 269 associated with the (Receiver-Mobile-Number), associates it with the (Cash-To-Token-ID), saves to the Database 292, then sends 294 a (Cash-To-Confirmation-Code) to (Sender-Mobile- Number) by SMS.
- the owner 295 of personal mobile computer device 290 receives and enters
- the personal mobile computer device 290 encrypts the (Cash-To-Token-ID) using (Public UIKey), includes it in the (Cash-To- Confirmation-Form) and submits 293 them all to the server computer 291 .
- the server computer 291 matches (Cash-To-Token-ID) with (Cash-To-
- the server computer 291 may also match the one or more user computing device factors 100 with one or more receiver device factors 100.
- the one or more receiver device factors 100 may be stored in one or more database 292 or may be sent to server computer 291 by receiver device 290.
- the server computer 291 then encrypts the (QR-URL) using receiver
- the owner 295 of the receiver device 290 receives 294 notification from the server computer 291, refreshes 294 the (Cash-Box) QR-Box 108 to view (Cash-Token) List, clicks 294 on a (Cash-Token) 100 on the associated touchscreen 214 to view it.
- the receiver device 290 decrypts the (QR-URL) using (Private OUKey), fetches the (QR- Image) 130 from the server computer 291 and displays it on the associated touch screen 214.
- the invention also provides a method of authorising cash dispensing.
- the Cashier 295 scans 294 the (QR Image) 130 of the (Cash-Token-ID) 102 using a cashier personal mobile computer device 290, reads the (Cash-Token-Amount) 104 to the Owner, presses 294 the (Confirm-Button) and waits for (Cash-Out-Confirmation- Code).
- the cashier personal mobile computing device 290 encrypts the (Cash-
- Token-ID 102
- the cash dispenser is referred to as the receiver device in this embodiment as it is receiving the token 140.
- the server 291 decrypts the (Cash-Token-ID) 102 and the Cashier (DU-ID)
- Cashier personal mobile computing device 290 decrypts the (Cash-Out- Token-ID) using (Private IUKey) and displays the (Cash- Out-Form) on screen 214 and the cashier 295 asks the owner 295 for (Cash-Out-Confirmation-Code).
- the Cashier 295 enters 294 (Cash-Out-Confirmation-Code) and presses 294
- the Cashier software application program 233 encrypts (Cash-Out-Token-
- the server 291 also receives from device 290 one or more user computing device factors 100.
- the server 291 matches (Cash-Out-Token-ID) with (Cash-Out- Confirmation-Code), generates (Cash- Out-Authorisation-ID), associates it with (Cash- Token-ID) 102 and Cashier (DU-ID) 269 and stores it in the Database 292.
- the server 291 encrypts (Cash-Out-Token- ID), (Cash-Out- Authorisation-
- Cashier (DU-ID) 269 using (Public IUKey) sends 293 it as a response to cashier personal mobile computer device 290.
- the Cashier personal mobile computer device 290 decrypts (Cash-Out-
- the user computing device factors 100 are also matched with one or more stored or acquired recipient device factors 100. In one embodiment, this matching is done by the lock manager computer 296.
- the Cashier 295 reviews 294 the (Cash-Dispensing-Form), presses 294
- the Cashier personal mobile computer device 290 encrypts (Cash-Out-Token-ID), (Cash-Out- Authorisation-ID) and Cashier (DU-ID) 269 using (Public IUKey) and sends 293 (Cash- Token- Redemption- Advise) to the server 291.
- the server 291 decrypts (Cash-Out-Token-ID), (Cash-Out-Authorisation-
- the Cashier 295 dispenses Cash to the Owner 295 and closes 294 transaction.
- the sending and receiving steps described herein may be performed through an application 233 stored on the mobile computing device 290 or through a mobile communications system such as SMS (short messaging service) or NFC (near field communication).
- a mobile communications system such as SMS (short messaging service) or NFC (near field communication).
- the methods of the invention may further include a step of sending a confirmation message.
- the confirmation message may be sent by SMS or NFC.
Abstract
Description
Claims
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2015372419A AU2015372419B2 (en) | 2014-12-22 | 2015-12-21 | Unlocking of a computer readable medium or of an electronic process using a computer readable medium |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2014905206A AU2014905206A0 (en) | 2014-12-22 | Unlocking of a computer readable medium or of an electronic process using a computer readable medium | |
AU2014905206 | 2014-12-22 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2016101009A1 true WO2016101009A1 (en) | 2016-06-30 |
Family
ID=56148771
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/AU2015/000759 WO2016101009A1 (en) | 2014-12-22 | 2015-12-21 | Unlocking of a computer readable medium or of an electronic process using a computer readable medium |
Country Status (2)
Country | Link |
---|---|
AU (1) | AU2015372419B2 (en) |
WO (1) | WO2016101009A1 (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020108062A1 (en) * | 2000-05-15 | 2002-08-08 | Takayuki Nakajima | Authentication system and method |
US20070187492A1 (en) * | 1999-08-19 | 2007-08-16 | Graves Phillip C | System and Method For Authorizing Stored Value Card Transactions |
US20110202466A1 (en) * | 2008-10-17 | 2011-08-18 | Carter Robert A | Multifactor Authentication |
WO2012027585A2 (en) * | 2010-08-25 | 2012-03-01 | American Cash Exchange, Inc. | Authorization of cash delivery |
WO2014158817A1 (en) * | 2013-03-14 | 2014-10-02 | Fexco Merchant Services | Systems and methods for transferring funds using a wireless device |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130110607A1 (en) * | 2011-10-28 | 2013-05-02 | Steven Allen Basmajian | Coupon generation, authentication, and redemption via a network |
US8676653B2 (en) * | 2012-07-31 | 2014-03-18 | Wal-Mart Stores, Inc. | Use of optical images to authenticate and enable a return with an electronic receipt |
-
2015
- 2015-12-21 WO PCT/AU2015/000759 patent/WO2016101009A1/en active Application Filing
- 2015-12-21 AU AU2015372419A patent/AU2015372419B2/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070187492A1 (en) * | 1999-08-19 | 2007-08-16 | Graves Phillip C | System and Method For Authorizing Stored Value Card Transactions |
US20020108062A1 (en) * | 2000-05-15 | 2002-08-08 | Takayuki Nakajima | Authentication system and method |
US20110202466A1 (en) * | 2008-10-17 | 2011-08-18 | Carter Robert A | Multifactor Authentication |
WO2012027585A2 (en) * | 2010-08-25 | 2012-03-01 | American Cash Exchange, Inc. | Authorization of cash delivery |
WO2014158817A1 (en) * | 2013-03-14 | 2014-10-02 | Fexco Merchant Services | Systems and methods for transferring funds using a wireless device |
Also Published As
Publication number | Publication date |
---|---|
AU2015372419B2 (en) | 2020-07-30 |
AU2015372419A1 (en) | 2017-04-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6476352B1 (en) | Network security based on proximity by IP whitelist registration | |
US10154020B1 (en) | Referral identity system and method of operation thereof | |
US20170011396A1 (en) | Configuring a plurality of security isolated wallet containers on a single mobile device | |
US11246034B2 (en) | Secure communication of access information via mobile devices | |
US9626696B2 (en) | Techniques to verify location for location based services | |
US9400877B2 (en) | Server device and service provision method | |
US20140379575A1 (en) | Controlling transactions using near field communications device | |
US20120185398A1 (en) | Mobile payment system with two-point authentication | |
US20150134538A1 (en) | Application for using mobile communication terminal as payment terminal, and application service provider system and method | |
CN114143784A (en) | Providing access credentials to secure networks using wireless beacons | |
US20140137206A1 (en) | Password-free, token-based wireless access | |
JP2014529964A (en) | System and method for secure transaction processing via a mobile device | |
US9842332B2 (en) | Systems and methods for processing a financial transaction | |
US20150081346A1 (en) | Event ticket sharing via networked mobile computing devices | |
JP2019502179A (en) | Network security based on proximity | |
CN106134230A (en) | The management domain that remote content on mobile information apparatus and configuration control | |
US9825955B2 (en) | Method and system for exchanging information | |
US10460262B2 (en) | Computer-implemented system and methods for distribution, verification, and redemption of electronic tickets | |
US9742810B2 (en) | Network node security using short range communication | |
JP5991143B2 (en) | Information processing apparatus, system, and information registration method | |
US20170068946A1 (en) | User equipment, service providing device, pos terminal, payment system including the same, control method thereof, and non-transitory computer-readable storage medium storing computer program recorded thereon | |
AU2015337839B2 (en) | Electronic money, method of producing electronic money and transaction method using electronic money | |
TW201810130A (en) | Mobile device, authentication device and authentication methods thereof | |
JP2021505049A (en) | Payment card verification | |
AU2015372419B2 (en) | Unlocking of a computer readable medium or of an electronic process using a computer readable medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 15871332 Country of ref document: EP Kind code of ref document: A1 |
|
DPE1 | Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101) | ||
ENP | Entry into the national phase |
Ref document number: 2015372419 Country of ref document: AU Date of ref document: 20151221 Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 15871332 Country of ref document: EP Kind code of ref document: A1 |