Car fobs and other similar small form factor devices may be used to lock and unlock doors remotely. Access cards, such as magnetic strip cards, may be used to grant a user access to a financial account. However, these devices only have limited functionality. At this time, users need many devices to gain access to different entry points, be they physical entry points such as doors to cars or offices or garages, or remote virtual entry points that need to be used to gain access to bank accounts, credit card accounts, and/or accounts at retail operations such as entertainment venues, restaurants and stores. In fact, many cards carry embedded electronic devices, such as the chips used with chip readers, and the short-range near-field communications (NFC) circuits needed for communications with NFC readers. For these reasons, persons may need to carry many cards and devices as they go about their daily routines. Carrying many such cards and devices on one's person while going about one's daily activities is inconvenient, is difficult to organize, and in some cases a card or device that had been left at home may be needed later in the day when the user is away from his or her home or office.
For all these reasons, there is a need for a system that addresses the issues identified above.
In one aspect, embodiments include a multi-function access device that has a battery providing power to a display screen, a processor, and a communications app. It also has an RFID chip in communication with the processor; and a display screen showing a plurality of icons. The display screen and the processor are configured such that touching an icon on the touch screen triggers a functionality represented by that icon. The processor is configured to control the display screen, the communications app and the functionality represented by the icons. The processor is also configured to provide key codes to the RFID chip for transmittal to locks such that the functionality of at least one of the plurality of icons includes unlocking a lock. Also, the functionality of at least one of the plurality of icons provides an access point for gaining access via the communications app to data stored in a database of a financial institution. The functionality of at least one of the plurality of icons facilitates wireless payments via the communications app to merchant terminals.
In another aspect, embodiments include a multi-access device that has an antenna controlled by a communications app and is configured to transmit and receive data wirelessly using at least one of Bluetooth, near field communications, WiFi and IEEE 802.11 technologies. It also has a plurality of apps controlled by a processor for providing access to a plurality of access points via the antenna. The access points include access points for gaining access to databases of at least one of a bank, a credit card company, a retailer, and an entertainment venue. The plurality of apps include an app configured to facilitate payments to merchants via the antenna. The device has at least one RFID chip in communication with the processor that is configured to transmit codes to unlock locks, and a screen displaying icons for activating the apps. It also has at least one slot that has a magnetic strip and/or a chip for implementing payments for purchases at retailers. The multi-access device includes a biometric device in communication with a processor for confirming the user as authorized to operate the multi-access device.
In yet another aspect, embodiments include a multi-access device that has a generally rectangular body with a top rectangular region characterized by afirst thickness, a side rectangular region characterized by a second thickness, and a main body screen region characterized by a third thickness. It has a chip in the top rectangular region, which is dimensioned to fit into a chip reader and is configured to be read by a chip reader. It has a magnetic strip in the side rectangular region, which is dimensioned to allow the side rectangular region to slide through a magnetic strip reader, and is configured to be read by a magnetic strip reader. The main body screen region has a display screen, a processor, a communications app, a memory, an antenna and a rechargeable battery. It also has an RFID chip configured to receive key codes from the processor. The rechargeable battery provides power to the processor, the communications app, the RFID chip and the memory. The display screen displays a plurality of icons, each icon representing a specific functionality that can be implemented by actuating the icon. At least one of the icons facilitates payments to merchant terminals when it is actuated, at least one of the icons provides access to a financial institution when it is actuated, and at least one of the icons uses the key codes to unlock locks when it is actuated.
Other systems, methods, features, and advantages of the disclosure will be, or will become, apparent to one of ordinary skill in the art upon examination of the following figures and detailed description. It is intended that all such additional systems, methods, features, and advantages be included within this description and this summary, be within the scope of the disclosure, and be protected by the following claims.
The embodiments disclosed herein may be better understood with reference to the following listed drawings and their descriptions. The components in the drawings are schematic rather than representational, and are not necessarily to scale, the emphasis of the disclosure being placed upon illustrating the purpose of implementing the systems and methods disclosed herein. Moreover, in the drawings like reference numerals designate corresponding parts throughout the drawings.
Embodiments disclosed herein include all-in-one multi-access devices that provide an access point for opening doors, using credit cards, and other applications, as described below. In addition to providing keyless entry, the all-in-one multi-access devices may also include a digital screen that can display information for credit cards, concert tickets, and airline tickets. In some embodiments, the multi-access device could include an RFID chip for communication with RFID readers. In some embodiments, the display could be a low powered e-ink screen. In some embodiments, the device can include a deployable magnetic strip and/or chip to maintain backwards compatibility with older devices, such as card readers. For example, the device may not have a magnetic strip exposed in a default position, but the magnetic strip could be deployed (either extended out or uncovered, for example) so the user can swipe a card or insert a card at a card reader. In some embodiments, the device may have a deployable card with a chip that could be read by a chip reader at a bank or retailer, for example.
In some embodiments, the all-in-one multi-access device could include a biometric sensor that can read fingerprints or recognize facial features, or other biometric indicators to prevent the device from being used by an unauthorized person. In some embodiments, the all-in-one multi-access device could be programmed with access codes that allow the user to wirelessly unlock doors, such as a door to their home and/or a door to their car.
In some embodiments, the device could be configured to display important information on the display, even when the device is locked. This information could include, for example, critical health information about the user, should the user be in need of emergency medical help. As one example, the device could display information about a user's chronic conditions, medications, or other instructions that may be relevant should the user be incapacitated. In another embodiment, the device could automatically detect that a user is walking into a particular store and show membership information on its display as the user customer walks into that store.
In one embodiment, the device could receive requests from external devices to display particular information. For example, the device could be used to store insurance information that could be requested automatically by a third party. In one embodiment, the device could be pushed a coupon code and display it on the screen when the user walks into a store with such capabilities.
In some embodiments, the all-in-one multi-access devices may approximately emulate the shape, width and length of a conventional credit card. In such embodiments, the credit-card-shaped device may be of uniform thickness, or it may have different regions having different thicknesses. This variable thickness may be necessary in order to accommodate a rechargeable battery as well as all of the different circuits, memories, and other devices required to implement the different functionalities disclosed herein and to gain access to multiple entry points.
As used herein, the term “financial institution” shall mean a bank, a savings and load, a credit union or a credit card company. The term “IEEE 802.11” shall refer to all of the IEEE 802.11 standards, including IEEE 802.11a, IEEE 802.11b, IEEE 802.11g and IEEE 802.11n. The term “lock/unlock” shall refer to locking a lock, unlocking a lock or both locking and unlocking a lock.
Device 102 includes a jack 120 (shown here in phantom) with which to charge a battery (shown in
For example, app 108 is an app that provides a link between device 102 and one or more financial accounts, such as a debit or a credit account, associated with the user. This app may be used to make payments to payees such as retailers, restaurants, banks and gas stations. The user may use app 108, for example, to make purchases at stores that have virtual pay platforms that are compatible with device 102. App 114 functions as a virtual key that a user may use to unlock doors, start a car or otherwise gain entry to private spaces, such as homes, commercial buildings and offices. In this embodiment, app 114 can be loaded by the user with a set of codes for wirelessly unlocking doors using an RFID chip (such as RFID chip 318 shown in
App 110 is a virtual-coupon app through which stores with compatible systems and networks may send store coupons to device 102 when the user enters the store. App 116 is a virtual ticketing app which, in some embodiments, displays tickets the user has purchased on display 130. In some embodiments, such a displayed ticket includes a barcode that can be read to verify the authenticity of the displayed virtual ticket. In other embodiments, app 116 allows the user to purchase tickets directly when device 102 is in communication with a seller of tickets, as it is linked to a financial account of the user. In other embodiments, rather than simply displaying a virtual ticket, app 116 broadcasts a code corresponding to the purchased ticket for wireless access to an event that requires tickets. In such an embodiment, such a ticket functions as a temporary “key” similar to the function of the virtual key app 114.
App 112 displays, for example, the user's critical health data in an emergency. In some embodiments, the user enters this information through an on-screen keyboard. In some embodiments, authorized third parties, such as a user's primary care physician, can enter and update this information by means of a program in communication with device 102. App 118 contains and displays identifying information for the user. In some embodiments, such identifying information takes the form of a virtual government-issued ID, such as a passport, a driver's license or an employee ID. In some embodiments, government-issued IDs may be securely loaded onto device 102 at a government office through jack 120 or they may be loaded wirelessly. In some embodiments, display 130 is “locked” and none of the apps are accessible to the user until the user “unlocks” it. The user may unlock device 102 by entering a passcode or passing a facial recognition, fingerprint, or other biometric test. In some embodiments, audio biometric verification means may be used by device 102 to ensure that the voice commands it receives, to some degree of confidence, come from an authorized user of device 102. In other embodiments, the user may simply recite a password.
In the embodiment of
Antenna 210, shown in
Top slot 204 allows a card containing an integrated circuit chip (shown in
Device 302 includes an image capture device 304 for performing a facial recognition test on a user. Device 302 further includes ID storage 306 which securely stores and acquires ID information for a user of device 302. In some embodiments, ID storage 306 is in wireless communication with compatible devices at a government office or at an employer's office to securely acquire ID information for a user of device 302. Device 302 includes a connection module 316. Connection module 316 is associated with wired connections to device 302, for example, for charging or for making a wired connection between device 302 and another device. Device 302 includes a memory 312 which stores a variety of data and applications, including pre-loaded applications and data that would be typically loaded onto this device and applications and data that have been selectively stored by the user of device 302. These apps and the data collectively implement the functions of device 302. Device 302 includes a communications app 310 for wirelessly exchanging data and instructions via an antenna such as antenna 210 (shown in
Device 302 may include a scanner app 314 in communication with a fingerprint reader (such as fingerprint reader 208) configured to take a fingerprint of a user of device 302 to ensure that the user is authorized to use device 302. In some embodiments, scanner app 314 feeds fingerprint data of the current user of device 302 to a fingerprint analysis algorithm running on processor 308 for comparison to fingerprints of authorized users of device 302 stored in memory 312. In some embodiments, device 302 may include an image capture app 304 in communication with an image capture device (such as image capture device 206). for comparison with stored images. Image capture app 304 feeds images received from an image capturing device (such as image capture device 206) to an image recognition algorithm running on processor 308 for comparison to images stored in memory 312.
Several mechanisms may be used to deploy the magnetic strip card 426 and/or the chip card 442. For example, in some embodiments, the slots may be wide enough so that a user can grip the cards and pull them out as needed. Alternatively, the cards may be kept in place with spring-loaded catches. Pushing the cards in would release the cards from the catch, and they would pop out. In those embodiments, button 424 and button 422 would not be needed. In other embodiments, the cards may be spring-loaded and held in place by a catch, and pressing button 424 and button 422 would cause the catch to retract, thus releasing the cards. The cards could be re-engaged with the catch just by pushing them back in. In yet other embodiments, servomechanisms may be used to deploy or retract the cards at the push of button 424 and button 422. In those embodiments, the servomechanisms would be powered by battery 320 (shown in
In this embodiment, deployable chip card 442 is compatible with merchant terminals or other access management devices that read account information (such as financial account information) or other access information that is encoded digitally on an integrated circuit chip 444 affixed to chip card 442. In this embodiment, deployable chip card 442 emerges from a top slot 404 and is deployed by the user of device 402 at the push of a top button 424.
In this embodiment, device 402 includes a jack 420 (shown here in phantom) with which to charge a battery that powers device 402. Jack 402 may also provide a hard-wired connection to device 402 for other devices, for example to transfer data to device 402. For example, key codes could be input via jack 420 so that they could be entered into an RFID chip, or they could be transmitted using Bluetooth or other technologies. Device 402 includes a display 430 which displays a set of apps such as apps 408 to 418. In some embodiments, display 430 includes a touch screen function as a user interface. In some embodiments, display 430 is an “electronic paper” display in grayscale to minimize power usage and battery size.
Display 430 features a set of exemplary apps which implement the various functions of device 402. For example, app 408 is a virtual pay-type app that provides a link between device 402 and one or more financial accounts, such as a debit or credit account, associated with the user. The user may use app 408, for example, to make purchases at stores with compatible virtual pay platforms with device 402. App 414 is a virtual key-type app through which the user unlocks doors or otherwise gains entry to private spaces, such as cars, homes, commercial buildings, residential buildings, offices, garages, parking lots and other spaces via an RFID chip such as RFID chip 318 shown in
App 412 contains and displays critical health information for the user. In some embodiments, the user may enter this information through an on-screen keyboard or by transmitting the information from another device such as a laptop computer, a tablet or a smart phone. In some embodiments, authorized third parties, such as a user's primary care physician, may enter and update this information by means of a program in communication with device 402. App 418 contains and displays identifying information for the user, such as an employee ID or a student ID. In some embodiments, such identifying information takes the form of a virtual government-issued ID, such as a passport or driver's license. In some embodiments, a virtual government-issued ID or an employee ID may be securely loaded onto device 402 at a government or other office through jack 420 or wirelessly.
In some embodiments, a single card that has both a magnetic strip and a chip may be used instead of having two cards. In that case, only a single slot may be needed, such as either top slot 404 or side slot 436. As noted above, multi-access device 402 may have an RFID chip that could enable payments to merchants that have RFID-enabled terminals.
Display 530 displays a set of apps. In this embodiment, app 508 is a virtual pay-type app that provides a link between device 502 and one or more financial accounts, such as a debit or credit account, associated with the user. The user uses app 508, for example, to make purchases at stores with compatible virtual pay platforms with device 502. App 514 is a virtual key-type app through which the user may use an RFID chip to unlock doors or otherwise gain entry to private spaces, such as homes, commercial buildings, residential buildings, offices, garages and parking lots. In other cases, multi-access device 502 may use near field communications (NFC) technologies or Bluetooth to unlock doors. In this embodiment, app 514 can be loaded by the user with a set of codes for wirelessly unlocking doors and similar access points in a building. In some embodiments, app 514 acquires these codes directly from other wireless devices that are used for door access. In other embodiments, these codes must be programmed into device 502, for example through a software or firmware update. App 510 is a virtual-coupon app through which stores with compatible systems and networks could send store coupons to device 502. App 516 is a virtual ticketing app through which, in some embodiments, tickets the user has purchased are loaded onto device 502 and may be displayed on display 530. In some embodiments, such a displayed ticket may include a barcode that can be read to verify the authenticity of the displayed virtual ticket. In other embodiments, app 516 allows the user to purchase tickets directly when device 502 is in communication with a seller of tickets, as it is linked to a financial account of the user. In other embodiments, rather than simply displaying a virtual ticket, app 516 broadcasts a code corresponding to the purchased ticket for wireless access to an event that requires tickets. In such an embodiment, such a ticket functions as a temporary “key” similar to the function of the virtual key app 514.
App 512 may contain and display a user's critical health information. In some embodiments, the user enters this information through an on-screen virtual keyboard. In some embodiments, authorized third parties, such as a user's primary care physician, can enter and update this information by means of a program in communication with device 502. App 518 contains and displays identifying information for the user. In some embodiments, such identifying information takes the form of a virtual government-issued ID, such as a passport or driver's license. In some embodiments, such a virtual government-issued ID is securely loaded onto device 502 at a government office through, for example, jack 520 or wirelessly.
Device 502 includes a jack 520 (shown here in phantom) with which to charge a battery that powers device 502 and to provide a hard-wired connection to device 502 from other devices, for example to transfer information to device 502.
In some embodiments, user 708 programs a virtual coupon app to allow connections to some stores (for example, for the receipt of store coupons) and not for others. In some embodiments, upon the receipt of search signal 706 by device 710, device 710 posts a message to the user asking if she would like to connect to master wireless device 704 for the receipt of coupons and other current store information. In some embodiments, such a connection between master local wireless device 704 and device 710 may occur over the store's WiFi network or other appropriate network.
In an alternative embodiment, rather than device 710 displaying store information (such as coupons) based upon a local wireless connection between device 710 and a master device associated with store 702, device 710 may display store information (such as member identification information for the store) using other triggers. In some embodiments, such a trigger could be the GPS location of the store. In this embodiment, user 708 has programmed device 710 so that when its GPS coordinates match the GPS coordinates of the store, within pre-defined limits, member identification information for the store may be displayed on a display of device 710.
In some embodiments, this financial account information is loaded into the virtual pay app 806 when the device receives a deployable chip card and/or a deployable magnetic strip provided by an affiliate of the financial institution itself, or when virtual pay app 806 is authorized by the financial institution in the case of an RFID chip-enabled embodiment. In some embodiments, the user can load these financial credentials into the virtual pay app by wirelessly transferring these credentials from a different device associated with the financial account, for example a smartphone to which the user has assigned a debit card for the financial account.
In this embodiment, user 802 indicates, for example by using a touchscreen on device 802, that she would like to use the virtual payment app to make this purchase. Device 804 then wirelessly sends a connection signal 816 using an RFID chip, for example, initiating this purchase to a mobile pay platform running on merchant terminal 814. Upon receipt of user 802's financial account credentials stored by the virtual payment app, the mobile pay platform verifies and then debits the associated financial account of user 802.
The embodiments illustrated in
In this embodiment, the user can then wirelessly transfer virtual ticket 1010 to device 1018 via a virtual ticketing app 1016 running on device 1018. Upon initiation by the user, device 1018 and laptop 1006 initiate a local wireless connection. In some embodiments, such a local wireless connection may occur via Bluetooth or NFC protocols. Then, the user can transfer the credentials associated with virtual ticket 1010 to a virtual ticket generated and stored by virtual ticketing app 1016.
In some embodiments, virtual ticketing app 1016, upon request by the user, displays on a screen 1012 of device 1018 a facsimile of a paper ticket that includes event and ticket purchase information. In some embodiments, virtual ticket app 1016 broadcasts a code corresponding to the purchased ticket for wireless access to the event.
Although in the example shown in
For purposes of understanding the different regions of the device, reference is made to the device's outer edges, including a first (or top) edge 1180, a second (or right) edge 1182, a third (or bottom) edge 1184, and a fourth (or left) edge 1186. Additionally, reference is made to a first inner boundary 1106 and a second inner boundary 1108. These inner boundaries correspond to regions where the thickness of the device may change.
Chip region 1150 extends from a first edge 1180 at the top of all-in-one multi-access device 1102 inwards to second interior boundary 1108. Chip region 1150 also extends from second edge 1182 to the opposing fourth edge 1186. Magnetic strip region 1152 extends from second edge 1182 inwards to first interior boundary 1106. Magnetic strip region 1152 also extends from first edge 1180 to the opposing third edge 1184. As seen in
Main body region 1154 comprises a region of multi-access device 1102 that extends between fourth edge 1186 and first interior boundary 1106 along a width of the device, and between third edge 1184 and second interior boundary 1108 along a part of the length of the device.
Main body region 1154 includes a display screen 1156. In this example, display screen 1156 shows exemplary apps, such as app 1130, app 1132, app 1134, app 1136, app 1138 and app 1140. In this example, app 1130 is a virtual pay app that provides the link between device 1102 and one or more financial accounts associated with the user. App 1136 is a virtual key app that a user could use to unlock locks at doors or otherwise gain entry to physical places such as cars, buildings garages, parking lots, homes and offices, using codes previously loaded into the multi-access device. App 1132 may be a virtual-coupon app through which stores with compatible systems and networks could transmit store coupons and sales information to device 1102. App 1134 may contain and display a user's personal critical health information. App 1138 may be a virtual ticketing app that displays virtual tickets that, for example, a user may have purchased using app 1138 to gain entry to entertainment or transportation venues. App 1140 may contain and display identifying or useful information such as a driver's license, a passport, a visa, a car registration, an employee ID or an insurance card.
In this embodiment, multi-access device 1102 may include a communications antenna 1146 (shown in
Magnetic strip region 1152 includes a magnetic strip 1104. It has the thickness required to allow magnetic strip region 1152 to slide through a magnetic strip reader at a merchant terminal. Chip region 1150 includes a chip 1110, which has the thickness required to insert the chip region 1150 into a chip reader at a merchant terminal.
In the embodiment of
As noted above, in some embodiments, chip region 1150 has a thickness that is selected so that chip region 1150 can slide into a conventional chip reader. Likewise, as also noted above, magnetic strip region 1152 has a thickness that is selected so that magnetic strip region 1152 can slide into a conventional magnetic strip reader. In some embodiments, the thicknesses of chip region 1150 and magnetic strip region 1152 may match the thickness of a conventional credit card. By contrast, the thickness of main body screen region 1154 may be selected to physically accommodate all of the various components, such as a battery, an antenna, and a memory, as well as the other components described above.
In this embodiment, thickness T2 substantially matches the thickness of a conventional credit card. For example, in one embodiment, thickness T2 may be within approximately 10% of the thickness of a conventional credit card. As described above, a conventional credit card may have an approximate thickness of 0.75 mm.
Although the embodiments show a device with regions having different thicknesses, in other embodiments a multi-access device could have a substantially constant thickness everywhere. Moreover, to ensure that the device may be backwards compatible with magnetic strip readers and chip readers, the thickness of a device with a uniform thickness may be approximately equal to the thickness of a conventional credit card. In such embodiments, the features of the device may be selected to ensure that the necessary components to perform those features can fit into a main body region with a thickness approximately matching that of a conventional credit card.
While various embodiments have been described above, the description is intended to be exemplary, rather than limiting and it will be apparent to those of ordinary skill in the art that many more embodiments and implementations are possible that are within the scope of the invention. Accordingly, the invention is not to be restricted except in light of the attached claims and their equivalents. Also, various modifications and changes may be made within the scope of the attached claims.
This application claims the benefit of Provisional Patent Application No. 63/154,922, filed Mar. 1, 2021, and titled “All-In-One Multi-Access Wireless Devices,” which is incorporated by reference herein in its entirety. This disclosure relates to devices that provide all-in-one access points to financial institutions, door locks, ticketed events, and retail and other outlets.
Number | Name | Date | Kind |
---|---|---|---|
7278584 | Gandel | Oct 2007 | B1 |
20050242921 | Zimmerman | Nov 2005 | A1 |
20070057038 | Gannon | Mar 2007 | A1 |
20070197261 | Humbel | Aug 2007 | A1 |
20130200999 | Spodak | Aug 2013 | A1 |
20160012445 | Villa-Real | Jan 2016 | A1 |
20180151007 | Einberg | May 2018 | A1 |
20210266737 | Burke | Aug 2021 | A1 |
20230260330 | Mango | Aug 2023 | A1 |
Number | Date | Country | |
---|---|---|---|
63154922 | Mar 2021 | US |