Embodiments described herein generally relate to mobile (e.g., digital) wallets and, for example and without limitation, consolidating application access in a mobile wallet.
Mobile wallets may store payment elements that allow consumers to make payments for products and services with mobile computing devices instead of cash, credit cards or checks. Mobile wallets may also store non-payment elements such as tickets and identification cards.
In the drawings, which are not necessarily drawn to scale, like numerals may describe similar components in different views. Like numerals having different letter suffixes may represent different instances of similar components. The drawings illustrate generally, by way of example, but not by way of limitation, various embodiments discussed in the present document.
A mobile wallet (also known as an electronic or digital wallet) refers to an application program executed by one or more computing devices (e.g., mobile devices such as a smartphone) and corresponding device memory which store and manage digital representations of elements (or items) typically found in a user's wallet or purse. These elements may comprise payment elements and non-payment elements. Payment elements are items which may be used in a financial transaction. Example payment elements managed by the digital wallet include digital representations of transaction cards, financial information, discount coupons, gift cards, subway passes, movie tickets, and so on. Example non-payment elements include digital representations of driver's licenses, passports, student ids, library cards, membership cards, insurance cards, and so on.
A mobile wallet application may allow an individual to use the stored information to pay for items (either in person or in e-commerce transactions), provide for identification (e.g., producing a driver's license), transfer money to others, access bank accounts, collect discount coupons, submit subway passes, and the like. Example mobile wallets include but are not limited to WELLS FARGO WALLET™, CITI PAY™, STARBUCKS® APP, WALMART PAY™, APPLE PAY™ ANDROID PAY™, GOOGLE WALLET™, SAMSUNG PAY™, GYFT APP™, and peer-to-peer payment apps such as VENMO®, SQUARE CASH™, and TILT APP™.
Users often have multiple mobile wallets in the same computing device such as a mobile device. Each of these mobile wallets may have its own password (e.g., alphanumeric passwords, PINS, biometric authentication such as a fingerprint, multi-factor authentication, etc.) required to be provided prior to activating the mobile wallet. As the number of mobile wallets on a computing device increases, accessing and/or using the mobile wallets becomes increasingly challenging. On a mobile device, for example, icons for the mobile wallets may be difficult to find among other icons displayed on the device. Passwords may be difficult for a user to remember as well.
The disclosure herein provides methods and systems for consolidating access to one or more mobile wallets within another mobile wallet application. For ease of reference, the other mobile wallet application may be referred to as a master mobile wallet application. The master mobile wallet application may, for example, display, in a user interface, a menu of one or more mobile wallets and receive a user selection of a particular mobile wallet to add to (e.g., consolidated within) the master mobile wallet. The added mobile wallet application may then be activated from within the master mobile wallet. This consolidation of mobile wallets within a master mobile wallet may make using the mobile wallets easier. The master wallet may further allow a user to store the password for the added wallet during setup and later activate the added mobile wallet using the stored password without requiring user input of the password during activation. Activation may include loading and executing an application and optionally providing a password and/or authenticating a user of the application. These are among other features of the examples provided herein.
The network may be or comprise any suitable network environment operated according to any suitable network protocol. For example, one or more portions of network may be an ad hoc network, an intranet, an extranet, a virtual private network (VPN), a local area network (LAN), a wireless LAN (WLAN), a wide area network (WAN), a wireless WAN (WWAN), a metropolitan area network (MAN), a portion of the Internet, a portion of the Public Switched Telephone Network (PSTN), a cellular telephone network, a wireless network, a Wi-Fi network, a WiMax network, another type of network, or a combination of two or more such networks.
At 2020, the master mobile wallet may display, in a user interface, a menu of one or more other mobile wallet applications also available on the computing device of the master wallet. To display the menu, the master wallet may retrieve data (e.g., wallet name) associated with the other mobile wallet(s) from a memory location of the computing device. The menu may be a drop-down list or a display of icon, for example. At 2030, the master mobile wallet receives from the menu a user selection of a particular mobile wallet application (or applications) to add to the master mobile wallet.
At 2040, the master mobile wallet may receive a selection to use the master password (e.g., of the master wallet) for activating the particular mobile wallet selected at 2030. Alternatively, in some examples, the master mobile wallet may receive a selection to not use the master password for such activation in which case, process flow may continue as illustrated in
After receiving the individual password, the master wallet may send the password to a wallet service provider associated with the master mobile wallet application for storage. The master wallet and its wallet service provider may securely communicate over a network. This may, for example, be done using communication schemes disclosed in U.S. patent application Ser. No. 15/264,531, filed Sep. 13, 2016, titled “Secure Digital Communications,” the contents of which are herein incorporated by reference. In other examples, the master wallet may store the individual password locally in memory located on the computing device.
In some examples, the master wallet may receive user input to confirm the addition of the particular mobile wallet application to the master mobile wallet application (e.g., receiving user touch of a confirmation button). After adding the wallet to the master wallet, the master wallet may display an icon associated with the added mobile wallet application within a user interface of the master mobile wallet application. In some examples, the master wallet may remove or not display an icon for the added mobile wallet application in a main screen (e.g., one or more of a home screen, a primary display screen, or an application selection screen) of the mobile device after the mobile wallet has been added to the master wallet.
At 2050, after the mobile wallet has been added to the master mobile wallet (e.g., after receiving a password selection, the individual password for the wallet, and/or confirmation of the addition), the master wallet may receive a selection (e.g., user input or a request) to activate the added mobile wallet. This may be done by receiving a user's touch input of the added wallet's icon displayed within the master wallet, for example.
At 2060, after receiving the activation selection, the master mobile wallet may activate the added mobile wallet application using the master wallet application and without requiring user input of an individual password for the particular mobile wallet application during the activating. For example, the master wallet may request the individual password of the added mobile wallet from the wallet service provider and use the individual password to activate the added mobile wallet. Where the individual password is stored locally (e.g., in memory on the mobile device), the master wallet may access the memory to retrieve the individual password. The master mobile wallet may, for example, launch the added mobile wallet in a window of the master wallet or may launch the application in a separate window on the mobile device. After launching the added wallet, the master wallet may automatically present the retrieved individual password to the launched wallet application to activate the application. For example, the master wallet may simulate user input using an operating system Application Programming Interface such that it appears from the perspective of the wallet application that the user entered the individual password.
At 3020, the master wallet may receive a selection (e.g., request or user input) to activate the added mobile wallet application. After receiving this selection, at 3030, the master wallet may prompt the user to enter the individual password for the mobile wallet application. After receiving the individual password, the master wallet may activate the added mobile wallet using the individual password at 3040. This may be done by launching the mobile wallet within the master wallet or in a separate window on the mobile device, and presenting the launched mobile wallet with the individual password entered by the user.
After adding mobile wallet application(s) to the master wallet (e.g., after receiving the selection to add a mobile wallet and/or after confirmation of the selection to add), the master wallet may display a screen that includes icons for the master wallet and the added mobile wallet(s). The icon for the master wallet may be located in different window than icon(s) for the added mobile wallet(s). The icons may be used to select the corresponding mobile wallet. Upon selection, the master wallet may display content associate the wallet corresponding to the selected icon within a display window of the master wallet. An icon may be any type of input including a graphical or text symbol.
The wallet configurator 5010 may store the XYZ password securely either locally or remotely, and the master wallet may use the XYZ password to open XYZ wallet automatically without requiring a user to enter the XYZ wallet password during activation of the XYZ wallet. The wallet configurator 5010 may include a confirmation button 570 that a user may touch to add to the XYZ wallet (selected using input from menu 5030) to the master wallet. The wallet configurator 5010 may show the newly added mobile wallet application at the bottom 5080 of the display when the process is complete. In some examples, when an application is consolidated within a master wallet, the master wallet may present the user with an option to leave the application's icon available on a main screen of the mobile device or delete it from the screen.
The master wallet 7010 may present the set of applications at the bottom display area 7030 based on past usage history, environmental data, or other conditions if there are more applications than can be displayed in the display area 7030. For instance the master wallet 7010 may present a set (e.g., five) applications that are frequently used at a location (e.g., a shopping mall identified based on GPS data), a set of applications that have been frequently used in the past associated with the last purchase, or simply last set of applications used recently.
In some examples, a consolidated application may be activated after its icon is selected. In other examples, the display area 7030 may present icon(s) for application(s) that have already been activated by the master wallet using the process flows described above. While the master wallet may allow activation of an application consolidated within the master wallet, in some example, a mobile device may still allow a user to activate the application from outside of the master wallet, for example, through selecting the application in a main screen of the mobile device and entering any required password.
While mobile wallet applications are illustrated above, the type of application that can be added to a master wallet (e.g., by a wallet configurator) may be any application stored on the mobile device. For example, an online banking application may be added to a master wallet and an online banking web page may be opened thorough the master wallet without requiring a user to enter the password of for the banking app during activation. In one embodiment, the master wallet may be used to retrieve passwords by allowing a user to search for and retrieve password(s) of consolidated application(s) included in the master wallet.
The representative hardware layer 8004 comprises one or more processing units 8006 having associated executable instructions 8008. Executable instructions 8008 represent the executable instructions of the software architecture 8002, including implementation of the methods, modules, components, and so forth discussed herein. Hardware layer 8004 also includes memory and/or storage modules 8010, which also have executable instructions 8008. Hardware layer 8004 may also comprise other hardware as indicated by other hardware 8012, which represents any other hardware of the hardware layer 8004, such as the other hardware illustrated as part of hardware architecture 700.
In the example architecture of
The operating system 8014 may manage hardware resources and provide common services. The operating system 8014 may include, for example, a kernel 8028, services 8030, and drivers 8032. The kernel 8028 may act as an abstraction layer between the hardware and the other software layers. For example, the kernel 8028 may be responsible for memory management, processor management (e.g., scheduling), component management, networking, security settings, and so on. The services 8030 may provide other common services for the other software layers. In some examples, the services 8030 include an interrupt service. The interrupt service may detect the receipt of a hardware or software interrupt and, in response, cause the architecture 8002 to pause its current processing and execute an ISR when an interrupt is received. The ISR may generate the alert, for example, as described herein.
The drivers 8032 may be responsible for controlling or interfacing with the underlying hardware. For instance, the drivers 8032 may include display drivers, camera drivers, Bluetooth® drivers, flash memory drivers, serial communication drivers (e.g., Universal Serial Bus (USB) drivers), Wi-Fi® drivers, NFC drivers, audio drivers, power management drivers, and so forth depending on the hardware configuration.
The libraries 8016 may provide a common infrastructure that may be utilized by the applications 8020 and/or other components and/or layers. The libraries 8016 typically provide functionality that allows other software modules to perform tasks in an easier fashion than to interface directly with the underlying operating system 8014 functionality (e.g., kernel 8028, services 8030 and/or drivers 8032). The libraries 8016 may include system libraries 8034 (e.g., C standard library) that may provide functions such as memory allocation functions, string manipulation functions, mathematic functions, and the like. In addition, the libraries 8016 may include API libraries 8036 such as media libraries (e.g., libraries to support presentation and manipulation of various media format such as MPEG4, H.264, MP3, AAC, AMR, JPG, PNG), graphics libraries (e.g., an OpenGL framework that may be used to render 2D and 9D in a graphic content on a display), database libraries (e.g., SQLite that may provide various relational database functions), web libraries (e.g., WebKit that may provide web browsing functionality), and the like. The libraries 8016 may also include a wide variety of other libraries 8038 to provide many other APIs to the applications 8020 and other software components/modules.
The frameworks 8018 (also sometimes referred to as middleware) may provide a higher-level common infrastructure that may be utilized by the applications 8020 and/or other software components/modules. For example, the frameworks 8018 may provide various GUI functions, high-level resource management, high-level location services, and so forth. The frameworks 8018 may provide a broad spectrum of other APIs that may be utilized by the applications 8020 and/or other software components/modules, some of which may be specific to a particular operating system or platform.
The applications 8020 include built-in applications 8040 and/or third-party applications 8042. Examples of representative built-in applications 8040 may include, but are not limited to, a contacts application, a browser application, a book reader application, a location application, a media application, a messaging application, and/or a game application. Third-party applications 8042 may include any of the built-in applications 8040 as well as a broad assortment of other applications. In a specific example, the third-party application 8042 (e.g., an application developed using the Android™ or iOS™ software development kit (SDK) by an entity other than the vendor of the particular platform) may be mobile software running on a mobile operating system such as iOS™, Android™, Windows® Phone, or other user computing device operating systems. In this example, the third-party application 8042 may invoke the API calls 8024 provided by the mobile operating system such as operating system 8014 to facilitate functionality described herein.
The applications 8020 may utilize built-in operating system functions (e.g., kernel 8028, services 8030 and/or drivers 8032), libraries (e.g., system 8034, APIs 8036, and other libraries 8038), frameworks/middleware 8018 to create user interfaces to interact with users of the system. Alternatively, or additionally, in some systems, interactions with a user may occur through a presentation layer, such as presentation layer 8044. In these systems, the application/module “logic” can be separated from the aspects of the application/module that interact with a user.
Some software architectures utilize virtual machines. For example, systems described herein may be executed utilizing one or more virtual machines executed at one or more server computing machines. In the example of
Example architecture 9000 includes a processor unit 9002 comprising at least one processor (e.g., a central processing unit (CPU), a graphics processing unit (GPU) or both, processor cores, compute nodes, etc.). The architecture 9000 may further comprise a main memory 9004 and a static memory 9006, which communicate with each other via a link 9008 (e.g., bus).
The architecture 9000 can further include a video display unit 9010, an alphanumeric input device 9012 (e.g., a keyboard), and a UI navigation device 9014 (e.g., a mouse). In some examples, the video display unit 9010, input device 9012, and UI navigation device 9014 are incorporated into a touch screen display. The architecture 9000 may additionally include a storage device 9016 (e.g., a drive unit), a signal generation device 9018 (e.g., a speaker), a network interface device 9020, and one or more sensors 9021, such as a GPS sensor, compass, accelerometer, or other sensor.
In some examples, the processor unit 9002 or other suitable hardware component may support a hardware interrupt. In response to a hardware interrupt, the processor unit 9002 may pause its processing and execute an ISR, for example, as described herein.
The storage device 9016 includes a machine-readable medium 9022 on which is stored one or more sets of data structures and instructions 9024 (e.g., software) embodying or utilized by any one or more of the methodologies or functions described herein. The instructions 9024 can also reside, completely or at least partially, within the main memory 9004, static memory 9006, and/or within the processor unit 9002 during execution thereof by the architecture 9000, with the main memory 9004, static memory 9006, and the processor unit 9002 also constituting machine-readable media. Instructions stored at the machine-readable medium 9022 may include, for example, instructions for implementing the software architecture 8002, instructions for executing any of the features described herein, etc.
While the machine-readable medium 9022 is illustrated in an example to be a single medium, the term “machine-readable medium” can include a single medium or multiple media (e.g., a centralized or distributed database, and/or associated caches and servers) that store the one or more instructions 9024. The term “machine-readable medium” shall also be taken to include any tangible medium that is capable of storing, encoding, or carrying instructions for execution by the machine and that cause the machine to perform any one or more of the methodologies of the present disclosure or that is capable of storing, encoding or carrying data structures utilized by or associated with such instructions. The term “machine-readable medium” shall accordingly be taken to include, but not be limited to, solid-state memories, and optical and magnetic media. Specific examples of machine-readable media include non-volatile memory, including, but not limited to, by way of example, semiconductor memory devices (e.g., electrically programmable read-only memory (EPROM), electrically erasable programmable read-only memory (EEPROM)) and flash memory devices; magnetic disks such as internal hard disks and removable disks; magneto-optical disks; and CD-ROM and DVD-ROM disks.
The instructions 9024 can further be transmitted or received over a communications network 9026 using a transmission medium via the network interface device 9020 utilizing any one of a number of well-known transfer protocols (e.g., HTTP). Examples of communication networks include a LAN, a. WAN, the Internet, mobile telephone networks, plain old telephone (POTS) networks, and wireless data networks (e.g., Wi-Fi, 3G, and 6G LTE/LTE-A or WiMAX networks). The term “transmission medium” shall be taken to include any intangible medium that is capable of storing, encoding, or carrying instructions for execution by the machine, and includes digital or analog communications signals or other intangible medium to facilitate communication of such software.
Various components are described in the present disclosure as being configured in a particular way. A component may be configured in any suitable manner. For example, a component that is or that includes a computing device may be configured with suitable software instructions that program the computing device. A component may also be configured by virtue of its hardware arrangement or in any other suitable manner.
The above description is intended to be illustrative, and not restrictive. For example, the above-described examples (or one or more aspects thereof) can be used in combination with others. Other embodiments can be used, such as by one of ordinary skill in the art upon reviewing the above description. The Abstract is to allow the reader to quickly ascertain the nature of the technical disclosure, for example, to comply with 37 C.F.R. § 1.72(b) in the United States of America. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims.
Also, in the above Detailed Description, various features can be grouped together to streamline the disclosure. However, the claims cannot set forth every feature disclosed herein as embodiments can feature a subset of said features. Further, embodiments can include fewer features than those disclosed in a particular example. Thus, the following claims are hereby incorporated into the Detailed Description, with a claim standing on its own as a separate embodiment. The scope of the embodiments disclosed herein is to be determined with reference to the appended claims, along with the full scope of equivalents to which such claims are entitled.
This application is a continuation of U.S. patent application Ser. No. 15/669,460, filed Aug. 4, 2017, which is incorporated by reference herein in its entirety.
Number | Name | Date | Kind |
---|---|---|---|
4893338 | Pastor | Jan 1990 | A |
5872844 | Yacobi | Feb 1999 | A |
5878138 | Yacobi | Mar 1999 | A |
6250557 | Forslund et al. | Jun 2001 | B1 |
7118027 | Sussman | Oct 2006 | B2 |
7120609 | Kerkdijk | Oct 2006 | B1 |
7207480 | Geddes | Apr 2007 | B1 |
RE40444 | Linehan | Jul 2008 | E |
7702898 | Tan | Apr 2010 | B2 |
7822688 | Labrou et al. | Oct 2010 | B2 |
8041338 | Chen et al. | Oct 2011 | B2 |
8291065 | Goodman et al. | Oct 2012 | B2 |
8423462 | Amacker et al. | Apr 2013 | B1 |
8510220 | Rackley, III | Aug 2013 | B2 |
8577803 | Chatterjee et al. | Nov 2013 | B2 |
8583926 | Benson | Nov 2013 | B1 |
8595502 | Saito | Nov 2013 | B2 |
8732022 | White | May 2014 | B2 |
8739267 | Le Rouzic et al. | May 2014 | B2 |
8761397 | Wright | Jun 2014 | B1 |
8769260 | Kwan et al. | Jul 2014 | B1 |
8839369 | Dai et al. | Sep 2014 | B1 |
8849075 | Painter et al. | Sep 2014 | B2 |
8880896 | Elliott | Nov 2014 | B1 |
8903093 | Kim et al. | Dec 2014 | B2 |
9208488 | Liberty | Dec 2015 | B2 |
9246672 | Smith | Jan 2016 | B2 |
9317018 | Spodak et al. | Apr 2016 | B2 |
9325696 | Balfanz et al. | Apr 2016 | B1 |
9355186 | Khanna et al. | May 2016 | B2 |
9386012 | Nichols et al. | Jul 2016 | B2 |
9704143 | Walker et al. | Jul 2017 | B2 |
9721147 | Kapczynski | Aug 2017 | B1 |
9734345 | Spodak et al. | Aug 2017 | B2 |
9858572 | Brickell et al. | Jan 2018 | B2 |
9898740 | Weller | Feb 2018 | B2 |
9904800 | Spodak et al. | Feb 2018 | B2 |
9940618 | Kang | Apr 2018 | B2 |
20010007983 | Lee | Jul 2001 | A1 |
20040158746 | Hu et al. | Aug 2004 | A1 |
20050114367 | Serebrennikov | May 2005 | A1 |
20060159260 | Pereira et al. | Jul 2006 | A1 |
20060165060 | Dua | Jul 2006 | A1 |
20070094727 | Singh | Apr 2007 | A1 |
20070125838 | Law et al. | Jun 2007 | A1 |
20070125840 | Law et al. | Jun 2007 | A1 |
20080022089 | Leedom | Jan 2008 | A1 |
20080208743 | Arthur et al. | Aug 2008 | A1 |
20090125429 | Takayama | May 2009 | A1 |
20100024015 | Hardt | Jan 2010 | A1 |
20100191602 | Mikkelsen et al. | Jul 2010 | A1 |
20110061012 | Lim et al. | Mar 2011 | A1 |
20120005078 | Pitroda | Jan 2012 | A1 |
20120036067 | Lee et al. | Feb 2012 | A1 |
20120072350 | Goldthwaite | Mar 2012 | A1 |
20120136732 | McMillen et al. | May 2012 | A1 |
20120159149 | Martin et al. | Jun 2012 | A1 |
20120174007 | Lee et al. | Jul 2012 | A1 |
20120198174 | Nellans et al. | Aug 2012 | A1 |
20120210041 | Flynn et al. | Aug 2012 | A1 |
20120221774 | Atkisson et al. | Aug 2012 | A1 |
20120239578 | Kang et al. | Sep 2012 | A1 |
20120240203 | Kling | Sep 2012 | A1 |
20120290449 | Mullen et al. | Nov 2012 | A1 |
20130275307 | Khan | Oct 2013 | A1 |
20130275656 | Talagala et al. | Oct 2013 | A1 |
20130290316 | Bhatnagar et al. | Oct 2013 | A1 |
20140032394 | Liberty et al. | Jan 2014 | A1 |
20140040147 | Varadarajan et al. | Feb 2014 | A1 |
20140058938 | Mcclung, III | Feb 2014 | A1 |
20140129357 | Goodwin | May 2014 | A1 |
20140188719 | Poornachandran et al. | Jul 2014 | A1 |
20140279566 | Verma et al. | Sep 2014 | A1 |
20140337230 | Bacastow | Nov 2014 | A1 |
20140372298 | Singh et al. | Dec 2014 | A1 |
20140372299 | Singh et al. | Dec 2014 | A1 |
20150006377 | Kang | Jan 2015 | A1 |
20150019567 | Li | Jan 2015 | A1 |
20150067833 | Verma et al. | Mar 2015 | A1 |
20150089438 | Wu et al. | Mar 2015 | A1 |
20150206210 | Liberty et al. | Jul 2015 | A1 |
20150254640 | Cassano et al. | Sep 2015 | A1 |
20150332395 | Walker et al. | Nov 2015 | A1 |
20160012465 | Sharp | Jan 2016 | A1 |
20160019542 | Eischen | Jan 2016 | A1 |
20160028550 | Gaddam et al. | Jan 2016 | A1 |
20160055483 | Liberty | Feb 2016 | A1 |
20160092696 | Guglani et al. | Mar 2016 | A1 |
20160117660 | Prakash et al. | Apr 2016 | A1 |
20160162882 | McClung, III | Jun 2016 | A1 |
20160358199 | Van Os | Dec 2016 | A1 |
20160379297 | Aspholm | Dec 2016 | A1 |
20170032370 | Beltramino et al. | Feb 2017 | A1 |
20170201850 | Raleigh | Jul 2017 | A1 |
20170243315 | Ellerstein | Aug 2017 | A1 |
Number | Date | Country |
---|---|---|
102693378 | Sep 2012 | CN |
102015006907 | Dec 2016 | DE |
Entry |
---|
Terri Bradford, Where Social Networks, Payments and Banking Intersect, Dec. 2012, Federal Reserve Bank of Kansas City, web, 2-5 (Year: 2012). |
U.S. Appl. No. 15/264,531, filed Sep. 13, 2016, Secure Digital Communications. |
U.S. Appl. No. 15/669,460, filed Aug. 4, 2017, Consolidating Application Access in a Mobile Wallet. |
“Apple Pay”, [Online]. Retrieved from the Internet: <URL: http://www.apple.com/apple-pay/, (Accessed Mar. 31, 2016), 8 pgs. |
“U.S. Appl. No. 15/264,532, Corrected Notice of Allowance dated May 2, 2018”, 2 pgs. |
“U.S. Appl. No. 15/264,532, Examiner Interview Summary dated Apr. 23, 2018”, 2 pgs. |
“U.S. Appl. No. 15/264,532, Notice of Allowance dated Apr. 23, 2018”, 16 pgs. |
“U.S. Appl. No. 15/264,540, Notice of Allowance dated Apr. 17, 2018”, 2 pgs. |
“U.S. Appl. No. 15/394,526, Examiner Interview Summary dated Apr. 20, 2018”, 2 pgs. |
“U.S. Appl. No. 15/394,526, Notice of Allowance dated Apr. 20, 2018”, 17 pgs. |
“U.S. Appl. No. 15/669,460, Examiner Interview Summary dated Apr. 7, 2020”, 3 pgs. |
“U.S. Appl. No. 15/669,460, Non Final Office Action dated Jan. 6, 2020”, 5 pgs. |
“U.S. Appl. No. 15/669,460, Notice of Allowance dated May 15, 2020”, 8 pgs. |
“U.S. Appl. No. 15/669,460, Response filed Apr. 6, 2020 to Non Final Office Action dated Jan. 6, 2020”. |
“Business Description”, SET Secure Electronic Transaction Specification, (May 1997), 80 pgs. |
“Electronic Commerce Modeling Language”, RFC 4112—Version 2 Specification, (Jun. 2005), 36 pgs. |
“Formal Protocol Definition”, SET Secure Electronic Transaction Specification, (May 1997), 262 pgs. |
“How email works (MTA, MDA, MUA)”, [Online]. Retrieved from the Internet: <URL: kioskea.net> http://ccm.net/contents/116-how-email-works-mta-mda-mua, (Jun. 2014), 2 pgs. |
“How EMV (Chip & PIN) Works—Transaction Flow Chart”, EMV Level 2 Kernels, [Online]. [Accessed Feb. 28, 2019]. Retrieved from the Internet: <URL: https://www.level2kernel.com/flow-chart.html>, 3 pgs. |
“Online E Wallet System with Decentralized Credential Keepers”, Mobile Networks and Applications 8, (2003), 87-99. |
“Programmers Guide”, SET Secure Electronic Transaction Specification, (May 1997), 629 pgs. |
“The ‘mailto’ URI Scheme”, RFC 6068, (Oct. 2010), 17 pgs. |
“Uniform Resource Identifier”, RFC3986, (Jan. 2005), 61 pgs. |
“Why 6 confirmations?”, Bitcoin, [Online]. [Accessed May 23, 2017]. Retrieved from the Internet: <URL: https://www.reddit.com/r/Bitcoin/comments/1cqyb1/why_6_confirmations/ >, 4 pgs. |
Bradford, Terri, “Where Social Networks, Payments and Banking Intersect”, (Dec. 2012), 7 pgs. |
Crispin, M., “internet Message Access Protocol”, Version 4rev1—Network Working Group RFC3501, (Mar. 2003), 108 pgs. |
Dove, Jackie, “Mobile Wallets: Apple Pay vs Samsung Pay vs Google Pay”, Tom's Guide Updated Jan. 17, 2018, [Online]. [Accessed Feb. 28, 2019]. Retrieved from the Internet: <URL: https://www.tomsguide.com/us/mobile-wallet-guide,news-20666.html>, 8 pgs. |
Egan, Matt, “What is NFC? Uses of NFC | How to use NFC on your smartphone”, Tech Advisor, [Online]. [Accessed Feb. 28, 2019]. Retrieved from the Internet: <URL: https://www.techadvisor.co.uk/how-to/mobile-phone/what-is-nfc-how-nfc-works-what-it-does-3472879/>, (May 12, 2015), 5 pgs. |
Geuss, Megan, “How Apple Pay and Google Wallet actually work”, [Online]. Retrieved from the Internet: <URL: http://arstechnica.com/gadgets/2014/10/how-mobile-payments-really-work/1/, (Oct. 29, 2014), 5 pgs. |
Geuss, Megan, “Why Apple Pay could succeed where others have had underwhelming results”, [Online]. Retrieved from the Internet: <URL: http://arstechnica.com/apple/2014/09/why-apple-pay-could-succeed-where-others-have-had-underwhelming-results/, (Sep. 14, 2014), 6 pgs. |
Kar, Ian, “Here's How the Security Behind Apple Pay Will Really Work”, [Online]. Retrieved from the Internet: <URL: http://bankinnovation.net/2014/09/heres-how-the-security-behind-apple-pay-will-really-work/, (Sep. 12, 2014), 5 pgs. |
Klensin, J., “Simple Mail Transfer Protocol”, RFC5321, (Oct. 2008), 96 pgs. |
Labrou, Yannis, et al., “Wireless Wallet”, The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. IEEE, (2004), 10 pgs. |
Mallat, Niina, et al., “Mobile Banking Service”, Communications of the ACM, vol. 47, No. 5, (May 2004), 42-46. |
Myers, J., et al., “Post Office Protocol—Version 3 degree”, RFC 1939, (May 1996), 24 pgs. |
Zhao, Hao, et al., “The Concept of Secure Mobile Wallet”, Internet Security, IEEE Xplore, 2011 World Congress, Feb. 21-23, 2011, (2011), 5 pgs. |
Number | Date | Country | |
---|---|---|---|
Parent | 15669460 | Aug 2017 | US |
Child | 16988352 | US |