Not applicable.
Not applicable.
A point-of-sale (POS) terminal or station may receive payment information associated with a purchase and seek authorization for payment from a back-end financial system, for example a credit card authorization service. The point-of-sale terminal may receive the financial information from a contactless card. A contactless card communicates with a point-of-sale terminal or other device at least in part without physically contacting the point-of-sale terminal, for example through radio frequency communication conducted in the proximity of the point-of-sale terminal. This radio frequency communication may include near field communication (NFC) technology.
Various payment cards, retail loyalty cards, and product coupons may be employed in different payment and/or purchase scenarios. For example, in paying for groceries at a point-of-sale (POS) terminal a customer may present a loyalty card issued by the grocery store chain, one or more product coupons, and either a credit card or a debit card. In another payment scenario, a commuter may present a transit card to obtain access to a mass transit vehicle.
In an embodiment, a method for point-of-sale transactions is disclosed. The method comprises a point-of-sale terminal receiving confidential information from a portable electronic device over a contactless communication link, the confidential information being used by the point-of-sale terminal to complete the transaction. The method also includes substantially blocking access to the contactless communication link beyond the area adjacent to the point-of-sale terminal to reduce eavesdropping on the confidential information.
In another embodiment, a point-of-sale terminal is disclosed. The point-of-sale terminal comprises a contactless communication transceiver configured to receive an emission containing confidential information from a portable electronic device. The point-of-sale terminal also comprises an enclosure having an aperture to promote at least partial insertion of the portable electronic device, wherein the enclosure is constructed to promote substantially confining the emission within the enclosure, to reduce eavesdropping on the confidential information, while promoting the transceiver receiving the emission.
In an additional embodiment, another point-of-sale terminal is disclosed. The point-of-sale terminal comprises a near field communication (NFC) transceiver configured to receive a radio frequency (RF) signal containing financial information from a portable electronic device to complete a payment transaction. The point-of-sale terminal also comprises a least one RF absorber panel positioned to substantially reduce propagation of the RF signal containing financial information beyond the RF absorber panel to reduce eavesdropping on the RF signal containing the financial information.
These and other features will be more clearly understood from the following detailed description taken in conjunction with the accompanying drawings and claims.
For a more complete understanding of this disclosure, reference is now made to the following brief description, taken in connection with the accompanying drawings and detailed description, wherein like reference numerals represent like parts.
It should be understood at the outset that although an illustrative implementation of one or more embodiments are provided below, the disclosed systems and/or methods may be implemented using any number of techniques, whether currently known or in existence. The disclosure should in no way be limited to the illustrative implementations, drawings, and techniques illustrated below, including the exemplary designs and implementations illustrated and described herein, but may be modified within the scope of the appended claims along with their full scope of equivalents.
Payment for products or services using contactless communication, for example a smart card or a mobile phone containing an electronic wallet application communicating with a point-of-sale terminal using near field communications (NFC) technology, may be vulnerable to eavesdropping and identity theft. An identity thief may electronically eavesdrop on an NFC payment transaction, capture financial information including a credit card account number and a personal identification number (PIN), which may include encrypted and/or hashed versions of these numbers, and later use this financial information to charge payments for goods and services. The present disclosure describes several embodiments of methods and systems for reducing the risk of eavesdropping on contactless communication. In one embodiment an enclosure is provided at the point-of-sale terminal which substantially blocks the propagation of the contactless communication beyond the enclosure. The shopper, for example, may insert a transmitting end of a portable electronic device containing an electronic wallet application into an aperture of the enclosure. The exchange of contactless communication signals between the portable electronic device and a contactless communication transceiver of the point-of-sale terminal, consequently, takes place within the enclosure and reduces the opportunity for eavesdropping. Alternatively, the shopper while holding the device may insert the entire portable electronic device into an aperture of the enclosure. In another embodiment, absorber panels are positioned effectively around the point-of-sale terminal to substantially block propagation of the contactless communication signal beyond the immediate vicinity of the point-of-sale terminal, thereby reducing the chances for eavesdropping unobserved at a discrete distance.
Turning now to
The POS terminal 104 may be embodied as a general purpose computer system, to be discussed in greater detail hereinafter. The POS terminal 104 communicates via contactless communication with the portable electronic device 102 by any of a variety of means including near field communication (NFC) technology, infra-red, ultra-sonic, optical, radio frequency (RF), and other communication links. The POS terminal 104 may be connected to databases or networked to servers (not shown) which provide product and service pricing information, including any discounting associated with a loyalty card and/or product coupons. In an embodiment, the POS terminal 104 may include a device for scanning a product, for example a bar code reader or radio frequency identification (RFID) reader, to identify a product and to add the associated cost to an accumulating purchase total.
The payment authorization center 106 may authenticate and authorize charges to a credit card such as VISA card, AMERICAN EXPRESS card, MASTERCARD card, DISCOVER card, gasoline company card, or other credit card. The authorization handshake may require transmission of account identification, for example an account number or a credit card number. Additionally, the authorization handshake may require further authentication information such as a personal identification number (PIN), a driver's license number, a security code associated with the credit card, or other authentication information. If the payment authorization center 106 approves the transaction, the payment authorization center 106 charges the appropriate account in the amount of the transaction and sends payment approval. The payment authorization center 106 may be implemented as a general purpose computer system.
The network 108 may be any of a public switched telephone network (PSTN), a public data network (PDN), or a combination thereof.
The portable electronic device 102 may be any of a variety of devices including but not limited to a mobile phone, a personal digital assistant (PDA), and a smart card. An exemplary embodiment of a handset suitable to implementing several embodiments of this disclosure, for example a mobile phone and a PDA, is discussed in detail hereinafter. A smart card may promote paying for goods and services in much the same way as a credit, card, a debit card, and a transit card are used, by providing the appropriate financial information at the POS terminal 104. In an embodiment, for example when the portable electronic device 102 is a mobile phone, the portable electronic device 102 may include an electronic wallet application, also referred to as an eWallet, configured to provide a variety of financial and payment capabilities. The electronic wallet application may promote paying for products or services with the portable electronic device 102 in much the same way as presenting a credit card, a debit card, or a transit card for payment, by providing the appropriate financial information to the POS terminal 104. Additionally, the electronic wallet application may promote paying from a payment account.
The financial information, which may also be referred to as confidential information, when it is transmitted from the portable electronic device 102 to the POS terminal 104 may be exposed to theft by others who could use the financial information to make unauthorized or fraudulently authorized payments for goods and services. For example, the NFC signals, the RF signals, the infrared signals, or other communication link signals may propagate or spread out beyond the POS terminal 104 and be received by an identify thief. The contactless communication signals may reflect off surfaces and/or objects and spread out around the POS terminal 104 and be received by an identify thief.
In an embodiment, the POS terminal 104 may begin or initialize a payment transaction by sending an initiation message to the portable electronic device 102 via contactless communication, for example NFC technology. The POS terminal 104 may receive confidential information from the portable electronic device 102, for example a credit card number and a PIN or encrypted or hashed versions of these numbers. To avoid the theft of the confidential information, the system 100 may block access to the radiated signal, for example a radiated NFC signal, by substantially blocking the propagation of the radiated signal beyond the area adjacent to the POS terminal 104. In an embodiment, the majority of the energy of the NFC signal containing confidential information may be confined within, for example, a radius of 2 feet of an NFC transceiver (not shown). In another embodiment, the majority of the energy of the NFC signal containing the confidential information may be confined within a larger radius, for example a radius of 20 feet. In this later case, it may be possible to readily detect an identity thief actively capturing the confidential information at a distance of 20 feet. In an embodiment, sufficient attenuation of the contactless communication signal and/or sufficiently limiting the direction of the contactless communication signal may provide important assistance in discouraging identify theft of the confidential information.
Turning now to
In an embodiment, the absorber pads 130 may be installed with known gaps positioned where a prospective eavesdropper would be exposed to plain sight. Because an identity thief would be unlikely to attempt to eavesdrop from that direction and risk ready detection, there may be no need to invest in the cost of installing absorber pads 130 in those directions.
In different embodiments, different numbers of absorber pads 130 may be used, and the absorber pads 130 may be located or positioned variously depending upon the specific installation configuration of the POS terminal 104 and the surrounding environment. In
The absorber pads 130 may be covered with radiation absorbent material (RAM) that prevents or materially attenuates the reflection of radiation incident upon the absorber pads 130, for example NFC radiation, RF radiation, or other contactless communication radiation. The RAM may comprise special paint designed to attenuate reflection of incident radiation. The RAM may comprise arrays of pyramid shaped pieces, each of which is constructed of radiation energy absorbing or “lossy” material. The RAM may be selected to be effective at a specific frequency that matches the frequency of the contactless communication signal frequency. The pyramid shaped pieces of lossy material may be covered with a smooth sheet of material that permits the radiation to pass through, for example to provide a more aesthetically appealing appearance.
Turning now to
In this position, the NFC signals exchanged between the NFC transceiver 140 and the portable electronic device 102 may be substantially contained within the interior of the enclosure 142, thereby reducing the risk that the confidential information carried by the NFC signals can be captured by an identity thief. In an embodiment the interior of the enclosure 142 may be covered at least partially by RAM as described above. Alternatively, the interior of the enclosure 142 may be lined with metal sheets, metal coated fabric, fabric woven to contain interconnecting metal threads, whereby the radiation of the NFC signals beyond the enclosure 142 may be attenuated. Alternatively, the enclosure 142 may be constructed, at least partially, of a metal material, metal coated fabric, fabric woven to contain interconnecting metal threads, or a metal mesh or chain mail, whereby the radiation of the NFC signals beyond the enclosure 142 may be attenuated. To be effective, the several RF shielding structures described above may be coupled to an electrical ground. In an embodiment, the portable electronic device 102 is substantially enclosed by RF shielding or RAM at least on the portion of the portable electronic device 102 that remains outside of the enclosure 142, such that RF emission from the body of the portable electronic device 102 is substantially attenuated. In an embodiment, this shielding or RAM may be integral with the packaging, shell, or case of the portable electronic device 102.
Additionally, in an embodiment, the metal material, metal coated fabric, interconnecting threads, and metal mesh or chain mail portions of the enclosure 142 may have small holes or openings, where the small holes have diameters no larger than on the order of about 1/10 the wavelength of the NFC signals employed. Small holes or openings in the enclosure 142 may promote visibility into the enclosure. In an embodiment, linearly polarized NFC signals may be employed, in which case the openings may be no larger than on the order or about 1/10 the wavelength of the NFC signals employed in the appropriate direction of polarization, while openings may be larger in directions of non-aligned polarization. These and other RF shielding structures are contemplated by the present disclosure.
In one embodiment, NFC signals having a center frequency of about 1.3 GHz may be employed, in which case the openings may be about 1 inch or smaller. In another embodiment, NFC signals having a center frequency of about 2.4 GHz may be employed, in which case the openings may be about ½ inch or smaller. In another embodiment, NFC signals having a center frequency of about 5.8 GHz may be employed, in which case the openings may be about ⅕ inch or smaller. It will be appreciated by one skilled in the art and/or knowledgeable about electromagnetics that holes somewhat larger than those defined above may still be effective to attenuate radiation of the confidential NFC signals beyond the enclosure 142, that there is not a step-function transition between effective attenuation and ineffective attenuation as the hole size increases, and therefore larger holes are also contemplated by this disclosure.
Turning now to
Turning now to
In an embodiment, the user may activate a function of the portable electronic device 102 to enable the transmission of confidential information to the NFC transceiver 140. In an embodiment, the portable electronic device 102 may respond to the user activation by starting a timer, for example a 10 second timer or other effective length of time, and transmitting the confidential information to the NFC transceiver 140 after the timer expires, thereby allowing time for the user to place the portable electronic device 102 inside the enclosure 142 and to close the enclosure door 144 before transmitting the confidential information to the NFC transceiver 140. In another embodiment, the portable electronic device 102 may respond to the user activation by entering a communication mode in which it will transmit the confidential information to the NFC transceiver 140 when the NFC transceiver 140 initiates a handshaking procedure. The operator of the POS terminal 104 may observe when the user has closed the enclosure door 144 and enter a control input to the POS terminal 104 that prompts the NFC transceiver 140 to initiate the handshaking procedure to cause the portable electronic device 102 to transmit the confidential information. Yet other methods of delaying the transmission of confidential information from the portable electronic device 102 to the NFC transceiver 140 until after the enclosure door 144 has been closed are contemplated by the present disclosure.
When the payment transaction is completed, the user opens the enclosure door 144 and retrieves the portable electronic device 102. An indicator light may be placed on the outside of the enclosure 142 to indicate to the customer when the payment transaction has completed, as an indication that they may then open the door 144 and retrieve their portable electronic device 102.
In another embodiment, the inside surface of the enclosure 142 and of the enclosure door 144 are covered with a metal sheet or a metal mesh, wherein the metal on the inside surface of the enclosure 142 and the metal on the inside surface of the enclosure door 144 are in electrical contact, at least while the enclosure door 144 is in the closed position. In this embodiment, the enclosure 142 and the enclosure door 144 form a Faraday cage that attenuates the radiation of the confidential information contained in the NFC signal beyond the confines of the enclosure 142.
Turning now to
The handset 400 includes a display 402 and a touch-sensitive surface or keys 404 for input by a user. The handset 400 may present options for the user to select, controls for the user to actuate, and/or cursors or other indicators for the user to direct. The handset 400 may further accept data entry from the user, including numbers to dial or various parameter values for configuring the operation of the handset. The handset 400 may further execute one or more software or firmware applications in response to user commands. These applications may configure the handset 400 to perform various customized functions in response to user interaction. Additionally, the handset 400 may be programmed and/or configured over-the-air, for example from a wireless base station, a wireless access point, or a peer handset 400. The handset 400 may have RAM on several interior sides, for example on several interior surfaces, not including on an antenna end, of a cover or package of the handset 400.
The handset 400 may execute a web browser application which enables the display 402 to show a web page. The web page may be obtained via wireless communications with a cell tower 406, a wireless network access node, a peer handset 400 or any other wireless communication network or system. The cell tower 406 (or wireless network access node) is coupled to a wired network 408, such as the Internet. Via the wireless link and the wired network, the handset 400 has access to information on various servers, such as a server 410. The server 410 may provide content that may be shown on the display 402. Alternately, the handset 400 may access the cell tower 406 through a peer handset 400 acting as an intermediary, in a relay type or hop type of connection. The handset 400 may conduct payment transactions using contactless communications means with the POS terminal 104, for example using a contactless communication transceiver (not shown).
The DSP 502 or some other form of controller or central processing unit operates to control the various components of the handset 400 in accordance with embedded software or firmware stored in memory 504 or stored in memory contained within the DSP 502 itself. In addition to the embedded software or firmware, the DSP 502 may execute other applications stored in the memory 504 or made available via information carrier media such as portable data storage media like a removable memory card (not shown) or via wired or wireless network communications. The application software may comprise a compiled set of machine-readable instructions that configure the DSP 502 to provide the desired functionality, or the application software may be high-level software instructions to be processed by an interpreter or compiler to indirectly configure the DSP 502.
The antenna and front end unit 506 may be provided to convert between wireless signals and electrical signals, enabling the handset 400 to send and receive information from a cellular network or some other available wireless communications network or from a peer handset 400. In an embodiment, the antenna and front end unit 506 may include multiple antennas whereby to support beam forming and/or multiple input multiple output (MIMO) operations. As is known to those skilled in the art, MIMO operations may provide spatial diversity which can be used to overcome difficult channel conditions and/or increase channel throughput. The antenna and front end unit 506 may include antenna tuning and/or impedance matching components, RF power amplifiers, and/or low noise amplifiers.
The RF transceiver 508 provides frequency shifting, converting received RF signals to baseband and converting baseband transmit signals to RF. In some descriptions a radio transceiver or RF transceiver may be understood to include other signal processing functionality such as modulation/demodulation, coding/decoding, interleaving/deinterleaving, spreading/despreading, inverse fast fourier transforming (IFFT)/fast fourier transforming (FFT), cyclic prefix appending/removal, and other signal processing functions. For the purposes of clarity the description here separates the description of this signal processing from the RF and/or radio stage and conceptually allocates that signal processing to the analog baseband processing unit 510 and/or the DSP 502 or other central processing unit. In some embodiments the RF transceiver 508, portions of the antenna and front end 506, the analog baseband processing unit 510 may be combined in one or more processing units and/or application specific integrated circuits (ASICs).
The analog baseband processing unit 510 may provide various analog processing of inputs and outputs, for example analog processing of inputs from the microphone 512 and outputs to the earpiece speaker 514. To that end, the analog baseband processing unit 510 may have ports for connecting to the built-in microphone 512 and the earpiece speaker 514 that enable the handset 400 to be used as a cell phone. The analog baseband processing unit 510 may further include a port for connecting to a headset or other hands-free microphone and speaker configuration. The analog baseband processing unit 510 may provide digital-to-analog conversion in one signal direction and analog-to-digital conversion in the opposing signal direction. In some embodiments at least some of the functionality of the analog baseband processing unit 510 may be provided by digital processing components, for example by the DSP 502 or by other central processing units.
The DSP 502 may perform modulation/demodulation, coding/decoding, interleaving/deinterleaving, spreading/despreading, inverse fast fourier transforming (IFFT)/fast fourier transforming (FFT), cyclic prefix appending/removal, and other signal processing functions associated with wireless communications. In an embodiment, for example in a code division multiple access (CDMA) technology application, for a transmitter function the DSP 502 may perform modulation, coding, interleaving, and spreading and for a receiver function the DSP 502 may perform despreading, deinterleaving, decoding, and demodulation. In another embodiment, for example in an orthogonal frequency division multiplex access (OFDMA) technology application, for the transmitter function the DSP 502 may perform modulation, coding, interleaving, inverse fast fourier transforming, and cyclic prefix appending and for a receiver function the DSP 502 may perform cyclic prefix removal, fast fourier transforming, deinterleaving, decoding, and demodulation. In other wireless technology applications yet other signal processing functions and combinations of signal processing functions may be performed by the DSP 502.
The DSP 502 may communicate with a wireless network via the analog baseband processing unit 510. In some embodiments, the communication may provide Internet connectivity, enabling a user to gain access to content on the Internet and to send and receive e-mail or text messages. The input/output interface 518 interconnects the DSP 502 and various memories and interfaces. The memory 504 and the removable memory card (not shown) may provide software and data to configure the operation of the DSP 502. Among the interfaces may be the NFC transceiver card 520, the USB port 522, and the infrared port 524. The NFC transceiver card 520 may promote communications between the handset 400 and the POS terminal 104. The USB port 522 may enable the handset 400 to function as a peripheral device to exchange information with a personal computer or other computer system. The infrared port 524 and other optional ports such as a Bluetooth interface or an IEEE 802.11 compliant wireless interface may enable the handset 400 to communicate wirelessly with other nearby handsets and/or wireless base stations.
The input/output interface 518 may further connect the DSP 502 to the biometric sensor 516 and to the accelerometer 526. The biometric sensor 516 may detect various biometric characteristics or signatures of a user and provide appropriate biometric input to the DSP 502 or other processor. The accelerometer 526 may serve as a mechanism to sense distinctive movements of the handset 400 and to provide appropriate motion input to the DSP 502 or other processor. In an embodiment, a different transducer may be employed to detect and/or sense distinctive movements of the handset 400.
The keypad 528 couples to the DSP 502 via the interface 518 to provide one mechanism for the user to make selections, enter information, and otherwise provide input to the handset 400. Another input mechanism may be the touch screen LCD 530, which may also display text and/or graphics to the user. The touch screen LCD controller 532 couples the DSP 502 to the touch screen LCD 530.
The CCD camera 534 enables the handset 400 to take digital pictures. The DSP 502 communicates with the CCD camera 534 via the camera controller 536. The GPS sensor 538 is coupled to the DSP 502 to decode global positioning system signals, thereby enabling the handset 400 to determine its position. In another embodiment, a camera operating according to a technology different from Charge Coupled Device cameras may be employed. Various other peripherals may also be included to provide additional functions, e.g., radio and television reception.
Portions of the system 100 described above, for example the POS terminal 104 and the payment authorization center 106, may be implemented on any general-purpose computer with sufficient processing power, memory resources, and network throughput capability to handle the necessary workload placed upon it.
The secondary storage 784 is typically comprised of one or more disk drives or tape drives and is used for non-volatile storage of data and as an over-flow data storage device if RAM 788 is not large enough to hold all working data. Secondary storage 784 may be used to store programs which are loaded into RAM 788 when such programs are selected for execution. The ROM 786 is used to store instructions and perhaps data which are read during program execution. ROM 786 is a non-volatile memory device which typically has a small memory capacity relative to the larger memory capacity of secondary storage. The RAM 788 is used to store volatile data and perhaps to store instructions. Access to both ROM 786 and RAM 788 is typically faster than to secondary storage 784.
I/O devices 790 may include printers, video monitors, liquid crystal displays (LCDs), touch screen displays, keyboards, keypads, switches, dials, mice, track balls, voice recognizers, card readers, paper tape readers, or other well-known input devices. The network connectivity devices 792 may take the form of modems, modem banks, ethernet cards, universal serial bus (USB) interface cards, serial interfaces, token ring cards, fiber distributed data interface (FDDI) cards, wireless local area network (WLAN) cards, radio transceiver cards such as code division multiple access (CDMA) and/or global system for mobile communications (GSM) radio transceiver cards, and other well-known network devices. These network connectivity devices 792 may enable the processor 782 to communicate with an Internet or one or more intranets. With such a network connection, it is contemplated that the processor 782 might receive information from the network, or might output information to the network in the course of performing the above-described method steps. Such information, which is often represented as a sequence of instructions to be executed using processor 782, may be received from and outputted to the network, for example, in the form of a computer data signal embodied in a carrier wave
Such information, which may include data or instructions to be executed using processor 782 for example, may be received from and outputted to the network, for example, in the form of a computer data baseband signal or signal embodied in a carrier wave. The baseband signal or signal embodied in the carrier wave generated by the network connectivity devices 792 may propagate in or on the surface of electrical conductors, in coaxial cables, in waveguides, in optical media, for example optical fiber, or in the air or free space. The information contained in the baseband signal or signal embedded in the carrier wave may be ordered according to different sequences, as may be desirable for either processing or generating the information or transmitting or receiving the information. The baseband signal or signal embedded in the carrier wave, or other types of signals currently used or hereafter developed, referred to herein as the transmission medium, may be generated according to several methods well known to one skilled in the art.
The processor 782 executes instructions, codes, computer programs, scripts which it accesses from hard disk, floppy disk, optical disk (these various disk based systems may all be considered secondary storage 784), ROM 786, RAM 788, or the network connectivity devices 792.
While several embodiments have been provided in the present disclosure, it should be understood that the disclosed systems and methods may be embodied in many other specific forms without departing from the spirit or scope of the present disclosure. The present examples are to be considered as illustrative and not restrictive, and the intention is not to be limited to the details given herein. For example, the various elements or components may be combined or integrated in another system or certain features may be omitted, or not implemented.
Also, techniques, systems, subsystems and methods described and illustrated in the various embodiments as discrete or separate may be combined or integrated with other systems, modules, techniques, or methods without departing from the scope of the present disclosure. Other items shown or discussed as coupled or directly coupled or communicating with each other may be indirectly coupled or communicating through some interface, device, or intermediate component whether electrically, mechanically, or otherwise. Other examples of changes, substitutions, and alterations are ascertainable by one skilled in the art and could be made without departing from the spirit and scope disclosed herein.
This application is a divisional of and claims priority under 35 U.S.C. §120 to U.S. application Ser. No. 11/863,229, filed on Sep. 27, 2007, entitled, “Method and System for Blocking Confidential Information at a Point-of-Sale Reader from Eavesdropping”, by Allison DiMartino, et al., which is incorporated herein by reference in its entirety.
Number | Name | Date | Kind |
---|---|---|---|
5453601 | Rosen | Sep 1995 | A |
5496966 | Hightower et al. | Mar 1996 | A |
5989720 | Taniyama | Nov 1999 | A |
6122625 | Rosen | Sep 2000 | A |
6298442 | Kocher et al. | Oct 2001 | B1 |
6446049 | Janning et al. | Sep 2002 | B1 |
6584326 | Boydston et al. | Jun 2003 | B1 |
6655587 | Andrews et al. | Dec 2003 | B2 |
6679423 | Ijichi et al. | Jan 2004 | B2 |
6810521 | Gelgon et al. | Oct 2004 | B1 |
6879965 | Fung et al. | Apr 2005 | B2 |
6880085 | Balczewski et al. | Apr 2005 | B1 |
7146159 | Zhu | Dec 2006 | B1 |
7194438 | Sovio et al. | Mar 2007 | B2 |
7233785 | Yamagishi et al. | Jun 2007 | B2 |
7269256 | Rosen | Sep 2007 | B2 |
7275095 | Lebouill | Sep 2007 | B1 |
7413113 | Zhu | Aug 2008 | B1 |
7434723 | White et al. | Oct 2008 | B1 |
7475044 | Kawai et al. | Jan 2009 | B1 |
7494067 | Zhu | Feb 2009 | B1 |
7533063 | Kianian | May 2009 | B2 |
7546956 | Adams et al. | Jun 2009 | B2 |
7567795 | Champion et al. | Jul 2009 | B1 |
7644039 | Magee et al. | Jan 2010 | B1 |
7644859 | Zhu | Jan 2010 | B1 |
7707113 | DiMartino et al. | Apr 2010 | B1 |
7748636 | Finn | Jul 2010 | B2 |
7819307 | Lyons et al. | Oct 2010 | B2 |
7822688 | Labrou et al. | Oct 2010 | B2 |
7926713 | Yamada et al. | Apr 2011 | B2 |
7926714 | Zhu | Apr 2011 | B1 |
7974926 | Ohmori et al. | Jul 2011 | B2 |
8055184 | DiMartino et al. | Nov 2011 | B1 |
8060449 | Zhu | Nov 2011 | B1 |
8107953 | Zimmerman et al. | Jan 2012 | B2 |
8123128 | Zhu | Feb 2012 | B1 |
8126806 | DiMartino et al. | Feb 2012 | B1 |
8165961 | DiMartino et al. | Apr 2012 | B1 |
8200582 | Zhu | Jun 2012 | B1 |
8244169 | DiMartino et al. | Aug 2012 | B1 |
8249935 | DiMartino et al. | Aug 2012 | B1 |
8250662 | Zhu | Aug 2012 | B1 |
8290433 | Fisher et al. | Oct 2012 | B2 |
8332272 | Fisher | Dec 2012 | B2 |
8352323 | Fisher | Jan 2013 | B2 |
8468095 | DiMartino et al. | Jun 2013 | B1 |
8655310 | Katzer et al. | Feb 2014 | B1 |
20010005184 | Tsuno et al. | Jun 2001 | A1 |
20020006806 | Kinnunen et al. | Jan 2002 | A1 |
20020011519 | Shults, III | Jan 2002 | A1 |
20020016838 | Geluc et al. | Feb 2002 | A1 |
20020018016 | Radonic | Feb 2002 | A1 |
20020052754 | Joyce et al. | May 2002 | A1 |
20020062284 | Kawan | May 2002 | A1 |
20020123971 | Maritzen et al. | Sep 2002 | A1 |
20020147913 | Lun Yip | Oct 2002 | A1 |
20030009382 | D'Arbeloff et al. | Jan 2003 | A1 |
20030028481 | Flitcroft et al. | Feb 2003 | A1 |
20030032409 | Hutcheson et al. | Feb 2003 | A1 |
20030045328 | Natsuno | Mar 2003 | A1 |
20030070080 | Rosen | Apr 2003 | A1 |
20030083933 | McAlear | May 2003 | A1 |
20030149900 | Glassman et al. | Aug 2003 | A1 |
20030211862 | Hutchison, IV et al. | Nov 2003 | A1 |
20040093265 | Ramchandani et al. | May 2004 | A1 |
20040122771 | Celi, Jr. et al. | Jun 2004 | A1 |
20040166839 | Okkonen et al. | Aug 2004 | A1 |
20040192303 | Puthenkulam | Sep 2004 | A1 |
20040203601 | Morriss et al. | Oct 2004 | A1 |
20050186989 | Cocita | Aug 2005 | A1 |
20050216424 | Gandre et al. | Sep 2005 | A1 |
20050234778 | Sperduti et al. | Oct 2005 | A1 |
20050278192 | Cantini et al. | Dec 2005 | A1 |
20060073808 | Buchert | Apr 2006 | A1 |
20060085847 | Ikeuchi et al. | Apr 2006 | A1 |
20060136334 | Atkinson et al. | Jun 2006 | A1 |
20060164318 | Lastinger et al. | Jul 2006 | A1 |
20060165060 | Dua | Jul 2006 | A1 |
20060167823 | York et al. | Jul 2006 | A1 |
20060191995 | Stewart et al. | Aug 2006 | A1 |
20060211408 | Yamagishi et al. | Sep 2006 | A1 |
20070010213 | Dewan | Jan 2007 | A1 |
20070011461 | Jeng | Jan 2007 | A1 |
20070080215 | Ramachandran et al. | Apr 2007 | A1 |
20070095892 | Lyons et al. | May 2007 | A1 |
20070125840 | Law et al. | Jun 2007 | A1 |
20070145152 | Jogand-Coulomb et al. | Jun 2007 | A1 |
20070197261 | Humbel | Aug 2007 | A1 |
20070198410 | Labgold et al. | Aug 2007 | A1 |
20070223685 | Boubion et al. | Sep 2007 | A1 |
20070233615 | Tumminaro | Oct 2007 | A1 |
20070234427 | Gardner et al. | Oct 2007 | A1 |
20070244811 | Tumminaro | Oct 2007 | A1 |
20070248232 | Driscoll et al. | Oct 2007 | A1 |
20070255620 | Tumminaro et al. | Nov 2007 | A1 |
20070255652 | Tumminaro et al. | Nov 2007 | A1 |
20070278290 | Messerges et al. | Dec 2007 | A1 |
20070281664 | Kaneko et al. | Dec 2007 | A1 |
20070291995 | Rivera | Dec 2007 | A1 |
20080059379 | Ramaci et al. | Mar 2008 | A1 |
20080067240 | Nakano et al. | Mar 2008 | A1 |
20080078831 | Johnson et al. | Apr 2008 | A1 |
20080116264 | Hammad et al. | May 2008 | A1 |
20080121687 | Buhot | May 2008 | A1 |
20080126260 | Cox et al. | May 2008 | A1 |
20080201212 | Hammad et al. | Aug 2008 | A1 |
20080238610 | Rosenberg | Oct 2008 | A1 |
20080297306 | Huajun et al. | Dec 2008 | A1 |
20080315989 | Mirkazemi-Moud et al. | Dec 2008 | A1 |
20090018964 | Liu et al. | Jan 2009 | A1 |
20090046858 | Iyer et al. | Feb 2009 | A1 |
20090050689 | Sako et al. | Feb 2009 | A1 |
20090078761 | Sines | Mar 2009 | A1 |
20090097531 | Franceschini et al. | Apr 2009 | A1 |
20090112765 | Skowronek | Apr 2009 | A1 |
20090253409 | Slavov et al. | Oct 2009 | A1 |
20090270174 | Kelly et al. | Oct 2009 | A1 |
20090313689 | Nyström et al. | Dec 2009 | A1 |
20090327292 | Janssen et al. | Dec 2009 | A1 |
20100030651 | Matotek et al. | Feb 2010 | A1 |
20100094752 | Heath | Apr 2010 | A1 |
20100133337 | Van Rensburg | Jun 2010 | A1 |
20110006112 | Mueller | Jan 2011 | A1 |
20110053560 | Jain et al. | Mar 2011 | A1 |
20110225655 | Niemelä et al. | Sep 2011 | A1 |
Entry |
---|
FAIPP Pre-Interview Communication dated Feb. 21, 2012, U.S. Appl. No. 13/270,205. |
Notice of Allowance dated Apr. 9, 2012, U.S. Appl. No. 13/270,205. |
Office Action—Restriction dated Mar. 14, 2011, U.S. Appl. No. 12/371,901. |
Office Action dated Apr. 14, 2011, U.S. Appl. No. 12/371,901. |
Final Office Action dated Oct. 14, 2011, U.S. Appl. No. 12/371,901. |
Advisory Action dated Feb. 9, 2012, U.S. Appl. No. 12/371,901. |
Final Office Action dated Feb. 26, 2013, U.S. Appl. No. 12/099,771. |
Dimartino, Allison, “Method for Launching an Electronic Wallet,” Filing Date—Jan. 4, 2012, U.S. Appl. No. 13/343,708. |
Katzer, Robin D., et al., Patent Application entitled, “Control of Secure Elements through Point-of-Sale Device,” filed Apr. 8, 2008, U.S. Appl. No. 12/099,771. |
Persson, Sarah A.V., et al., Patent Application entitled, “Electronic Wallet Removal from Mobile Electronic Devices,” filed Feb. 16, 2009, U.S. Appl. No. 12/371,901. |
Baker, D., “Real-Time Provisioning of SIM cards: A Boon to GSM Operators”, Apr. 13, 2011. http://www.billingworld.com/blogs/baker/2011/04/real-time-provisioning-of-sim-cards-a-boon-to-gsm.aspx. |
BlackBerry Enterprise Server for Microsoft Exchange, Version 4.0—Handheld Management Guide, Last Modified Aug. 18, 2006, Research in Motion Limited, Canada. |
BlackBerry Enterprise Server for Microsoft Exchange, Version 4.0—Administration Guide, Last Modified Nov. 10, 2006, Research in Motion Limited, Canada. |
Derfler, Frank J., et al., “How Networks Work,” Sep. 2000, Que Corporation, A Division of MacMillan Computer Publishing, USA. |
Anonymous, “Sourcebook '96,” Progressive Grocer Sourcebook '96 Supplement, Dec. 1995, pp. Cover-48, Maclean-Hunter Media Inc. |
Office Action dated Jun. 17, 2009, U.S. Appl. No. 11/949,759, filed Dec. 3, 2007. |
Office Action dated Nov. 13, 2009, U.S. Appl. No. 11/949,759, filed Dec. 3, 2007. |
Office Action dated May 25, 2010, U.S. Appl. No. 11/949,759, filed Dec. 3, 2007. |
Final Office Action dated Sep. 10, 2010, U.S. Appl. No. 11/949,759, filed Dec. 3, 2007. |
Office Action dated Feb. 15, 2011, U.S. Appl. No. 11/949,759, filed Dec. 3, 2007. |
Final Office Action dated Aug. 5, 2011, U.S. Appl. No. 11/949,759, filed Dec. 3, 2007. |
Notice of Allowance dated Oct. 17, 2011, U.S. Appl. No. 11/949,759, filed Dec. 3, 2007. |
Restriction Requirement dated Aug. 6, 2012, U.S. Appl. No. 13/343,708, filed Jan. 4, 2012. |
FAIPP Pre-Interview Communication dated Sep. 12, 2012, U.S. Appl. No. 13/343,708, filed Jan. 4, 2012. |
FAIPP Office Action dated Nov. 15, 2012, U.S. Appl. No. 13/343,708, filed Jan. 4, 2012. |
Notice of Allowance dated Feb. 11, 2013, U.S. Appl. No. 13/343,708, filed Jan. 4, 2012. |
Pre-Interview Communication dated Nov. 15, 2011, U.S. Appl. No. 13/207,645, filed Aug. 11, 2011. |
Notice of Allowance dated Apr. 2, 2012, U.S. Appl. No. 13/207,645, filed Aug. 11, 2011. |
Office Action dated Feb. 17, 2009, U.S. Appl. No. 11/863,229, filed Sep. 27 2007. |
Office Action dated Sep. 14, 2009, U.S. Appl. No. 11/863,229, filed Sep. 27, 2007. |
Office Action dated Dec. 24, 2009, U.S. Appl. No. 11/863,229, filed Sep. 27, 2007. |
Final Office Action dated Jun. 22, 2010, U.S. Appl. No. 11/863,229, filed Sep. 27, 2007. |
Office Action dated Mar. 16, 2011, U.S. Appl. No. 11/863,229, filed Sep. 27, 2007. |
Final Office Action dated Aug. 22, 2011, U.S. Appl. No. 11/863,229, filed Sep. 27, 2007. |
Advisory Action dated Oct. 21, 2011, U.S. Appl. No. 11/863,229, filed Sep. 27, 2007. |
Notice of Allowance dated Apr. 9, 2012, U.S. Appl. No. 11/863,229, filed Sep. 27, 2007. |
Office Action dated Mar. 6, 2009, U.S. Appl. No. 11/863,632, filed Sep. 28, 2007. |
Office Action dated May 6, 2009, U.S. Appl. No. 11/863,632, filed Sep. 28, 2007. |
Notice of Allowance dated Dec. 1, 2009, U.S. Appl. No. 11/863,632. |
Pre-Interview Communication dated Nov. 9, 2011, U.S. Appl. No. 12/702,270, filed Feb. 8, 2010. |
Notice of Allowance dated Dec. 14, 2011, U.S. Appl. No. 12/702,270, filed Feb. 8, 2010. |
Office Action dated Mar. 11, 2011, U.S. Appl. No. 12/022,903. |
Notice of Allowance dated Jun. 21, 2011, U.S. Appl. No. 12/022,903. |
Supplemental Notice of Allowance dated Sep. 13, 2011, U.S. Appl. No. 12/022,903. |
Supplemental Notice of Allowance dated Sep. 28, 2011, U.S. Appl. No. 12/022,903. |
Office Action dated Mar. 1, 2011, U.S. Appl. No. 12/099,771. |
Office Action dated Aug. 3, 2011, U.S. Appl. No. 12/099,771. |
Final Office Action dated Jan. 4, 2012, U.S. Appl. No. 12/099,771. |
Office Action dated Aug. 21, 2012, U.S. Appl. No. 12/099,771. |
Office Action dated Jan. 13, 2011, U.S. Appl. No. 12/348,377. |
Final Office Action dated Jun. 20, 2011, U.S. Appl. No. 12/348,377. |
Advisory Action dated Aug. 30, 2011, U.S. Appl. No. 12/348,377. |
Notice of Allowance dated Jan. 5, 2012, U.S. Appl. No. 12/348,377. |
Office Action—Restriction dated Mar. 16, 2011, U.S. Appl. No. 12/348,371. |
Office Action dated May 24, 2011, U.S. Appl. No. 12/348,371. |
Notice of Allowance dated Sep. 9, 2011, U.S. Appl. No. 12/348,371. |
Supplemental Notice of Allowance dated Oct. 6, 2011, U.S. Appl. No. 12/348,371. |
Notice of Allowance dated Oct. 2, 2013, U.S. Appl. No. 12/099,771. |
Notice of Allowance dated Feb. 28, 2014, U.S. Appl. No. 12/371,901. |
Number | Date | Country | |
---|---|---|---|
Parent | 11863229 | Sep 2007 | US |
Child | 13535337 | US |