Method and system for mobile banking using a server

Information

  • Patent Grant
  • 11847649
  • Patent Number
    11,847,649
  • Date Filed
    Monday, April 20, 2015
    9 years ago
  • Date Issued
    Tuesday, December 19, 2023
    11 months ago
  • Inventors
  • Original Assignees
    • (Berkeley, CA, US)
  • Examiners
    • Smith; Slade E
Abstract
A method for transmitting data between a mobile communication device and a server. The method includes running a mobile application on the mobile communication device. The mobile application is hosted on the mobile communication device through the server as a Software as a Service (SaaS). The method further includes transmitting data associated with the mobile application between the mobile communication device and the server, in which transmission of the data between the mobile communication device and the server is monitored through the server.
Description
FIELD OF INVENTION

The present invention relates to data communications and wireless devices.


BACKGROUND OF THE INVENTION

Mobile communication devices—e.g., cellular phones, personal digital assistants, and the like—are increasingly being used to conduct payment transactions as described in U.S. patent application Ser. No. 11/933,351, entitled “Method and System For Scheduling A Banking Transaction Through A Mobile Communication Device”, and U.S. patent application Ser. No. 11/467,441, entitled “Method and Apparatus For Completing A Transaction Using A Wireless Mobile Communication Channel and Another Communication Channel, both of which are incorporated herein by reference. Such payment transactions can include, for example, purchasing goods and/or services, bill payments, and transferring funds between bank accounts. Given the sensitive nature of personal money or banking data that may be stored on a mobile communication device as a result of the ability to transact payments, it is critical to protect a user from fraudulent usage due to, e.g., loss or theft of a mobile communication device.


BRIEF SUMMARY OF THE INVENTION

In general, in one aspect, this specification describes a method for transmitting data between a mobile communication device and a server. The method includes running a mobile application on the mobile communication device. The mobile application is hosted on the mobile communication device through a management server. The method further includes transmitting data associated with the mobile application between the mobile communication device and the server, in which transmission of the data between the mobile communication device and the management server is monitored through the management server.


Implementations can include one or more of the following features. Transmitting data can include generating a session key that is only valid for a given communication session between the mobile communication device and the server. The method can further include disabling use of the mobile application running on the mobile communication device through the management server by invalidating the session key. The method can further include timing out a given communication session between the mobile communication device and the management server after a pre-determined amount of time to prevent theft of data that is accessible through the mobile application. Transmitting data associated with the mobile application between the mobile communication device and the management server can include prompting a user to enter a payment limit PIN in response to a pending purchase exceeding a pre-determined amount. The payment limit PIN can be applied to all purchases globally or on a per-payment basis. The method can include use of biometrics to authenticate the user before authorizing the transaction. The mobile application can comprise a payment transaction application that permits a user to perform one or more of the following services including bill payment, fund transfers, or purchases through the mobile communication device. The mobile application can permit a user to subscribe to each of the services separately.


The details of one or more implementations are set forth in the accompanying drawings and the description below. Other features and advantages will be apparent from the description and drawings, and from the claims.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 illustrates one implementation of a block diagram of a communication system including a wireless mobile communication device.



FIG. 2 illustrates one implementation of the wireless mobile communication device of FIG. 1.



FIG. 3 illustrates one implementation of a method for authenticating a user.



FIG. 4 illustrates one implementation of a method for remotely locking use of a mobile application on a mobile communication device.





Like reference symbols in the various drawings indicate like elements.


DETAILED DESCRIPTION OF THE INVENTION


FIG. 1 illustrates one implementation of a communication system 100. The communication system 100 includes a hand-held, wireless mobile communication device 102 a point-of-sale device 104 and a remote server 106. In one implementation, the mobile communication device 102 includes a mobile application (discussed in greater detail below) that permits a user of the mobile communication device 102 to conduct payment transactions. Payment transactions can include, for example, using contactless payment technology at a retail merchant point of sale (e.g., through point of sale device 104), using mobile/internet commerce (e.g., purchase tickets and products, etc.), storage of payment information and other digital artifacts (receipts, tickets, coupons, etc), storage of banking information (payment account numbers, security codes, PIN's, etc.), and accessing banking service (account balance, payment history, bill pay, fund transfer, etc.), and so on.


In one implementation, the mobile application running on the mobile communication device 102 implements one or more of the following tools to secure data that may be stored and presented on the mobile communication device 102 as a result of a payment transaction. The mobile application can implemented one the mobile communication device 102 through a management server which hosts and operates (either independently or through a third-party) the application for use by its customers over the Internet, or other wireless network (e.g., a private network), or a wired network. In one implementation, customers do not pay for owning the software itself but rather for using the software. In one implementation, the mobile application is accessible through an API accessible over the Web (or other network). The mobile application can include a multi-factored PIN-based login and authentication, and include session keys and have command-level authentication. In one implementation, the mobile application running on the mobile communication device 102 can be remotely locked through a remote server (e.g., remote server 106). In one implementation, a PIN request can be implemented to limit the amount of purchases that can be made. Further, security codes for different payment methods can be implemented to protect a user. Each of these tools is discussed in greater detail below.



FIG. 2 illustrates one implementation of the mobile communication device 102. The mobile communication device 102 includes a mobile application 200 that (in one implementation) is provided to the mobile communication device 102 through a remote server (e.g., remote server 106). In one implementation, the mobile application is a Mobile Wallet application available from Mobile Candy Dish, Inc., of Berkeley, Calif. Providing the mobile application as a hosted service enables central monitoring and management of all security aspects of the service at the remote server. In addition, data (corresponding to a payment transaction) can be stored on the remote server (e.g., remote server 106 (FIG. 1)) in a secure manner. In one implementation, the remote server is a management server that is can be maintained by Mobile Candy Dish or a trusted third party, as described in U.S. patent application Ser. No. 11/933,351. For example, the data can be securely stored on the remote server using conventional PCI guidelines. Hence, in the event the mobile communication device 102 is lost (or stolen), no confidential data can be recovered as no data is stored on the mobile communication device 102. In addition, an added benefit is that a user can recover seamlessly by syncing new mobile communication device (via new installation of the mobile application) with the service. Thus, in one implementation, sensitive information (e.g., banking account numbers, credit card account numbers, expiry dates, and so on) are never stored on the mobile communication device. This reduces risk and exposure of the user's private information and data.


Client Login and Authentication


In general, while effort is made to minimize storage of sensitive user information and data in a memory of a mobile communication device, in one implementation, some data is stored in the memory of a mobile communication device due to reasons of performance, usability and user experience. For example, data may need to be stored on a mobile communication device in the following circumstances. Payment credentials, coupons, tickets, and so on may have to be stored on the secure element of an NFC phone. Account balance, banking payment history, etc., may be locally cached on a mobile communication device. In one implementation, a user can opt-in to save payment method security codes in the client (or mobile application) for convenience. Tickets and/or coupons may be locally cached so that a user can redeem the tickets and/or coupons in an offline mode. For example, a mobile communication device may be offline in a situation in which network connectivity inside a building is degraded, and storing a ticket and/or coupon in a local cache of the mobile communication device permits the user to access the ticket or coupon.


In addition to data partitioning, in one implementation, users have an ability to subscribe to different services. For example, User A may subscribe to “Mobile Payments” and “Mobile Banking” services, while User B may only subscribe to “Mobile Banking” and “What's Nearby” services. Hence, in one implementation, the mobile application includes a mechanism to enable/disable different services on the Client based on particular services to which users are subscribed. Table 1 below illustrates example services that are enabled/disabled based on user subscriptions.











TABLE 1





USER
SERVICE
SUBSCRIPTION STATUS







User A
Money Manager
Disabled


User B
Money Manager
Transaction Only


User C
Money Manager
Transaction, Payment


User D
Money Manager
Transaction, Payment, BillPay, FundTransfer










The above example control access to the Money Manager service and what privileges within the service a given user can perform. This will be used by the Client (mobile application) to enable/disable available features on the Client.


In one implementation, when a user subscribes to a mobile wallet the user is assigned credentials that include a unique WalletID, SiteKey, a user-defined PIN, as well as tokens that specify access and privileges for the different services. FIG. 3 illustrates one implementation of a method 300 for authenticating a user. User input is received (through a mobile communication device) logging into the mobile application service (step 302). In one implementation, when a user attempts to login with the client, the user is prompted to enter login credentials (e.g., mobile phone number, 1-time activation code, Wallet PIN, etc.). A session key is generated (step 304). In one implementation, the session key is a unique server-generated session key that is valid only for the duration of a given session. In one implementation, the session key is used to ensure the server can identify the client and ensure that the client has been previously authenticated. Upon a successful login, the server will transfer credentials, service access and privileges (step 306), which are locally cached on the mobile communication device. The service access and privileges control the behavior of the client. In one implementation, to prevent command spoofing, the session key is passed in every API server call. The server will validate (every time) the session key is valid. If valid, the API server call is processed. Failure to validate the session key will cause a failure. In such a case, the client will flush the cached PIN and force the user to re-authenticate (or re-login).


Remote Lock


In one implementation, a mobile application running on a mobile communication device can be remotely locked (or disabled) by invalidating a session key. Users, via calling a Customer Care, a personal web portal, or some other mechanism, can implement changes (e.g., change PIN, etc.) that causes the server to invalidate the session key. In real-time, the next attempt by the client to issue an API server call, validation of the session key will fail, which (in one implementation) causes the client to automatically flush the cached PIN and session key, and force the user to re-authenticate. In addition, the client can perform additional actions, in addition to flushing the cached PIN and session key. This includes, but is not limited to, one or more of the following: changing the secure element mode to effective temporarily or permanently disable the secure element—i.e., a user can remotely alter the state of the smart chip to lock it remotely; and deleting all cached data stored in the memory (or disk) of the mobile communication device.


Session Time Out


In one implementation, while a client is open, a user has access to transaction data. In such an implementation, users who may misplace a mobile communication device while the client is open may expose the user to risk of information theft. Therefore, in one implementation, mobile application (or client) shuts down after a period of inactivity. Additional tasks that can be associated with the shutdown procedure can include, but is not limited to, temporarily shutting down a secure element (of the mobile communication device) to prevent NFC payments, NFC coupon redemption, and NFC ticket redemption.


Payment Limit PIN


For payments (mobile commerce ticket purchase, etc.), in one implementation a user can prevent either fraudulent purchases or accidental purchases by forcing a PIN prompt when a purchase amount exceed a user-specified value. In one implementation, a user can control this behavior globally (e.g., across all users' payment methods) or on a per-payment-method basis. Thus, when a user purchases ticket and selects a payment method (to pay for purchase), if the transaction amount exceeds a specified payment method's limit, the client will trigger and prompt for the PIN. In order to proceed with purchase, the user has to enter the correct PIN. The user's input is validated against the cached PIN on the client. The payment transaction will proceed if validated. Otherwise, an appropriate response is generated to the user. Effectively, this is a mechanism for the user (not the Merchant or Issuing Bank) to throttle/control the dollar amount that can be authorized for various payments and transactions. In the event of a contactless purchase, the client controls the smart chip. In the event of an electronic purchase (ticketing, etc.), a server can manages the controls.


Local Storage of Payment Security Codes


As a convenience to users, a user can opt-in and have only the security codes (CVV, etc.) associated to each of their payment methods locally stores on the client. In one implementation, management tools are provided to add/delete/edit these security codes. In one implementation, the security codes are encrypted (Key Management of encryption key performed by a server) and then only stored in the client on the mobile communication device. In one implementation, security codes are not stored in any form on the server. The encryption key and security codes can be kept separately to prevent fraudulent usage.


Although the present invention has been particularly described with reference to implementations discussed above, various changes, modifications and substitutes are can be made. Accordingly, it will be appreciated that in numerous instances some features of the invention can be employed without a corresponding use of other features. Further, variations can be made in the number and arrangement of components illustrated in the figures discussed above.

Claims
  • 1. A method for conducting a mobile banking transaction using a server, the method comprising: maintaining, at the server, a payment method;receiving, at the server, user input login information from a non-browser based application stored on a mobile device, wherein the non-browser based application stored on the mobile device receives the user input login information via a mobile device display of the mobile device, wherein the non-browser based application is a mobile operating system platform based application with a graphical user interface that is downloaded and installed on the mobile device, wherein the graphical user interface includes a graphical icon; the mobile device including the mobile device display, a mobile device memory, a mobile device processor, a mobile device radio transceiver that supports voice and data interactions through a first wireless communication channel using at least one of GSM or CDMA, and a mobile device wireless fidelity (Wi-Fi) interface;upon receipt of the user input login information, authenticating at the server a user of the mobile device associated with the user input login information prior to conducting the mobile banking transaction;receiving at the server user input from the non-browser based application to initiate a mobile banking transaction request including an identification code associated with the user, wherein the non-browser based application stored on the mobile device receives user input via the mobile device display of the mobile device;after receiving the mobile banking transaction request including the identification code associated with the user, processing at the server the mobile banking transaction using the payment method that corresponds to the identification code associated with the user; andafter the mobile banking transaction has been processed, sending, from the server, a digital artifact to the non-browser based application.
  • 2. The method of claim 1, wherein the mobile banking transaction comprises a bill payment.
  • 3. The method of claim 1, wherein the mobile banking transaction comprises a funds transfer.
  • 4. The method of claim 1, wherein the mobile banking transaction comprises loading funds.
  • 5. The method of claim 1, wherein the digital artifact is a receipt, ticket, coupon, advertisement, or content.
  • 6. The method of claim 1, wherein the user input login information includes biometric data or a personal identification number (PIN).
  • 7. The method of claim 1, further wherein the digital artifact is cached on the mobile communication device and can be accessed by the non-browser based application when there is no network connection.
  • 8. The method of claim 1, wherein upon the condition that the mobile device loses connection with a wireless network, the non-browser based application monitors for access to the wireless network and automatically reconnects to the wireless network when the wireless network is available.
  • 9. The method of claim 1, further wherein no sensitive data is stored on the mobile device, wherein the sensitive data comprises at least one of information related to the payment method, information related to a PIN associated with the user input login information, and information related to an expiration dates associated with the payment method.
  • 10. The method of claim 1, further wherein the non-browser based application shuts down due to a period of inactivity, wherein the period of inactivity means the non-browser based application has not received input at the non-browser based application.
  • 11. The method of claim 1, further wherein the server is configured to store a single identification code associated with the user.
  • 12. A system for conducting a mobile banking transaction using a server comprising: a mobile device including;a mobile device display;a mobile device processor;a mobile device memory that maintains a non-browser based application, wherein the non-browser based application is a mobile operating system platform based application with a graphical user interface that is downloaded and installed on the mobile device, wherein the graphical user interface includes a graphical icon;a mobile device radio transceiver that supports voice and data interactions through a first wireless communication channel using at least one of GSM or CDMA;and a mobile device wireless fidelity (Wi-Fi) interface.the server including:a server memory that maintains a payment method;a server transceiver that receives user input login information from a the non-browser based application stored on a the mobile device, wherein the non-browser based application stored on the mobile device receives the user input login information via the mobile device display of the mobile device; andreceives user input into from the non-browser based application to initiate a mobile banking transaction request including an identification code associated with the user, wherein the non-browser based application stored on the mobile device receives the user input via the mobile device display of the mobile device; andafter the mobile banking transaction has been processed, sends a digital artifact to the non-browser based application;a server processor that upon receipt of the user input login information, authenticates a user of the mobile device associated with the user input login information prior to conducting the mobile banking transaction; andafter receiving the mobile banking transaction request including the identification code associated with the user, processes the mobile banking transaction using the payment method that corresponds to the identification code associated with the user.
  • 13. The system of claim 12, wherein the mobile banking transaction comprises a bill payment.
  • 14. The system of claim 12, wherein the mobile banking transaction comprises a funds transfer.
  • 15. The system of claim 12, wherein the mobile banking transaction comprises loading funds.
  • 16. The system of claim 12, wherein the digital artifact is a receipt, ticket, coupon, advertisement, or content.
  • 17. The system of claim 12, wherein the user input login information includes biometric data or a personal identification number (PIN).
  • 18. The system of claim 12, further wherein the digital artifact is cached on the mobile communication device and can be accessed by the non-browser based application when there is no network connection.
  • 19. The system of claim 12, wherein upon the condition that the mobile device loses connection with a wireless network, the non-browser based application monitors for access to the wireless network and automatically reconnects to the wireless network when the wireless network is available.
  • 20. The system of claim 12, further wherein no sensitive data is stored on the mobile device, wherein the sensitive data comprises at least one of information related to the payment method, information related to a PIN associated with the user input login information, and information related to an expiration dates associated with the payment method.
  • 21. The system of claim 12, further wherein the non-browser based application shuts down due to a period of inactivity, wherein the period of inactivity means the non-browser based application has not received input at the non-browser based application.
  • 22. The system of claim 12, further wherein the server is configured to store a single identification code associated with the user.
  • 23. A non-transitory computer readable medium for conducting a mobile banking transaction using a server, comprising: computer code for maintaining, at the server, a payment method;computer code for receiving, at the server, user input login information from a non-browser based application stored on a mobile device, wherein the non-browser based application stored on the mobile device receives the user input login information via a mobile device display of the mobile device; ,wherein the non-browser based application is a mobile operating system platform based application with a graphical user interface that is downloaded and installed on the mobile device, wherein the graphical user interface includes a graphical icon, the mobile device including the mobile device display, a mobile device memory, a mobile device processor, a mobile device radio transceiver that supports voice and data interactions through a first wireless communication channel using at least one of GSM or CDMA, and a mobile device wireless fidelity (Wi-Fi) interface;computer code for upon receipt of the user input login information, authenticating at the server, a user of the mobile device associated with the user input login information prior to conducting the mobile banking transaction;computer code for receiving at the server, user input from non-browser based application to initiate a mobile banking transaction request including an identification code associated with the user, wherein the non-browser based application stored on the mobile device receives the user input via a mobile device display of the mobile device;computer code for after receiving the mobile banking transaction request including the identification code associated with the user, processing at the server the mobile banking transaction using the payment method that corresponds to the identification code associated with the user; andcomputer code for after the mobile banking transaction has been processed, sending, from the server, a digital artifact to the non-browser based application.
CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation and claims priority to U.S. patent application Ser. No. 13/620,432 filed on Sep. 14, 2012, titled, “METHOD AND SYSTEM FOR MOBILE BANKING USING A MOBILE APPLICATION” which is a continuation and claims priority to U.S. patent application Ser. No. 11/939,821, filed Nov. 14, 2007, titled, “METHOD AND SYSTEM FOR SECURING TRANSACTIONS MADE THROUGH A MOBILE COMMUNICATION DEVICE” which is now U.S. Pat. No. 8,290,433B, all of which is incorporated by reference herein in its entirety.

US Referenced Citations (161)
Number Name Date Kind
6038367 Abecassis Mar 2000 A
6101483 Petrovich Aug 2000 A
6115601 Ferreira Sep 2000 A
6123259 Ogasawara Sep 2000 A
6128655 Fields Oct 2000 A
6141666 Tobin Oct 2000 A
6199082 Ferrel Mar 2001 B1
6250557 Forslund Jun 2001 B1
6415156 Stadelmann Jul 2002 B1
6450407 Freeman Sep 2002 B1
6587835 Treyz Jul 2003 B1
6605120 Fields Aug 2003 B1
6771981 Zalewski Aug 2004 B1
6772396 Cronin Aug 2004 B1
6886017 Jackson Apr 2005 B1
6950939 Tobin Sep 2005 B2
7031945 Donner Apr 2006 B1
7069248 Huber Jun 2006 B2
7096003 Joao Aug 2006 B2
7110744 Freeny Sep 2006 B2
7110792 Rosenberg Sep 2006 B2
7127236 Khan Oct 2006 B2
7200578 Paltenghe Apr 2007 B2
7289810 Jagadeesan Oct 2007 B2
7308254 Rissanen Dec 2007 B1
7357312 Gangi Apr 2008 B2
7379920 Leung May 2008 B2
7472829 Brown Jan 2009 B2
7482925 Hammad Jan 2009 B2
7512567 Bemmel Mar 2009 B2
7522905 Hammad Apr 2009 B2
7784684 Labrou Aug 2010 B2
7870077 Woo Jan 2011 B2
7979519 Shigeta Jul 2011 B2
8005426 Huomo Aug 2011 B2
8019362 Sweatman Sep 2011 B2
8073424 Sun Dec 2011 B2
8086534 Powell Dec 2011 B2
8109444 Jain Feb 2012 B2
8121945 Rackley Feb 2012 B2
8127984 Zatloukal Mar 2012 B2
20010011250 Paltenghe Aug 2001 A1
20010044751 Pugliese Nov 2001 A1
20010056402 Ahuja Dec 2001 A1
20020049670 Moritsu Apr 2002 A1
20020056091 Bala May 2002 A1
20020059100 Shore May 2002 A1
20020063895 Agata May 2002 A1
20020065774 Young May 2002 A1
20020077918 Lerner Jun 2002 A1
20020082879 Miller Jun 2002 A1
20020102963 Heinonen Aug 2002 A1
20020107756 Hammons Aug 2002 A1
20020120860 Ferguson Aug 2002 A1
20020160761 Wolfe Oct 2002 A1
20020169984 Kumar Nov 2002 A1
20020188565 Nakamura Dec 2002 A1
20030061113 Petrovich Mar 2003 A1
20030065805 Barnes Apr 2003 A1
20030074259 Slyman Apr 2003 A1
20030085286 Kelley May 2003 A1
20030087601 Agam May 2003 A1
20030093695 Dutta May 2003 A1
20030105641 Lewis Jun 2003 A1
20030132298 Swartz Jul 2003 A1
20030140004 O'Leary Jul 2003 A1
20030163359 Kanesaka Aug 2003 A1
20030172028 Abell Sep 2003 A1
20030191973 Johnson Oct 2003 A1
20030210127 Anderson Nov 2003 A1
20040006497 Nestor Jan 2004 A1
20040030658 Cruz Feb 2004 A1
20040034544 Fields Feb 2004 A1
20040073497 Hayes Apr 2004 A1
20040127256 Goldthwaite Jul 2004 A1
20040153668 Baier Saip Aug 2004 A1
20040235450 Rosenberg Nov 2004 A1
20040243519 Perttila Dec 2004 A1
20040254836 Emoke Barabas Dec 2004 A1
20040267618 Judicibus Dec 2004 A1
20040267665 Nam Dec 2004 A1
20050003810 Chu Jan 2005 A1
20050021363 Stimson Jan 2005 A1
20050027543 Labrou Feb 2005 A1
20050040230 Swartz Feb 2005 A1
20050076210 Thomas Apr 2005 A1
20050165646 Tedesco Jul 2005 A1
20050187873 Labrou Aug 2005 A1
20050215231 Bauchot Sep 2005 A1
20060018467 Steinmetz Jan 2006 A1
20060020559 Steinmetz Jan 2006 A1
20060031174 Steinmetz Feb 2006 A1
20060031752 Surloff Feb 2006 A1
20060089874 Newman Apr 2006 A1
20060136334 Atkinson Jun 2006 A1
20060143091 Yuan Jun 2006 A1
20060191995 Stewart Aug 2006 A1
20060206709 Labrou Sep 2006 A1
20060219780 Swartz Oct 2006 A1
20060224508 Fietz Oct 2006 A1
20070004391 Maffeis Jan 2007 A1
20070011066 Steeves Jan 2007 A1
20070011099 Sheehan Jan 2007 A1
20070022058 Labrou Jan 2007 A1
20070075133 Yeager Apr 2007 A1
20070095892 Lyons May 2007 A1
20070125838 Law Jun 2007 A1
20070125840 Law Jun 2007 A1
20070138299 Mitra Jun 2007 A1
20070143828 Jeal Jun 2007 A1
20070131759 Cox Jul 2007 A1
20070156436 Fisher Jul 2007 A1
20070210155 Swartz Sep 2007 A1
20070235519 Jang Oct 2007 A1
20070255662 Tumminaro Nov 2007 A1
20070270166 Hampel Nov 2007 A1
20070293155 Liao Dec 2007 A1
20080006685 Rackley, III Jan 2008 A1
20080010190 Rackley, III Jan 2008 A1
20080010196 Rackley Jan 2008 A1
20080017704 Vandeburg Jan 2008 A1
20080294556 Anderson Jan 2008 A1
20080040265 Rackley, III Feb 2008 A1
20080045172 Narayanaswami Feb 2008 A1
20080046366 Bemmel Feb 2008 A1
20080048022 Vawter Feb 2008 A1
20080051059 Fisher Feb 2008 A1
20080051142 Calvet Feb 2008 A1
20080052192 Fisher Feb 2008 A1
20080052233 Fisher Feb 2008 A1
20080059372 Lee Mar 2008 A1
20080066165 Rosenoer Mar 2008 A1
20080080411 Cole Apr 2008 A1
20080080457 Cole Apr 2008 A1
20080126145 Rackley, III May 2008 A1
20080139155 Boireau Jun 2008 A1
20080167988 Sun Jul 2008 A1
20080177668 Delean Jul 2008 A1
20080208681 Hammad Aug 2008 A1
20080208743 Arthur Aug 2008 A1
20080208744 Arthur Aug 2008 A1
20080208762 Arthur Aug 2008 A1
20080221997 Wolfe Sep 2008 A1
20080255947 Friedman Oct 2008 A1
20080275779 Lakshminarayanan Nov 2008 A1
20080305769 Rubinstein Dec 2008 A1
20080305774 Ramakrishna Dec 2008 A1
20090063312 Hurst Mar 2009 A1
20090075592 Nystrom Mar 2009 A1
20090098825 Huomo Apr 2009 A1
20090104888 Cox Apr 2009 A1
20090106112 Dalmia Apr 2009 A1
20090124234 Fisher May 2009 A1
20090132362 Fisher May 2009 A1
20090143104 Loh Jun 2009 A1
20090144161 Fisher Jun 2009 A1
20090227281 Hammad Sep 2009 A1
20100057619 Weller Mar 2010 A1
20100063895 Dominguez Mar 2010 A1
20100275010 Ghirardi Oct 2010 A1
20110320316 Randazza Dec 2011 A1
Foreign Referenced Citations (1)
Number Date Country
WO 2006095212 Sep 2006 WO
Non-Patent Literature Citations (35)
Entry
U.S. Appl. No. 11/933,351, Office Action datted Oct. 3, 2008, 5 p.
U.S. Appl. No. 11/939,821, Office Action dated Aug. 17, 2010, 11 p.
U.S. Appl. No. 11/933,351, Office Action dated Aug. 18, 2010, 16 p.
U.S. Appl. No. 11/933,321, Office Action dated May 27, 2010, 11 p.
“ViVOtech to Demonstrate Industry's First End-to-End Near Field Communication (NFC) Solution at the NRF Show.” Business Wire: 1 Jan. 16, 2006. Business Dateline; Hoover's Company Profiles; ProQuest Central. Web. Oct. 5, 2012.
MCA Specification Standard, 2002.
U.S. Appl. No. 11/933,337, Office Action dated May 27, 2010, 9 p.
U.S. Appl. No. 11/933,351, Office Action dated Oct. 3, 2008, 5 p.
U.S. Appl. No. 11/933,367, Office Action dated May 27, 2010, 8 p.
U.S. Appl. No. 11/467,441, Office Action dated May 27, 2009, 17 p.
U.S. Appl. No. 12/592,581, Office Action dated Jun. 4, 2010, 20 p.
U.S. Appl. No. 11/933,351, Office Action dated Jul. 8, 2009, 7 p.
U.S. Appl. No. 15/134,101, Office Action dated Nov. 2017.
U.S. Appl. No. 14/219,223, Office Action dated Jul. 3, 2018.
Deena, M. Amato, “Mobile Rewards.” Chain Store Age 82.5 (2006): 160, 161, 163. Hoover's Company Profiles; ProQuest Central. Web. Oct. 5, 2012.
Coupon . http://www.dictionary.com/browse/coupon?s=t.
URL https://en.wikipedia.org/wiki/URL.
“Text Messaging” https://en.m.wikipedia.org/wiki/Text_messaging.
“Text Based User Interface” https://en.wikipedia.org/wiki/User_interface.
“Web Browser” https://techterms.com/definition/web_browser.
“WAP” https://en.wikipedia.org/wiki/Wireless_Application_Protocol.
“Multimedia messaging” https://en.wikipedia.org/wiki/Multimedia_Messaging_Service#Technical_description.
Web based user interface https://en.wikipedia.org/wiki/User_interface.
Ajax https://techterms.com/definition/ajax.
Java script https://techterms.com/definition/javascript.
“Browser games” www.60freegames.com/Free-to-Play/Browser-Games.
“Online shopping” https://en.wikipedia.org/wiki/Online_shopping.
“Social networking services” https://en.wikipedia.org/wiki/Social_networking_service.
“Web mapping” https://en.wikipedia.org/wiki/Web_mapping.
“Mobile browser” https://en.wikipedia.org/wiki/Mobile_browser.
“Voice browser” https://en.wikipedia.org/wiki/Voice_browser.
“Email” https://techterms.com/definition/email.
“Web mail” https://en.wikipedia.org/wiki/Webmail ).
“WAP Browser” https://en.m.wikipedia.org/wiki/Wireless_Application_Protocol.
“Binary application” https://en.m.wikipedia.org/wiki/Application_binary_interface.
Related Publications (1)
Number Date Country
20150254634 A1 Sep 2015 US
Continuations (2)
Number Date Country
Parent 13620432 Sep 2012 US
Child 14691537 US
Parent 11939821 Nov 2007 US
Child 13620432 US