The present description relates generally to notification based provisioning of card accounts, including notification based provisioning of applets corresponding to card accounts for a wireless or contactless transaction system.
In a wireless transaction system, devices, such as phones, smart watches, etc., may also be used to conduct wireless transactions with wireless transaction terminals. For example, one or more applets that correspond to one or more card accounts (e.g., credit card accounts, debit card accounts, loyalty card accounts, etc.), may be provisioned on a secure element of an electronic device and used to conduct wireless transactions with wireless transaction terminals.
Certain features of the subject technology are set forth in the appended claims. However, for purpose of explanation, several embodiments of the subject technology are set forth in the following figures.
The detailed description set forth below is intended as a description of various configurations of the subject technology and is not intended to represent the only configurations in which the subject technology can be practiced. The appended drawings are incorporated herein and constitute a part of the detailed description. The detailed description includes specific details for the purpose of providing a thorough understanding of the subject technology. However, the subject technology is not limited to the specific details set forth herein and can be practiced using one or more other implementations. In one or more implementations, structures and components are shown in block diagram form in order to avoid obscuring the concepts of the subject technology.
In wireless transaction systems, one or more applets that correspond to a user's card accounts may be provisioned on a secure element of the user's device(s). The applets (credentials) on the secure element may be used to conduct wireless transactions with wireless transaction terminals, e.g., in lieu of using the physical cards that correspond to the card accounts. However, a user may need to add each card account to the wireless transaction system to have the corresponding applet provisioned on the user's device(s), which may, in a user's mind, be a daunting process that may create a perceived barrier to entry for utilizing the wireless transaction system. Further, a user may be required to separately add a card account to each of the user's devices on which the corresponding applet may be used, e.g., for electronic payment transactions.
The subject system provides a mechanism that proactively notifies a user of their card accounts that may be added to the wireless transaction system and enables the user to easily add such card accounts, thereby removing the perceived barrier to entry for utilizing the wireless transaction system. For example, the subject system may receive an indication of a card account of a user, such as from the entity that issued the card account, and/or from other sources. The subject system may then confirm that the card account is eligible to be added to the wireless transaction system. If the card account is eligible, the subject system proactively transmits a notification message to one or more of the user's devices, informing the user that they have a card account that is eligible to be added to the wireless transaction system. If the user approves of having the card account added to the wireless transaction system, the subject system initiates provisioning an applet corresponding to the card account on the user's device to add the card account to the wireless transaction system.
The network environment 100 includes one or more electronic devices, e.g., electronic devices 102A-B, a network 106, one or more wireless transaction system servers 110, and one or more service provider servers 120. The network 106 may communicatively couple, for example, one or more of the electronic devices 102A-B to the one or more wireless transaction system servers 110 and/or the one or more service provider servers 120, and the one or more wireless transaction system servers 110 to the one or more service provider servers 120. In one or more implementations, the network 106 may be an interconnected network of devices that may include, or may be communicatively coupled to, the Internet.
The one or more wireless transaction system servers 110 may include one or more servers that facilitate providing a wireless transaction system, such as a mobile payment system, to the electronic devices 102A-B. The one or more wireless transaction system servers 110 may include one or more trusted services manager (TSM) servers, one or more broker servers, one or more application servers, and/or generally any servers that may facilitate providing a wireless transaction system. In one or more implementations, an authorized user of one or more of the electronic devices 102A-B may have a user account with the wireless transaction system. The user account may be used, among other things, to manage the various card accounts and/or credentials that the user has registered with the wireless transaction system, e.g., via the one or more wireless transaction system servers 110. The one or more wireless transaction system servers 110 may be, and/or may include all or part of, the electronic system discussed below with respect to
The one or more service provider servers 120 may include one or more server devices that may facilitate a service being provided with respect to a card account of the user, such as a credit card service, a debit card service, a loyalty card service, an online content service, such as an online music service, a transit service, a membership service, and the like. In one or more implementations, the one or more service provider servers 120 may include one or more servers corresponding to one or more financial institutions, such as financial institutions that issue credit and/or debit cards. The one or more service provider servers 120 may include any/all of one or more TSM servers, one or more broker servers, one or more application servers, and/or generally any servers that may facilitate providing a service and/or utilizing wireless transactions for the service. In one or more implementations, an authorized user of the electronic device 102A may have a user account with one or more service providers associated with the one or more service provider servers 120. The one or more service provider servers 120 may be, and/or may include all or part of, the electronic system discussed below with respect to
One or more of the electronic devices 102A-B may be, for example, a portable computing device such as a laptop computer, a smartphone, a peripheral device (e.g., digital camera, headphones), a tablet device, a wearable device (e.g., watch, band, etc.), or other appropriate devices that include one or more wireless interfaces, such as one or more NFC radios, WLAN radios, Bluetooth radios, Zigbee radios, cellular radios, and/or other wireless radios. In
In one or more implementations, the electronic devices 102A-B may each include a secure element onto which one or more applets (e.g., representing one or more payment credentials) corresponding to, for example, card accounts of the user, may be provisioned. An example electronic device that includes a secure element is discussed further below with respect to
In order to have an applet corresponding to a card account with a given service provider provisioned onto a secure element of one or more of the electronic devices 102A-B, such as the electronic device 102A, a user of the electronic device 102A may access an application running on the electronic device 102A to input information regarding the card account, such as any/all of an account number, a picture of the corresponding physical card, a name, a security code, and the like. After entering the information, the one or more of the service provider servers 120 and/or the one or more wireless transaction system servers 110, such as a TSM server and/or a broker server, may cause the applet corresponding to the card account to be provisioned on a secure element of the electronic device 102A, such as by transmitting a provisioning script to be executed by the secure element of the electronic device 102A. The secure element may execute the provisioning script and provision the applet corresponding to the card account on the secure element of the electronic device 102A.
In the subject system, the one or more wireless transaction system servers 110 automatically receive indications of card accounts of the user, e.g. without the user having to input information regarding the card accounts. The one or more wireless transaction system servers 110 determine whether a card account is eligible to have a corresponding applet provisioned on the secure element of one or more of the electronic devices 102A-B of the user, such as the electronic device 102A, and, if so, transmit a notification to the one or more electronic devices (e.g., electronic device 102A) indicating the same. For example, the notification may proactively notify the user that they have a card account (a card on file (“CoF”)) that is eligible to be added to the electronic device 102A for use in one or more wireless transaction systems. In some embodiments, a CoF can be detected through any association with a user account. For example, a user can associate a payment card with a particular service that is linked to a user account, such as a media streaming service or an application service. The payment card can then be detected as a CoF associated with the user, which can trigger a notification of a CoF that is eligible to be provisioned to one or more electronic devices associated with the user account. Similarly, provisioning a card account on one electronic device associated with the user account can trigger a notification of a CoF that is eligible to be provisioned on one or more other electronic devices that also are associated with the user account.
The notification may be, for example, a notification message, such as a notification message displayed on a homescreen of the electronic device 102A or displayed within an application corresponding to the wireless transaction system, and/or the notification may be a text message, or any other form of message or notification. In one or more implementations, the notification may include a response mechanism, such as a selectable element, that allows the user to approve adding the card account to the electronic device 102A, e.g., for use in one or more wireless transaction systems. If the one or more wireless transaction system servers 110 receive an indication (directly or indirectly) that approves adding the card account to the electronic device 102A, the one or more wireless transaction system servers 110 initiate provisioning the applet corresponding to the card account on the secure element of the electronic device 102A.
If the one or more wireless transaction system servers 110 receive an indication disapproving (or declining) adding the card account to the wireless transaction system and/or there has been no response to the notification for a predetermined amount of time, the one or more wireless transaction system servers 110 store an indication that the user disapproved or did not respond to the notification to add the card account to the electronic device 102A for use in the wireless transaction system. The one or more wireless transaction system servers 110 may not notify the user again for a predetermined amount of time with respect to adding the card account to the electronic device 102A for use in the wireless transaction system.
Once an applet has been provisioned on the secure element of the electronic device 102A for a given card account, the user may use the electronic device 102A for a wireless transaction using the card account, such as a wireless payment transaction with a wireless transaction terminal. An example process for notification based provisioning of card accounts is discussed further below with respect to
The electronic device 102A may include a host processor 202, a memory 204, an NFC controller 206, and a secure element 208. The secure element 208 may include one or more interfaces for communicatively coupling (directly or indirectly) to the NFC controller 206 and/or the host processor 202, such as via one or more single wire protocol (SWP) connections and/or any other data connection. The secure element 208 may include one or more provisioned service provider applets 210A-N, which may be referred to herein as applets 212A-N that may correspond to different service providers. In one or more implementations, the operating system and/or execution environment of the secure element 208 may be a JAVA-based operating system and/or JAVA-based execution environment, and the applets 210A-N may be JAVA-based applets. In other implementations, other operating systems, languages, and/or environments can be implemented. In addition to the one or more applets 210A-N, the secure element 208 may also include one or more additional applets for performing other operations, such as a security applet, a registry applet, and the like.
The applets 210A-N may be provisioned on the secure element 208 in part by, for example, a trusted services manager server and/or a broker server, such as of the one or more wireless transaction system servers 110 and/or the one or more service provider servers 120. For example, the trusted services manager server and/or the broker server may transmit a provisioning script to the electronic device 102A via the network 106. In some implementations, the host processor 202 of the electronic device 102A may receive the script and may provide the script to the secure element 208, such as via the NFC controller 206 and/or directly to the secure element 208. The secure element 208 may perform one or more security mechanisms to verify the received script, such as one or more security mechanisms inherent in the GlobalPlatform framework, and may then execute the received script.
The execution of the script by the secure element 208 may cause one or more of the applets 210A-N to be provisioned on the secure element 208. Each of the applets 210A-N may be provisioned with one or more of: an applet identifier, a device primary account number (DPAN), an identifier of the associated service provider, and/or one or more attributes. The applet identifier associated with a given applet 210A may be used by, for example, the host processor 202 and/or the trusted services manager server to uniquely identify the applet 210A relative to the other applets 210A-N provisioned on the secure element 208, such as to perform one or more operations with respect to the applet 210A. In one or more implementations, the applet identifiers may be used by the host processor 202 to store associations between the applets 210A-N and the corresponding service providers.
The DPAN may be associated with a card account, such as a credit card account, that is associated with a given applet 210A. In contrast to the DPAN, the actual number that is printed on the physical card may be referred to as a funding primary account number (FPAN). When conducting a wireless payment transaction using one of the applets 210A-N, the secure element 208 may provide the DPAN to a wireless transaction terminal (e.g., without providing the FPAN which may not be stored on the secure element 208). The wireless transaction terminal may then forward the DPAN to the associated service provider who can determine the account (e.g., the FPAN) associated with the DPAN, and confirm that the account contains sufficient funds and/or credit to complete the wireless payment transaction.
In one or more implementations, the applets 210A-N may also be provisioned with an attribute that indicates the type of communication protocol used by the applets 210A-N to communicate with a wireless transaction terminal. The types of communication protocols may include, for example, an NFC-A protocol, an NFC-B protocol, an NFC-F protocol, a Bluetooth protocol, a Bluetooth low energy (BLE) protocol, a Zigbee protocol, a Wi-Fi protocol, or generally any communication protocol.
The NFC controller 206 may include one or more antennas and one or more transceivers for transmitting/receiving NFC communications. The NFC controller 206 may further include one or more interfaces, such as a single wire protocol interface, for coupling to the host processor 202 and/or the secure element 208. The NFC controller 206 may be able to communicate via one or more different NFC communication protocols, such as NFC-A (or Type A), NFC-B (or Type B), NFC-F (or Type F or FeliCA), and/or International Organization for Standardization (ISO)/International Electrotechnical Commission (IEC) 15693. The NFC-A protocol may be based on ISO/IEC 14443A and may use Miller bit coding with a 100 percent amplitude modulation. The NFC-B protocol may be based on ISO/IEC 14443B and may use variations of Manchester encoding along with a 10 percent modulation. The NFC-F protocol may be based on FeliCA JIS X6319-4 and may use a slightly different variation of Manchester coding than the NFC-B protocol.
For explanatory purposes, the electronic device 102A is illustrated in
The host processor 202 may include suitable logic, circuitry, and/or code that enable processing data and/or controlling operations of the electronic device 102A. In this regard, the host processor 202 may be enabled to provide control signals to various other components of the electronic device 102A. The host processor 202 may also control transfers of data between various portions of the electronic device 102A. Additionally, the host processor 202 may enable implementation of an operating system or otherwise execute code to manage operations of the electronic device 102A. The memory 204 may include suitable logic, circuitry, and/or code that enable storage of various types of information such as received data, generated data, code, and/or configuration information. The memory 204 may include, for example, random access memory (RAM), read-only memory (ROM), flash, and/or magnetic storage.
In one or more implementations, one or more of the host processor 202, the memory 204, the NFC controller 206, the secure element 208, and/or one or more portions thereof, may be implemented in software (e.g., subroutines and code), may be implemented in hardware (e.g., an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA), a Programmable Logic Device (PLD), a controller, a state machine, gated logic, discrete hardware components, or any other suitable devices) and/or a combination of both.
The secure element 208 includes a secure processor 302, RAM 304, a security engine 306, an interface 308, and non-volatile memory 310. The RAM 304 may include one or more of static RAM (SRAM), and/or dynamic RAM (DRAM). The interface 308 may communicatively couple the security element 208 to one or more other chips in the device, such as the NFC controller 206 and/or the host processor 202. The interface 308 may be, for example, a SWP interface, a universal serial bus (USB) interface, or generally any data interface. The secure processor 302 may be, for example, a reduced instruction set computing (RISC) processor, an advanced RISC machine (ARM) processor, or generally any processing circuitry.
The security engine 306 may perform one or more security operations for the secure element 208. For example, the security engine 306 may perform cryptographic operations and/or may manage cryptographic keys and/or certificates. In one or more implementations, the communications between the secure element 208 and an external device, such as a wireless transaction terminal and/or a trusted services manager server may be encrypted, and therefore the content of such communications may be inaccessible to the NFC controller 206. For example, for NFC-F communications, an encryption key may be dynamically generated each time mutual authentication is performed. In these one or more implementations, the encryption/decryption and/or key generation/management may be performed all or in part by the security engine 306.
The non-volatile memory 310 may be and/or may include, for example, flash memory. The non-volatile memory 310 may store the attributes and executable code associated with the applets 210A-N. In one or more implementations, the non-volatile memory 310 may also store firmware and/or operating system executable code that is executed by the secure processor 302 to provide the execution environment for the applets 210A-N, such as a JAVA execution environment.
In one or more implementations, one or more of the secure processor 302, the RAM 304, the security engine 306, the interface 308, the non-volatile memory 310, and/or one or more portions thereof, may be implemented in software (e.g., subroutines and code), may be implemented in hardware (e.g., an ASIC, an FPGA, a PLD, a controller, a state machine, gated logic, discrete hardware components, or any other suitable devices) and/or a combination of both.
The process 400 is initiated when the wireless transaction system server 110 receives an indication of a card account associated with a user (402). The indication may be received, for example, from a service provider server 120. For example, a card account may be registered for use with the service provider server 120, and/or a card account may be established as a default payment method for the service provider server 120, and the service provider server 120 may send an indication of the same to the wireless transaction system server 110. In one or more implementations, the service provider server 120 may transmit the notification to the wireless transaction system server 110 when the service provider server 120 and the wireless transaction system server 110 are associated with a same entity, when the user uses an electronic device 102A to register the card account for use with the service provider server 120, and/or when the user of the electronic device 102A implicitly or explicitly links their accounts with the service provider server 120 and/or the wireless transaction system server 110 (and/or has an account that is shared between the service provider server 120 and the wireless transaction system server 110).
In one or more implementations, the electronic device 102A may be used to conduct a wireless payment transaction with the wireless transaction system using a wireless payment terminal at a physical location associated with the service provider server 120, such as a restaurant or store. The service provider server 120 may determine that the user of electronic device 102A has a user account with the service provider, such as a loyalty card account with a store or restaurant, and the service provider server 120 may transmit an indication of the same to the wireless transaction system server 110. In one or more implementations, the service provider server 120 may transmit the notification to the wireless transaction system server 110 responsive to the service provider server 120 provisioning an applet corresponding to a card account of the user on another electronic device 102B of the user. In one or more implementations, the service provider server 120 may transmit the indication to the wireless transaction system server 110 responsive to the user installing an application corresponding to the service provider server 120 on the electronic device 102A.
The wireless transaction system server 110 verifies whether the card account is eligible to be added to the electronic device 102A for use in the wireless transaction system (404). For example, the wireless transaction system server 110 may determine whether the service provider associated with the card account supports the wireless transaction system and/or whether the service provider supports provisioning an applet on the secure element 208 of the electronic device 102A. In one or more implementations, the wireless transaction system server 110 may determine whether the electronic device 102A satisfies one or more security requirements associated with the wireless transaction system. For example, the wireless transaction system may require that the electronic device 102A implement two-factor authentication and/or other security mechanisms. The determination as to whether the card account is eligible to be added to the electronic device 102A for the wireless transaction system is discussed further below with respect to
If the wireless transaction system server 110 determines that the card account is not eligible to be added to the electronic device 102A for the wireless transaction system (404), the wireless transaction system server 110 bypasses sending a notification to the electronic device 102A (406). In this manner, the wireless transaction system server 110 can avoid sending unnecessary notifications to the electronic device 102A of the user that may bother the user and/or unnecessarily consume resources of the electronic device 102A, such as bandwidth resources, processing resources, and the like.
If the wireless transaction system server 110 determines that the card account is eligible to be added to the electronic device 102A (404), the wireless transaction system server 110 sends a notification to the electronic device 102A that notifies the user that the card account is eligible to be added to the electronic device 102A, e.g., for use in the wireless transaction system (408). The notification message may be transmitted, for example, as text message, a homescreen notification, a notification within an application corresponding to the wireless transaction system, and/or any other form of messaging. In some implementations, a notification may be sent to multiple electronic devices associated with the user (e.g., linked to a common user account) on which the card account can be added.
In one or more implementations, the notification may include a selectable element, such as a link or virtual control, that the user may select to approve adding the card account to the electronic device 102A. In one or more implementations, the notification may include multiple selectable elements, such as a first (virtual) button to approve adding the card account and a second (virtual) button to disapprove/decline adding the card account. In one or more implementations, the user may respond to the notification, such as with a text message, to indicate whether they approve (e.g., a text message of “yes”), or disapprove (e.g., a text message “no”) of adding the card account. In one or more implementations, the user may respond to the notification using a spoken command, or any other form of providing input.
If the user approves of adding the card account, such as by selecting the selectable element, an indication of the selection may be transmitted to the wireless transaction system server 110. If the wireless transaction system server 110 receives the indication of the selection (410), the wireless transaction system server 110 initiates provisioning an applet corresponding to the card account on the electronic device 102A to effectuate adding the card account to the electronic device 102A, e.g., for use in the wireless transaction system (416). It is noted that a provisioned card account may be used in any/all wireless transaction systems in which it is accepted/recognized. An example of initiating the provisioning of an applet on the electronic device 102A is discussed further below with respect to
If the wireless transaction system server 110 does not receive the indication of approval regarding adding the card account after a predetermined period of time elapses, or if the wireless transaction system server 110 receives a disapproval/decline indication regarding adding the card account (410), the wireless transaction system server 110 bypasses initiating the provisioning of the applet corresponding to the card account on the electronic device 102A (412). The wireless transaction system server 110 may also store an indication of the disapproval/decline regarding adding the card account to the electronic device 102A (414). The wireless transaction system server 110 may wait a predetermined amount of time before sending another notification regarding adding the card account to the electronic device 102A. In one or more implementations, if addition of the card account was declined/disapproved, e.g., a predetermined number of times, the wireless transaction system server 110 may not send another notification regarding adding the card account to the electronic device 102A. In some implementations, upon receiving a disapproval to add a card, the wireless transaction system server 110 also may not send a notification to add another card account, e.g., for another card of the same type or class, from the same issuer, and/or associated with the same system, for a predetermined period of time or until a predetermined condition is detected.
In one or more implementations, the wireless transaction system server 110 may repeat (404)-(416) for any additional electronic devices associated with the user, such as the electronic device 102B. For example, the electronic devices 102A-B may be registered to a user account associated with the user, such as via a cloud-based device management system that may be associated with the wireless transaction system and/or the wireless transaction system server 110, and/or the wireless transaction system server 110 may receive an indication of the electronic devices 102A-B that are registered to the user.
The process flow 500 includes the service provider server 120, the electronic device 102A, the wireless transaction system server 110, a security server 502 and a messaging server 504. In one or more implementations, the operations of the process flow 500 that are performed by the electronic device 102A may be performed by an application running on the electronic device 102A that is associated with the wireless transaction system, such as a wallet or payment application.
The process flow 500 begins with the service provider server 120 identifying a card account of a user, and transmitting an indication 512 of the identified card account to the wireless transaction system server 110 (510). For example, the electronic device 102A may be used to provide a credit card account to the service provider server 120 to be used as a payment method with the service provider server 120, such as a registered or default payment method.
In one or more implementations, the user's account with the service provider server 120 may be implicitly or explicitly linked or associated with the user's account with the wireless transaction system server 110. For example, in one or more implementations the user may use the same account to access both the service provider server 120 and the wireless transaction system server 110. However, a card account registered with the service provider server 120 may not be accessible for use with the wireless transaction system until an applet corresponding to the card account is provisioned on the electronic device 102A.
In one or more implementations, the indication 512 of the identified card account may include an identifier of the user, such as any/all of the “dsid” in
The wireless transaction system server 110 may receive the indication 512 from the service provider server 120 and may perform one or more card eligibility checks to verify that the card account is eligible to be added to the electronic device 102A, e.g., for use in the wireless transaction system or systems (514). The eligibility checks may include, for example, checking whether the country in which the card account was issued is supported by the wireless transaction system, checking whether the card type is supported by the wireless transaction system (e.g. checking whether the service provider server 120 supports the wireless transaction system), checking whether the user's account is registered with the wireless transaction system, and/or checking whether an applet corresponding to the card account has already been provisioned on the secure element 208 of the electronic device 102A, e.g., for use in the wireless transaction system. If one or more of the eligibility checks fails, the wireless transaction system server 110 may not notify the user of the card account. In one or more implementations, if there are any applets or any applets of the same type/class provisioned on the secure element 208 of the electronic device 102A, the wireless transaction system may not notify the user of the card account.
If the card eligibility checks all pass, the wireless transaction system server 110 transmits a notification to a messaging server 504 for communication to the electronic device 102A (514). In one or more implementations, the messaging server 504 may be a server that is used by the wireless transaction system to communicate with the electronic devices 102A-B and/or to communicate with the secure element 208 on the electronic devices 102A-B. The messaging server 504 may receive the notification, and may transmit a corresponding notification 518 to the electronic device 102A (516). The notification 518 may include an indication that the card account may be provisioned on the secure element 208 of the electronic device 102A as well as an identifier to uniquely identify the notification 518. The unique identifier, e.g. a request identifier, may be used to associate the provisioning of the card on the electronic device 102A to the notification that is being acted on.
The notification 518 may be received by the electronic device 102A, and the electronic device 102A may respond directly to the wireless transaction system server 110 with a message that includes the identifier of the notification 518 as well as a security token that may be used to access information regarding the user and/or the card account (520). The wireless transaction system server 110 may receive the security token (522) and may use the security token to request information from the service provider server 120 regarding the card account and/or regarding whether one or more security mechanisms are implemented by the electronic device 102A (524). The service provider server 120 may respond with the requested information (526).
The wireless transaction system server 110 may determine, based on the information received from the electronic device 102A, whether one or more security mechanisms are implemented by the electronic device 102A, such as two-factor authentication, and/or whether the current authentication level of the electronic device 102A meets a minimum authentication level for provisioning an applet on the secure element 208 of the electronic device 102A (528). If the electronic device 102A is implementing the appropriate security mechanisms (528), the wireless transaction system server 110 performs a network card check with the card account provider to perform pre-provisioning with respect to the card account, and the wireless transaction system server 110 transmits a notification message to the electronic device 102A indicating that the card account is available to be added to the wireless transaction system (529).
In one or more implementations, the notification message may include a selectable element that allows the user to indicate their approval of adding the card account to the wireless transaction system. If the user indicates their approval, the electronic device 102A may generate a new security token (which may require the user to authenticate with the electronic device 102A), and the electronic device 102A transmits the security token to the wireless transaction system server 110 (530). The wireless transaction system server 110 may then initiate provisioning of an applet corresponding to the card account on the secure element 208 of the electronic device 102A, e.g., for use in the wireless transaction system (532). The provisioning may include performing a security check, such as a fraud check, with the security server 502 (534). For example, the wireless transaction system server 110 may confirm, via the security server 502, that the user is authorized to use the card account.
In one or more implementations, the wireless transaction system server 110 may initiate the provisioning by instructing the service provider server 120 to generate a set of commands for provisioning an applet corresponding to the card account on the secure element 208 of the electronic device 102A. The service provider server 120 may transmit the set of commands directly to the secure element 208 of the electronic device 102A, and/or the service provider server 120 may transmit the set of commands to the wireless transaction system server 110 for transmission to the secure element 208 of the electronic device 102A. The secure element 208 of the electronic device 102A may execute the commands to cause the applet to be provisioned on the secure element 208 of the electronic device 102A.
Once the provisioning process is complete, the wireless transaction system server 110 transmits an indication of the same to the electronic device 102A (536). The electronic device 102A may receive the indication and, responsive thereto, the electronic device 102A may cause a representation of the card account to appear in an application associated with the wireless transaction system, such as a wallet application (538). The user may then be able to select the card account in the wallet or payment application to perform wireless transactions, e.g., in one or more wireless transaction systems using the card account. The wireless transactions can be any/all of payment transactions, reward transactions, redemption transactions, identity/access transactions, validation transactions, etc.
The bus 608 collectively represents all system, peripheral, and chipset buses that communicatively connect the numerous internal devices of the electronic system 600. In one or more implementations, the bus 608 communicatively connects the one or more processing unit(s) 612 with the ROM 610, the system memory 604, and the permanent storage device 602. From these various memory units, the one or more processing unit(s) 612 retrieves instructions to execute and data to process in order to execute the processes of the subject disclosure. The one or more processing unit(s) 612 can be a single processor or a multi-core processor in different implementations.
The ROM 610 stores static data and instructions that are needed by the one or more processing unit(s) 612 and other modules of the electronic system 600. The permanent storage device 602, on the other hand, may be a read-and-write memory device. The permanent storage device 602 may be a non-volatile memory unit that stores instructions and data even when the electronic system 600 is off. In one or more implementations, a mass-storage device (such as a magnetic or optical disk and its corresponding disk drive) may be used as the permanent storage device 602.
In one or more implementations, a removable storage device (such as a floppy disk, flash drive, and its corresponding disk drive) may be used as the permanent storage device 602. Like the permanent storage device 602, the system memory 604 may be a read-and-write memory device. However, unlike the permanent storage device 602, the system memory 604 may be a volatile read-and-write memory, such as random access memory. The system memory 604 may store any of the instructions and data that one or more processing unit(s) 612 may need at runtime. In one or more implementations, the processes of the subject disclosure are stored in the system memory 604, the permanent storage device 602, and/or the ROM 610. From these various memory units, the one or more processing unit(s) 612 retrieves instructions to execute and data to process in order to execute the processes of one or more implementations.
The bus 608 also connects to the input and output device interfaces 614 and 606. The input device interface 614 enables a user to communicate information and select commands to the electronic system 600. Input devices that may be used with the input device interface 614 may include, for example, alphanumeric keyboards and pointing devices (also called “cursor control devices”). The output device interface 606 may enable, for example, the display of images generated by electronic system 600. Output devices that may be used with the output device interface 606 may include, for example, printers and display devices, such as a liquid crystal display (LCD), a light emitting diode (LED) display, an organic light emitting diode (OLED) display, a flexible display, a flat panel display, a solid state display, a projector, or any other device for outputting information. One or more implementations may include devices that function as both input and output devices, such as a touchscreen. In these implementations, feedback provided to the user can be any form of sensory feedback, such as visual feedback, auditory feedback, or tactile feedback; and input from the user can be received in any form, including acoustic, speech, or tactile input.
Finally, as shown in
As described above, aspects of the present technology may include the gathering and use of data available from various sources to improve the delivery to users of invitational content or any other content that may be of interest to them. The present disclosure contemplates that in some instances, this gathered data may include personal information data that uniquely identifies or can be used to contact or locate a specific person. Such personal information data can include financial data, demographic data, location-based data, telephone numbers, email addresses, social network ID's, home addresses, data or records relating to a user's health or level of fitness (e.g., vital signs measurements, medication information, exercise information), date of birth, or any other identifying or personal information.
The present disclosure recognizes that the use of such personal information data, in the present technology, can be used to the benefit of users. For example, the personal information data can be used to deliver targeted content that is of greater interest to the user. Accordingly, use of such personal information data enables users to calculated control of the delivered content. Further, other uses for personal information data that benefit the user are also contemplated by the present disclosure. For instance, health and fitness data may be used to provide insights into a user's general wellness, or may be used as positive feedback to individuals using technology to pursue wellness goals.
The present disclosure contemplates that the entities responsible for the collection, analysis, disclosure, transfer, storage, or other use of such personal information data will comply with well-established privacy policies and/or privacy practices. In particular, such entities should implement and consistently use privacy policies and practices that are generally recognized as meeting or exceeding industry or governmental requirements for maintaining personal information data private and secure. Such policies should be easily accessible by users, and should be updated as the collection and/or use of data changes. Personal information from users should be collected for legitimate and reasonable uses of the entity and not shared or sold outside of those legitimate uses. Further, such collection/sharing should occur after receiving the informed consent of the users. Additionally, such entities should consider taking any needed steps for safeguarding and securing access to such personal information data and ensuring that others with access to the personal information data adhere to their privacy policies and procedures. Further, such entities can subject themselves to evaluation by third parties to certify their adherence to widely accepted privacy policies and practices. In addition, policies and practices should be adapted for the particular types of personal information data being collected and/or accessed and adapted to applicable laws and standards, including jurisdiction-specific considerations. For instance, in the US, collection of, or access to, certain health data may be governed by federal and/or state laws, such as the Health Insurance Portability and Accountability Act (HIPAA); whereas health data in other countries may be subject to other regulations and policies and should be handled accordingly. Hence different privacy practices should be maintained for different personal data types in each country.
Despite the foregoing, the present disclosure also contemplates embodiments in which users selectively block the use of, or access to, personal information data. That is, the present disclosure contemplates that hardware and/or software elements can be provided to prevent or block access to such personal information data. For example, in the case of advertisement delivery services, the present technology can be configured to allow users to select to “opt in” or “opt out” of participation in the collection of personal information data during registration for services or anytime thereafter. In another example, users can select not to provide mood-associated data for targeted content delivery services. In yet another example, users can select to limit the length of time mood-associated data is maintained or entirely prohibit the development of a baseline mood profile. In addition to providing “opt in” and “opt out” options, the present disclosure contemplates providing notifications relating to the access or use of personal information. For instance, a user may be notified upon downloading an app that their personal information data will be accessed and then reminded again just before personal information data is accessed by the app.
Moreover, it is the intent of the present disclosure that personal information data should be managed and handled in a way to minimize risks of unintentional or unauthorized access or use. Risk can be minimized by limiting the collection of data and deleting data once it is no longer needed. In addition, and when applicable, including in certain health related applications, data de-identification can be used to protect a user's privacy. De-identification may be facilitated, when appropriate, by removing specific identifiers (e.g., date of birth, etc.), controlling the amount or specificity of data stored (e.g., collecting location data a city level rather than at an address level), controlling how data is stored (e.g., aggregating data across users), and/or other methods.
Therefore, although the present disclosure broadly covers use of personal information data to implement one or more various disclosed embodiments, the present disclosure also contemplates that the various embodiments can also be implemented without the need for accessing such personal information data. That is, the various embodiments of the present technology are not rendered inoperable due to the lack of all or a portion of such personal information data. For example, content can be selected and delivered to users by inferring preferences based on non-personal information data or a bare minimum amount of personal information, such as the content being requested by the device associated with a user, other non-personal information available to the content delivery services, or publicly available information
Implementations within the scope of the present disclosure can be partially or entirely realized using a tangible computer-readable storage medium (or multiple tangible computer-readable storage media of one or more types) encoding one or more instructions. The tangible computer-readable storage medium also can be non-transitory in nature.
The computer-readable storage medium can be any storage medium that can be read, written, or otherwise accessed by a general purpose or special purpose computing device, including any processing electronics and/or processing circuitry capable of executing instructions. For example, without limitation, the computer-readable medium can include any volatile semiconductor memory, such as RAM, DRAM, SRAM, T-RAM, Z-RAM, and TTRAM. The computer-readable medium also can include any non-volatile semiconductor memory, such as ROM, PROM, EPROM, EEPROM, NVRAM, flash, nvSRAM, FeRAM, FeTRAM, MRAM, PRAM, CBRAM, SONOS, RRAM, NRAM, racetrack memory, FJG, and Millipede memory.
Further, the computer-readable storage medium can include any non-semiconductor memory, such as optical disk storage, magnetic disk storage, magnetic tape, other magnetic storage devices, or any other medium capable of storing one or more instructions. In one or more implementations, the tangible computer-readable storage medium can be directly coupled to a computing device, while in other implementations, the tangible computer-readable storage medium can be indirectly coupled to a computing device, e.g., via one or more wired connections, one or more wireless connections, or any combination thereof.
Instructions can be directly executable or can be used to develop executable instructions. For example, instructions can be realized as executable or non-executable machine code or as instructions in a high-level language that can be compiled to produce executable or non-executable machine code. Further, instructions also can be realized as or can include data. Computer-executable instructions also can be organized in any format, including routines, subroutines, programs, data structures, objects, modules, applications, applets, functions, etc. As recognized by those of skill in the art, details including, but not limited to, the number, structure, sequence, and organization of instructions can vary significantly without varying the underlying logic, function, processing, and output.
While the above discussion primarily refers to microprocessor or multi-core processors that execute software, one or more implementations are performed by one or more integrated circuits, such as ASICs or FPGAs. In one or more implementations, such integrated circuits execute instructions that are stored on the circuit itself.
Those of skill in the art would appreciate that the various illustrative blocks, modules, elements, components, methods, and algorithms described herein may be implemented as electronic hardware, computer software, or combinations of both. To illustrate this interchangeability of hardware and software, various illustrative blocks, modules, elements, components, methods, and algorithms have been described above generally in terms of their functionality. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the overall system. Skilled artisans may implement the described functionality in varying ways for each particular application. Various components and blocks may be arranged differently (e.g., arranged in a different order, or partitioned in a different way) all without departing from the scope of the subject technology.
It is understood that any specific order or hierarchy of blocks in the processes disclosed is an illustration of example approaches. Based upon design preferences, it is understood that the specific order or hierarchy of blocks in the processes may be rearranged, or that all illustrated blocks be performed. Any of the blocks may be performed simultaneously. In one or more implementations, multitasking and parallel processing may be advantageous. Moreover, the separation of various system components in the embodiments described above should not be understood as requiring such separation in all embodiments, and it should be understood that the described program components and systems can generally be integrated together in a single software product or packaged into multiple software products.
As used in this specification and any claims of this application, the terms “base station”, “receiver”, “computer”, “server”, “processor”, and “memory” all refer to electronic or other technological devices. These terms exclude people or groups of people. For the purposes of the specification, the terms “display” or “displaying” means displaying on an electronic device.
As used herein, the phrase “at least one of” preceding a series of items, with the term “and” or “or” to separate any of the items, modifies the list as a whole, rather than each member of the list (i.e., each item). The phrase “at least one of” does not require selection of at least one of each item listed; rather, the phrase allows a meaning that includes at least one of any one of the items, and/or at least one of any combination of the items, and/or at least one of each of the items. By way of example, the phrases “at least one of A, B, and C” or “at least one of A, B, or C” each refer to only A, only B, or only C; any combination of A, B, and C; and/or at least one of each of A, B, and C.
The predicate words “configured to”, “operable to”, and “programmed to” do not imply any particular tangible or intangible modification of a subject, but, rather, are intended to be used interchangeably. In one or more implementations, a processor configured to monitor and control an operation or a component may also mean the processor being programmed to monitor and control the operation or the processor being operable to monitor and control the operation. Likewise, a processor configured to execute code can be construed as a processor programmed to execute code or operable to execute code.
Phrases such as an aspect, the aspect, another aspect, some aspects, one or more aspects, an implementation, the implementation, another implementation, some implementations, one or more implementations, an embodiment, the embodiment, another embodiment, some embodiments, one or more embodiments, a configuration, the configuration, another configuration, some configurations, one or more configurations, the subject technology, the disclosure, the present disclosure, other variations thereof and alike are for convenience and do not imply that a disclosure relating to such phrase(s) is essential to the subject technology or that such disclosure applies to all configurations of the subject technology. A disclosure relating to such phrase(s) may apply to all configurations, or one or more configurations. A disclosure relating to such phrase(s) may provide one or more examples. A phrase such as an aspect or some aspects may refer to one or more aspects and vice versa, and this applies similarly to other foregoing phrases.
The word “exemplary” is used herein to mean “serving as an example, instance, or illustration”. Any embodiment described herein as “exemplary” or as an “example” is not necessarily to be construed as preferred or advantageous over other embodiments. Furthermore, to the extent that the term “include”, “have”, or the like is used in the description or the claims, such term is intended to be inclusive in a manner similar to the term “comprise” as “comprise” is interpreted when employed as a transitional word in a claim.
All structural and functional equivalents to the elements of the various aspects described throughout this disclosure that are known or later come to be known to those of ordinary skill in the art are expressly incorporated herein by reference and are intended to be encompassed by the claims. Moreover, nothing disclosed herein is intended to be dedicated to the public regardless of whether such disclosure is explicitly recited in the claims. No claim element is to be construed under the provisions of 35 U.S.C. § 112, sixth paragraph, unless the element is expressly recited using the phrase “means for” or, in the case of a method claim, the element is recited using the phrase “step for”.
The previous description is provided to enable any person skilled in the art to practice the various aspects described herein. Various modifications to these aspects will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other aspects. Thus, the claims are not intended to be limited to the aspects shown herein, but are to be accorded the full scope consistent with the language claims, wherein reference to an element in the singular is not intended to mean “one and only one” unless specifically so stated, but rather “one or more”. Unless specifically stated otherwise, the term “some” refers to one or more. Pronouns in the masculine (e.g., his) include the feminine and neuter gender (e.g., her and its) and vice versa. Headings and subheadings, if any, are used for convenience only and do not limit the subject disclosure.
The present application claims the benefit of U.S. Provisional Patent Application Ser. No. 62/514,751, entitled “Notification Based Provisioning of Card Accounts,” filed on Jun. 2, 2017, which is hereby incorporated by reference in its entirety for all purposes.
Number | Date | Country | |
---|---|---|---|
62514751 | Jun 2017 | US |