Over the air update of payment transaction data stored in secure memory

Abstract
A system, apparatus, and method for processing payment transactions that are conducted using a mobile device that includes a contactless element, such as an integrated circuit chip. The invention enables the updating, correction or synchronization of transaction data maintained by an Issuer with that stored on the device. This is accomplished by using a wireless (cellular) network as a data communication channel for data provided by an Issuer to the mobile device, and is particularly advantageous in circumstances in which the contactless element is not presently capable of communication with a device reader or point of sale terminal that uses a near field communications mechanism. Data transferred between the mobile device and Issuer may be encrypted and decrypted to provide additional security and protect the data from being accessed by other users or applications. If encryption keys are used for the encryption and decryption processes, they may be distributed by a key distribution server or other suitable entity to a mobile gateway which participates in the data encryption and decryption operations.
Description
BACKGROUND

Embodiments of the present invention are directed to systems, apparatuses and methods for the processing of payment transactions, and more specifically, to a system and associated apparatus and method for processing a transaction that includes synchronizing transaction data stored in a device having a contactless element with transaction data maintained by an Issuer. The present invention is further directed to systems, apparatuses, and methods for using a contactless element such as an integrated circuit chip embedded in a wireless mobile device to enable payment transactions.


Consumer payment devices are used by millions of people worldwide to facilitate various types of commercial transactions. In a typical transaction involving the purchase of a product or service at a merchant location, the payment device is presented at a point of sale terminal (“POS terminal”) located at a merchant's place of business. The POS terminal may be a card reader or similar device that is capable of accessing data stored on the payment device, where this data may include identification or authentication data, for example. Data read from the payment device is provided to the merchant's transaction processing system and then to the Acquirer, which is typically a bank or other institution that manages the merchant's account. The data provided to the Acquirer may then be provided to a payment processing network that is in communication with data processors that process the transaction data to determine if the transaction should be authorized by the network, and assist in the clearance and account settlement functions for the transaction. The authorization decision and clearance and settlement portions of the transaction may also involve communication and/or data transfer between the payment processing network and the bank or institution that issued the payment device to the consumer (the Issuer).


Although a consumer payment device may be a credit card or debit card, it may also take the form of a “smart” card or chip. A smart card is generally defined as a pocket-sized card (or other portable payment device) that is embedded with a microprocessor and one or more memory chips, or is embedded with one or more memory chips with non-programmable logic. The microprocessor type card typically can implement certain data processing functions, such as to add, delete, or otherwise manipulate information stored in a memory location on the card. In contrast, the memory chip type card (for example, a prepaid phone card) can typically only act as a file to hold data that is manipulated by a card reading device to perform a pre-defined operation, such as debiting a charge from a pre-established balance stored in the memory. Smart cards, unlike magnetic stripe cards (such as standard credit cards), can implement a variety of functions and contain a variety of types of information on the card. Therefore, in some applications they may not require access to remote databases for the purpose of user authentication or record keeping at the time of a transaction. A smart chip is a semiconductor device that is capable of performing most, if not all, of the functions of a smart card, but may be embedded in another device.


Smart cards or chips come in two general varieties; the contact type and the contactless type. A contact type smart card or chip is one that includes a physical element (e.g., a magnetic stripe) that enables access to the data and functional capabilities of the card, typically via some form of terminal or card reader. A contactless smart card or chip is a device that incorporates a means of communicating with the card reader or point of sale terminal without the need for direct physical contact. Thus, such devices may effectively be “swiped” (i.e., waved or otherwise presented in a manner that results in enabling communication between the contactless element and a reader or terminal) by passing them close to a card reader or terminal. Contactless cards or chips typically communicate with a card reader or terminal using RF (radio-frequency) technology, wherein proximity to the reader or terminal enables data transfer between the card or chip and the reader or terminal. Contactless cards have found uses in banking and other applications, where they have the advantage of not requiring removal from a user's wallet or pocket in order to participate in a transaction. A contactless card or chip may be embedded in, or otherwise incorporated into, a mobile device such as a mobile phone or personal digital assistant (PDA). Further, because of the growing interest in such cards, standards have been developed that govern the operation and interfaces for contactless smart cards, such as the ISO 14443 standard.


In a typical payment transaction, data is sent from a point of sale terminal to the Issuer to authenticate a consumer and obtain authorization for the transaction. As part of the authentication or authorization processes, the data may be accessed or processed by other elements of the transaction processing system (e.g., the merchant's Acquirer or a payment processor that is part of a payment processing network). Note that in some cases, authorization for the transaction may be obtained without connecting to the Issuer; this may be permitted by Issuer configured risk management parameters that have been set on the consumer's payment application or payment device. If the proposed transaction is authorized, then the consumer may provide other information to the merchant as part of completing the transaction. The Issuer or data processor may also send data back to the consumer. Such data may include an update to records of the transactions for which the payment device has been used, or to a current balance of an account associated with the device.


In the case of a transaction that uses a contactless element, a reader or point of sale terminal is typically only in communication with the contactless element for a short period of time (e.g., the amount of time needed for the element to be recognized by the reader and to provide data needed to initiate or conduct a portion of the transaction). This means that an Issuer or other party wishing to provide transaction related data to a consumer's payment device may be unable to effectively communicate with the consumer using the reader or point of sale terminal. This can create problems for a consumer who wishes to use the payment device for a later transaction, as the balance of a prepaid card or balance of a credit card or debit card account may be incorrect and affect the consumer's ability to obtain authorization for the later transaction. It may also cause a consumer wishing to access their account information to mistakenly think that they have either more or less funds available to them than they actually do.


What is desired is a system, apparatus and method for enabling transaction data stored on a payment device that utilizes a contactless smart chip to be updated without the contactless smart chip needing to communicate with a reader or point of sale terminal, and which overcomes the noted disadvantages of current approaches. Embodiments of the invention address these problems and other problems individually and collectively.


BRIEF SUMMARY

Embodiments of the present invention are directed to a system, apparatus, and method for using a contactless element (such as a contactless smart chip) as part of a payment transaction. Specifically, embodiments of the present invention are directed to facilitating the update or synchronization of transaction data and transaction records stored in a memory that is part of a payment device (such as a mobile phone), where the device includes a contactless element. The inventive system, apparatus and method can be implemented using a contactless smart chip and a wireless data transfer element (e.g., a near field communications (NFC) capability, etc.) embedded within a mobile wireless device. The mobile device may be a mobile phone, PDA, MP3 player or the like. The smart chip or other type of contactless element can be integrated with the circuitry of the mobile device to permit data stored on the chip to be accessed and manipulated (e.g., read, written, erased) using the wireless communications network as a data transport or command transport channel. In this way, transaction data provided by an Issuer may be provided to the payment device in the absence of communication between the payment device and a near field communications device reader or point of sale terminal.


This permits the Issuer to update transaction data and/or synchronize data or records stored in the payment device with those maintained by the issuer when the contactless element is not in the proximity of the device reader or terminal. This capability is particularly useful in the case of a prepaid balance being stored in the payment device, since without an accurate balance, a user may be prevented from completing a transaction that they should be entitled to complete. Similarly, a credit or debit account balance stored in the payment device may be updated to properly reflect the status of the account in a situation where the data stored after interaction between the contactless element and reader or terminal was incorrect or incomplete.


In one embodiment, the present invention is directed to a mobile device for use in conducting a payment transaction, where the mobile device includes a processor, a memory, and a set of instructions stored in the memory, which when executed by the processor implement a method to conduct the payment transaction by communicating with a point of sale terminal using a near field communications mechanism of the mobile device, and receive data related to the payment transaction at the mobile device using a cellular communications network, wherein the received data related to the payment transaction is an update to data stored in the mobile device as a result of communicating with the point of sale terminal.


In another embodiment, the present invention is directed to a data processing device, where the data processing device includes a processor, a memory, and a set of instructions stored in the memory, which when executed by the processor implement a method to receive data for a payment transaction from a point of sale terminal, wherein at least some of the data is provided to the point of sale terminal by a mobile device that communicates with the point of sale terminal using a near field communications mechanism, process the received data to generate a record of the transaction, wherein the record of the transaction includes an update to data stored in the mobile device as a result of communicating with the point of sale terminal, and provide the record of the transaction to an element of a wireless communications system, thereby causing the record of the transaction to be provided to the mobile device over a wireless network.


In yet another embodiment, the present invention is directed to a method of conducting a payment transaction, where the method includes communicating with a point of sale terminal using a near field communications mechanism of a payment device as part of the payment transaction, wherein the payment device includes a contactless element and is contained in a mobile phone, and receiving data to update a record of the payment transaction contained in the mobile phone using a cellular phone communications network.


In yet another embodiment, the present Invention is directed to an apparatus for facilitating payment transactions between a plurality of consumers and a plurality of merchants, where the apparatus includes a processor, a memory, and a set of instructions stored in the memory, which when executed by the processor implement a method to generate a first pair of encryption keys, the first pair of encryption keys including a first encryption key and a second encryption key, generate a second pair of encryption keys, the second pair of encryption keys including a first encryption key and a second encryption key, distribute the first pair of encryption keys to a first mobile gateway, the first mobile gateway configured to process a first set of payment transactions, and distribute the second pair of encryption keys to a second mobile gateway, the second mobile gateway configured to process a second set of payment transactions, wherein the first set of transactions is different from the second set of transactions.


Other objects and advantages of the present invention will be apparent to one of ordinary skill in the art upon review of the detailed description of the present invention and the included figures.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 is a block diagram illustrating a transaction processing system that may be used with some embodiments of the present invention;



FIG. 2 is a functional block diagram illustrating the primary components of a system for updating or synchronizing transaction data for a transaction that uses a contactless element contained within a mobile device, in accordance with an embodiment of the present invention;



FIG. 3 is a functional block diagram illustrating the primary components of a mobile device, such as a mobile phone that may be used as part of the inventive system and method;



FIG. 4 is a flow chart illustrating an embodiment of the inventive method or process for updating or synchronizing transaction data for a transaction that uses a contactless element contained within a mobile device;



FIGS. 5(a), 5(b), and 5(c) are flow charts illustrating a process for distributing and using encryption keys to provide secure transfer of payment transaction or other data between an Issuer and a mobile device, in accordance with an embodiment of the present invention; and



FIG. 6 is a block diagram of an exemplary computing apparatus that may be used to implement an embodiment of the inventive method or process for updating or synchronizing transaction data for a transaction that uses a contactless element contained within a mobile device.





DETAILED DESCRIPTION

Embodiments of the present invention are directed to a system, apparatus, and method for processing payment transactions that are conducted using a mobile device that includes a contactless element, such as an integrated circuit chip. The invention enables the updating, correction or synchronization of transaction data maintained by an Issuer with that stored on the device. This is accomplished by using a wireless (cellular) network as a data communication channel for data provided by an Issuer to the mobile device, and is particularly advantageous in circumstances in which the contactless element is not presently capable of communication with a device reader or point of sale terminal that uses a near field communications mechanism. In some embodiments, data transferred between the mobile device and Issuer (i.e., either from the device to the Issuer or from the Issuer to the device) may be encrypted and decrypted (e.g., using “keys” such, as public key infrastructure (PKI) keys or symmetric keys) to provide additional security and protect the data from being accessed by other users or applications. If encryption keys are used for the encryption and decryption processes, they may be distributed by a key distribution server or other suitable entity to a mobile gateway which participates in the data encryption and decryption operations.


The present invention is typically implemented in the context of a payment transaction; therefore prior to describing one or more embodiments of the invention in greater detail, a brief discussion of the entities involved in processing and authorizing a payment transaction, and their roles in the authorization process will be presented.



FIG. 1 is a block diagram illustrating a transaction processing system that may be used with some embodiments of the present invention. Typically, an electronic payment transaction is authorized if the consumer conducting the transaction is properly authenticated (i.e., their identity and their valid use of a payment account is verified) and has sufficient funds or credit to conduct the transaction. Conversely, if there are insufficient funds or credit in the consumer's account, or if the consumer's payment device is on a negative list (e.g., it is indicated as possibly having been stolen), then an electronic payment transaction may not be authorized. In the following description, an “Acquirer” is typically a business entity (e.g., a commercial bank) that has a business relationship with a particular merchant. An “Issuer” is typically a business entity (e.g., a bank) which issues a payment device such as a credit or debit card to a consumer. Some entities may perform both issuer and Acquirer functions.



FIG. 1 illustrates the primary functional elements that are typically involved in processing a payment transaction and in the authorization process for such a transaction. As shown in FIG. 1, in a typical payment transaction, a consumer wishing to purchase a good or service from a merchant uses a portable consumer payment device 20 to provide payment transaction data that may be used as part of an authorization process. Portable consumer payment device 20 may be a debit card, credit card, smart card, mobile device containing a contactless chip, or other suitable form of device.


The portable consumer payment device is presented to a device reader or point of sale (POS) terminal 22 which is able to access data stored on or within the payment device. The account data (as well as any required consumer data) is communicated to the merchant 24 and ultimately to the merchant's transaction/data processing system 26. As part of the authorization process performed by the merchant, merchant transaction processing system 26 may access merchant database 28, which typically stores data regarding the customer/consumer (as the result of a registration process with the merchant, for example), the consumer's payment device, and the consumer's transaction history with the merchant. Merchant transaction processing system 26 typically communicates with Acquirer 30 (which manages the merchant's accounts) as part of the overall authorization process. Merchant transaction processing system 26 and/or Acquirer 30 provide data to Payment Processing Network 34, which among other functions, participates in the clearance and settlement processes that are part of the overall transaction processing. Communication and data transfer between Merchant transaction processing system 26 and Payment Processing Network 34 is typically by means of an intermediary, such as Acquirer 30. As part of the transaction authorization process, Payment Processing Network 34 may access account database 36, which typically contains information regarding the consumer's account payment history, chargeback or transaction dispute history, credit worthiness, etc. Payment Processing Network 34 communicates with Issuer 38 as part of the authorization process, where Issuer 38 is the entity that issued the payment device to the consumer and manages the consumer's account. Customer or consumer account data is typically stored in customer/consumer database 40 which may be accessed by Issuer 38 as part of the authentication, authorization or account management processes. Note that instead of, or in addition to being stored in account database 36, consumer account data may be included in, or otherwise part of customer/consumer database 40.


In standard operation, an authorization request message is created during a consumer purchase of a good or service at a point of sale (POS) using a portable consumer payment device (such as a credit or debit card). In some embodiments, the portable consumer payment device may be a wireless phone that incorporates a contactless card or chip. The contactless card or chip may communicate with the point of sale terminal using a near field communications (NFC) capability. The authorization request message is typically sent from the device reader/POS terminal 22 through the merchant's data processing system 26 to the merchant's Acquirer 30, to a payment processing network 34, and then to an Issuer 38. An “authorization request message” can include a request for authorization to conduct an electronic payment transaction. It may include one or more of an account holder's payment account number, currency code, sale amount, merchant transaction stamp, acceptor city, acceptor state/country, etc. An authorization request message may be protected using a secure encryption method (e.g., 128-bit SSL or equivalent) in order to prevent data from being compromised.


After the Issuer receives the authorization request message, the Issuer determines if the transaction should be authorized and sends an authorization response message back to the payment processing network to indicate whether or not the current transaction is authorized. The payment processing system then forwards the authorization response message to the Acquirer. The Acquirer then sends the response message to the Merchant. The Merchant is thus made aware of whether the Issuer has authorized the transaction, and hence whether the transaction can be completed.


At a later time, a clearance and settlement process may be conducted by elements of the payment/transaction processing system depicted in FIG. 1. A clearance process involves exchanging financial details between an Acquirer and an Issuer to facilitate posting a transaction to a consumer's account and reconciling the consumer's settlement position. Clearance and settlement can occur simultaneously or as separate processes.


Payment Processing Network 34 may include data processing subsystems, networks, and other means of implementing operations used to support and deliver authorization services, exception file services, and clearing and settlement services for payment transactions. An exemplary Payment Processing Network may include VisaNet Payment Processing Networks such as VisaNet are able to process credit card transactions, debit card transactions, and other types of commercial transactions. VisaNet, in particular, includes a VIP system (Visa Integrated Payments system) which processes authorization requests and a Base II system which performs transaction clearing and settlement services.


Payment Processing Network 34 may include a server computer. A server computer is typically a powerful computer or duster of computers. For example, the server computer can be a large mainframe, a minicomputer cluster, or a group of servers functioning as a unit. In one example, the server computer may be a database server coupled to a web server. Payment Processing Network 34 may use any suitable combination of wired or wireless networks, including the Internet, to permit communication and data transfer between network elements. Among other functions, Payment Processing Network 34 may be responsible for ensuring that a user is authorized to conduct the transaction (via an authentication process), confirm the identity of a party to a transaction (e.g., via receipt of a personal identification number), confirm a sufficient balance or credit line to permit a purchase, or reconcile the amount of a purchase with the user's account (via entering a record of the transaction amount, date, etc.).


Consumer payment device 20 may take one of many suitable forms. As mentioned, the portable consumer device can be a mobile device that incorporates a contactless element such as a chip for storing payment data (e.g., a BIN number, account number, etc.) and a near field communications (NFC) data transfer element such as an antenna, a light emitting diode, a laser, etc. The portable consumer device may also include a keychain device (such as the Speedpass™ commercially available from Exxon-Mobil Corp.), etc. The device containing the contactless card or chip, or other data storage element may be a cellular (mobile) phone, personal digital assistant (PDA), pager, transponder, or the like. The portable consumer device may also incorporate the ability to perform debit functions (e.g., a debit card), credit functions (e.g., a credit card), or stored value functions (e.g., a stored value or prepaid card).


In embodiments of the invention that include a contactless element (which may include a contactless chip and near field communications data transfer element) embedded within a wireless mobile phone or similar device, the contactless element can communicate with a Merchant's device reader or point of sale terminal using a short range communication method, such as a near field communications (NFC) capability. Examples of such NFC technologies or similar short range communications technologies include ISO standard 14443, RFID, Bluetooth™ and Infra-red communications methods.



FIG. 2 is a functional block diagram Illustrating the primary components of a system 100 for updating or synchronizing transaction data for a transaction that uses a contactless element contained within a mobile device, in accordance with an embodiment of the present invention. As shown in FIG. 1, system 100 includes a mobile device 102 having wireless communications capabilities 122. Mobile device 102 may be a wireless mobile telephone, PDA, laptop computer, pager, etc. In a typical embodiment, mobile device 102 is a cell phone, although as noted, implementation of the present invention is not limited to this embodiment. In the case of a cell phone as the mobile device 102, the device includes mobile device (cell phone) circuitry 104 that enables certain of the telephony functions. Among other functions, mobile device circuitry 104 enables mobile device 102 to communicate wirelessly with cellular system (i.e., a wireless carrier) 120 via cellular network 122.


Mobile device 102 further includes a contactless element 106, typically implemented in the form of a semiconductor chip. Contactless element 106 may include a secure data storage element 110, although secure data storage element 110 may also be implemented as a separate element from contactless element 106. Contactless element 106 includes a near field communications (NFC) data transfer (e.g., data transmission) element 105, such as an antenna or transducer. Contactless element 106 is typically embedded within and integrated with the elements of mobile device 102, and data or control instructions transmitted via cellular network 122 may be exchanged with or applied to contactless element 106 by means of contactless element interface 108. Contactless element interface 108 functions to permit the exchange of data and/or control instructions between mobile device circuitry 104 (and hence the cellular network) and contactless element 106. Thus, contactless element 106 may include data storage capability in the form of a memory or secure data storage 110 that may be accessed via interface 108 to permit the implementation of data read, write, and erase functions, for example.


Secure data storage 110 may be used by mobile device 102 to store operating parameters or other data utilized in the operation of the device. Secure data storage 110 may also be used to store other data for which enhanced security is desired, for example, transaction data, personal account data, identification data, authentication data, access control data for an application or device function, etc. As mentioned, secure data storage 110 may be implemented in the form of a chip that is separate and apart from contactless element 106, or alternatively, may be a section of memory in a chip that forms part of contactless element 106. Note also that the secure data storage and/or contactless element contained within the mobile device may be a removable element or may be integrated within the mobile device. Examples of removable elements include SIM cards, flash memory cards, and other suitable devices.


Mobile device 102 may also include one or more applications 109, where applications 109 are implemented in the form of one or more of software, firmware, or hardware. Applications 109 are used to implement various functions desired by a user, where such functions may include, but are not limited to, eCommerce transaction operations, transaction payment operations, etc. Typically, applications 109 represent processes or operations that are dedicated to a specific function that provides added value to the user and which are not part of the standard operation of the device (I.e., not part of enabling the standard telephony functions, for example). As shown in the figure, applications 109 may exchange data with secure data storage 110 (via contactless element interface 108) and may also be capable of exchanging data with mobile device circuitry 104. A typical application 109 for the purposes of the present invention is a payment application that enables a user to make a payment for a transaction, where the transaction is wholly or partially conducted using the mobile device. In such an example, secure data storage 110 may contain authentication data, user identification data, transaction record data, account balance data, etc. Applications 109 are typically stored as a set of executable instructions in memory 107, which may also Include data storage 113. A processor accesses memory 107 to load and unload the instructions and data as needed to execute the instructions and perform the functions of the applications.


Contactless element 106 is capable of transferring and receiving data using data transfer element 105 which implements a near field communications capability 112, typically in accordance with a standardized protocol or data transfer mechanism (Identified as ISO 14443/NFC in the figure). Near field communications capability 112 is a short-range communications capability; examples include the ISO 14443 standard, RFID, Bluetooth™, infra-red, or other data transfer capability that can be used to exchange data between the mobile device 102 and a device reader or point of sale terminal 130, which is typically located at a Merchant's place of business. Thus, mobile device 102 is capable of communicating and transferring data and/or control instructions via both cellular network 122 and near field communications capability 112.


System 100 further includes Acquirer 132 which is in communication with Merchant or Merchant's device reader or point of sale terminal 130. Acquirer 132 is in communication with Payment Processing Network 134 and as was described, may exchange data with Payment Processing Network 134 as part of the transaction authorization process. Payment Processing Network 134 is also in communication with Issuer 136. As was described, Issuer 136 may exchange data with Payment Processing Network 134 as part of a transaction authorization or transaction reconciliation process.


System 100 may also include Mobile Gateway 138, which is capable of coupling the cellular (wireless) network or system to a second network (typically a wireline network such as the Internet) and enabling the transfer of data between the networks. Mobile Gateway 138 may perform data processing operations as needed to permit the efficient transfer of data between the two types of networks, including, but not limited to, data reformatting or other processing to take into account differences in network protocols. Mobile Gateway 138 may also perform data processing operations to enable more efficient data transfer between the networks and devices coupled to each type of network, such as for purposes of improving the ability of a user to utilize the received data on a mobile device. As shown in the figure, in some embodiments, Mobile Gateway 138 is coupled to Payment Processing Network 134, which is coupled to Acquirer 130. Note that other embodiments are possible, such as where Mobile Gateway 138 is coupled to Issuer 136, as well as where Acquirer 130 is coupled to Issuer 136. Similarly, Issuer 136 may include the capability of functioning as Mobile Gateway 138.


System 100 may also include Encryption Key Distribution Server 140 which is capable of communication and data transfer with Mobile Gateway 138 and Issuer 136. As will be described, Encryption Key Distribution Server 140 may be used to distribute encryption keys to Mobile Gateway 138 and Issuer 136 for the purpose of enabling the encryption and decryption of transaction data that is transferred between the Issuer and the mobile device.


In some embodiments, payment processing network 134 may be configured to enable the transport of encrypted data; if so, then Encryption Key Distribution Server 140 may be capable of communication with payment processing network 134 for the purpose of distributing an encryption key to an element of that network (as suggested by the non-solid line connecting Key Server 140 to network 134). If payment processing network 134 is not configured to enable transport of encrypted data, then the data encryption/decryption processes may be performed in Mobile Gateway 138 in accordance with the encryption key(s) distributed by Encryption Key Distribution Server 140. Note that Issuer 136 may communicate with Encryption Key Distribution Server 140 to inform server 140 which of several mobile gateways it authorizes for purposes of communicating with mobile device 102, and hence to which mobile gateway a particular set of encryption keys should be distributed. Thus, Issuer 136 may select which of multiple available mobile gateways it chooses to authorize for purposes of communicating and exchanging transaction data with a particular mobile device.


Inventive system 100 provides an efficient way for a user to conduct a payment transaction using a contactless element. By integrating the contactless element with the mobile device's telephony communications capabilities, the cellular network may be used as a data transfer channel between an Issuer or Payment Processing Network element and the user's mobile device. In some embodiments, this arrangement may be used to facilitate the provision of data to the device for the purpose of synchronizing the transaction or account data stored in the mobile device with the data records maintained by the Issuer. Such data may include authentication and account management data, such as transaction records or account balances. For example, a secure data store (e.g., secure data storage 110 or a similar secure memory region that is part of the mobile device or the contactless element) may contain transaction records and a running total of the balance available for a user's account. In the case of the contactless element being used with a prepaid card or account, the balance would reflect the remaining amount of money available to a user. In the case of the contactless element being used with a credit or debit account, the balance would reflect a remaining credit limit or amount available from the debit account.


Embodiments of the present invention provide a mechanism for reconciling the data for the transaction records and/or account balances stored in the secure memory (or other data storage element) of the mobile device with that maintained by an Issuer. This ability is desirable (and may be necessary) when a contactless element is used for a transaction. This is because a contactless element is typically used as part of initiating a transaction, and to provide authentication, account identification, and account balance data to a Merchant. The contactless element is then typically removed from communication with the device reader or point of sale terminal. As a result, the contactless element is not available for later communication with the Issuer using the device reader or terminal to update, synchronize, or reconcile transaction records. However, as recognized by the inventors, such updating, synchronizing, or reconciling is desirable and can be accomplished by using the cellular network as a data transport mechanism between the Issuer (via Mobile Gateway 138, for example) and the mobile device.


In embodiments of the present invention, mobile device 102 may be any device capable of communication and data transfer with a cellular network and a near field communication system. As noted, one example is a mobile wireless phone. FIG. 3 is a functional block diagram illustrating the primary components of a portable consumer device (e.g., element 102 of FIG. 2), such as a mobile phone that may be used as part of the inventive system and method. As illustrated in FIG. 3, mobile device 302 may include circuitry that is used to enable certain telephony and other device functions. The functional elements responsible for enabling those functions may include a processor 304 for executing instructions that implement the functions and operations of the device. Processor 304 may access data storage 312 (or another suitable memory region or element) to retrieve instructions or data used in executing the instructions. Data input/output elements 308 may be used to enable a user to input data (via a microphone or keyboard, for example) or receive output data (via a speaker, for example). Display 306 may also be used to output data to a user. Communications element 310 may be used to enable data transfer between device 302 and a wireless network (via antenna 318, for example) to assist in enabling telephony and data transfer functions. As described with reference to FIG. 2, device 302 may also include contactless element interface 314 to enable data transfer between contactless element 316 and other elements of the device, where contactless element 316 may include a secure memory and a near field communications data transfer element.


Data storage 312 may be a memory that stores data, and may be in any suitable form including a magnetic stripe, a memory chip, etc. The memory may be used to store data such as user identification or authentication information, user account Information, transaction data, etc. Stored financial information may include Information such as bank account information, bank identification number (BIN), credit or debit card account number information, account balance information, expiration date, consumer information such as name, date of birth, etc. Note that such data may instead, or also be stored in a secure data storage element, such as secure data storage 110 of FIG. 2 or a similar secure memory that is part of contactless element 316. As described, data storage 312 may also contain instructions which when executed by processor 304 implement operations or processes that are part of the operation of the device.



FIG. 4 is a flowchart illustrating an embodiment of the inventive method or process for updating or synchronizing transaction data for a transaction that uses a contactless element contained within a mobile device. The process steps or stages illustrated in the figure may be implemented as an independent routine or process, or as part of a larger routine or process. Note that each process step or stage depicted may be implemented as an apparatus that includes a processor executing a set of instructions, a method, or a system, among other embodiments.


As shown in the figure, a payment device is used to provide payment for a transaction. Depending on the transaction, the payment device may be used to conduct (or otherwise participate in) a transaction as a result of communication between the payment device and a Merchant device reader or point of sale terminal (stage 402, and as depicted, for example, by element 130 of FIG. 2). The payment device may be a mobile wireless phone or similar device that includes a contactless element, for example (as depicted, for example, by element 102 of FIG. 2 or element 302 of FIG. 3). As discussed, the contactless element is capable of communication and data transfer using a near field communications capability. The transaction may be conducted by passing the payment device near the device reader or point of sale terminal to permit the payment device and reader or terminal to establish communications and exchange data.


At stage 404 data stored in the payment device is provided to the device reader or point of sale terminal. The data may include user identification data, account data, or other data required by a Merchant to authenticate a user and permit the user to initiate or participate in a transaction. Following any needed processing of the provided data by the Merchant, Acquirer (element 132 of FIG. 2), Issuer (element 136 of FIG. 2), or other element(s) of the payment processing system, transaction data may be transferred to the payment device and stored in the memory of the payment device (as depicted in stage 406). In some embodiments, the data is transferred to the device using the near field communications capability of the contactless element and may be stored in the secure data space or other data storage element of the device (as depicted, for example, by element 110 or 113 of FIG. 2, or element 312 or 316 of FIG. 3). The transferred data may include, for example, a record of the transaction, an update to an account balance based on the characteristics of the transaction, an update to the balance of a prepaid card, etc. Note that this step is optional and may not occur for every transaction as the payment device may not be in communication with the device reader/POS terminal for a sufficient period of time to permit the data or the entire set of data to be transferred. In such a situation, the near field communications capability is used to engage in a transaction, but may not be available to transfer transaction related data from the Merchant, Acquirer or Issuer to the payment device.


Communication and data transfer between the payment device and the device reader or point of sale terminal is then ended (stage 408), typically because the payment device is out of range and no longer capable of communicating with the device reader or terminal using the near field communications capability. This may occur, for example, because the payment device is only momentarily positioned near enough to the device reader or terminal to permit effective communication and data transfer (e.g., it is only momentarily “swiped” or presented nearby the device reader or terminal). At a later time, after the payment device is no longer in communication with the device reader or point of sale terminal, the cellular network (as depicted by elements 120 and/or 122 of FIG. 2) is used to provide data to the payment device, where that data may then be stored in a secure data space or other memory location within the device (stage 410).


The data provided over the cellular network to the payment device may include, for example, data used to complete the records for a transaction. Such records might be used to update the data stored in the device to reflect the final amount of a transaction, provide identification data for a transaction, provide a receipt or warranty information for a transaction, update the balance of an account as a result of the completion of the transaction, etc. Note that some or all of the data provided over the cellular network may not have been available until completion of the transaction, at which time the payment device (e.g., a mobile phone or other device in which a contactless element is embedded) may not have been in communication with, or capable of communication with, the device reader or point of sale terminal by means of a near field communications mechanism.


The following is an example of a typical use case or scenario in which embodiments of the inventive system, apparatus and methods may be used. It is noted that the use case is only exemplary, as other use cases or scenarios are possible and will be evident to those of skill in the art.


In one use case or scenario, a counter or “accumulator” for a contactless element embedded in a mobile phone can be updated using the cellular network, after a contactless transaction is initiated using the near field communications capability. Such a counter or accumulator may be used to keep track of an account balance or prepaid account funds, for example. In another example, if there is a problem with a transaction, an Issuer can synchronize the data stored in the contactless device with its own transaction information using the cellular network. For example, a consumer might wish to purchase $75 worth of gas using a mobile phone that includes a prepaid card type of functionality as part of the contactless element. In such a transaction, $75 may be deducted from the prepaid card balance and that data may be stored in a memory in the phone. However, in actuality, the gas pump may stop at $50, because the gas pump stopped working, the consumer could only fill their tank up to $50, etc. In this case, the consumer's prepaid card or balance would show a $75 debit even though the transaction was only for the amount of $50. However, using the cellular network as a communications channel, the Issuer is able to update the transaction records stored in the phone so that the data in the phone's memory (e.g., the secure memory region of the contactless element or another suitable data storage region of the phone) reflects the actual transaction information. This capability can be very important in situations where the balance of an account (as reflected by the data stored in the phone) is used to determine whether a later transaction is authorized.


To provide additional security for the transaction data transferred between the mobile device and the Issuer or Payment Processing Network, embodiments of the present invention may include the capability to encrypt and decrypt the transaction data. This is desirable as encrypting the transaction data may prevent unauthorized users or applications from accessing the data, either on the phone or while the data is in transit over a communications network. As will be described, the distribution of encryption keys or access codes for use in encrypting, decrypting, or otherwise accessing transaction data may be controlled by an Issuer, payment processor, or other suitable entity that is part of a payment processing system. This enables the Issuer or payment processor, for example, to determine which mobile gateways are authorized for transferring or processing payment transaction data. It also provides an Issuer or payment processor with a mechanism for segmenting the data transfer or processing tasks performed by a mobile gateway. The segmentation may be based on a characteristic of the transaction (transaction type (such as debit, credit, prepaid, goods, service), amount (above or below a threshold) or originating location), a characteristic of the consumer (credit history, transaction history, account profile), or a characteristic of the data processing system (processing load, processing or security capabilities of a mobile gateway, etc.).



FIGS. 5(a), 5(b), and 5(c) are flow charts illustrating a process for distributing and using encryption keys to provide secure transfer of payment transaction or other data between an Issuer and a mobile device, in accordance with an embodiment of the present invention. The process steps or stages illustrated in the figures may be implemented as an independent routine or process, or as part of a larger routine or process. Note that each process step or stage depicted may be implemented as an apparatus that includes a processor executing a set of Instructions, a method, or a system, among other embodiments. The apparatus may be an encryption key distribution server (such as element 140 of FIG. 2, which may be implemented as part of another element of a payment processing system), a payment processor, or another suitable element of a data processing or payment processing system. Further, although the encryption and decryption process described with reference to FIGS. 5(a), 5(b), and 5(c) use encryption keys, other encryption methods or security techniques (such as access codes, etc.) may be used in implementing embodiments of the present invention and are understood to be included within the description of the invention contained herein.



FIG. 5(a) illustrates the stages involved in a process for an encryption key distribution server (e.g., element 140 of FIG. 2) to distribute an encryption key of a first key pair to a mobile gateway. FIG. 5(b) Illustrates the stages involved in a process for using the encryption key server to distribute an encryption key of a second key pair to an Issuer. FIG. 5(c) illustrates the stages involved in a process for using the encryption keys distributed to the mobile gateway and to the Issuer to encrypt data generated by the Issuer in the mobile gateway for transmission to the mobile device, and to decrypt that data in the mobile device. As will be described, in some embodiments, the encryption and decryption processes used to enable enhanced data security depend upon the use of a pair of “keys” which are used in accordance with an accepted encryption or data security protocol (e.g., symmetric key standards and protocols), although other suitable methods or processes (such as the public key infrastructure (PKI) standards and protocols) may also be used.


As shown in FIG. 5(a), at stage 502 an encryption key server (e.g., element 140 of FIG. 2) is used to distribute a first encryption key pair (or more precisely, a key of a first encryption key pair) to a mobile gateway that will participate in the encryption/decryption processes. Note that the keys can be generated within the encryption key server or provided to the server by another entity, such as an authorized data processor, Issuer, payment processor, or element of a data processing network. Note that the process described with reference to FIG. 5(a) is performed for each mobile gateway that will be used in the transfer of transaction data between the mobile payment device and the payment processing network.


Further, each encryption key pair distributed in accordance with the process depicted in FIG. 5(a) can be associated with a specific mobile gateway, so that a different encryption key pair may be used for data transferred via each such gateway, eCommerce server, etc., and a mobile device. This arrangement may allow an Issuer or payment processor (for example) to specify which of multiple mobile gateways is authorized to provide communications and data transfer capabilities for a specific mobile device, group of devices, Issuer, or type of transaction, for example. It also permits an Issuer or payment processor (for example) to be the entity responsible for authenticating a mobile gateway and thereby control which of multiple mobile gateways is a valid one for processing a specified type of transaction, for processing transaction data for a specified group of consumers, for processing transaction data requiring a specific security level, etc. Among other benefits, this permits an Issuer or payment processor to verify the security or status of a mobile gateway, thereby providing protection for consumers and merchants. For example, an Issuer or payment processor may desire to segment the processing of transactions based on the type of transaction or a characteristic of a transaction (e.g., debit, credit, prepaid, a range of transaction amounts, a region or time zone in which transactions are originated, etc.), or based on a characteristic of the consumer or mobile device responsible for originating the transaction (e.g., a credit rating of the consumer, the configuration of the mobile device, the type or class of payment application or payment device, etc.). The segmentation of the processing of transactions among multiple mobile gateways may enable the issuer or payment processor to better track usage patterns of a payment device contained in the mobile device, dynamically or statically configure the data processing load as needed to achieve a desired load balancing among transaction data provided by multiple mobile gateways, or provide a different level of quality control, fraud detection, or value-added service for a group of consumers, payment devices, or type of transactions.


Continuing with the description of FIG. 5(a), at stage 504, the encryption key server provides one key of the first key pair to the desired mobile gateway (element 138 of FIG. 2, for example). As mentioned, a different pair of encryption keys may be utilized for each different mobile gateway or server that is, or may be, participating in a transaction process. A record of the encryption key pair used for each such mobile gateway or server would typically be maintained by the encryption key server or an entity responsible for operating the encryption key server. As noted, one key of the first encryption key pair is stored in the mobile gateway (stage 504), while the second key of the first key pair is stored in the encryption key server (stage 506).



FIG. 5(b) illustrates the stages involved in a process for using the encryption key server to distribute an encryption key of a second key pair to an Issuer. Note that the keys can be generated within the encryption key server or provided to the server by another entity, such as an authorized data processor, Issuer, payment processor, or element of a data processing network. Note that the process described with reference to FIG. 5(b) is performed for each Issuer.


At stage 508, the encryption key server begins the process of distributing a key of a second key pair to an Issuer. One key of the second key pair is provided to the Issuer (stage 510) and the other key of the second key pair is stored in the encryption key server (stage 514). The Issuer uses the received key of the second key pair to generate a unique key (or other form of access control data) for each mobile payment device that is registered with the Issuer (stage 512). As will be described, this unique key will be distributed to the mobile payment device and used to decrypt transaction data provided to the device as part of an update of the transaction data stored in the device, or as part of a transaction or account record stored in the device. Note that the unique key provided to the mobile device may also be used to encrypt data that is generated by the device or the payment application installed in the device for secure transfer to an issuer or other entity.



FIG. 5(c) illustrates the stages involved in a process for using the encryption keys distributed to the mobile gateway and to the issuer to encrypt data generated by the issuer in the mobile gateway for transmission to the mobile device, and to decrypt that data in the mobile device. Note that the process or method described with reference to FIG. 5(c) may be performed for each transaction. At stage 522, a mobile device initiates a payment transaction by interacting with a device reader or point of sale terminal (e.g., element 130 of FIG. 2). As part of the transaction process, the Acquirer (e.g., element 132 of FIG. 2) provides transaction data to the Payment Processing Network (e.g., element 134 of FIG. 2) and ultimately to the Issuer (e.g., element 136 of FIG. 2) at stage 524, typically as a result of communication between the Payment Processing Network and the Issuer.


The issuer processes the transaction data and generates updated transaction data which is intended to be provided to the mobile device. The generated data may be for example, in the form of transaction records, updates or corrections to an account balance, etc. Thus, the process described with reference to FIG. 5(c) may be used for example, as part of the process described with reference to FIG. 4 (e.g., to exchange or update transaction related data as part of a transaction query, update or reconciliation process performed by the Issuer). The generated data is provided to the Payment Processing Network at stage 526. Note that in some embodiments, and depending upon the communications network or connections being used, the generated data may instead be provided directly to the mobile gateway.


If there is no direct connection between the issuer and mobile gateway, then the generated data provided to the Payment Processing Network is provided to the mobile gateway. The mobile gateway connects to the encryption key server and to the mobile device (stage 528). At stage 530, the encryption key server generates a session specific key from the stored key of the first key pair. The encryption key server then generates the unique key for the mobile device using the stored key of the second key pair (stage 532). The encryption key server then encrypts the generated session key using the unique key for the mobile device (stage 532). The encryption key server then distributes the encrypted session key to the mobile device via the mobile gateway (stage 534). The mobile device receives the encrypted session key, recovers the session key using its unique key, and then uses the session key to decrypt the transaction data it received from the mobile gateway (stage 536). The decrypted data is then made available to the payment application resident on the mobile device for processing, storage, display to the user, or another relevant function. The decrypted data may be stored in a secure data storage medium or other suitable element.


Note that the process of FIG. 5 has been described with reference to distributing a key of an encryption key pair to a mobile gateway for storage in the gateway—this enables the gateway to encrypt and decrypt data that passes through the gateway. In some embodiments, one key of a pair may be distributed from the encryption key server to the Issuer to enable the Issuer to perform some or all of the data encryption and decryption operations. Similarly, one key of a pair may be distributed from the encryption key server to an element of the payment processing network (element 134 of FIG. 2, as suggested by the dot/dash line in the figure). In such embodiments, the element of the payment processing network (such as a payment processor) may perform some or all of the data encryption and decryption operations. Note also that as mentioned, even if the Issuer does not perform the data encryption/decryption processes, the Issuer may be involved in the encryption key distribution process by communicating with the encryption key distribution server to validate an encryption key, determine which encryption keys are distributed to which mobile gateways, authenticate a mobile gateway, assign a security level to a mobile gateway, etc.


After distribution of the encryption/decryption keys, the keys may be used to provide a secure method of exchanging transaction data between the mobile device and the Issuer. In some embodiments, this may involve establishing a secure channel between a payment application resident in the mobile device and the mobile gateway, with the gateway acting as an intermediary between the mobile device and the payment processing network (and hence the Issuer by virtue of the Issuer's communication with the payment processing network). Typically, the exchange of transaction data may involve two paths: (1) data generated in the mobile device for transfer to the payment processing network; and (2) data generated by the Issuer for transfer to the mobile device.


As mentioned, an encryption key may be used to encrypt data generated in the mobile device for transmission, and to decrypt that data in the mobile gateway for use by an element of the payment processing network or the Issuer. In this use case, payment application data generated by the mobile device is encrypted using a key provided to the mobile device. The encryption process may occur within the secure data storage under the control of the payment application, or by another suitable process. The encrypted data may include security or access data, payment account data (account identifiers, account balances, etc.), transaction data, user identification data, etc. The encrypted data is transmitted from the mobile device over the cellular network to the cellular system and then to the mobile gateway. The mobile gateway uses a key stored in the gateway to decrypt the received data so that the data may be provided to the payment processing network and the Issuer. Note that this process of encrypting data generated in the mobile device for transfer to the payment processing network or Issuer may be used as part of the process described with reference to FIG. 4 (e.g., to transfer transaction related data as part of a transaction query, update or reconciliation process). However, this process may also be used in situations other than those described with reference to FIG. 4, such as to provide a secure data exchange between a mobile device and a payment processing network or Issuer using a wireless/cellular network, for the purpose of initiating or otherwise conducting a payment transaction.


Note that in the context of the Issuer providing transaction data via the wireless network to update or correct data stored in the mobile device after the device is no longer in communication with a device reader or point of sale terminal, the process, functions, or operations of described would typically be utilized to provide data security. The process, functions, or operations described may also be used to transfer data from the mobile device to the payment processing network in the context of initiating a transaction or performing another function over the wireless network. However, as previously described, a transaction may also be initiated using the near field communications capability of the contactless element contained in the mobile device.



FIG. 6 is a block diagram of an exemplary computing apparatus that may be used to implement an embodiment of the inventive method or process for updating or synchronizing transaction data for a transaction that uses a contactless element contained within a mobile device. The elements of the computing apparatus illustrated in FIG. 6 may be used to implement the inventive processes, methods, or operations in whole or in part, and may be part of a server or other computing apparatus (e.g., a mobile gateway, an Issuer managed server, etc.). The subsystems shown in FIG. 6 are interconnected via a system bus 600. Additional subsystems such as a printer 610, keyboard 620, fixed disk 630 (or other memory comprising computer readable media), monitor 640, which is coupled to display adapter 650, and others are shown. Peripherals and input/output (I/O) devices, which couple to I/O controller 660, can be connected to the computer system by any number of means known in the art, such as serial port 670. For example, serial port 670 or external interface 680 can be used to connect the computer apparatus to a wide area network such as the Internet, a mouse input device, or a scanner. The interconnection via system bus allows the central processor 6890 to communicate with each subsystem and to control the execution of instructions from system memory 695 or the fixed disk 630, as well as the exchange of information between subsystems. The system memory 695 and/or the fixed disk 630 may embody a computer readable medium.


In accordance with embodiments of the present invention, there have been described a system, apparatuses, and methods for enabling use of a mobile device that includes a contactless element in a payment transaction. The contactless element is embedded within a mobile device that is capable of communication and data transfer over a cellular network and using a near field communications capability. The contactless element may include a secure data storage region that is used to store transaction data, account data, etc. The cellular network is used to provide an over the air update or reconciliation of transaction data stored in the mobile device in situations in which a transaction was initiated using the contactless element and a near field communications mechanism, but the mobile device is no longer capable of such communication.


It should be understood that the present invention as described above can be implemented in the form of control logic using computer software in a modular or integrated manner. Based on the disclosure and teachings provided herein, a person of ordinary skill in the art will know and appreciate other ways and/or methods to implement the present invention using hardware and a combination of hardware and software


Any of the software components or functions described in this application, may be implemented as software code to be executed by a processor using any suitable computer language such as, for example, Java, C++ or Perl using, for example, conventional or object-oriented techniques. The software code may be stored as a series of instructions, or commands on a computer readable medium, such as a random access memory (RAM), a read only memory (ROM), a magnetic medium such as a hard-drive or a floppy disk, or an optical medium such as a CD-ROM. Any such computer readable medium may reside on or within a single computational apparatus, and may be present on or within different computational apparatuses within a system or network.


While certain exemplary embodiments have been described in detail and shown in the accompanying drawings, it is to be understood that such embodiments are merely illustrative of and not intended to be restrictive of the broad invention, and that this invention is not to be limited to the specific arrangements and constructions shown and described, since various other modifications may occur to those with ordinary skill in the art.


As used herein, the use of “a”, “an” or “the” is intended to mean “at least one”, unless specifically indicated to the contrary.

Claims
  • 1. A method for facilitating a transaction, the method comprising: sending, by a key distribution server to an issuer computer, a first symmetric encryption key of a symmetric key pair, and storing, by the key distribution server a second symmetric encryption key corresponding to the first symmetric encryption key of the symmetric key pair;generating, by the issuer computer, a unique key using the first symmetric encryption key of the symmetric key pair;transmitting, by the issuer computer, the unique key to a mobile device, the mobile device comprising account data;generating, by a device reader that interacts with the mobile device, transaction data for the transaction, the transaction data comprising a first transaction value and the account data;receiving, by the issuer computer, the transaction data from the device reader, wherein the transaction data comprises the first transaction value;processing, by the issuer computer, the transaction data;generating, by the issuer computer, updated transaction data for the transaction, the updated transaction data comprising a second transaction value that is different than the first transaction value;transmitting, by issuer computer, the updated transaction data to a mobile gateway;encrypting, by the mobile gateway, the updated transaction data using a session key;sending, by the mobile gateway to the mobile device, the encrypted updated transaction data;generating, by the key distribution server, a copy of the unique key using the second symmetric encryption key of the symmetric key pair;encrypting, by the key distribution server, the session key with the copy of the unique key;sending, by the key distribution server to the mobile device via the mobile gateway, the encrypted session key;decrypting, by the mobile device, the encrypted session key using the unique key;decrypting, by the mobile device, the encrypted updated transaction data using the session key; andupdating, by the mobile device, the account data on the mobile device based on the updated transaction data.
  • 2. The method of claim 1, wherein the transaction data is received from the device reader via an acquirer computer and a payment processing network.
  • 3. The method of claim 1, further comprising providing a communication by the issuer computer to the key distribution server indicating that the mobile gateway is authorized to communicate with the mobile device.
  • 4. The method of claim 1, wherein the issuer computer selects the mobile gateway to process a type of payment transaction, wherein the type is one of an eCommerce transaction, a debit transaction, a credit transaction, or a prepaid transaction, and wherein the transaction conducted between the mobile device and the device reader is of the type.
  • 5. The method of claim 1, wherein the transaction data comprises a characteristic of the transaction, the characteristic of the transaction being one or more of a region in which the transaction data is generated, a type of a consumer operating the mobile device, a type of the mobile device or device reader, a service for processing the transaction data, or a type of mobile gateway associated with the transaction, and wherein the method further comprises selecting, by the issuer computer, based on the characteristic of the transaction, the mobile gateway to encrypt the updated transaction data.
  • 6. The method of claim 5, wherein the characteristic of the transaction is a region in which the transaction data is generated.
  • 7. The method of claim 5, wherein the common characteristic of the transaction is a type or characteristic of a consumer operating the mobile device originating the transaction.
  • 8. The method of claim 5, wherein the characteristic of the transaction is a type of the mobile device or device reader.
  • 9. The method of claim 5, wherein the characteristic of the transaction is a service for processing the transaction data.
  • 10. The method of claim 5, wherein the characteristic of the transaction is a type of mobile gateway associated with the transaction.
  • 11. The method of claim 1, wherein the mobile device is a mobile phone.
  • 12. The method of claim 1, further comprising: generating, by the key distribution server, a plurality of symmetric key pairs, each symmetric key pair of the plurality of symmetric key pairs associated with a different mobile gateway of a plurality of mobile gateways; anddistributing, by the key distribution server, the plurality of symmetric key pairs to the plurality of mobile gateways; andselecting, by the issuer computer, the mobile gateway to transmit the updated transaction data by determining that the mobile gateway has received at least the symmetric key pair comprising the first symmetric encryption key and the second symmetric encryption key from the key distribution server.
  • 13. A system comprising: a key distribution server comprising a processor and a non-transitory computer readable medium comprising executable instructions, that when executed by the key distribution server processor cause the key distribution server to perform the steps of: sending, to an issuer computer, a first symmetric encryption key of a symmetric key pair, and storing a second symmetric encryption key corresponding to the first symmetric encryption key of the symmetric key pair;generating a copy of a unique key using the second symmetric encryption key of the symmetric key pair;encrypting a session key with the copy of the unique key; andsending, to a mobile device via a mobile gateway, the encrypted session key;the mobile gateway comprising a processor and a non-transitory computer readable medium comprising executable instructions, that when executed by the mobile gateway processor cause the mobile gateway to perform the steps of: receiving updated transaction data from the issuer computer;encrypting the updated transaction data using the session key; andsending, by the mobile gateway to the mobile device, the encrypted updated transaction data;the issuer computer comprising a processor and a non-transitory computer readable medium comprising executable instructions, that when executed by the issuer computer processor cause the issuer computer to perform the steps of: generating the unique key using the first symmetric encryption key of the symmetric key pair;transmitting the unique key to the mobile device;receiving transaction data from a device reader that interacts with the mobile device,wherein the transaction data for a transaction comprises a first transaction value;processing the transaction data;generating the updated transaction data for the transaction, wherein the updated transaction data comprises an updated balance comprising a second transaction value that is different than the first transaction value; andtransmitting the updated transaction data to the mobile gateway;the device reader that interacts with the mobile device, the device reader comprising a processor and a non-transitory computer readable medium comprising executable instructions, that when executed by the device reader processor cause the device reader to perform the steps of: generating transaction data for a transaction, the transaction data comprising the first transaction value and account data; andsending the transaction data to the issuer computer;the mobile device comprising a processor and a non-transitory computer readable medium comprising executable instructions, that when executed by the mobile device processor cause the mobile device to perform the steps of: decrypting the encrypted session key using the unique key;decrypting the encrypted updated transaction data using the session key; andupdating the account data on the mobile device based on the updated transaction data.
  • 14. The system of claim 13, wherein the issuer computer non-transitory computer readable medium further comprises executable instructions, that when executed by the issuer computer processor cause the issuer computer to perform the step of: generating and transmitting an authorization response message for the transaction to the device reader.
  • 15. The system of claim 13, wherein the transaction is a payment transaction.
  • 16. The system of claim 15, wherein the payment transaction is a credit or debit card transaction.
  • 17. The system of claim 16, wherein the account data is a credit or debit account balance.
CROSS REFERENCE TO RELATED APPLICATIONS

This application is a continuation application of U.S. patent application Ser. No. 13/662,843, filed Oct. 19, 2012, which is a divisional application of U.S. patent application Ser. No. 12/563,421, filed Sep. 21, 2009, which claims priority from U.S. Provisional Patent Application No. 61/099,960, filed Sep. 22, 2008, the contents of which are hereby incorporated in their entirety by reference for all purposes.

US Referenced Citations (420)
Number Name Date Kind
4044231 Beck et al. Aug 1977 A
4613904 Lurie Sep 1986 A
4614861 Pavlov et al. Sep 1986 A
4674041 Lemon et al. Jun 1987 A
4701601 Francini et al. Oct 1987 A
4868376 Lessin et al. Sep 1989 A
5034597 Atsumi Jul 1991 A
5305196 Deaton et al. Apr 1994 A
5327508 Deaton et al. Jul 1994 A
5353218 De Lapa et al. Oct 1994 A
5359183 Skolar Oct 1994 A
5388165 Deaton et al. Feb 1995 A
RE34915 Nichtberger et al. Apr 1995 E
5420606 Begum et al. May 1995 A
5430644 Deaton et al. Jul 1995 A
5448471 Deaton et al. Sep 1995 A
5465206 Hilt et al. Nov 1995 A
5477038 Levine et al. Dec 1995 A
5483444 Heintzeman et al. Jan 1996 A
5500513 Langhans et al. Mar 1996 A
5502636 Clarke Mar 1996 A
5530438 Bickham et al. Jun 1996 A
5564073 Takahisa Oct 1996 A
5577266 Takahisa et al. Nov 1996 A
5579537 Takahisa Nov 1996 A
5592560 Deaton et al. Jan 1997 A
5604921 Alanara Feb 1997 A
5615110 Wong Mar 1997 A
5621201 Langhans et al. Apr 1997 A
5621812 Deaton et al. Apr 1997 A
5627549 Park May 1997 A
5638457 Deaton et al. Jun 1997 A
5642485 Deaton et al. Jun 1997 A
5644723 Deaton et al. Jul 1997 A
5649114 Deaton et al. Jul 1997 A
5659165 Jennings et al. Aug 1997 A
5659469 Deaton et al. Aug 1997 A
5675662 Deaton et al. Oct 1997 A
5678939 Ross Oct 1997 A
5687322 Deaton et al. Nov 1997 A
5708422 Blonder et al. Jan 1998 A
5710886 Christensen et al. Jan 1998 A
5717866 Naftzger Feb 1998 A
5761648 Golden et al. Jun 1998 A
5777903 Piosenka et al. Jul 1998 A
5791991 Small Aug 1998 A
5793972 Shane Aug 1998 A
5806044 Powell Sep 1998 A
5822735 De Lapa et al. Oct 1998 A
5855007 Jovicic et al. Dec 1998 A
5870030 Deluca et al. Feb 1999 A
5884277 Khosla Mar 1999 A
5905246 Fajkowski May 1999 A
5907830 Engel et al. May 1999 A
5924080 Johnson Jul 1999 A
5945653 Walker et al. Aug 1999 A
5959577 Fan et al. Sep 1999 A
5974399 Giuliani et al. Oct 1999 A
5991749 Morrill Nov 1999 A
6002771 Nielsen Dec 1999 A
6009411 Kepecs Dec 1999 A
6009415 Shurling et al. Dec 1999 A
6012038 Powell Jan 2000 A
6014634 Scroggie et al. Jan 2000 A
6018718 Walker et al. Jan 2000 A
6029151 Nikander Feb 2000 A
6035280 Christensen Mar 2000 A
6041309 Laor Mar 2000 A
6049778 Walker et al. Apr 2000 A
6055505 Elston Apr 2000 A
6062472 Cheung May 2000 A
6062991 Moriarty et al. May 2000 A
6064990 Goldsmith May 2000 A
6067526 Powell May 2000 A
6067529 Ray et al. May 2000 A
6076068 Delapa et al. Jun 2000 A
6076069 Laor Jun 2000 A
6076101 Kamakura et al. Jun 2000 A
6128599 Walker et al. Oct 2000 A
6185290 Shaffer et al. Feb 2001 B1
6185541 Scroggie et al. Feb 2001 B1
6227447 Campisano May 2001 B1
6237145 Narasimhan et al. May 2001 B1
6247129 Keathley et al. Jun 2001 B1
6267292 Walker et al. Jul 2001 B1
6279112 O'toole, Jr. et al. Aug 2001 B1
6292786 Deaton et al. Sep 2001 B1
6307958 Deaton et al. Oct 2001 B1
6318631 Halperin Nov 2001 B1
6321208 Barnett et al. Nov 2001 B1
6330543 Kepecs Dec 2001 B1
6330550 Brisebois et al. Dec 2001 B1
6334108 Deaton et al. Dec 2001 B1
6336098 Fortenberry et al. Jan 2002 B1
6336099 Barnett et al. Jan 2002 B1
6341724 Campisano Jan 2002 B2
6351735 Deaton et al. Feb 2002 B1
6377935 Deaton et al. Apr 2002 B1
6378775 Hayashida Apr 2002 B2
6381324 Shaffer et al. Apr 2002 B1
6424949 Deaton et al. Jul 2002 B1
6424951 Shurling et al. Jul 2002 B1
6434534 Walker et al. Aug 2002 B1
6470181 Maxwell Oct 2002 B1
6484146 Day et al. Nov 2002 B2
6488203 Stoutenburg et al. Dec 2002 B1
6505046 Baker Jan 2003 B1
6516302 Deaton et al. Feb 2003 B1
6529725 Joao et al. Mar 2003 B1
6535855 Cahill et al. Mar 2003 B1
6557752 Yacoob May 2003 B1
6560581 Fox et al. May 2003 B1
6584309 Whigham Jun 2003 B1
6587835 Treyz et al. Jul 2003 B1
6601040 Kolls Jul 2003 B1
6601759 Fife et al. Aug 2003 B2
6609104 Deaton et al. Aug 2003 B1
6611811 Deaton et al. Aug 2003 B1
6631849 Blossom Oct 2003 B2
6647257 Owensby Nov 2003 B2
6647269 Hendrey et al. Nov 2003 B2
6664948 Crane et al. Dec 2003 B2
6685093 Challa et al. Feb 2004 B2
6736322 Gobburu et al. May 2004 B2
6684195 Deaton et al. Jun 2004 B1
6747547 Benson et al. Jun 2004 B2
6764003 Martschitsch et al. Jul 2004 B1
6775539 Deshpande Aug 2004 B2
6832721 Fujii Dec 2004 B2
6837425 Gauthier et al. Jan 2005 B2
6868391 Hultgren Mar 2005 B1
6877665 Challa et al. Apr 2005 B2
6912398 Domnitz Jun 2005 B1
6915272 Zilliacus Jul 2005 B1
6920611 Spaeth et al. Jul 2005 B1
6934689 Ritter et al. Aug 2005 B1
6965992 Joseph et al. Nov 2005 B1
6975852 Sofer et al. Dec 2005 B1
6990330 Veerepalli et al. Jan 2006 B2
7003497 Maes Feb 2006 B2
7007840 Davis Mar 2006 B2
7013286 Aggarwal et al. Mar 2006 B1
7025256 Drummond et al. Apr 2006 B1
7028906 Challa et al. Apr 2006 B2
7039611 Devine May 2006 B2
7040533 Ramachandran May 2006 B1
7051923 Nguyen et al. May 2006 B2
7055031 Platt May 2006 B2
7076329 Kolls Jul 2006 B1
7089208 Levchin et al. Aug 2006 B1
7099850 Mann et al. Aug 2006 B1
7104446 Bortolin et al. Sep 2006 B2
7107250 Harrison Sep 2006 B2
7110954 Yung et al. Sep 2006 B2
7121456 Speath et al. Oct 2006 B2
7124937 Myers et al. Oct 2006 B2
7136835 Flitcroft et al. Nov 2006 B1
7150393 Drummond et al. Dec 2006 B1
7152780 Gauthier et al. Dec 2006 B2
7159770 Onozu et al. Jan 2007 B2
7181620 Hur Feb 2007 B1
7194437 Britto et al. Mar 2007 B1
7201313 Ramachandran Apr 2007 B1
7203300 Shaffer et al. Apr 2007 B2
7207477 Ramachandran Apr 2007 B1
7231357 Shanman Jun 2007 B1
7231372 Prange et al. Jun 2007 B1
RE39736 Morrill Jul 2007 E
7243853 Levy et al. Jul 2007 B1
7257545 Hung Aug 2007 B1
7280981 Huang et al. Oct 2007 B2
7290704 Ball et al. Nov 2007 B1
7308254 Rissanen Dec 2007 B1
7343149 Benco et al. Mar 2008 B2
7350702 Bortolin et al. Apr 2008 B2
7353187 Emodi et al. Apr 2008 B1
7356516 Richey et al. Apr 2008 B2
7357310 Calabrese et al. Apr 2008 B2
RE40444 Linehan Jul 2008 E
7407094 Myers et al. Aug 2008 B2
7440771 Purk Oct 2008 B2
7447662 Gibson Nov 2008 B2
7464867 Kolls Dec 2008 B1
7496527 Silverstein et al. Feb 2009 B2
7500606 Park et al. Mar 2009 B2
7580873 Silver et al. Aug 2009 B1
7631803 Peyret et al. Dec 2009 B2
7716129 Tan et al. May 2010 B1
7945240 Klock et al. May 2011 B1
7970669 Santos Jun 2011 B1
7992781 Hammad Aug 2011 B2
8019365 Fisher Sep 2011 B2
8135362 LaDue Mar 2012 B2
8170527 Granucci et al. May 2012 B2
8639629 Hoffman Jan 2014 B1
8977567 Aabye et al. Mar 2015 B2
10037523 Aabye Jul 2018 B2
20010013542 Horowitz et al. Aug 2001 A1
20020013711 Ahuja et al. Jan 2002 A1
20020065713 Awada et al. May 2002 A1
20020073025 Tanner Jun 2002 A1
20020091569 Kitaura et al. Jul 2002 A1
20020128903 Kernahan Sep 2002 A1
20020161701 Warmack Oct 2002 A1
20020165775 Tagseth et al. Nov 2002 A1
20020190118 Davenport et al. Dec 2002 A1
20020198777 Yuasa Dec 2002 A1
20030004808 Elhaoussine et al. Jan 2003 A1
20030058261 Challa et al. Mar 2003 A1
20030120593 Bansal et al. Jun 2003 A1
20030126078 Vihinen Jul 2003 A1
20030144907 Cohen, Jr. et al. Jul 2003 A1
20030149662 Shore Aug 2003 A1
20030154139 Woo Aug 2003 A1
20030172036 Feigenbaum Sep 2003 A1
20030172040 Kemper et al. Sep 2003 A1
20030212595 Antonucci Nov 2003 A1
20030212601 Silva et al. Nov 2003 A1
20030212642 Weller et al. Nov 2003 A1
20030220835 Barnes, Jr. Nov 2003 A1
20030225618 Hessburg et al. Dec 2003 A1
20030229588 Falk et al. Dec 2003 A1
20030230630 Whipple et al. Dec 2003 A1
20030233292 Richey et al. Dec 2003 A1
20040019522 Bortolin et al. Jan 2004 A1
20040030601 Pond et al. Feb 2004 A1
20040038690 Lee et al. Feb 2004 A1
20040044621 Huang et al. Mar 2004 A1
20040049455 Mohsenzadeh Mar 2004 A1
20040050922 Gauthier et al. Mar 2004 A1
20040054575 Marshall Mar 2004 A1
20040054581 Redford et al. Mar 2004 A1
20040054590 Redford et al. Mar 2004 A1
20040054591 Spaeth et al. Mar 2004 A1
20040063494 Oram et al. Apr 2004 A1
20040064406 Yates et al. Apr 2004 A1
20040078243 Fisher et al. Apr 2004 A1
20040117254 Nemirofsky et al. Jun 2004 A1
20040133653 Defosse et al. Jul 2004 A1
20040139021 Reed et al. Jul 2004 A1
20040148224 Gauthier Jul 2004 A1
20040153715 Spaeth et al. Aug 2004 A1
20040186770 Pettit et al. Sep 2004 A1
20040199470 Ferry, Jr. et al. Oct 2004 A1
20040220964 Shiftan et al. Nov 2004 A1
20040243519 Perttila et al. Dec 2004 A1
20040249712 Brown et al. Dec 2004 A1
20040254848 Golan et al. Dec 2004 A1
20040260653 Tsuei et al. Dec 2004 A1
20040267618 Judicibus et al. Dec 2004 A1
20050021456 Steele et al. Jan 2005 A1
20050029344 Davis Feb 2005 A1
20050033688 Peart et al. Feb 2005 A1
20050035847 Bonalle et al. Feb 2005 A1
20050036611 Seaton et al. Feb 2005 A1
20050045718 Bortolin et al. Mar 2005 A1
20050058427 Nguyen et al. Mar 2005 A1
20050071225 Bortolin et al. Mar 2005 A1
20050071226 Nguyen et al. Mar 2005 A1
20050071227 Hammad et al. Mar 2005 A1
20050071228 Bortolin et al. Mar 2005 A1
20050071235 Nguyen et al. Mar 2005 A1
20050075958 Gonzalez Apr 2005 A1
20050097473 Malik et al. May 2005 A1
20050102233 Park et al. May 2005 A1
20050102234 Devine May 2005 A1
20050121506 Gauthier et al. Jun 2005 A1
20050131838 Woodward Jun 2005 A1
20050149455 Bruesewitz et al. Jul 2005 A1
20050154674 Nicholls et al. Jul 2005 A1
20050156026 Ghosh Jul 2005 A1
20050165864 Martino Jul 2005 A1
20050171898 Bishop et al. Aug 2005 A1
20050177510 Hilt et al. Aug 2005 A1
20050184145 Law Aug 2005 A1
20050187873 Labrou et al. Aug 2005 A1
20050199714 Brandt et al. Sep 2005 A1
20050203856 Russell Sep 2005 A1
20050210387 Alagappan et al. Sep 2005 A1
20050213766 Goss Sep 2005 A1
20050219061 Lai et al. Oct 2005 A1
20050222933 Wesby Oct 2005 A1
20050222949 Inotay et al. Oct 2005 A1
20050228719 Roberts Oct 2005 A1
20050283416 Reid Dec 2005 A1
20050283430 Reid et al. Dec 2005 A1
20050283431 Reid et al. Dec 2005 A1
20050283432 Reid et al. Dec 2005 A1
20050283433 Reid et al. Dec 2005 A1
20060006226 Fitzgerald Jan 2006 A1
20060053056 Alspach-Goss et al. Mar 2006 A1
20060059110 Madhok et al. Mar 2006 A1
20060080243 Kemper et al. Apr 2006 A1
20060085260 Yamagishi Apr 2006 A1
20060111967 Forbes May 2006 A1
20060155644 Reid et al. Jul 2006 A1
20060163345 Myers et al. Jul 2006 A1
20060178957 Leclaire Aug 2006 A1
20060179007 Davis Aug 2006 A1
20060202025 Calabrese et al. Sep 2006 A1
20060206376 Gibbs et al. Sep 2006 A1
20060218086 Campbell et al. Sep 2006 A1
20060224449 Byerley et al. Oct 2006 A1
20060247981 Singh et al. Nov 2006 A1
20060248007 Hofer et al. Nov 2006 A1
20060253390 McCarthy et al. Nov 2006 A1
20060270421 Philips et al. Nov 2006 A1
20060273163 Gusler et al. Dec 2006 A1
20060282382 Balasubramanian et al. Dec 2006 A1
20060290501 Hammad et al. Dec 2006 A1
20060293027 Hammad et al. Dec 2006 A1
20070001000 Nguyen et al. Jan 2007 A1
20070001001 Myers et al. Jan 2007 A1
20070005492 Kim Jan 2007 A1
20070005613 Singh et al. Jan 2007 A1
20070005774 Singh et al. Jan 2007 A1
20070012764 Bortolin et al. Jan 2007 A1
20070017970 Gauthier et al. Jan 2007 A1
20070022058 Labrou et al. Jan 2007 A1
20070034679 Gauthier et al. Feb 2007 A1
20070055597 Patel et al. Mar 2007 A1
20070055630 Gauthier et al. Mar 2007 A1
20070057034 Gauthier et al. Mar 2007 A1
20070057051 Bortolin et al. Mar 2007 A1
20070078761 Kagan et al. Apr 2007 A1
20070083465 Ciurea et al. Apr 2007 A1
20070100691 Patterson May 2007 A1
20070101411 Babi May 2007 A1
20070125842 Antoo et al. Jun 2007 A1
20070150387 Seubert et al. Jun 2007 A1
20070156436 Fisher et al. Jul 2007 A1
20070194104 Fukada Aug 2007 A1
20070194113 Esplin et al. Aug 2007 A1
20070203836 Dodin Aug 2007 A1
20070205270 Kemper et al. Sep 2007 A1
20070241189 Slavin et al. Oct 2007 A1
20070243856 Fougnies et al. Oct 2007 A1
20070244811 Tumminaro Oct 2007 A1
20070250380 Mankoff Oct 2007 A1
20070276764 Mann et al. Nov 2007 A1
20070288373 Wilkes Dec 2007 A1
20070297610 Chen Dec 2007 A1
20080003987 Mechaley Jan 2008 A1
20080006685 Rackley et al. Jan 2008 A1
20080010193 Rackley, III et al. Jan 2008 A1
20080021784 Hessburg et al. Jan 2008 A1
20080120703 Morris Jan 2008 A1
20080040265 Rackley Feb 2008 A1
20080058014 Khan et al. Mar 2008 A1
20080064383 Nath et al. Mar 2008 A1
20080114657 Forzley May 2008 A1
20080116264 Hammad et al. May 2008 A1
20080118069 Yang et al. May 2008 A1
20080120182 Arnold et al. May 2008 A1
20080126145 Rackley et al. May 2008 A1
20080133366 Evans et al. Jun 2008 A1
20080133409 Eastley et al. Jun 2008 A1
20080147546 Weichselbaumer et al. Jun 2008 A1
20080154727 Carlson Jun 2008 A1
20080154735 Carlson Jun 2008 A1
20080154772 Carlson Jun 2008 A1
20080163257 Carlson et al. Jul 2008 A1
20080167017 Wentker et al. Jul 2008 A1
20080167988 Sun et al. Jul 2008 A1
20080167991 Carlson et al. Jul 2008 A1
20080183480 Carlson et al. Jul 2008 A1
20080201226 Carlson et al. Aug 2008 A1
20080208681 Hammad et al. Aug 2008 A1
20080208688 Byerley Aug 2008 A1
20080208741 Arthur et al. Aug 2008 A1
20080208762 Arthur et al. Aug 2008 A1
20080228611 Lilly et al. Sep 2008 A1
20080270246 Chen Oct 2008 A1
20080288404 Pirzadeh et al. Nov 2008 A1
20080300973 Dewitt et al. Dec 2008 A1
20080313047 Casares et al. Dec 2008 A1
20080319843 Moser et al. Dec 2008 A1
20090012886 Allin et al. Jan 2009 A1
20090016538 Drudis et al. Jan 2009 A1
20090018954 Roberts Jan 2009 A1
20090076896 DeWitt et al. Mar 2009 A1
20090076925 DeWitt et al. Mar 2009 A1
20090078777 Granucci et al. Mar 2009 A1
20090081989 Wuhrer et al. Mar 2009 A1
20090083159 Maw Mar 2009 A1
20090084840 Williams et al. Apr 2009 A1
20090094125 Killian et al. Apr 2009 A1
20090098825 Huomo et al. Apr 2009 A1
20090106551 Boren Apr 2009 A1
20090112721 Hammad et al. Apr 2009 A1
20090112765 Skowronek et al. Apr 2009 A1
20090119170 Hammad et al. May 2009 A1
20090143104 Loh et al. Jun 2009 A1
20090182634 Park et al. Jul 2009 A1
20090193253 Falk et al. Jul 2009 A1
20090202081 Hammad et al. Aug 2009 A1
20090314840 Granucci et al. Dec 2009 A1
20100030651 Matotek et al. Feb 2010 A1
20100042540 Graves et al. Feb 2010 A1
20100057620 Li et al. Mar 2010 A1
20100211498 Aabye et al. Aug 2010 A1
20100211504 Aabye et al. Aug 2010 A1
20100211507 Aabye et al. Aug 2010 A1
20100217709 Aabye et al. Aug 2010 A1
20110112964 Berntsen et al. May 2011 A1
20110119184 Singhal May 2011 A1
20110161182 Racco Jun 2011 A1
20110161230 Singh Jun 2011 A1
20110225075 Maw et al. Sep 2011 A1
20110276511 Rosenberg Nov 2011 A1
20120029990 Fisher Feb 2012 A1
20120203646 Morgan et al. Aug 2012 A1
20120323786 Kirsch Dec 2012 A1
20130060647 Aabye et al. Mar 2013 A1
20130060706 Aabye et al. Mar 2013 A1
20140040052 Arthur et al. Feb 2014 A1
20140201084 Dagenais et al. Jul 2014 A1
20150213560 Aabye et al. Jul 2015 A1
20170069028 Narayana et al. Mar 2017 A1
20200051111 Nelsen et al. Feb 2020 A1
Foreign Referenced Citations (39)
Number Date Country
1096439 May 2001 EP
1136961 Sep 2001 EP
1280115 Jan 2003 EP
1772832 Apr 2007 EP
2340519 Jul 2011 EP
2340519 Apr 2012 EP
2348781 Nov 2003 GB
1184584 Jan 2014 HK
2007CHENP2011 Feb 2011 IN
2012CHENP2011 Dec 2011 IN
2016CHENP2011 Dec 2011 IN
200276208 May 2002 KR
100773918 Nov 2007 KR
100914513 Sep 2009 KR
101039696 Jun 2011 KR
101092657 Dec 2011 KR
101138938 Apr 2012 KR
101184865 Sep 2012 KR
101195182 Oct 2012 KR
2011003056 Jul 2011 MX
2011003059 Jul 2011 MX
2011003060 Jul 2011 MX
323011 Aug 2014 MX
2173505 Sep 2001 RU
2285294 Oct 2006 RU
9613814 May 1996 WO
9712461 Apr 1997 WO
9745814 Dec 1997 WO
9951038 Oct 1999 WO
0003328 Jan 2000 WO
0077697 Dec 2000 WO
2004077369 Sep 2004 WO
2005052869 Jun 2005 WO
2006024080 Mar 2006 WO
2007121587 Nov 2007 WO
2007145540 Dec 2007 WO
2010033968 Mar 2010 WO
2010033970 Mar 2010 WO
2016062890 Apr 2016 WO
Non-Patent Literature Citations (88)
Entry
Seema Nambiar, C. . -T. Lu and L. R. Liang, “Analysis of payment transaction security in mobile commerce,” Proceedings of the 2004 IEEE International Conference on Information Reuse and Integration, 2004. IRI 2004., 2004, pp. 475-480, doi: 10.1109/IRI.2004.1431506. (Year: 2004).
Liu Hui and Ji Xiu-hua, “A Kind of Modified Encrypted WAP in E-commerce,” (CIMCA-IAWTIC'06), 2005, pp. 235-238, doi: 10.1109/CIMCA.2005.1631271. (Year: 2005).
B. T. S. Toh, S. Kungpisdan and P. D. Le, “KSL protocol: design and implementation,” IEEE Conference on Cybernetics and Intelligent Systems, 2004., 2004, pp. 544-549 vol. 1, doi: 10.1109/ICCIS.2004.1460473. (Year: 2004).
J. T. Isaac and J. S. Camara, “An Anonymous Account-Based Mobile Payment Protocol for a Restricted Connectivity Scenario,” 18th International Workshop on Database and Expert Systems Applications (DEXA 2007), 2007, pp. 688-692, doi: 10.1109/DEXA.2007.132. (Year: 2007).
Tan Soo Fun, Leau Yu Beng, J. Likoh and R. Roslan, “A lightweight and private mobile payment protocol by using mobile network operator,” 2008 International Conference on Computer and Communication Engineering, 2008, pp. 162-166, doi: 10.1109/ICCCE.2008.4580588. (Year: 2008).
P. Lin, H. Chen, Y. Fang, J. Jeng and F. Lu, “A secure mobile electronic payment architecture platform for wireless mobile networks,” in IEEE Transactions on Wireless Communications, vol. 7, No. 7, pp. 2705-2713, Jul. 2008, doi: 10.1109/TWC.2008.070111. (Year: 2008).
Indian Application No. 2007/CHENP/2011, First Examination Report dated Sep. 27, 2018, 7 pages.
“Introduction to Public Key Infrastructure (PKI)”, https://web.archive.org/web/20040826082243/http://www.%20articsoft.com/public_key_infrastructure.html, Aug. 26, 2004, 5 pages.
“Proximity Mobile Payments: Leveraging NFC and the Contactless Financial Payments Infrastructure”, A Smart Card Alliance Contactless Payments Council White Paper, Smart Card Alliance, www.smartcardalliance.org, Sep. 2007, pp. 1-39.
U.S. Appl. No. 12/563,410 , “Final Office Action”, dated May 1, 2012, 12 pages.
U.S. Appl. No. 12/563,410 , “Final Office Action”, dated Dec. 26, 2014, 13 pages.
U.S. Appl. No. 12/563,410 , “Non-Final Office Action”, dated Sep. 4, 2014, 22 pages.
U.S. Appl. No. 12/563,410 , “Non-Final Office Action”, dated Mar. 6, 2014, 16 pages.
U.S. Appl. No. 12/563,410 , “Non-Final Office Action”, dated Nov. 28, 2011, 9 pages.
U.S. Appl. No. 12/563,421 , “Advisory Action”, dated Apr. 8, 2015, 4 pages.
U.S. Appl. No. 12/563,421 , “Final Office Action”, dated Oct. 30, 2012, 16 pages.
U.S. Appl. No. 12/563,421 , “Final Office Action”, dated Dec. 21, 2015, 22 pages.
U.S. Appl. No. 12/563,421 , “Final Office Action”, dated Jan. 16, 2015, 21 pages.
U.S. Appl. No. 12/563,421 , “Final Office Action”, dated Sep. 4, 2014, 22 pages.
U.S. Appl. No. 12/563,421 , “Non Final Office Action”, dated Dec. 1, 2016, 20 pages.
U.S. Appl. No. 12/563,421 , “Non-Final Office Action”, dated Mar. 30, 2012, 17 pages.
U.S. Appl. No. 12/563,421 , “Non-Final Office Action”, dated Jan. 10, 2014, 19 pages.
U.S. Appl. No. 12/563,421 , “Non-Final Office Action”, dated Jun. 5, 2015, 22 pages.
U.S. Appl. No. 12/563,421 , “Restriction Requirement”, dated Dec. 29, 2011, 6 pages.
U.S. Appl. No. 12/563,430 , “Final Office Action”, dated Sep. 26, 2012, 39 pages.
U.S. Appl. No. 12/563,430 , “Non-Final Office Action”, dated Mar. 15, 2012, 36 pages.
U.S. Appl. No. 12/563,430 , “Non-Final Office Action”, dated Jun. 19, 2014, 47 pages.
U.S. Appl. No. 12/563,430 , “Notice of Allowance”, dated Oct. 29, 2014, 18 pages.
U.S. Appl. No. 12/563,444 , “Final Office Action”, dated Jul. 25, 2012, 10 pages.
U.S. Appl. No. 12/563,444 , “Final Office Action”, dated Jun. 29, 2015, 7 pages.
U.S. Appl. No. 12/563,444 , “Non Final Office Action”, dated Nov. 1, 2016, 19 pages.
U.S. Appl. No. 12/563,444 , “Non- Final Office Action”, dated Dec. 11, 2014, 5 pages.
U.S. Appl. No. 12/563,444 , “Non-Final Office Action”, dated Jun. 17, 2014, 12 pages.
U.S. Appl. No. 12/563,444 , “Non-Final Office Action”, dated Feb. 8, 2012, 8 pages.
U.S. Appl. No. 13/662,371 , “Advisory Action”, dated Sep. 1, 2016, 3 pages.
U.S. Appl. No. 13/662,371 , “Final Office Action”, dated Dec. 26, 2014, 15 pages.
U.S. Appl. No. 13/662,371 , “Final Office Action”, dated Apr. 27, 2016, 16 pages.
U.S. Appl. No. 13/662,371 , “Non-Final Office Action”, dated Aug. 1, 2014, 11 pages.
U.S. Appl. No. 13/662,371 , “Non-Final Office Action”, dated Sep. 11, 2015, 13 pages.
U.S. Appl. No. 13/662,371 , “Non-Final Office Action”, dated Apr. 20, 2015, 14 pages.
U.S. Appl. No. 13/662,371 , “Notice of Allowance”, dated Feb. 8, 2017, 8 pages.
U.S. Appl. No. 13/662,843 , “Final Office Action”, dated Sep. 9, 2016, 12 pages.
U.S. Appl. No. 13/662,843 , “Non-Final Office Action”, dated Jan. 21, 2016, 9 pages.
U.S. Appl. No. 13/662,843 , “Notice of Allowance”, dated Feb. 3, 2017, 10 pages.
U.S. Appl. No. 13/662,843 , “Restriction Requirement”, Aug. 10, 2015, 5 pages.
AU2009292921 , “First Examiner Report”, dated Jul. 9, 2014, 3 pages.
AU2009292921 , “Second Examiner Report”, dated Oct. 29, 2014, 3 pages.
AU2009292922 , “First Examiner Report”, dated Jul. 25, 2014, 4 pages.
AU2009292922 , “Fourth Examiner Report”, dated Jan. 21, 2016, 5 pages.
AU2009292922 , “Notice of Acceptance”, dated May 2, 2016, 3 pages.
AU2009292922 , “Second Examiner Report”, dated Feb. 3, 2015, 3 pages.
AU2009292922 , “Third Examiner Report”, dated Aug. 27, 2015, 6 pages.
AU2009292926 , “First Examiner Report”, dated Jul. 3, 2014, 3 pages.
AU2016213707 , “First Examiner Report”, dated Sep. 27, 2017, 3 pages.
CA2,738,046 , “Office Action”, dated Jul. 21, 2015, 3 pages.
CA2,738,046 , “Office Action”, dated Sep. 26, 2016, 4 pages.
EP09815367.9 , “Examination Notification”, dated Apr. 22, 2014, 13 pages.
EP09815367.9 , “Extended European Search Report”, dated Jun. 19, 2013, 12 pages.
EP09815368.7 , “European Search Report”, dated Mar. 30, 2012, 3 pages.
EP09815368.7 , “Office Action”, dated Sep. 25, 2013, 4 pages.
EP09815372.9 , “Extended European Search Report”, dated Mar. 13, 2012, 7 pages.
EP13160698.0 , “Extended European Search Report”, dated Aug. 14, 2013, 8 pages.
MX/A/2011/003056 , “Notice of Allowance”, dated Jul. 28, 2014.
MX/A/2011/003056 , “Office Action”, dated Apr. 30, 2014, 4 pages.
MX/A/2011/003059 , “Office Action”, dated Mar. 31, 2014, 6 pages.
MX/A/2011/003060 , “Notice of Allowance”, dated Jul. 4, 2014, 1 page.
MX/A/2011/003060 , “Office Action”, dated Feb. 14, 2014, 2 pages.
MX/A/2011/003060 , “Office Action”, dated Oct. 16, 2013, 5 pages.
PCT/US2009/057791 , “International Preliminary Report on Patentability”, dated Mar. 31, 2011, 7 pages.
PCT/US2009/057791 , “International Search Report and Written Opinion”, dated Nov. 9, 2009, 7 pages.
PCT/US2009/057794 , “International Preliminary Report on Patentability”, dated Mar. 31, 2011, 8 pages.
PCT/US2009/057794 , “International Search Report and Written Opinion”, dated Jan. 8, 2010, 11 pages.
PCT/US2009/057799 , “International Preliminary Report on Patentability”, dated Mar. 31, 2011, 8 pages.
PCT/US2009/057799 , “International Search Report and Written Opinion”, dated Nov. 10, 2009, 8 pages.
PCT/US2009/057802 , “International Preliminary Report on Patentability”, dated Mar. 31, 2011, 7 pages.
PCT/US2009/057802 , “International Search Report and Written Opinion”, dated Nov. 19, 2009, 8 pages.
RU2011113671 , “Notice of Allowance”, dated May 12, 2014, 12 pages.
RU2011113671 , “Office Action”, dated Oct. 4, 2013, 6 pages.
RU2011115355 , “Notice of Allowance”, dated Sep. 18, 2014, 11 pages.
RU2011115355 , “Office Action”, dated Sep. 5, 2013, 10 pages.
RU2011115355 , “Office Action”, dated Apr. 25, 2014, 3 pages.
RU2011131696 , “Notice of Allowance”, dated Feb. 26, 2015, 11 pages.
RU2011131696 , “Office Action”, dated Oct. 25, 2013, 5 pages.
RU2011131696 , “Office Action”, dated Aug. 13, 2014, 4 pages.
U.S. Appl. No. 12/563,421 , “Notice of Allowance”, dated Feb. 19, 2020, 8 pages.
U.S. Appl. No. 12/563,421 , “Notice of Allowance”, dated Jan. 15, 2020, 8 pages.
U.S. Appl. No. 16/030,394 , “Non-Final Office Action”, dated Dec. 26, 2019, 7 pages.
U.S. Appl. No. 16/030,394 , “Notice of Allowance”, dated May 1, 2020, 8 pages.
Related Publications (1)
Number Date Country
20170255919 A1 Sep 2017 US
Provisional Applications (1)
Number Date Country
61099060 Sep 2008 US
Divisions (1)
Number Date Country
Parent 12563421 Sep 2009 US
Child 13662843 US
Continuations (1)
Number Date Country
Parent 13662843 Oct 2012 US
Child 15586169 US