Secure elements broker (SEB) for application communication channel selector optimization

Information

  • Patent Grant
  • 12022290
  • Patent Number
    12,022,290
  • Date Filed
    Friday, February 24, 2023
    2 years ago
  • Date Issued
    Tuesday, June 25, 2024
    8 months ago
Abstract
Systems and methods for managing concurrent secure elements on a mobile device to coordinate with an application or “app” running on the mobile device and an appropriate communications protocol for conducting transactions using the mobile device include: informing, by the processor, the reader device of a preferred app and a communication protocol usable by the preferred app; receiving, by the processor, information about which apps and communication protocols are supported by a reader for processing a transaction; locating, by the processor, a secure element supporting an app and a communication protocol supported by the reader; channeling the communication protocol for the specific configuration of the app and the supporting secure element; activating the secure element that supports the app; and processing, with the activated secure element, using the supported app and communication channel, the transaction with the reader.
Description
BACKGROUND
Technical Field

Embodiments of the present invention generally relate to commerce using a consumer mobile device and wireless communication and, more particularly, to managing concurrent secure elements on the mobile device to coordinate with an application or “app” running on the mobile device and an appropriate communications protocol for conducting transactions using the mobile device.


Related Art

One issue with today's mobile device or consumer electronic devices is that most of the time, the devices can handle only one secure element (SE). A secure element may be briefly described as a system for storing private data—such as a digital identification (ID) of the payer, e.g., user of the mobile device—in such a way that it is very difficult to compromise. For example, a secure element of a device may be located in a Universal Integrated Circuit Card (UICC), a Subscriber Identity Module (SIM) card, Secure Data (SD) card or embedded Secure Element (eSE), any of which may be plugged into or otherwise connected with the mobile device. With smart phones, it is becoming more and more common to see two or more secure elements in a single device. Current rules—such as those promulgated by standardization bodies like GlobalPlatform—allow only one SE to be active at a time or require one SE to be dominant while the other SEs are slaves.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 is a system block diagram illustrating a system for managing concurrent secure elements on a mobile device in accordance with one or more embodiments of the present invention.



FIG. 2 is a flow chart illustrating a method for managing concurrent secure elements on a mobile device in accordance with an embodiment.



FIG. 3 is an example of a matrix diagram illustrating a portion of a system for managing concurrent secure elements on a mobile device in accordance with an embodiment.





Embodiments of the present disclosure and their advantages are best understood by referring to the detailed description that follows. It should be appreciated that like reference numerals are used to identify like elements illustrated in one or more of the figures, in which the showings therein are for purposes of illustrating the embodiments and not for purposes of limiting them.


DETAILED DESCRIPTION

Broadly speaking, methods and systems according to one or more embodiments provide for managing concurrent secure elements on a mobile device to coordinate with an application or “app” running on the mobile device and an appropriate communications protocol for conducting transactions using the mobile device. One embodiment provides a mechanism for allowing the selection of a proper communication protocol linked to a specific “secured” application (e.g., an application residing in a secure element) even within a multi-SE and multi-application environment.


In one or more embodiments, a secure elements broker (SEB) may operate in multi-SE environment (e.g., a mobile device having more than one functioning SE) by regarding all SEs as being in “sleeping mode” and with an SE being called upon by the secure elements broker only when an app that uses the called SE is requested or launched. This operating principle may allow better management of concurrent SEs and their functions, create equality and priority among the concurrent SEs based on optimized connectivity and selection, organize one or more multi-storage zones for secure application content, and circumvent the issue of which SE should always be on. While future secure element architectures may allow for concurrent SEs to run simultaneously, this operating principle of a secure elements broker would still be valid and provide similar advantages.


Moreover, while a “physical” result (such as SE calls in hardware) may occur from using the secure elements broker, the secure elements broker also employs logical functions, for example, managing containers of lists either via logs by application or via preferences by user. For example, the secure elements broker may reside and execute from within a “wallet” (e.g., a virtual wallet on a mobile device that allows a user to easily use various mobile apps and organize them into “containers”) as an underlying mechanism. The applications may be marked with a special identifying mechanism at the communication protocol level. Then similar apps, regardless of which secure element they are stored in, may be “listed” in a container from within the secure elements broker. When the device is presented to a reader, e.g., at a point of sale (POS), or other device requesting a communication via a specific channel (e.g., Wi-Fi vs. Bluetooth), the secure elements broker may answer by (figuratively) saying “here is the list of apps I know about in container X that support your protocol.” At that point, an application selection may be triggered and the proper SE may be “powered up” to deliver the real app, e.g., the applet in the secure element that selected app calls on. Thus, even if the secure elements broker is broken (e.g., security compromised, “hacked”) it would still not be possible to use that compromise in order to access the real (e.g., the secure element-residing applet) app.


In another alternative embodiment, the secure elements broker mechanism may be moved one level up in the wallet, giving the user a way to organize his or her apps in the wallet based on various use cases (e.g., apps for transit, apps for payment, apps for fun).


In one or more embodiments, methods, systems, and computer program products are provided for managing concurrent secure elements on a mobile device to coordinate with an application or “app” running on the mobile device and an appropriate communications protocol for conducting transactions using the mobile device. For example, a method may include: informing, by the processor, the reader device of a preferred app and a communication protocol usable by the preferred app; receiving, by the processor, information about which apps and communication protocols are supported by a reader for processing a transaction; locating, by the processor, a secure element supporting an app and a communication protocol supported by the reader; channeling the communication protocol for the specific configuration of the app and the supporting secure element; activating the secure element that supports the app; and processing, with the activated secure element, using the supported app and communication channel, the transaction with the reader.



FIG. 1 illustrates a system 100 for managing concurrent secure elements on a mobile device in accordance with one or more embodiments. System 100 may include a mobile device 104, e.g., a consumer electronic device such as a mobile phone or smartphone. Mobile device 104 may be enabled for various forms of communication such as, for example, Wi-Fi, Bluetooth, Global System for Mobile (GSM), or near-field communication (NFC). Thus mobile device 104 may communicate with reader 106 (e.g., a point of sale (POS) terminal) using a wireless protocol via a wireless communication channel 108, for example, or using an NFC protocol via an NFC channel 110. Between the two devices, the communication channels are illustrated by a telco tower (for wireless communication channel 108) and the contactless symbol (for NFC channel 110) to illustrate that the range of connectivity is not limited to one mode or the other because the secure elements broker 140 could be used in a proximity or a remote mode. In addition, a “hard wired” connected mode is also possible.


Mobile device 104 may include a security area 120. Security area 120 may include any combination of secure elements 121, 122, 123. For example, a UICC or SIM card secure element 121, usually controlled by carriers or networks; an embedded Secure Element (eSE) or micro-SD (mSD) card secure element 122, usually controlled by handset makers or service providers; or a virtual Secure Element (vSE) or Trust Zone secure element 123.


Mobile device 104 may include a communication module 130. Communication module 130 may integrate modem-like functionalities and may be a portion of system 100 that “connects” the mobile device 104 to another device such as reader device 106. Communication module 130 may integrate hardwire connected, radio-frequency, and contactless (e.g., NFC) ways to communicate between devices. It may be noted that these various communication means may reside within or be implemented using different physical components. As seen in FIG. 1, communication module 130 may implement communication in using a multiplicity of systems and protocols. For example, communication module 130 may implement communication using wireless systems such as: Wi-Fi, Bluetooth, GSM, or others, and using NFC (or contactless) systems and protocols such as HCI (Host Controller Interface), NCI (NFC Controller Interface); CE (Card Emulation) mode; P2P (peer-to-peer); LLCP (Logical Link Control Protocol); NFCIP-1 (NFC Interchange and Protocol-1); NDEF (NFC Data Exchange Format); NPP (NDEF Push Protocol); SNEP (Simple NDEF Exchange Protocol); or CLF (Contactless Front End).


Mobile device 104 may include a secure elements broker 140. Secure elements broker 140 may be implemented, for example, as a process executing on mobile device 104 and may, for example, be physically embodied as computer readable and executable instructions stored in a memory of mobile device 104. Secure elements broker 140 may be considered as a logical technology with the ability to use existing hardware components and functions (e.g., low-level drivers). To do so, it may be an underlying component to an existing application (e.g. wallet 142) or integrated at the operating system (OS) level (e.g., Android). In some instances, it may be possible for specific devices to have the secure elements broker 140 be executed from a secure OS launched at boot up time in parallel with unsecure normal OS operations.


The secure elements broker 140 internal logic may allow for the creation of containers (e.g., C1, C2, C3 shown in FIG. 1) that may provide an area to store a list or lists 144 of applications executed from secure elements (e.g., applets or trustlets 146 shown in FIG. 1). These containers (e.g., C1, C2, C3) may be assigned to various functions, such as specific communication channels, specific payment kernels (e.g., Visa, MasterCard, PayPal), specific services (transit, access, payments). Thus, secure elements broker 140 may create an index list of available secure applications with a smart location mapping of these applications within the devices, for example, in a multi-SE environment. The role of the secure elements broker 140 may be to point to the right path, during the selection process, for which one or more applications are optimized for a specific call (e.g., a transaction conducted between mobile device 104 and reader device 106) and to make sure the activation or wake-up signal is sent to the SE containing such applications (or apps). In order to connect to the proper SE, the secure elements broker 140 may be able (if authorized) to read low-level drivers and potentially turn them on or off to wake up the proper SEs. The relevant protocols may include i2C, SCI, SWP, or others, as known in the art.


System 100 may include a reader device 106, e.g., a card reader or wireless terminal located at a point of sale (POS). Reader device 106 may include a communication interface 160 that may be similar to communication module 130. Reader device 106 may include kernels 161, 162, 163, 164 that would expect to find counterparts in a device (e.g., mobile device 104) calling upon them. However, a kernel may be able to “read” multiple applications on the mobile side (e.g., from mobile device 104). Hence, the secure elements broker 140 may present the best option to the reader kernel (e.g., whichever one of kernels 161, 162, 163, 164 that is active) based on preferences and settings (see, for example, FIG. 3).



FIG. 2 illustrates a method 200 for managing concurrent secure elements on a mobile device, in accordance with an embodiment.


At step 201, method 200 may provide enrollment or registration for apps resident on mobile device 104. Method 200 may include validating, by the processor, an app including registering a unique ID for the app and listing the ID in a container. For example, when an application or applet is provisioned (e.g., downloaded and activated) on the mobile device 104, the app contains some unique ID. The secure elements broker 140 could employ an existing standard accepted identifier or rely on its own signature and ID mechanism to validate the legitimacy of an application or applet. (In the case of an applet, the ID is normally stronger as the process to provision the applet in the right SE is normally done from a controlled and secure environment following strict security processes.) Then, when the user or the service provider or apps provider decides to “register” the app ID with the secure elements broker 140, the ID is listed in a unique “container” (e.g., C1, C2, C3 shown in FIG. 1). Each container may be assigned different parameters based on, for example, usage or protocols. For example, the secure elements broker 140 could be used to manage specific usability cases—for example, C1 for transit, C2 for payment, C3 for social—specific protocols—for example, C1 for NFC, C2 for WiFi, C3 for Bluetooth, or specific providers—for example, C1 for PayPal, C2 for Google, C3 for Amazon. A cross-referencing of containers may be performed using a multi-layer matrix (e.g., matrix 300 shown in FIG. 3) within the secure elements broker 140.


A call between mobile device 104 and reader device 106 (by which a transaction may be conducted between mobile device 104 and reader device 106) may be application or user initiated or, alternatively, may be reader initiated. In each case, method 200 may perform similarly described actions at steps 202 through 207 that conform to the particular details of each case.


In the application or user initiated case (e.g., call initiated from user mobile device 104), a user may launch an application that partially relies on being “validated” or “approved” by a (secondary) applet residing on an SE (e.g., SE 121, 122, or 123 on mobile device 104). This allows controlling “fake” apps (e.g., an app not residing on an SE) to perform critical steps of an app process without linking to the secondary applet. Applications are frequently updated more often than applets, however, and the user may also decide to change the settings or parameters for apps at any point of time. It is also possible for a user to move some client application from one area of the mobile device 104 to another. For example, eBay apps on Android may be stored on the apps processor of the phone or in an mSD card. This constant variability may be accommodated by the secure elements broker 140. When an app is able to communicate with the secure elements broker 140 to access or call on its applet, even if the app is moved around or the applet is moved from one SE to another, the secure elements broker 140 may still be able to point to the right place. This also allows for easier communication channel management (e.g., matching the correct communication protocol with the launched app). For example, suppose an app using applet 1 in eSE is to trigger the NFC P2P LLCP protocol, but an app using applet 2 in UICC is to trigger a GSM communication, then the secure elements broker 140 can channel and “activate” the proper protocol for the specific configuration of the apps.


In the reader initiated case (e.g., call initiated from reader device 106), whatever the communication trigger is, the reader may talk “light” (e.g., provide information for establishing a connection or link) to the secure elements broker 140 via the proper channel (NFC CE for example) and deliver the proper request to the secure elements broker 140. For example, reader 106 may provide information to mobile device 104 that “I am a reader in NFC CE mode and I want to complete a PayPal transaction with security validation.” A next step for the secure elements broker 140 may be to “check” against its known list of containers (e.g., C1, C2, C3 shown in FIG. 1) as to the location of the PayPal app that will be able to complete the process. Secure elements broker 140 may “know”, for example, that in this specific request, the PayPal app is actually an applet residing in a trusted or secure zone environment (e.g., the Trust Zone environment of SE 123) and is known as Trustlet 2. At that point, the device will be activating the secure world or portion of Trust Zone, technically waking up the PayPal Trustlet to handle the request from the reader 106. The binding between the two devices—mobile device 104 and reader device 106—may now be optimized and may break as the required task is completed, technically shutting down the secure world of Trust Zone on the phone side (on mobile device 104) and the NFC P2P LLCP channel between the two devices.


One important consideration is that the reader 106 may be in control of the chosen app by the way of pre-loaded apps kernels (e.g., kernels 161-164). So the reader may interrogate the phone (e.g., mobile device 104), which activates an SE, and the SE communicates its supported app IDs, and the reader 106 then selects one. In a multi-SE environment, this may be sub-optimal. For example, SE 121 (e.g., a SIM) might contain app A, and SE 122 (e.g., a microSD) might contain app B. The reader 106 (or the customer, user of mobile device 104) may have a preference between these apps, but conventionally, the reader 106 will only be offered either app A or app B without regard to preference. A protocol made possible with a secure elements broker 140 is to have secure elements broker 140 in between the two devices which might enforce the customer's preferences. For example, if the customer prefers app B and if the reader supports apps A and B, the secure elements broker 140 could ensure that app B is chosen. Also the proper SE is always “powered up” to release the real (SE resident) app, knowing from the beginning where to look because of the pre-known list of containers. This allows bypassing the problem that may arise of multiple SEs that are powered up at the same time, creating prioritization and latency issues at the physical and logical level of a device.


In accordance with the descriptions given above and examples provided below with reference to FIG. 3, method 200, at step 202, may include informing, by the processor of mobile device 104, the reader device 106 of a preferred app and a communication protocol usable by the preferred app. At step 203, method 200 may include receiving, by the processor, information about which apps and communication protocols are supported by the reader for processing a transaction. At step 204, method 200 may include locating, by the secure elements broker 140 running on a processor of mobile device 104, a secure element supporting an app and a communication protocol supported by the reader. At step 205, method 200 may include channeling the communication protocol for the specific configuration of the app and the supporting secure element. At step 206, method 200 may include activating the secure element that supports the app. At step 207, method 200 may include processing, with the activated secure element, using the supported app and communication channel, the transaction with the reader.



FIG. 3 illustrates an example of a matrix 300 for managing concurrent secure elements on a mobile device in accordance with an embodiment. Matrix 300 illustrates one example of a matrix assignment reflecting a particular configuration, for example, of mobile device 104. Matrix 300 shown in FIG. 3 illustrates an example of how various parameters could be assigned to various secure elements (e.g., secure elements 121, 122, 123) to help the secure elements broker 140 choose the proper path to find the right apps. In this example, the communication protocol is limited to NFC. The example could be extended, however, to any mode of contact and contactless communication. Kernels describe what type of “payment process” is supported and, if additional services are supported by the selected apps, the preferences—such as loyalty-reward, couponing, or discount, for example.


To illustrate how to read matrix 300, in the case of the UICC as a secure element “hosting” four applications, it can be seen that: (1) Application 1 can communicate only via NFC P2P (NDEF) from within the ISIS wallet kernel and also supports couponing; (2) Application 2 is a PayPal (PP) app supporting Card Emulation (CE) and reward; (3) Application 3 is tag only (LLCP, reader/writer) linked to Visa and used for reward purposes (for example, a hospitality tag inviting the user to instantly sign up for a Visa card and get a reward); and (4) Application 4 is also tag (LLCP) but on the MasterCard network and does not have any additional services.












EXAMPLES ILLUSTRATED BY FIG. 3


Example Call 1: “Normal” call:
















Mobile
apps (NDEF; PP)


Reader
reader (NDEF; kernel 4)


Mobile
SEB_settings (prefC3; Trustlet1; vSE; kernel 4; NDEF)









The mobile device 104 communicates with another device (e.g. reader 106, phone, POS, tablet, etc.) and informs the reader device that its preferred payment app is PayPal in NFC P2P mode (NDEF).


The reader device replies: “yes, I support NDEF and PayPal kernel is kernel 4 in my system”.


Mobile device 104 then completes the transaction via the secure elements broker 140 which knows that in this specific device 104, the preferred container for PayPal (or NDEF, depending on architecture decision) is C3 which contains a link to the PayPal Trustlet (Trustlet 1) inside virtual Secure Element (or Trust Zone) 123, which is able to communicate with the reader via Kernel 4 in NFC P2P mode (NDEF).


At that point, if the mobile device 104 has another Secure Element activated, it will know that it needs to do a power down or hibernate for this one and activate the vSE to complete that transaction.


Priorities assignment and latencies from a hardware point of view are not addressed here and should be viewed on a case by case basis depending on the device design as well as business agreements between various parties.












Example Call 2: Reader device dominates


mobile device preference:


















Mobile
apps (NDEF; PP)



Reader
reader (FailNDEF; CE; Kernel 1/2/3)



Mobile
SEB_settings (C1; App4; eSE; kernel 1; CE)










The reader device 106 is in charge of the transaction and “picks” which apps it will support inside the phone (e.g., mobile device 104). In that case, the secure elements broker 140 is just a gateway or filter for the reader 106.


In the reader dominance case, the first step may be similar to the normal call case with the phone (e.g., mobile device 104) informing the reader 106 of its preferences. In this particular example, however, the reader 106 replies that it does not support NFC P2P but Card Emulation only, and only applications that can be read by Kernel 1, 2 or 3 (Visa. MC, Amex).


The mobile device 104 secure elements broker 140 then goes down its list of preferences and determines that the first best alternative to its preferred method with that specific reader will be to launch application 4 from container C1 (assigned to Card Emulation mode in that case) contained in the embedded Secure Element 122 which can read Kernel 1 (Visa) in CE mode.












Example Call 3: Mobile device dominates reader device decision:


















Mobile
apps (NDEF; PP)



Reader
reader (prefCE/NDEF/LLCP; prefKernel 1/2/4/5;)



Mobile
SEB_settings (C2; App2; eSE; kernel 4; CE)










In the mobile device dominance case, the first step may be similar to the normal and reader dominance calls with the phone (e.g., mobile device 104) informing the reader 106 of its preferences.


The reader 106 may reply, in this example, that its supported modes of communication are all NFC modes and its supported kernels are Visa, MC, PayPal, and Google. At that point, the reader 106 is giving full control to the mobile device 104 to pick whichever application it wants to use.


The mobile device 104 replies that the path to the application to be used is contained in container C2, identified as application 2 residing in the eSE and able to “talk” with Kernel 4 (PP) via Card Emulation mode.


It may be noted that preferences may be set up by the secure elements broker provider, by the users, or by the service provider for the application provided (which may be a merchant, for example). With multiple secure elements and multiple preferences prioritization, the secure elements broker 140 may be able to make an instant decision on the most appropriate path depending on the highest control entity preferences (e.g., device owner vs. user vs. provider vs. other).


In implementation of the various embodiments, embodiments of the invention may comprise a personal computing device, such as a personal computer, laptop, PDA, cellular phone or other personal computing or communication devices. The payment provider system may comprise a network computing device, such as a server or a plurality of servers, computers, or processors, combined to define a computer system or network to provide the payment services provided by a payment provider system.


In this regard, a computer system may include a bus or other communication mechanism for communicating information, which interconnects subsystems and components, such as a processing component (e.g., processor, micro-controller, digital signal processor (DSP), etc.), a system memory component (e.g., RAM), a static storage component (e.g., ROM), a disk drive component (e.g., magnetic or optical), a network interface component (e.g., modem or Ethernet card), a display component (e.g., CRT or LCD), an input component (e.g., keyboard or keypad), and/or cursor control component (e.g., mouse or trackball). In one embodiment, a disk drive component may comprise a database having one or more disk drive components.


The computer system may perform specific operations by processor and executing one or more sequences of one or more instructions contained in a system memory component. Such instructions may be read into the system memory component from another computer readable medium, such as static storage component or disk drive component. In other embodiments, hard-wired circuitry may be used in place of or in combination with software instructions to implement the invention.


Logic may be encoded in a computer readable and executable medium, which may refer to any medium that participates in providing instructions to the processor for execution. Such a medium may take many forms, including but not limited to, non-volatile media, volatile media, and transmission media. In one embodiment, the computer readable medium is non-transitory. In various implementations, non-volatile media includes optical or magnetic disks, such as disk drive component, volatile media includes dynamic memory, such as system memory component, and transmission media includes coaxial cables, copper wire, and fiber optics, including wires that comprise bus. In one example, transmission media may take the form of acoustic or light waves, such as those generated during radio wave and infrared data communications.


Some common forms of computer readable and executable media include, for example, floppy disk, flexible disk, hard disk, magnetic tape, any other magnetic medium, CD-ROM, any other optical medium, punch cards, paper tape, any other physical medium with patterns of holes, RAM, ROM, E2PROM, FLASH-EPROM, any other memory chip or cartridge, carrier wave, or any other medium from which a computer is adapted to read.


In various embodiments, execution of instruction sequences for practicing the invention may be performed by a computer system. In various other embodiments, a plurality of computer systems coupled by a communication link (e.g., LAN, WLAN, PTSN, or various other wired or wireless networks) may perform instruction sequences to practice the invention in coordination with one another.


Modules described herein can be embodied in one or more computer readable media or be in communication with one or more processors to execute or process the steps described herein.


A computer system may transmit and receive messages, data, information and instructions, including one or more programs (i.e., application code) through a communication link and a communication interface. Received program code may be executed by a processor as received and/or stored in a disk drive component or some other non-volatile storage component for execution.


Where applicable, various embodiments provided by the present disclosure may be implemented using hardware, software, or combinations of hardware and software. Also, where applicable, the various hardware components and/or software components set forth herein may be combined into composite components comprising software, hardware, and/or both without departing from the spirit of the present disclosure. Where applicable, the various hardware components and/or software components set forth herein may be separated into sub-components comprising software, hardware, or both without departing from the scope of the present disclosure. In addition, where applicable, it is contemplated that software components may be implemented as hardware components and vice-versa—for example, a virtual Secure Element (vSE) implementation or a logical hardware implementation.


Software, in accordance with the present disclosure, such as program code and/or data, may be stored on one or more computer readable and executable mediums. It is also contemplated that software identified herein may be implemented using one or more general purpose or specific purpose computers and/or computer systems, networked and/or otherwise. Where applicable, the ordering of various steps described herein may be changed, combined into composite steps, and/or separated into sub-steps to provide features described herein.


The foregoing disclosure is not intended to limit the present invention to the precise forms or particular fields of use disclosed. It is contemplated that various alternate embodiments and/or modifications to the present invention, whether explicitly described or implied herein, are possible in light of the disclosure. Having thus described various example embodiments of the disclosure, persons of ordinary skill in the art will recognize that changes may be made in form and detail without departing from the scope of the invention. Thus, the invention is limited only by the claims.

Claims
  • 1. A device, comprising: a non-transitory memory storing instructions; anda processor configured to execute the instructions to cause the device to: determine a first application of a plurality of applications to be executed on the device, wherein each of the plurality of applications is associated with at least one respective virtual secure element of a plurality of virtual secure elements;determine a first virtual secure element, of the plurality of virtual secure elements, to use with the first application; andin response to determining the first virtual secure element, select the first virtual secure element for activation with the first application.
  • 2. The device of claim 1, wherein the determining the first application comprises: detecting an initiation of a transaction that utilizes the first application at the device; andresponsive to the detecting of the initiation of the transaction, determining the first application.
  • 3. The device of claim 2, wherein the executing the instructions further causes the device to process, using the virtual secure element and via the first application, the transaction.
  • 4. The device of claim 2, wherein the transaction is initiated via a near field communication (NFC) connection established between a point-of-sale system and the device.
  • 5. The device of claim 1, wherein the determining the first application comprises: determining a user selection of the first application of the plurality of applications operable to be executed on the device, wherein at least two of the plurality of applications are each associated with a different functionality provided by a different one of the plurality of virtual secure elements.
  • 6. The device of claim 1, wherein the device further comprises a physical secure element that enables a secure area for using the plurality of virtual secure elements.
  • 7. The device of claim 1, wherein the device further comprises a secure elements broker that logically maps each of the plurality of virtual secure elements to at least one respective application of the plurality of applications.
  • 8. The device of claim 1, wherein the device further comprises a physical secure element that hosts the plurality of applications, each of the plurality of applications associated with a respective one of the plurality of virtual secure elements.
  • 9. The device of claim 1, wherein the determining the first application comprises determining a transaction, between the device and a second device, that is initiated via a near field communication (NFC) connection established between the device and the second device.
  • 10. The device of claim 1, wherein the executing the instructions further causes the device to, prior to activating the first virtual secure element, determine that a second secure element of the plurality of virtual secure elements is activated; anddeactivate the second secure element.
  • 11. A method comprising: determining to execute a first application of a plurality of applications on a device, wherein each of the plurality of applications is associated with at least one respective virtual secure element of a plurality of virtual secure elements that are implemented on the device;selecting a first virtual secure element, of the plurality of virtual secure elements, to activate for execution of the first application; andin response to selecting the first virtual secure element, activating the first virtual secure element for execution of the first application.
  • 12. The method of claim 11, wherein the determining to execute the first application is based on a detection of an initiation of a transaction that utilizes the first application at the device.
  • 13. The method of claim 11, wherein the determining to execute the first application is based on receiving a user selection of the first application of the plurality of applications operable to be executed on the device, wherein at least two of the plurality of applications are each associated with a different functionality provided by a different one of the plurality of virtual secure elements.
  • 14. The method of claim 11, wherein the device further comprises a physical secure element that enables a secure area for using the plurality of virtual secure elements.
  • 15. The method of claim 11, wherein the device further comprises a secure elements broker that logically maps each of the plurality of virtual secure elements to at least one respective application of the plurality of applications.
  • 16. The method of claim 11, wherein the device further comprises a physical secure element that hosts the plurality of applications, each of the plurality of applications associated with a respective one of the plurality of virtual secure elements.
  • 17. A non-transitory machine-readable medium having instructions stored thereon, the instructions executable to cause of a device to perform operations comprising: determining to execute a first application of a plurality of applications on the device, wherein each of the plurality of applications is associated with at least one respective virtual secure element of a plurality of virtual secure elements that are implemented on the device;selecting a first virtual secure element, of the plurality of virtual secure elements, to activate for execution of the first application; andin response to selecting the first virtual secure element, activating the first virtual secure element for execution of the first application.
  • 18. The non-transitory machine-readable medium of claim 17, wherein the determining to execute the first application is based on a detection of an initiation of a transaction that utilizes the first application at the device.
  • 19. The non-transitory machine-readable medium of claim 17, wherein the determining to execute the first application is responsive to detecting a user selection of the first application of the plurality of applications, wherein each of the plurality of applications is mapped to a different one of the plurality of virtual secure elements.
  • 20. The non-transitory machine-readable medium of claim 17, wherein the device further comprises a physical secure element that hosts the plurality of applications, each of the plurality of applications associated with a respective one of the plurality of virtual secure elements.
CROSS REFERENCE TO RELATED APPLICATIONS

This application is a continuation application of U.S. patent application Ser. No. 17/140,872, filed Jan. 4, 2021, which in turn is a continuation of U.S. patent application Ser. No. 16/365,108, filed Mar. 26, 2019, now U.S. Pat. No. 10,887,769, issued Jan. 5, 2021, which in turn is a continuation of U.S. patent application Ser. No. 14/971,684, filed Dec. 16, 2015, now U.S. Pat. No. 10,242,366, issued Mar. 26, 2019, which in turn is a continuation application of U.S. patent application Ser. No. 14/507,343, filed Oct. 6, 2014, now U.S. Pat. No. 9,225,710, issued Dec. 29, 2015, which in turn is a continuation application of co-pending U.S. patent application Ser. No. 13/603,242, filed Sep. 4, 2012, now U.S. Pat. No. 8,862,767, issued Oct. 14, 2014, and claims the benefit of priority from U.S. Provisional Patent Application No. 61/530,636, filed Sep. 2, 2011. The present application is related to U.S. patent application Ser. No. 14/529,604, filed Oct. 31, 2014, and U.S. Ser. No. 14/529,775, filed Oct. 31, 2014, the disclosures of which are incorporated by reference in their entirety.

US Referenced Citations (419)
Number Name Date Kind
4408306 Kuo Oct 1983 A
4527256 Giebel Jul 1985 A
4578777 Fang et al. Mar 1986 A
4638430 Perra et al. Jan 1987 A
4698750 Wilkie et al. Oct 1987 A
4718041 Baglee et al. Jan 1988 A
4763305 Kuo Aug 1988 A
4783766 Samachisa et al. Nov 1988 A
4811294 Kobayashi et al. Mar 1989 A
4891791 Lijima Jan 1990 A
4907202 Kouzi Mar 1990 A
4967393 Yokoyama et al. Oct 1990 A
4970692 Ali et al. Nov 1990 A
4999812 Amin Mar 1991 A
5043940 Harari Aug 1991 A
5053990 Kreifels et al. Oct 1991 A
5095344 Harari Mar 1992 A
5168465 Harari Dec 1992 A
5337280 Tanagawa et al. Aug 1994 A
5355413 Ohno Oct 1994 A
5386539 Nishi Jan 1995 A
5467310 Yoshida et al. Nov 1995 A
5523972 Rashid et al. Jun 1996 A
5594796 Grube et al. Jan 1997 A
5602987 Harari et al. Feb 1997 A
5809143 Hughes Sep 1998 A
5864241 Schreck et al. Jan 1999 A
5870723 Pare, Jr. et al. Feb 1999 A
5918158 LaPorta et al. Jun 1999 A
5933498 Schneck et al. Aug 1999 A
5956473 Ma et al. Sep 1999 A
5991517 Harari et al. Nov 1999 A
6026027 Terrell, II et al. Feb 2000 A
6067529 Ray et al. May 2000 A
6105006 Davis et al. Aug 2000 A
6138239 Veil Oct 2000 A
6173332 Hickman Jan 2001 B1
6175922 Wang Jan 2001 B1
6263437 Liao et al. Jul 2001 B1
6269348 Pare, Jr. et al. Jul 2001 B1
6279069 Robinson et al. Aug 2001 B1
6282656 Wang Aug 2001 B1
6314408 Salas et al. Nov 2001 B1
6314425 Serbinis et al. Nov 2001 B1
6330546 Gopinathan et al. Dec 2001 B1
6343323 Kalpio et al. Jan 2002 B1
6415156 Stadelmann Jul 2002 B1
6516996 Hippelainen Feb 2003 B1
6570790 Harari May 2003 B1
6581042 Pare, Jr. et al. Jun 2003 B2
6594759 Wang Jul 2003 B1
6681233 Ichikawa et al. Jan 2004 B1
6736313 Dickson May 2004 B1
6804517 Laurila Oct 2004 B1
6819219 Bolle et al. Nov 2004 B1
6850916 Wang Feb 2005 B1
6856975 Inglis Feb 2005 B1
6898299 Brooks May 2005 B1
6925568 Heinonen Aug 2005 B1
6999824 Glanzer et al. Feb 2006 B2
7016494 Hopkins et al. Mar 2006 B2
7080039 Marsh Jul 2006 B1
7103575 Linehan Sep 2006 B1
7107246 Wang Sep 2006 B2
7155679 Bandaru et al. Dec 2006 B2
7176060 Yamada et al. Feb 2007 B2
7206847 Alberth, Jr. et al. Apr 2007 B1
7251624 Lee et al. Jul 2007 B1
7251731 Laniepce et al. Jul 2007 B2
7260555 Rossmann et al. Aug 2007 B2
7299498 Lee et al. Nov 2007 B2
7337976 Kawamura et al. Mar 2008 B2
7350230 Forrest Mar 2008 B2
7360691 Takayama Apr 2008 B2
7392941 Choi Jul 2008 B2
7428591 Stebbings Sep 2008 B2
7454194 Kuwajima Nov 2008 B2
7478248 Ziv et al. Jan 2009 B2
7505941 Bishop et al. Mar 2009 B2
7512567 Bemmel et al. Mar 2009 B2
7539861 Trench May 2009 B2
7543156 Campisi Jun 2009 B2
7543738 Saunders et al. Jun 2009 B1
7613427 Blight et al. Nov 2009 B2
7635084 Wang et al. Dec 2009 B2
7689497 May Mar 2010 B2
7702898 Tan Apr 2010 B2
7775442 Saarisalo Aug 2010 B2
7788481 Bik et al. Aug 2010 B2
7827370 Ahvenainen et al. Nov 2010 B2
7844082 Baentsch et al. Nov 2010 B2
7844255 Petrov et al. Nov 2010 B2
7860755 Warner Dec 2010 B2
7873837 Lee et al. Jan 2011 B1
7877605 Labrou et al. Jan 2011 B2
7895311 Juenger Feb 2011 B1
7917769 Campisi Mar 2011 B2
7937588 Picard et al. May 2011 B2
7945924 Li et al. May 2011 B2
7958457 Brandenberg et al. Jun 2011 B1
7967215 Kumar et al. Jun 2011 B2
8016191 Bonalle et al. Sep 2011 B2
8040883 Keeler et al. Oct 2011 B2
8099772 Takada et al. Jan 2012 B2
8108318 Mardikar Jan 2012 B2
8121945 Rackley, III et al. Feb 2012 B2
8122488 Hoch et al. Feb 2012 B2
8149085 Ould Apr 2012 B2
8150772 Mardikar et al. Apr 2012 B2
8160959 Rackley, III et al. Apr 2012 B2
8190087 Fisher et al. May 2012 B2
8230149 Long et al. Jul 2012 B1
8286241 Yeo et al. Oct 2012 B1
8358596 Byrne et al. Jan 2013 B2
8385553 Jooste et al. Feb 2013 B1
8417643 Mardikar Apr 2013 B2
8423466 Lanc Apr 2013 B2
8543091 Mardikar Sep 2013 B2
8554689 Mardikar et al. Oct 2013 B2
8583039 Kammer Nov 2013 B2
8583915 Huang Nov 2013 B1
8646056 Poplett Feb 2014 B2
8768854 Neville et al. Jul 2014 B2
8862767 Taveau et al. Oct 2014 B2
8863256 Addepalli et al. Oct 2014 B1
8925106 Steiner et al. Dec 2014 B1
9037676 Lundh et al. May 2015 B1
9060271 Mardikar Jun 2015 B2
9097544 Dhanani et al. Aug 2015 B2
9098844 Davis et al. Aug 2015 B2
9143622 Sprigg et al. Sep 2015 B2
9165125 Zarei et al. Oct 2015 B2
9185234 Horel et al. Nov 2015 B2
9185538 Oliver et al. Nov 2015 B2
9232077 Yu et al. Jan 2016 B2
9450759 Hauck et al. Sep 2016 B2
9537839 Mardikar Jan 2017 B2
9558481 Bauer et al. Jan 2017 B2
9836735 Vilmos et al. Dec 2017 B2
9852418 Mardikar Dec 2017 B2
9858566 Mardikar et al. Jan 2018 B2
10083446 Taveau et al. Sep 2018 B2
10242366 Taveau et al. Mar 2019 B2
10382331 Sivaramakrishnan Aug 2019 B1
10546298 Quiroga et al. Jan 2020 B2
20010018660 Sehr Aug 2001 A1
20010049785 Kawan et al. Dec 2001 A1
20020007320 Hogan et al. Jan 2002 A1
20020023215 Wang et al. Feb 2002 A1
20020032905 Sherr et al. Mar 2002 A1
20020059530 Talvitie May 2002 A1
20020099649 Lee et al. Jul 2002 A1
20020111918 Hoshino et al. Aug 2002 A1
20020133467 Hobson et al. Sep 2002 A1
20020152390 Furuyama et al. Oct 2002 A1
20020161723 Asokan et al. Oct 2002 A1
20020164023 Koelle et al. Nov 2002 A1
20020165811 Ishii et al. Nov 2002 A1
20020194499 Audebert et al. Dec 2002 A1
20030028484 Boylan et al. Feb 2003 A1
20030037264 Ezaki et al. Feb 2003 A1
20030055792 Kinoshita et al. Mar 2003 A1
20030076955 Alve et al. Apr 2003 A1
20030076962 Roh et al. Apr 2003 A1
20030101071 Salonen May 2003 A1
20030110131 Alain et al. Jun 2003 A1
20030120601 Ouye et al. Jun 2003 A1
20030123669 Koukoulidis et al. Jul 2003 A1
20030145205 Sarcanin Jul 2003 A1
20030154405 Harrison Aug 2003 A1
20030163710 Ortiz et al. Aug 2003 A1
20030167207 Berardi et al. Sep 2003 A1
20030171993 Chappuis Sep 2003 A1
20030172090 Asunmaa et al. Sep 2003 A1
20030187784 Maritzen et al. Oct 2003 A1
20030190908 Craven Oct 2003 A1
20030191709 Elston et al. Oct 2003 A1
20030233462 Chien Dec 2003 A1
20030236981 Marmigere et al. Dec 2003 A1
20040002350 Gopinath et al. Jan 2004 A1
20040015445 Heaven et al. Jan 2004 A1
20040059921 Bianchi Mar 2004 A1
20040059923 Shamrao Mar 2004 A1
20040068649 Haller et al. Apr 2004 A1
20040073925 Kinoshita Apr 2004 A1
20040107368 Colvin Jun 2004 A1
20040117631 Colvin Jun 2004 A1
20040117644 Colvin Jun 2004 A1
20040117664 Colvin Jun 2004 A1
20040124966 Forrest Jul 2004 A1
20040133797 Arnold Jul 2004 A1
20040157584 Bensimon et al. Aug 2004 A1
20040181463 Goldthwaite et al. Sep 2004 A1
20040182921 Dickson et al. Sep 2004 A1
20040186993 Risan et al. Sep 2004 A1
20040194100 Nakayama et al. Sep 2004 A1
20040230536 Fung et al. Nov 2004 A1
20040243634 Levy Dec 2004 A1
20040268133 Lee et al. Dec 2004 A1
20040268142 Karjala et al. Dec 2004 A1
20050027999 Pelly et al. Feb 2005 A1
20050033688 Peart et al. Feb 2005 A1
20050033988 Chandrashekhar et al. Feb 2005 A1
20050070248 Gaur Mar 2005 A1
20050097059 Shuster May 2005 A1
20050102381 Jiang et al. May 2005 A1
20050105734 Buer et al. May 2005 A1
20050156708 Puranik et al. Jul 2005 A1
20050171898 Bishop et al. Aug 2005 A1
20050182710 Andersson et al. Aug 2005 A1
20050187782 Grear et al. Aug 2005 A1
20050187883 Bishop et al. Aug 2005 A1
20050190912 Hopkins et al. Sep 2005 A1
20050222949 Inotay et al. Oct 2005 A1
20050240778 Saito Oct 2005 A1
20050242177 Roberge et al. Nov 2005 A1
20050246253 Barthelemy Nov 2005 A1
20050251582 Goel et al. Nov 2005 A1
20050273399 Soma et al. Dec 2005 A1
20050273609 Eronen Dec 2005 A1
20050289078 Wary et al. Dec 2005 A1
20060005033 Wood Jan 2006 A1
20060010075 Wolf Jan 2006 A1
20060015580 Gabriel et al. Jan 2006 A1
20060023486 Furusawa et al. Feb 2006 A1
20060079284 Lu et al. Apr 2006 A1
20060080259 Wajs Apr 2006 A1
20060080548 Okamura et al. Apr 2006 A1
20060080549 Okamura et al. Apr 2006 A1
20060098678 Tan May 2006 A1
20060115084 Ryu Jun 2006 A1
20060122902 Petrov et al. Jun 2006 A1
20060136332 Ziegler Jun 2006 A1
20060136735 Plotkin et al. Jun 2006 A1
20060149727 Viitaharju Jul 2006 A1
20060161635 Lamkin et al. Jul 2006 A1
20060170530 Nwosu et al. Aug 2006 A1
20060183462 Kolehmainen Aug 2006 A1
20060183489 Modeo Aug 2006 A1
20060265743 Kusunoki et al. Nov 2006 A1
20060272031 Ache et al. Nov 2006 A1
20060285659 Suryanarayana et al. Dec 2006 A1
20060287004 Fuqua Dec 2006 A1
20060294007 Barthelemy Dec 2006 A1
20070011242 McFarland et al. Jan 2007 A1
20070011724 Gonzalez et al. Jan 2007 A1
20070019622 Alt et al. Jan 2007 A1
20070022058 Labrou et al. Jan 2007 A1
20070033149 Kanngard et al. Feb 2007 A1
20070033408 Morten Feb 2007 A1
20070050871 Mashhour Mar 2007 A1
20070052517 Bishop et al. Mar 2007 A1
20070057038 Gannon Mar 2007 A1
20070067535 Liu Mar 2007 A1
20070078773 Czerniak Apr 2007 A1
20070080784 Kim et al. Apr 2007 A1
20070092112 Awatsu et al. Apr 2007 A1
20070092114 Ritter et al. Apr 2007 A1
20070106892 Engberg May 2007 A1
20070106897 Kulakowski May 2007 A1
20070112667 Rucker May 2007 A1
20070136211 Brown et al. Jun 2007 A1
20070143828 Jeal et al. Jun 2007 A1
20070175023 Heitmann et al. Aug 2007 A1
20070197261 Humbel Aug 2007 A1
20070198837 Koodli et al. Aug 2007 A1
20070203841 Maes Aug 2007 A1
20070219926 Korn Sep 2007 A1
20070220273 Campisi Sep 2007 A1
20070221725 Kawaguchi Sep 2007 A1
20070233875 Raghav et al. Oct 2007 A1
20070234034 Leone et al. Oct 2007 A1
20070234291 Ronen et al. Oct 2007 A1
20070235539 Sevanto et al. Oct 2007 A1
20070239869 Raghav et al. Oct 2007 A1
20070245148 Buer Oct 2007 A1
20070254712 Chitti Nov 2007 A1
20070255652 Tumminaro et al. Nov 2007 A1
20070255662 Tumminaro Nov 2007 A1
20070260558 Look Nov 2007 A1
20070271596 Boubion et al. Nov 2007 A1
20070286373 Pailles et al. Dec 2007 A1
20070293202 Moshir et al. Dec 2007 A1
20070295803 Levine et al. Dec 2007 A1
20080006685 Rackley, III et al. Jan 2008 A1
20080010678 Burdette et al. Jan 2008 A1
20080046366 Bemmel et al. Feb 2008 A1
20080046915 Haeuser et al. Feb 2008 A1
20080046988 Baharis et al. Feb 2008 A1
20080052091 Vawter Feb 2008 A1
20080064346 Charrat Mar 2008 A1
20080065531 Smith et al. Mar 2008 A1
20080065885 Nagai et al. Mar 2008 A1
20080076572 Nguyen et al. Mar 2008 A1
20080091614 Bas Bayod et al. Apr 2008 A1
20080091681 Dwivedi et al. Apr 2008 A1
20080119162 Sivalingam et al. May 2008 A1
20080121687 Buhot May 2008 A1
20080129450 Riegebauer Jun 2008 A1
20080130895 Jueneman et al. Jun 2008 A1
20080144650 Boch et al. Jun 2008 A1
20080147508 Liu et al. Jun 2008 A1
20080155268 Jazayeri et al. Jun 2008 A1
20080167961 Wentker et al. Jul 2008 A1
20080168273 Chung et al. Jul 2008 A1
20080170691 Chang et al. Jul 2008 A1
20080189212 Kulakowski et al. Aug 2008 A1
20080201264 Brown et al. Aug 2008 A1
20080207124 Raisanen et al. Aug 2008 A1
20080222038 Eden et al. Sep 2008 A1
20080230615 Read et al. Sep 2008 A1
20080238610 Rosenberg Oct 2008 A1
20080242267 Soni et al. Oct 2008 A1
20080268811 Beenau et al. Oct 2008 A1
20080270302 Beenau et al. Oct 2008 A1
20080270307 Olson et al. Oct 2008 A1
20080275748 John Nov 2008 A1
20080279381 Narendra et al. Nov 2008 A1
20080287162 Gaillard et al. Nov 2008 A1
20080288405 John Nov 2008 A1
20080289006 Hock et al. Nov 2008 A1
20080289030 Poplett Nov 2008 A1
20080297311 Wu Dec 2008 A1
20080306828 Chao Dec 2008 A1
20080319896 Carlson et al. Dec 2008 A1
20090018934 Peng et al. Jan 2009 A1
20090023474 Luo et al. Jan 2009 A1
20090046069 Griffin et al. Feb 2009 A1
20090048916 Nuzum et al. Feb 2009 A1
20090065571 Jain Mar 2009 A1
20090070263 Davis et al. Mar 2009 A1
20090099961 Ogilvy Apr 2009 A1
20090143104 Loh et al. Jun 2009 A1
20090144161 Fisher Jun 2009 A1
20090164799 Takagi Jun 2009 A1
20090165031 Li et al. Jun 2009 A1
20090171970 Keefe Jul 2009 A1
20090182676 Barbier et al. Jul 2009 A1
20090191846 Shi Jul 2009 A1
20090196465 Menon Aug 2009 A1
20090222902 Bender et al. Sep 2009 A1
20090233579 Castell et al. Sep 2009 A1
20090261172 Kumar et al. Oct 2009 A1
20090265552 Moshir et al. Oct 2009 A1
20090273435 Ould Nov 2009 A1
20090286509 Huber et al. Nov 2009 A1
20090305673 Mardikar Dec 2009 A1
20090307139 Mardikar et al. Dec 2009 A1
20090307142 Mardikar Dec 2009 A1
20090323673 Gabbay et al. Dec 2009 A1
20090327131 Beenau et al. Dec 2009 A1
20100029200 Varriale et al. Feb 2010 A1
20100029202 Jolivet et al. Feb 2010 A1
20100050271 Saarisalo Feb 2010 A1
20100088227 Belamant Apr 2010 A1
20100117791 Inoue et al. May 2010 A1
20100125737 Kang May 2010 A1
20100138365 Hirvela et al. Jun 2010 A1
20100159962 Cai et al. Jun 2010 A1
20100199327 Keum et al. Aug 2010 A1
20100223472 Alvarsson Sep 2010 A1
20100235277 Van Rensburg et al. Sep 2010 A1
20100274677 Florek Oct 2010 A1
20110078081 Pirzadeh et al. Mar 2011 A1
20110087610 Batada et al. Apr 2011 A1
20110112968 Florek et al. May 2011 A1
20110117883 Drabo May 2011 A1
20110138192 Kocher et al. Jun 2011 A1
20110143663 Renard Jun 2011 A1
20110179284 Suzuki et al. Jul 2011 A1
20110197059 Klein et al. Aug 2011 A1
20110208761 Zybura et al. Aug 2011 A1
20110213665 Joa et al. Sep 2011 A1
20110238578 Hurry Sep 2011 A1
20110276638 Errico et al. Nov 2011 A1
20120002810 Imming et al. Jan 2012 A1
20120029990 Fisher Feb 2012 A1
20120066346 Virmani et al. Mar 2012 A1
20120078735 Bauer et al. Mar 2012 A1
20120089520 Mardikar Apr 2012 A1
20120096077 Weerts Apr 2012 A1
20120096535 Popp et al. Apr 2012 A1
20120196529 Huomo et al. Aug 2012 A1
20120209852 Dasgupta et al. Aug 2012 A1
20120215747 Wang Aug 2012 A1
20120244805 Haikonen et al. Sep 2012 A1
20130046761 Soderberg et al. Feb 2013 A1
20130054459 Granbery Feb 2013 A1
20130060661 Block et al. Mar 2013 A1
20130074046 Sharma et al. Mar 2013 A1
20130144968 Berger Jun 2013 A1
20130198086 Mardikar Aug 2013 A1
20140006486 Bintliff Jan 2014 A1
20140025520 Mardikar et al. Jan 2014 A1
20140052532 Tsai et al. Feb 2014 A1
20140185806 Mardikar Jul 2014 A1
20140208099 Rajsic Jul 2014 A1
20140372323 Balasubramanian et al. Dec 2014 A1
20150026781 Taveau et al. Jan 2015 A1
20150056957 Mardikar et al. Feb 2015 A1
20150220932 Mardikar et al. Aug 2015 A1
20150227932 Huxham et al. Aug 2015 A1
20150281191 Mardikar Oct 2015 A1
20160026991 Murdoch et al. Jan 2016 A1
20160125415 Mardikar et al. May 2016 A1
20160224984 Mardikar et al. Aug 2016 A1
20160253670 Kim et al. Sep 2016 A1
20170111797 Mardikar Apr 2017 A1
20170237829 Kirkeby et al. Aug 2017 A1
20180054438 Li et al. Feb 2018 A1
20180101678 Rosa Apr 2018 A1
20180130548 Fisher May 2018 A1
20180211236 Rutherford et al. Jul 2018 A1
20190057115 Liu et al. Feb 2019 A1
20190097975 Martz et al. Mar 2019 A1
20200034830 Ortiz et al. Jan 2020 A1
20200279258 Agrawal et al. Sep 2020 A1
20210056524 Isgar Feb 2021 A1
20210258395 Saito Aug 2021 A1
Foreign Referenced Citations (9)
Number Date Country
1479533 Mar 2004 CN
1908981 Feb 2007 CN
1737181 Dec 2006 EP
2034428 Mar 2009 EP
2396472 Jun 2004 GB
0178493 Oct 2001 WO
2006113834 Oct 2006 WO
2008034937 Mar 2008 WO
2009138848 Nov 2009 WO
Non-Patent Literature Citations (35)
Entry
Abstract of CN1908981A, Fujitsu Ltd, Feb. 7, 2007, 51 pages.
Atmel., “Understanding the Requirements of ISO/IEC 14443 for Type B Proximity Contactless Identification Cards”, Retrieved from the internet: http://www.atmel.com/dyn/resources/prod.documents/doc2056.pdf, Nov. 2005, 28 pages.
Baddeley D., “ISO/IEC 14443-3 Identification Cards—Contactless Integrated Circuit(s) Cards—Proximity Cards—Part 3: Initialization and Anticollision”, Retrieved from Internet: http://www.waaza.org/download/fcd-14443-3.pdf, Jun. 11, 1999, 48 pages.
Chinese Appl. No. 200980121058.9, English Translation of Chinese Office Action, dated Dec. 12, 2011, 8 pages.
Chinese Appl. No. 200980121058.9, English Translation of Second Chinese Office Action, dated May 18, 2012, 10 pages.
Erfahrungen M., et al., “NFC = Simplicity”, Nokia, 2007, Retrieved from the Internet: http://www.hccomp.eu/files/NFC-4.pdf, 18 pages.
European Appl. No. 09773993.2, Extended European Search Report dated Oct. 7, 2013, 7 pages.
Gralla P., “How Wireless Works”, 2nd Edition, Que Corporation, Oct. 24, 2005, 56 pages.
Grillo A., et al., “Transaction Oriented Text Messaging with Trusted-SMS,” 2008 Annual Computer Security Applications Conference (ACSAC), Dec. 2008, 10 pages.
Hassinen M., “Java based Public Key Infrastructure for SMS Messaging”, Department of Computer Science, 2006, 6 pages.
International Appl. No. PCT/US2009/046322, International Search Report and Written Opinion dated Nov. 10, 2009, 7 pages.
International Appl. No. PCT/US2009/046450, International Search Report and Written Opinion dated Jul. 28, 2009, 7 pages.
International Preliminary Report on Patentability for Application No. PCT /US2009/046450 dated Dec. 16, 2010, 7 pages.
International Preliminary Report on Patentability for Application No. PCT/US2009/046322 dated Dec. 16, 2010, 7 pages.
“ISO8583 Message Format Specification Version 3.0”, Trusted Security Solutions, Sep. 21, 2005, 11 Pages.
Me G., “Security Overview for M-Payed Virtual Ticketing,” The 14th IEEE 2003 International Symposium on Personal, Indoor and Mobile Radio Communication Proceedings, 2003, 5 pages.
“Merriam-Webster's Collegiate Dictionary,” 10th Edition, 1993, 1 page.
“Mobile NFC Services Version 1.0”, GSMA, Feb. 2007, 24 Pages.
“Mobile NFC technical Guidelines Version 2.0”, GSMA, Nov. 2007, 24 Pages.
“NFC—The Technology| Mobile NFC”, Aug. 8, 2012, Retrieved from the Internet: http://www.gsma.com/mobilenfc/nfc-the-technology/, 2 pages.
“Pay-Buy Mobile Business Opportunity Analysis Public White Paper”, Version 1.0, GSMA, Nov. 2007, 36 pages.
“Reader Series 4000: S4100 Multi-Function Reader Module RF-MGR-MNMN ISO 14443 Library Reference Guide”, Texas Instrument, Oct. 2003, Retrieved from the Internet: http://www.ti.com/rfid/docs/manuals/refmanuals/RF-MGR-MNMN-14443-refGuide.pdf, 58 pages.
Reference Shelf., “Secure,” Webster's Dictionary: Full Text, Jun. 9, 2011, 2 pages.
Reference Shelf, “Separate,” Webster Dictionary: Full Text, Jun. 9, 2011, 2 pages.
Smartcardalliance., “Contactless Technology for Secure Physical Access: Technology and Standards Choices”, Smart Card Alliance Report, Oct. 2002, Retrieved from the Internet: https://www.securetechalliance.org/resources/lib/Contactless.sub-Technology.Report.pdf, 48 pages.
Strunk W., et al., “The Elements of Style Third Edition”, MacMillan Publishing Co Inc, 1979, 3 pages.
U.S. Appl. No. 60/974,424, filed Sep. 21, 2007, 15 pages.
“Webster's New World Dictionary, Third College Edition,” 1988, 1 page.
White R., “How Computers Work”, 9th Edition, Que Corporation, Nov. 14, 2007, 75 pages.
White R., “How Computers Work”, Illustrated by Timothy Edward Downs, Que Publishing, 7th Edition, Oct. 15, 2003, 23 pages.
White R., “How Software Works”, Illustrated by Pamela Drury Wattenmaker, 1993, 68 pages.
Wikipedia., “FIPS 140-2”, Federal Information Processing Standard (FIPS), May 25, 2001, Retrieved From the Internet: https://en.wikipedia.org/wiki/FIPS_140-2, 6 pages.
Wikipedia., “FIPS PUB 140-2”, National Institute of Standards and Technology (NIST), May 25, 2001, Retrieved from Internet URL: http://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf, 6 pages.
Chinese Appl. No. 200980121058.9, Chinese Version of Office Action dated Dec. 12, 2011, 5 pages.
Chinese Appl. No. 200980121058.9, Chinese Version of Second Office Action, dated May 18, 2012, 6 pages.
Related Publications (1)
Number Date Country
20230284021 A1 Sep 2023 US
Provisional Applications (1)
Number Date Country
61530636 Sep 2011 US
Continuations (5)
Number Date Country
Parent 17140872 Jan 2021 US
Child 18174457 US
Parent 16365108 Mar 2019 US
Child 17140872 US
Parent 14971684 Dec 2015 US
Child 16365108 US
Parent 14507343 Oct 2014 US
Child 14971684 US
Parent 13603242 Sep 2012 US
Child 14507343 US