Wireless transaction and information system

Abstract
A financial information and transaction system utilizes wireless communication in connection with portable terminals. In this system, a terminal is connected to the financial institution via a wireless or cellular telephone hook-up. Smart cards are utilized to verify authorization for transactions, thereby minimizing potential security problems which could otherwise result from use of a mobile terminal. Alternately, a smart card is advantageously utilized not only for authorization, but also to maintain a secure record of available funds. The system not only provides the functionality of an ATM network, but also provides non-financial services, thereby forming an integrated system.
Description




FIELD OF THE INVENTION




This invention relates to a system for providing information and performing financial transactions. In particular, it relates to a financial system which utilizes wireless, portable terminals for providing financial information and performing financial transactions.




BACKGROUND OF THE INVENTION




The proliferation of automated teller machines (ATMs) has revolutionized the banking and financial services industry by increasing the ability to provide financial services to the consumer. For example, in the past virtually all consumer transactions were conducted in person. Thus, consumer access was generally limited to the business hours of branch locations. With the advent of ATM and other financial networks, consumers may now access financial services virtually twenty-four hours a day, seven days a week. This results in increased convenience and efficiency both for the service provider and the consumer.




Despite these successes, ATM and other financial networks in use today are characterized by certain shortcomings which limit consumer access and provide a barrier to more widespread accessibility and use. For example, the ATMs in greatest use today are hard wired in a fixed location. This hard wiring is necessary to provide power for the terminal and to provide access to communication lines, such as telephone lines, over which data may be exchanged with the financial service provider. Security concerns also play a role in limiting ATMs to fixed locations.




As a result of the fixed location of such terminals, financial networks must take great care in distributing ATMs over a particular geographic region so as to maximize consumer access. However, with changing demographics, such distributions may become less advantageous. For example, a new shopping mall may open in a first location, increasing demand in that area, while another mall may close in a second location thereby decreasing demand in that location. One-time or isolated events resulting in an unexpected influx of people to a particular area may also result in an overwhelming demand which cannot be met satisfactorily by an existing distribution of terminals.




Currently, such problems may be addressed by providing additional ATM terminals. However, the capital costs of such terminals and the necessary peripheral equipment, such as power supplies, maintenance facilities and so forth may be too prohibitive to permit adaptive response to the above-described changes in consumer demand.




Accordingly, there is a need for a financial transaction and information system which can overcome the aforementioned shortcomings. Specifically, there is a need to provide transaction and information terminals which can be conveniently repositioned by the operator as necessary to maximize availability and use of the financial services provided thereby. Further, there is a need for transaction and information terminals which do not need to be directly connected by lines to a telephone network or power source network.




There is an additional need to provide the above-described features without compromising the security provided by existing systems and without introducing inordinate costs.




SUMMARY OF THE INVENTION




It is an object of the invention to meet these needs, and others, through a financial information and transaction system which utilizes wireless communication in connection with portable terminals. In this system, a terminal is connected to the financial institution via a wireless or cellular telephone hook-up. It is a feature of the invention that so-called “smart cards” are utilized to verify authorization for transactions, thereby minimizing potential security problems which could otherwise result from use of a mobile terminal. According to an alternate embodiment of the invention, a smart card is advantageously utilized not only for authorization, but also to maintain a secure record of available funds.




According to another embodiment of the invention, a portable transaction terminal is internally powered by, for example, rechargeable batteries. In an alternate embodiment, the terminal is powered by a standard ac power supply through a conventional outlet.




In yet another embodiment of the invention, a cellular telephone, having a smart card reader incorporated therein, is utilized as a data terminal for various financial transactions.




According to a further embodiment, the system not only provides the functionality of an ATM network, but also provides non-financial services thereby forming an integrated system.




The above, and other objects, features and advantages of the present invention will become readily apparent from the following detailed description thereof which is to be read in connection with the accompanying drawings.











BRIEF DESCRIPTION OF THE DRAWINGS




In the drawings:





FIG. 1

is a block diagram of a financial information and transaction system in accordance with the invention.





FIG. 2A

is a block diagram of a first application of the invention which includes a wireless transmitting/receiving station.





FIG. 2B

is a block diagram showing a second application of the invention which includes a wireless transmission/receiving station.





FIG. 2C

is a perspective view of a cellular telephone terminal in accordance with the invention.





FIG. 3A

is a perspective/block view of a first portable wireless transaction and information terminal in accordance with the invention.





FIG. 3B

is a perspective/block view of a second portable wireless transaction and information terminal in accordance with the invention.





FIG. 4

is a block diagram of a wireless transaction and information system in accordance with the invention.





FIG. 5

is a block diagram of a smart card according to the invention.





FIG. 6

is a block diagram of a file structure of the smart card of FIG.


5


.











DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS





FIG. 1

is a block diagram illustrating a system for providing financial information and performing financial transactions in accordance with the present invention. In this embodiment, a financial institution is represented by block


10


. As known in the art, the financial institution, such as a consumer banking institution, utilizes an automated system, including a host computer, for maintaining records of customer accounts. These records are used to keep track of funds in the customer accounts, to enter debits and credits made to such accounts, and for other purposes.




In order to provide various services to the customer, such as providing account information and account debiting and crediting at the customer's request, a communications front end


12


is used to exchange data corresponding to such information. The communication front end


12


provides access to the host computer operated by the financial institution


10


from a variety of communication systems. For example, as shown, the communications front end


12


may exchange data with a standard switch network


14


, such as one operated by a regional telephone company. Thus, data transfer utilizing such a system generally takes place over the telephone line. In this way, data may be exchanged with a user suitably linked to the standard switch network


14


with a modem using any of a variety of communication protocols known in the art. Moreover, data may be exchanged in this way other financial institutions and financial networks (not shown), for example, to provide data for settlement of various customer transactions.




Alternately, the communication front end


12


may be connected to a network service provider


16


or a private network


18


. For example, one of several commercial services now available may link users throughout a geographic area. Further, the communications front end


12


may provide an interface between the financial institution


10


and a private network


18


comprising, for example, one or more local area networks (LAN) or wide area networks (WAN).




Further, the communications front end in this representation is connected to a direct wireless service


20


. For example, such a hook-up could operate at a very high frequency (900 megahertz) along a cellular telephone-type or spread spectrum type connection (900 megahertz with multiplexers) for security purposes. The signal from the direct wireless service


20


may be received by a number of different types of terminals, described below.




As illustrated,

FIG. 1

shows direct links between the communications front end


12


and the various types of communication systems


14


,


16


,


18


, and


20


. However, it will be understood by those skilled in the art that various combinations of such systems, and others, are possible. For example, a private network


22


may be accessed with the communications front end


12


through a network service provider


16


. Alternatively, rather than the direct wireless communication represented by block


20


, wireless communication may take place using various commercial wireless service providers


24


via the standard switch network


14


. Other networks


26


, such as the so-called “Internet,” may be accessed with the standard switch networks


14


.





FIGS. 2A

to


2


C illustrate various applications in which wireless data transmission may be utilized to provide convenient access to a financial institution, such as the financial institution


10


mentioned above in relation to FIG.


1


. For example,

FIG. 2A

illustrates an application in which a wireless transmitting and receiving station


50


is operatively linked to various terminals A to D distributed in a shopping mall


52


or other localized area.




In

FIG. 2B

, a wireless transmitting and receiving station


54


is operatively linked to a financial server


56


associated with LAN or WAN of a business. Various nodes


58


,


60


, and


64


are provided along the network of the business. One such node


64


shown in

FIG. 2B

may comprise a personal computer which includes a smart card reader


64




a.






In

FIG. 2C

a cellular telephone


75


serves as a financial information and transaction terminal. In this embodiment, the cellular telephone


75


includes standard features such as an alpha-numerical keypad


80


, a speaker portion


76


, a microphone portion


82


, and a display


78


(for example, a LCD display). Additionally, a smart card reader portion


84


is provided. This additional feature provides the additional capability to perform financial transactions using the keypad


80


as an interface. The functionality of this embodiment and of those described above is apparent from the ensuing description.





FIGS. 3A and 3B

illustrate in greater detail embodiments of a portable, wireless terminal in accordance with the invention. In both of these embodiments and in those which are later described, use is made of a smart card and a smart card reader. As is known in the art, a smart card is a device which may include processing means as well as both volatile and non-volatile memory. Data stored in read-write memory on the smart card may be exchanged with a reader device, typically through a serial interface. One advantage of such use of the smart card is that encryption algorithms may be stored and processed with the smart card to allow the smart card to be validated from a remote location, for example, by a host computer operated by a financial institution. In this way, information can be securely exchanged between the card and the remote location using one or more encryption keys that are in place in both locations. The encryption keys are used to encode information to be transmitted and to decode information that is received.




Using encryption techniques, it is possible not only to encode financial information stored remotely by a host computer or locally on the smart card, but also to encode identification information, such as personal identification numbers (PINs). In this way a user's PIN may be encrypted by the smart card and communicated to a remote host which has the same encryption key to decode the encrypted PIN and to validate it. This provides authorization to access information stored by the host and/or to request various financial transactions.





FIG. 3A

illustrates a first wireless terminal


100


for use with a smart card. This terminal


100


includes a customer interface


102


, such as an alpha-numerical keypad


104


, a display


106


, and a smart card reader


108


. Signals provided from a wireless service provider, such as one described in

FIG. 1

, are received by a transmitter/receiver portion


110


of the terminal


100


. Conversely, signals are provided from the transmitter/receiver portion


110


of the terminal


100


to a front end processor via wireless service provider. In this manner, the terminal


100


may be used to wirelessly receive and transmit data to and from a financial institution or financial network. This data may then be read and write from and onto a smart card that is inserted into the smart card reader


108


.




In this embodiment, the terminal


100


may be advantageously used to read data stored on a smart card to determine, for example, a value corresponding to an amount of funds existing in the user's account. With the terminal


100


, the user may add to the amount stored on the card and have the added amount debited from the user's account by the host computer. In such a way, the terminal thereby functions as a credit-authorization terminal. The authorization and financial information is kept secure during transmission as a result of the encryption capabilities of a smart card that is used to access the terminal


100


.




For example, the user may insert a smart card into the smart card reader


108


. The card first encrypts, then transmits to the terminal


100


information stored on a smart card. This information identifies the financial institution which maintains the user's account as well as the user's account number. Additional security may be obtained by requiring that the user input a PIN with the numeric keypad. Again, the smart card can then encrypt the PIN for transmission by the terminal to a host computer for verification.




Once authorization has been obtained, the user may determine the user's current account balance and/or request that value be added to the card. In executing these requests, the terminal exchanges encoded information by wireless transmission with a financial network, such as one described above with respect to FIG.


1


. For example, the terminal may be used to directly add value to the user's card, and then request by wireless transmission that the customer's account be debited a corresponding amount. These requests comprise encoded data which is decoded by the host computer associated with financial institution.




When the funds are transferred to and from the smart card, an encrypted bank signature appended to the funds certifies that the funds are “real.” It also ensures that when the transaction enters the settlement system, the funds are validated. Because the settlement system may involve more than one financial institution, when the transaction is ultimately presented to the financial institution for payment, the encrypted bank signature verifies that the transaction is authentic.




In the embodiment shown in

FIG. 3A

, the terminal


100


may operate with a standard ac supply


112


from a conventional outlet. In the embodiment of

FIG. 3B

(in which identical reference numerals are used to refer to corresponding structure described in reference to FIG.


3


A), a terminal


120


is powered by rechargeable batteries


122


in order to provide even greater mobility.




It will be appreciated that such a terminal as described in reference to

FIGS. 3A and 3B

permits the user to conduct numerous financial transactions without a hard wired connection between the terminal and the financial institution. For example, the terminal can be used to “recharge” a smart card in the manner described above. After “recharging,” the user may then use the card in connection with terminals that accept this “electronic cash” in lieu of cash by deducting an amount from the user's card. The amount deducted can then be redeemed by a merchant through a settlement process with the user's financial institution (and others).




It can be seen that the terminal described in

FIGS. 3A and 3B

is a truly mobile unit and enjoys the benefits of such mobility. Because the terminal is not required to dispense cash, no safe is required. This, in turn, reduces the cost and size of the terminal and maximizes the flexibility of the design of the terminal. For example, the terminal may be positioned in the corridor of a mall or an office building, thereby maximizing its access and availability to foot traffic during the day. At night, the terminal could be rolled back in from the corridor and accessed for settlement/verification procedures in accordance with standard industry practice with ATMs. In the embodiment of

FIG. 3B

, the terminal's batteries could be recharged during this time for use the next day.




Alternatively, the mobile terminal could be positioned on a truck which could be parked outside at a fair or sporting event and powered by batteries or a generator stored on the truck. Again, the mobile terminal is positioned to maximize access to foot traffic and is repositioned at night for recharging, servicing, etc. Positioned in this way, the above-described terminals provide increased flexibility and adaptiveness for responding to customer demands.





FIG. 4

illustrates another embodiment of the invention in which a wireless server/terminal unit


150


is used to exchange financial information between a user and a remote host computer of a financial institution, such as that referred to in FIG.


1


. The wireless server/terminal unit


150


preferably includes a terminal described above in reference to

FIGS. 3A and 3B

(that is, one which incorporates a display, a keypad, a smart card reader, and means for wireless transmission of data).




The system shown in

FIG. 4

integrates the capability of exchanging financial information with other non-financial functionality, such as security control. In particular, the wireless server/terminal unit


150


forms a portion of a LAN which comprises a variety of other computers and networks. As illustrated, these other computers and networks include an employee's work place PC


158


, an employee's home PC


152


, a WAN


156


, a local building computer system


154


, a conventional ATM


160


, and a spread spectrum server


162


.




A variety of terminals and associate device are coupled to the networks shown. For example, the WAN


156


includes PCs


166


and


168


. A building access system


174


includes various smart card readers


170


, some of which are equipped with keypads. Similarly, each of the employee PCs


152


and


158


are equipped with smart card readers


152




a


and


158




a.






Also, a plurality of terminals, represented by the terminal


172


, are coupled to the spread spectrum server


162


. For example, the terminal


172


is equipped with a smart card reader


172




a


. In this way, the wireless financial server terminal


150


enables employees to access their financial institution through a variety of means and from a variety of locations in the work place and at home.




In particular, the wireless smart card recharge station


172


communicates to the financial institution via the spread spectrum receiver


162


and the server terminal


150


. The recharge station


172


has a slot for receiving and reading a smart card and a display (see FIGS.


3


A and


3


B). Through its connection with a financial system, such as that shown in

FIG. 1

, the user makes selections from a menu displayed on the display of the terminal


172


. For example, the user may review account balances, transfer funds, or perform other activities typically available on a fixed-location ATM. The user may also reload monetary value onto the smart card via the cash station, adding set funds to either a “prepaid” or “purse” account on the smart card as described below. In this way the user can obtain access to money via a portable ATM-type terminal without security risk because no cash is directly involved. At the end of the user's visit to a location where the smart card is honored, the user may employ the station to deposit any unused balances from the user's smart card to the user's account with the financial institution.




As shown, a user's PC


152


may be connected to a smart card reader, such as one having a keypad and processing capabilities. This enables the user to access the user's financial accounts and to “recharge” the smart card (that is, add funds onto the smart card). In this respect, the keypad enables the user to enter the user's PIN and the smart card inserted into reader


152




a


provides additional encryption and security measures to make the transport route (namely, the LAN/wireless terminal/route) sufficiently secure to conduct financial transactions. A similar arrangement is conducted at other remote locations through a telephone line connection between the terminal and the employee's home personal computer connected to a smart card reader/processor and keypad. Further, a smart card reader/processor with a display which simulates an ATM protocol could be connected to the terminal, thereby enabling the user to perform all ATM functions including recharging the smart card, without the use of a personal computer.




Thus, the server terminal


150


provides a communications channel for several remote devices, such as the home PC


152


, the work place PC


158


and the terminals


172


associated with the spread spectrum server


162


and those associated with the wide area network


156


. By providing card readers with these terminals, it is possible to obtain a wide range of access points to a remote host computer via the wireless financial server/terminal. This provides additional capabilities to the above-described financial information and transactions.




Additionally, the embodiment of

FIG. 4

describes an integrated system which may be used for other non-financial transactions. For example, the building computer system


154


noted above may be used to control a building access system


174


. The building access system of this example includes a plurality of smart card readers and/or keypads. Such interface devices may be used to verify that a user is authorized to enter particular areas by matching information stored on a smart card against security records maintained or updated through the server/terminal unit


150


. Different security levels may be instituted for different areas, each requiring additional authorization. For example, it may only be necessary to insert a card to access a parking garage, while gaining access to particular rooms may require additional authorization, for example, the inputting of a PIN with a keypad.





FIG. 5

illustrates a multi-purpose smart card


200


which permits both financial and non-financial functions in an integrated system such as that described in FIG.


4


. The smart card


200


comprises a central processing unit


202


(CPU) which is connected to a read only memory


204


(ROM), primarily used for storage of an operating system. A random access memory


206


(RAM) is also provided for volatile storage of data, particularly for program execution. The CPU


202


is operatively coupled to a serial interface


208


which in turn communicates with a smart card reader


210


according to techniques well known in the art.




The CPU is connected to an arithmetic logic unit


212


, for example, one suitable for processing large keys (512 byte keys). An electrically erasable programmable read only memory


214


(EEPROM) is provided, which typically stores system files and applications.




As illustrated in

FIG. 6

, the smart card


200


of

FIG. 5

has different file paths for different functions. The EEPROM has a master file


220


and dedicated files for different applications. These dedicated files include a biometric identification file


222


and an encrypted digital signature file


224


. Also included is a building access file


226


that contains information which enables the card to be used in conjunction with a security system, such as the one referred to in FIG.


4


. The master file


220


also is linked to a banking card debit file


228


which may also have its own security path for identification. The smart card has a prepaid function path


230


which can only be loaded through a secure function, and a “non-secure” electronic purse function file


232


. These files are readable by an external terminal, such as the terminal described in reference to

FIGS. 3A and 3B

, and may be decremented as required from an outside terminal, as described more fully below.




In this example, the master file


220


also has a digital encryption capability


234


providing algorithmic computation for the processing of digital keys and encryption of, for example, the user's PIN. The algorithms used may provide symmetrical or asymmetrical encryption as known in the art.




While the smart card utilized in the invention embodies a “computer”, it has a fairly limited memory. For example, the EEPROM may be limited to the range between 3 to 8 kilobytes with current technology limitations. Accordingly, the smart card in the system preferably acts as an enabling device for other systems according to known techniques. For example, the smart card provides validation of the individual and the service requested, but does not store large quantities of data on the card.




It should be understood from the above description that as the mobility of an ATM-type terminal increases, security concerns may also increase. More specifically, it may be unfeasible to place cash in a mobile ATM due to the possibility of theft of the terminal. Use of a smart card enables the system to provide users with secure purchasing in a cash-free environment.




Further addressing this concern, the smart card


200


of

FIGS. 5 and 6

includes two storage areas for storing monetary values. The first is an “electronic purse” represented by file


232


. This area is used, for example, when the user makes a high value purchase by placing the smart card in a merchant's terminal. The user accepts the transaction and amount of the purchase entered by the merchant by entering the user's PIN. The user then approves the amount, for example, by pushing an “enter” button on a terminal keypad, the card purse cash value is then debited by the requested amount, and, conversely, the merchant's account is credited that amount.




A second area for storing monetary values on the card comprises a “pre-paid account” represented by file


230


. This account is generally utilized for lower value purchases, for example, fifty dollars or less. This account is kept in an unsecured cash area of the smart card and operates essentially like cash. For example, the user of the smart card may make purchases from this account without entering the user's PIN. Possible uses would include, preferably, low value, fast transactions such as at a cafeteria, or a vending machine, or when placing a local telephone call.




The smart cards referred herein interface with the system through the use of various smart card reader/processors. These processors vary in complexity and sophistication depending upon the application. For example, when used to regulate building access, the smart card may be inserted into a smart card reader which simply identifies the user. This could be used in lower security areas, such as parking garages. A numerical keypad, by which a user's PIN may be entered, can be required for added security, such as at building door entrances. For even further security, some biometric parameter (such as a fingerprint) may be used for identification. This same access code with or without a PIN can be used in a smart card reader attached to a stand-alone or network personal computer


158


A to control the level of access to local or remote files, communication networks, databases and network services.




In the aforementioned embodiments, the smart card incorporates optional digital encryption signatures and encryption algorithms to enable the smart card to be validated from a remote location, such as a host computer at a financial institution or at off/on line merchant terminals equipped with a SAM module for off-line card authentication. In such instances both ends of the communication (for example, the host computer and the smart card) may each have an encryption key so that data (such as a PIN entry) which is sent via the smart card


60


is validated at the host computer. Thus, the host computer is able to validate that the smart card is authentic and that the proper user is using the smart card so that a financial transaction can take place.




In a wireless off-line situation, the smart card and the terminal being used similarly validate one another because there is a possibility that a false terminal is being used. Accordingly, even in an off line system, security measures are available to validate the card, the terminal, and the user.




Various preferred embodiments of the invention have now been described in fulfillment of the objects of the invention. While these embodiments have been set forth by way of example, various other embodiments and modifications will be apparent to those skilled in the art. Accordingly, it should be understood that the invention is not limited to such embodiments, but encompasses all that which is described in the following claims.



Claims
  • 1. A method for performing transactions, comprising:receiving, at a host computer system, encrypted user identification information wirelessly transmitted from a mobile server terminal, the encrypted identification information transmitted by a user to the mobile server terminal from one of a plurality of user terminals over a corresponding one of a plurality of networks, each of the plurality of user terminals having a smart card interface device, each of the plurality of user terminals and each of the plurality of networks compatible for communication with the mobile server terminal, the plurality of user terminals including at least one of personal computer, a mobile terminal, a battery-powered mobile terminal, an automatic teller machine, and a building access terminal, the plurality of networks including at least one of standard switch network, a direct wireless service network, the Internet, a financial network, a commercial network, a private network, a wide area network, a local area network, an ATM network and a spread spectrum network, the encrypted user identification information encrypted via a smart card having an encryption algorithm, the host system having records of user account information, including reference identification information, and the host system having a decryption algorithm capable of decrypting data encrypted by the encryption algorithm of the smart card; decrypting the encrypted identification information using the decryption algorithm of the host system and validating the identification information sent from the smart card with the reference identification information; if the identification information is validated, providing the user with wireless access to the information and functionality of the host system through the mobile server terminal to exchange information, the information exchange comprising: receiving at the host computer system an encrypted selected function from a group of transaction functions and encrypted function data corresponding to the selected function both wirelessly transmitted from the mobile server terminal, the group of transaction functions including at least a financial transaction function and an entry into a secure physical location function, both the encrypted selected function and the encrypted data encrypted via the smart card; decrypting the encrypted selected function and the encrypted function data for the selected function at the host system, performing the selected function in response to the transmitted function data for the selected function to provide data for the performed function, and encrypting the data for the performed function; and wirelessly transmitting the encrypted data for the performed function to the mobile server terminal for use by the user.
  • 2. The method of claim 1 wherein the group of transaction functions further includes at least one function selected from the group consisting of an account information gathering function, a credit authorization function, a banking card debit function, an electronic prepaid function, and an electronic purse function.
  • 3. The method of claim 1, wherein the host system comprises a security system for controlling access to a secure physical location, wherein the identification information comprises security information stored on the smart card, the security system having security records and providing access to the secure physical location by matching the security information to the corresponding security record.
  • 4. A system for a user to obtain information and perform transactions on a network, comprising:a plurality of user terminals each having a smart card interface device for communicating with a smart card, each of the plurality of user terminals having an input device associated with the user terminal and in combination with the smart card interface device for receiving identification information and data from the user, wherein the identification information is encrypted by a smart card in communication with the smart card interface device and the smart card having a first encryption algorithm, the plurality of user terminals including at least one of a personal computer, a mobile terminal, a battery-powered mobile terminal, an automated teller machine, and a building access terminal; a plurality of networks including at least one of a standard switch network, a direct wireless service network, the Internet, a financial network, a commercial network, a private network, a wide area network, a local area network, an ATM network and a spread spectrum network; a mobile server terminal compatible for communication with all of the plurality of user terminals through any of the plurality of networks, the mobile server terminal further comprising a first wireless device for wirelessly transmitting and receiving data; a host computer system having an associated second wireless device and at least a second encryption algorithm corresponding to the first encryption algorithm, wherein the second wireless device receives the encrypted identification information and wherein the second encryption algorithm decrypts the encrypted identification information, wherein the host system maintains records of user account information including identification information and compares the identification information encrypted by the smart card to the user account information to verify the identification information, and wherein the host system wirelessly transmits authorization information through the second wireless device to the mobile server terminal to allow the user access to the host computer system; and a transaction application for providing the user with transactions to be performed through the server terminal if the identification information is validated by the user account information, the transaction application including financial transaction functions and an entry into a secure physical location function.
  • 5. The method of claim 1 wherein the battery-powered mobile terminal comprises a cellular phone.
  • 6. The method of claim 1, further comprising encrypting authorization information using an encryption algorithm within the host system, where the authorization information represents whether or not the identification information is validated, wirelessly transmitting the encrypted authorization information to the mobile server terminal for notifying the user whether or not access to the host system is allowed.
  • 7. The method of claim 1, wherein the information exchange further comprises adding electronic value to the smart card and debiting value from a user account in the host system.
  • 8. The method of claim 7, further comprising appending an encrypted bank signature to the value added to the smart card, wherein the bank signature certifies the authenticity of the value.
  • 9. The system of claim 4, wherein the transaction application further includes at least one transaction selected from the group consisting of an account information gathering transaction, a credit authorization transaction, a banking card debit transaction, an electronic prepaid transaction, and an electronic purse transaction.
  • 10. A method for performing transactions, comprising:receiving a smart card in a smart card reader in communication with a user terminal, wherein the smart card comprises at least a first encryption algorithm and validation information, wherein the user terminal comprises at least one terminal selected from a plurality of user terminals consisting of a personal computer, a mobile terminal, a battery-powered mobile terminal, an automated teller machine, and a building access terminal; receiving at least an encrypted portion of the validation information at the user terminal, the encrypted portion encrypted using the first encryption algorithm of the smart card; wirelessly transmitting the encrypted portion of the validation information via a mobile server terminal having a first transmitter/receiver in communication with the user terminal through a network, wherein the network is at least one network selected from a plurality of networks consisting of a standard switch network, a direct wireless service network, the Internet, a financial network, a commercial network, a private network, a wide area network, a local area network, an ATM network and a spread spectrum network, wherein the mobile server terminal is compatible with any of the plurality of user terminals and a corresponding one of the plurality of networks; wirelessly receiving the encrypted portion of the validation information at a second transmitter/receiver and transmitting the encrypted portion of the validation information to a host system, wherein the host system comprises user account information including reference validation information, a second encryption algorithm and financial transaction capabilities, wherein the user account information corresponds to the validation information on the smart card, and wherein the second encryption algorithm corresponds to the first encryption algorithm on the smart card such that data encrypted by the first encryption algorithm is decryptable by the second encryption algorithm and vice versa; decrypting the encrypted portion of the validation information and comparing the validation information to the user account information to determine an authorization code for further accessing the host system; and wirelessly transmitting the authorization code via the second transmitter/receiver; and if the authorization code represents verification between the validation information and the user account information, providing the user with access to the host system to perform transactions including at least one financial function and an access to a secure physical location function, wherein communications between the host system and the user terminal are encrypted by the host system and the smart card, respectively.
  • 11. The method of claim 10, further comprising:wirelessly receiving at the host system encrypted identification information along with the encrypted validation information, where the encrypted identification information comprises a personal identification number input by the user into the user terminal and encrypted via the smart card; and decrypting and comparing the identification information and the validation information to the user account information to determine the authorization code.
  • 12. A system for performing transactions, comprising:a plurality of smart card readers capable of communication with a smart card having at least a first encryption algorithm and a plurality of stored data, wherein the plurality of stored data includes validation information; a plurality of user terminals each corresponding to and in communication with one of the plurality of smart card readers, wherein each of the plurality of terminals have a first input device for generating user input data, the plurality of user terminals consisting of at least one of a personal computer, a mobile terminal, a battery-powered mobile terminal, an automated teller machine, and a building access terminal; a server terminal compatible for communication with each of the plurality of user terminals, wherein the server terminal comprises a second input device, a first wireless transmit/receive device and a display, wherein the second input device includes a keypad for generating user input data and the display is adapted for displaying images to the user, wherein the first wireless transmit/receive device receives and transmits a first encrypted message comprising validation information and user input data, wherein the first encrypted message is encrypted by the encryption algorithm of the smart card; a plurality of networks, wherein at least one of the plurality of networks connects at least one of the plurality of user terminals to the server terminal, the plurality of networks consisting of at least one of a standard switch network, a direct wireless service network, the Internet, a financial network, a commercial network, a private network, a wide area network, a local area network, an ATM network and a spread spectrum network; a host financial system in communication with the server terminal, wherein the host system comprises user account information, an authentication program, a plurality of transaction applications, and at least a second encryption algorithm, wherein the second encryption algorithm corresponds to the first encryption algorithm on the smart card such that data encrypted by the first encryption algorithm is decryptable by the second encryption algorithm and vice versa, wherein the authentication program compares the validation information to the user account information to verify the authenticity of the validation information and thereby to determine user access to the host system, the plurality of transaction applications including at least a financial transaction function and an entry to a secure physical location function, and wherein the host system provides a second encrypted message comprising data relating to at least one of the plurality of transaction applications if the authentication program authenticates the validation information and; a second transmit/receive device associated with the host system for wirelessly transmitting and receiving the first and second encrypted messages, wherein the second transmit/receive device is in communication with the first transmit/receive device and the host system.
  • 13. The system of claim 12, wherein the financial transaction function is selected from the group consisting of an account information gathering function, a credit authorization function, a banking card debit function, an electronic prepaid function, and an electronic purse function.
  • 14. The method of claim 1, where the selected function further comprises an electronic prepaid function, where the smart card includes an electronic prepaid account having an electronic prepaid value, where the information exchange includes a transaction comprising adjusting an amount of the electronic prepaid value in the electronic prepaid account, and where the identification information does not include a personal identification number.
  • 15. The method of claim 1, where the selected function further comprises an electronic purse function, where the smart card includes an electronic purse account having an electronic monetary value, where the information exchange includes a transaction comprising adjusting an amount of the electronic monetary value in the electronic purse account, and where the identification information includes a personal identification number.
  • 16. The method of claim 1, where the encrypted user identification received at the host computer system is transmitted by the automatic teller machine further comprising a cashless automatic teller machine such that the information exchange comprises exchanging financial information or electronic value.
  • 17. The method of claim 16, where the cashless automatic teller machine is located in a vehicle.
  • 18. The method of claim 10, further comprising receiving from the mobile server terminal a selected function from a plurality of functions, where the selected function comprises an electronic prepaid function, where the smart card includes an electronic prepaid account having an electronic prepaid value, where the information exchange includes a transaction comprising adjusting an amount of the electronic prepaid value in the electronic prepaid account, and where the identification information does not include a personal identification number.
  • 19. The method of claim 10, further comprising receiving from the mobile server terminal a selected function from a plurality of functions, where the selected function comprises an electronic purse function, where the smart card includes an electronic purse account having an electronic monetary value, where the information exchange includes a transaction comprising adjusting an amount of the electronic monetary value in the electronic purse account, and where the identification information includes a personal identification number.
  • 20. The method of claim 10, where the encrypted portion of the validation information received at the host computer system is transmitted by the automatic teller machine further comprising a cashless automatic teller machine such that the transactions comprise exchanging financial information or exchanging electronic value.
  • 21. The method of claim 10, where the cashless automatic teller machine is located in a vehicle.
  • 22. The system of claim 4, wherein the mobile server terminal comprises a cellular phone or an automatic teller machine.
  • 23. The system of claim 4, wherein the user terminal further comprises a cashless automatic teller machine such that the transaction application comprises a function of exchanging financial information or exchanging electronic value.
  • 24. The system of claim 23, wherein the cashless automatic teller machine is located in a vehicle.
  • 25. The system of claim 4, wherein the transaction application comprises an electronic prepaid function, wherein the smart card includes an electronic prepaid account having an electronic prepaid value, wherein the electronic prepaid function includes a transaction comprising adjusting an amount of the electronic prepaid value in the electronic prepaid account, and wherein the identification information does not include a personal identification number.
  • 26. The system of claim 4, wherein the transaction application comprises an electronic purse function, wherein the smart card includes an electronic purse account having an electronic monetary value, wherein the electronic purse function includes a transaction comprising adjusting an amount of the electronic monetary value in the electronic purse account, and wherein the identification information includes a personal identification number.
  • 27. A system for performing transactions, comprising:a plurality of smart card readers capable of communication with a smart card having at least a first encryption algorithm and a plurality of stored data, wherein the plurality of stored data includes validation information; a plurality of user terminals each corresponding to and in communication with one of the plurality of smart card readers, wherein each of the plurality of terminals have a first input device for generating user input data, the plurality of user terminals consisting of at least one of a personal computer, a mobile terminal, a battery-powered mobile terminal, an automated teller machine, and a building access terminal; a server terminal compatible for communication with each of the plurality of user terminals, wherein the server terminal is a mobile server terminal that comprises a second input device, a first wireless transmit/receive device and a display, wherein the second input device includes a keypad for generating user input data and the display is adapted for displaying images to the user, wherein the first wireless transmit/receive device receives and transmits a first encrypted message comprising validation information and user input data, wherein the first encrypted message is encrypted by the encryption algorithm of the smart card, and where the mobile server terminal comprises a cellular phone or an automatic teller machine; a plurality of networks, wherein at least one of the plurality of networks connects at least one of the plurality of user terminals to the server terminal, the plurality of networks consisting of at least one of a standard switch network, a direct wireless service network, the Internet, a financial network, a commercial network, a private network, a wide area network, a local area network, an ATM network and a spread spectrum network; a host financial system in communication with the server terminal, wherein the host system comprises user account information, an authentication program, a plurality of transaction applications, and at least a second encryption algorithm, wherein the second encryption algorithm corresponds to the first encryption algorithm on the smart card such that data encrypted by the first encryption algorithm is decryptable by the second encryption algorithm and vice versa, wherein the authentication program compares the validation information to the user account information to verify the authenticity of the validation information and thereby to determine user access to the host system, the plurality of transaction applications including at least a financial transaction function and an entry to a secure physical location function, and wherein the host system provides a second encrypted message comprising data relating to at least one of the plurality of transaction applications if the authentication program authenticates the validation information; and a second transmit/receive device associated with the host system for wirelessly transmitting and receiving the first and second encrypted messages, wherein the second transmit/receive device is in communication with the first transmit/receive device and the host system.
  • 28. The system of claim 12, wherein the user terminal further comprises a cashless automatic teller machine such that the financial transaction application comprises a function of exchanging financial information or exchanging electronic value.
  • 29. The system of claim 28, wherein the cashless automatic teller machine is located in a vehicle.
  • 30. The system of claim 12, wherein the financial transaction function comprises an electronic prepaid function, wherein the smart card includes an electronic prepaid account having an electronic prepaid value, wherein the electronic prepaid function includes a transaction comprising adjusting an amount of the electronic prepaid value in the electronic prepaid account, and wherein the identification information does not include a personal identification number.
  • 31. The system of claim 12, wherein the financial transaction function comprises an electronic purse function, wherein the smart card includes an electronic purse account having an electronic monetary value, wherein the electronic purse function includes a transaction comprising adjusting an amount of the electronic monetary value in the electronic purse account, and wherein the identification information includes a personal identification number.
  • 32. The method of claim 1, further comprising providing physical access to a secure physical location associated with the one of the plurality of user terminals if the identification information is validated by the user terminal.
  • 33. The method of claim 1, further comprising, prior to the transmission of the encrypted user identification information to the mobile server terminal, validating via the smart card the identification information, providing access to local files associated with the smart card or the user terminal or a local network connected to the user terminal, and providing access to the one of the plurality of networks.
  • 34. The method of claim 33, further comprising receiving a personal identification number input into the user terminal by the user, where the user identification information validated by the smart card includes the personal identification number.
  • 35. The method of claim 33, further comprising receiving a biometric parameter input into the user terminal by the user, where the user identification information validated by the smart card includes the biometric parameter.
  • 36. The method of claim 1, further comprising, prior to the transmission of the encrypted user identification information to the mobile server terminal and where the one of the plurality of user terminals comprises a personal computer connected to a local network, validating the identification information via the smart card, providing access to local files associated with the personal computer or the smart card or the local network, and providing access to the one of the plurality of networks associated with the mobile server terminal.
CROSS-REFERENCE TO RELATED APPLICATION

This application is a divisional of U.S. patent application Ser. No. 08/558,091 filed Nov. 13, 1995 now U.S. Pat No. 5,796,832. Reference is made to commonly owned co-pending application Ser. No. 08/177,548 entitled “WIRELESS SCREEN TELEPHONE,” the disclosure of which is incorporated by reference herein.

US Referenced Citations (187)
Number Name Date Kind
2541270 Mitnick Feb 1951 A
2593475 Neilsen Apr 1952 A
D202110 Wann Aug 1965 S
D211253 Sundquist Jun 1968 S
3515814 Morgan Jun 1970 A
3596256 Alpert et al. Jul 1971 A
3652795 Wolf et al. Mar 1972 A
3727186 Stephenson, Jr. et al. Apr 1973 A
D227482 Binks Jun 1973 S
3760375 Irwin et al. Sep 1973 A
3833885 Gentile et al. Sep 1974 A
3852571 Hall et al. Dec 1974 A
3865994 Bender Feb 1975 A
3932709 Hoff et al. Jan 1976 A
3938090 Borison et al. Feb 1976 A
3956615 Anderson et al. May 1976 A
3987259 Larson Oct 1976 A
3995123 Wilson Nov 1976 A
4023013 Kinker May 1977 A
4025760 Trenkamp May 1977 A
D244617 Breger Jun 1977 S
4032931 Haker Jun 1977 A
4071697 Bushnell et al. Jan 1978 A
4075460 Gorgens Feb 1978 A
4091448 Clausing May 1978 A
4114027 Slater et al. Sep 1978 A
4185282 Pick Jan 1980 A
4186438 Benson et al. Jan 1980 A
4277837 Stuckert Jul 1981 A
4291198 Anderson et al. Sep 1981 A
4291199 Densmore et al. Sep 1981 A
4301337 Eventoff Nov 1981 A
4313176 Cecil Jan 1982 A
4319336 Anderson et al. Mar 1982 A
4334126 Slingsby Jun 1982 A
4341951 Benton Jul 1982 A
4381427 Cheal et al. Apr 1983 A
4409450 Blades Oct 1983 A
4423294 Walser et al. Dec 1983 A
4425627 Eibner Jan 1984 A
4431870 May et al. Feb 1984 A
4454414 Benton Jun 1984 A
4468529 Samuel et al. Aug 1984 A
4476349 Cottrell et al. Oct 1984 A
4481574 DeFino et al. Nov 1984 A
4493021 Agrawal et al. Jan 1985 A
4494194 Harris et al. Jan 1985 A
4503288 Kessler Mar 1985 A
4510351 Costello et al. Apr 1985 A
4532378 Nakayama et al. Jul 1985 A
4533791 Read et al. Aug 1985 A
4536647 Atalla et al. Aug 1985 A
D282165 Brown Jan 1986 S
D282927 Story et al. Mar 1986 S
4578174 Kato et al. Mar 1986 A
4578537 Faggin et al. Mar 1986 A
4580011 Glaser Apr 1986 A
4585908 Smith Apr 1986 A
4591662 Legros et al. May 1986 A
D284856 Marshall Jul 1986 S
4598174 Pommer, II Jul 1986 A
4604686 Reiter et al. Aug 1986 A
4607144 Carmon et al. Aug 1986 A
4611277 Kemppainen et al. Sep 1986 A
4625276 Benton et al. Nov 1986 A
4629832 Carson et al. Dec 1986 A
4631666 Harris et al. Dec 1986 A
4634845 Hale et al. Jan 1987 A
4639917 Furuta Jan 1987 A
D288808 Asaki et al. Mar 1987 S
4649563 Riskin Mar 1987 A
4652704 Franklin Mar 1987 A
4653086 Laube Mar 1987 A
4659876 Sullivan et al. Apr 1987 A
4659879 Hasegawa Apr 1987 A
4663766 Bremer May 1987 A
4674115 Kaleita et al. Jun 1987 A
4682014 Iwama Jul 1987 A
4683360 Maser Jul 1987 A
4688170 Waite et al. Aug 1987 A
4697281 O'Sullivan Sep 1987 A
4701845 Andreasen et al. Oct 1987 A
4710955 Kauffman Dec 1987 A
4714989 Billings Dec 1987 A
4724521 Carron et al. Feb 1988 A
4725977 Izumi et al. Feb 1988 A
4727243 Savar Feb 1988 A
4734858 Schlafly Mar 1988 A
4737980 Curtin et al. Apr 1988 A
4744103 Dahlquist et al. May 1988 A
4748656 Gibbs et al. May 1988 A
4754326 Kram et al. Jun 1988 A
4788657 Douglas et al. Nov 1988 A
D299030 Menn Dec 1988 S
4796297 Okamoto Jan 1989 A
4797914 Vaello Jan 1989 A
4814972 Winter et al. Mar 1989 A
4817129 Riskin Mar 1989 A
4823264 Deming Apr 1989 A
4839919 Borges et al. Jun 1989 A
4850007 Marino et al. Jul 1989 A
4851994 Toda et al. Jul 1989 A
4852127 Fraser et al. Jul 1989 A
4852151 Dittakavi et al. Jul 1989 A
4858114 Heath et al. Aug 1989 A
4860342 Danner Aug 1989 A
D303522 Meda et al. Sep 1989 S
4870677 DiSanto et al. Sep 1989 A
D304932 Oura et al. Dec 1989 S
4885580 Noto et al. Dec 1989 A
4885765 Shirakawa Dec 1989 A
4897868 Engelke et al. Jan 1990 A
4905186 Fukui Feb 1990 A
4926325 Benton et al. May 1990 A
4933971 Bestock et al. Jun 1990 A
4935870 Burk, Jr. et al. Jun 1990 A
4943995 Daudelin et al. Jul 1990 A
4951278 Biber et al. Aug 1990 A
4956852 Hodge Sep 1990 A
4958278 Meguro Sep 1990 A
4958368 Parker Sep 1990 A
4972457 O'Sullivan Nov 1990 A
4972463 Danielson et al. Nov 1990 A
4982430 Frezza et al. Jan 1991 A
4991133 Davis et al. Feb 1991 A
4991199 Parekh et al. Feb 1991 A
4995074 Goldman et al. Feb 1991 A
5008927 Weiss et al. Apr 1991 A
5008930 Gawrys et al. Apr 1991 A
5012512 Basso et al. Apr 1991 A
5014190 Johnson May 1991 A
5018189 Kurosawa et al. May 1991 A
5020100 Gardiner May 1991 A
5025373 Keyser, Jr. et al. Jun 1991 A
5027315 Agrawal et al. Jun 1991 A
5038284 Kramer Aug 1991 A
5038372 Elms et al. Aug 1991 A
5050207 Hitchcock Sep 1991 A
5058000 Cox et al. Oct 1991 A
5060152 Maeser et al. Oct 1991 A
5065309 Putnam et al. Nov 1991 A
5065425 Lecomte et al. Nov 1991 A
5072441 Szwarc Dec 1991 A
5077788 Cook et al. Dec 1991 A
5081673 Engelke et al. Jan 1992 A
5103392 Mori Apr 1992 A
5120939 Claus et al. Jun 1992 A
5124909 Blakely et al. Jun 1992 A
5127041 O'Sullivan Jun 1992 A
RE34034 O'Sullivan Aug 1992 E
5153919 Reeds, III et al. Oct 1992 A
5155847 Kirouac et al. Oct 1992 A
5164982 Davis Nov 1992 A
5175817 Adams et al. Dec 1992 A
5185742 Bales et al. Feb 1993 A
5191611 Lang Mar 1993 A
5195129 Yazawa et al. Mar 1993 A
5195130 Weiss et al. Mar 1993 A
5202825 Miller et al. Apr 1993 A
5218680 Farrell et al. Jun 1993 A
5220501 Lawlor et al. Jun 1993 A
5221838 Gutman et al. Jun 1993 A
B14947028 Gorog Jun 1993 A
5227778 Vacon et al. Jul 1993 A
5235595 O'Dowd Aug 1993 A
5245651 Takashima et al. Sep 1993 A
5249218 Sainton Sep 1993 A
5265033 Vajk et al. Nov 1993 A
5272754 Boerbert Dec 1993 A
5274810 Meldrum Dec 1993 A
5276529 Williams Jan 1994 A
5299263 Beller et al. Mar 1994 A
5321840 Ahlin et al. Jun 1994 A
5336870 Hughes et al. Aug 1994 A
5341428 Schatz Aug 1994 A
5347632 Filepp et al. Sep 1994 A
5383113 Kight et al. Jan 1995 A
5457680 Kamm et al. Oct 1995 A
5461217 Claus Oct 1995 A
5515439 Bantz et al. May 1996 A
5530438 Bickman et al. Jun 1996 A
5544225 Kennedy, III et al. Aug 1996 A
5561282 Price et al. Oct 1996 A
5719918 Serbetciouglu et al. Feb 1998 A
5751791 Chen et al. May 1998 A
5878141 Daly et al. Mar 1999 A
5887020 Smith et al. Mar 1999 A
Foreign Referenced Citations (26)
Number Date Country
26 321 06 Jan 1978 DE
27 09 461 Sep 1978 DE
3 212 554 Oct 1983 DE
3 423 090 Jan 1985 DE
3 405 448 Nov 1987 DE
01 814 38 May 1986 EP
00 854 82 Oct 1987 EP
00 143 13 Aug 1989 EP
0421808 May 1990 EP
0 421 808 Oct 1990 EP
0 662 665 Jul 1995 EP
2 309 915 Nov 1976 FR
1 324 616 Jul 1973 GB
1 523 691 Sep 1978 GB
2 128 447 Apr 1984 GB
8228609 Oct 1984 GB
5 415 606 Feb 1979 JP
5 741 723 Sep 1982 JP
63 136 758 Aug 1988 JP
8600015 Aug 1986 WO
8800371 Jan 1988 WO
9006517 May 1991 WO
WO 9428498 Jun 1994 WO
9428498 Dec 1994 WO
WO 9632700 Mar 1996 WO
9632700 Oct 1996 WO
Non-Patent Literature Citations (53)
Entry
The Wall Street Journal, Telecommunications (A Special Report): A wireless World_Squeeze play: With Usable Frequencies Scares, Companies Try to Ease the Crunch, Feb. 11, 1994; Don Clark; http://proquest.umi.com/pqdweb?TS=...3&SID=2&ldx=1&Deli=1&RQT=309.*
“Scenarios for the Future of the ACH,” vol. LXXI, No. 4, pp. 29-50, 4/86 Economic Review, Federal Reserve Bank of Atlanta.
“Desiderata for a Viable ACH,” vol. LXXI, No. 3, pp. 34-43, 3/86, Economic , Review, Federal Reserve Bank of Atlanta.
Discovering Direct Access, 1987, Citibank, N.A.
“Electronic Banking Heads Toward Cashless Society,” New Mexico Business Journal, 1994, vol. 9, No. 6, p. 19.
“NBD Automatic Electronic Highway for Network of Shared ATMs,” American Banker, Apr. 11, 1984, p. 8.
“New Jersey ATM Network Will Offer Home Banking Service Through Video,” American Banker, Jul. 14, 1982, p. 8.
“Home Banking: MCI Communications Venture to be Delayed Until Next Year,” American Banker, Jun. 28, 1984, pp. 2, 18 (Abstract).
“FOL Automatic Download Using P86 Integrator”, Citibank, N.A., 87/88.
PCT International Search Report—PCT/US96/17902.
“Managerial Leadership: A Key to Electronic Payment Success,” vol. LXXI, No. 4, pp. 22-28, 4/86, Economic Review, Federal Reserve Bank of Atlanta.
“Electronic Payments at the Crossroads,” vol. LXXI, No. 3, pp. 20-33, 3/86, Economic Review, Federal Reserve Bank of Atlanta.
“Electronic Payment Basics/ACH Returns,” vol. LXXI, No. 3, pp. 9-18, 3/86, Economic Review, Federal Reserve Bank of Atlanta.
“Corporate Trade Payments: Hard Lessons in Product Design,” vol. LXXI, No. 4, pp. 9-21, 4/86, Economic Review, Federal Reserve Bank of Atlanta.
“Dr. Frankenstein and the ACH,” vol. LXXI, No. 4, pp. 4-8, 4/86, Economic Review, Federal Reserve Bank of Atlanta.
“Homebase User Manual,” 1984, Citibank, N.A.
“The ACH: An Elusive Dream,” vol. LXXI, No. 3, pp. 4-8, 3/86, Economic Review, Federal Reserve Bank of Atlanta.
“The Delicate Balance of ATM Industry Standards,” The EFT Sourcebook, pp. 35-50, Table 1-4, 1988.
“Compuserve Home Banking System Offereed in Maschusetts, Ohio,” American Banker, Sep. 22, 1982, p. 9.
“8 Banks and Thrifts in 3 States Launch Video Banking Service,” American Banker, Jun. 9, 1987, pp. 2, 25.
“Data Networks,” Bertsekas et al., 1987, p. 64.
“Electronic Networks Springing Up All Over: Systems Linking, Automated Teller Machines, Point-of-Sale Devices Are Established or Contemplated in Several Areas of the Country,” American Banker, Mar. 19, 1982, p. 2.
“Airline Credit Union Ready for Takeoff with Electronic and Telephone Banking,” American Banker, May 15, 1985, pp. 24, 91 (Abstract).
“Over 100 Shared Automatic Teller Machine (ATM) Networks are Operating in the U.S.,” Economist, Mar. 27, 1982, pp. 83, 84 (Abstract).
“Home Banking: MCI Communications Venture to be Delayed Until Next Year,” American Banker, Jun. 28, 1984, pp. 2, 18 (Abstract).
“Low-Cost Computer Terminal Designed for Home Banking,” American Banker, Apr. 4, 1984, pp. 8, 17.
“Viewtron Entering Pittsburgh in Deal With Dollar Bank,” American Banker, Apr. 4, 1984, pp. 8, 17.
“Case Study: The Cirrus Banking Network,” Communications of the ATM, Aug. 1995, vol. 28, No. 8, pp. 798-807.
“Is Home Banking for Real?” Datamation, Sep. 15, 1986, vol. 32, p. 128.
“Home Banking System is Micro Friendly,” American Banker, Jul. 13, 1983, p.1.
“Computer Assisted Prior Art Searching,” Journal of the Patent Office Society, Becker, Oct. 1983, vol. 65, No. 10, pp. 536-585.
“ITS Develops Shazam Bill Payer for Consumer and Merchant Convenience,” ITS Current, Mar. 1988, pp. 3-5.
Megatel Computer Corporation, “V-40-Based Single-Board Computer Technical Manual,” Aug. 1, 1989.
B.A. Pargh Company, Inc. Catalog, DEX-A-PHONE -Tray., 1985-86; p. 345.
B.A. Pargh Company, Inc. Catalog, Dictograph -Dial-It-Portable Dialer, 1985-86; p. 345.
“Class Feature: Calling Number Delivery,” Bellcore Technical Reference TR-SY000031, Issue 2, Jun. 1988.
“Displayphone: Telephone and Terminal Combine in a Compact Desk-Top Unit,” Adkins et al., Bell-Northern Research, Ltd., 1982, pp. 2-7.
“Intelligent Telephone,” IBM Technical Disclosure Bulletin, vol. 23, No. 9, Feb. 1981.
“New Generation Microprocessor for Telecommunication Application,” Proceeding of the IEEE International Conference on Communications, Subhash, Bal, 1980.
Plessey Publication, “Plessey IBIS Videotex System” (1982).
Plessey Publication, “Plessey Microphone” (1987).
“Plessey Vutel,” Plessey Publication No. 7871/6 6/82 5M, 1983.
“The Programmable Gate Array Data Book,” Xilinx, 1988, pp.6-38 to 6-40.
“Programmable Gate Arrays and Self-Diagnosing Hardware,” Xilinx, 1989, pp. 6-54 to 6-56.
“QWERTYphone--A Low Cost Integrated Microprocessor,” Data Terminal, G.M. Durkin, British Telecommunications Engineering, vol. 5, Jan. 1987.
“Reset Preventing System of Microprocessor,” Japanese Publication No. vol. 112(P-124) (990), Jun. 23, 1982.
“SPCS Customer Premises Equipment Data Interface,” Bellcore Technical Reference TR-SYS00030, Issue 1, Nov. 1988, Subhash, Bal, 1980.
“Special Section: The Telephone Becomes an Information Terminal,” Computopia, May 1987, p. 41.
“This Thing Has to Change People's Habits,” Forbes, Jun. 26, 1989.
“Understanding Telephone Electronics,” Howard W. Swams & Company, Fike et al., 1980, pp. 119-150.
“XC3000 Logic Cell Array Family,” Xilinx, no date, pp. 2-1 to 2-20 and 6-1 to 6-40.
“A New Generation of Information Terminals,” CERMETEK, Apr. 23, 1987.
International Conference on Communications, Jun. 8-12, 1980, pp. 11.5.1 -11.5.4.