System and method for managing electronic data transfer applications
First Claim
1. A method for managing one or more data transfer applications on a mobile electronic device, the method comprising:
- disabling all of the one or more data transfer applications on the electronic device;
identifying one or more of the data transfer applications which have been registered for use on the electronic device;
displaying an identifier for one or more of the registered data transfer application on the electronic device;
receiving, from a user of the electronic device, a selection for one of the data transfer applications;
enabling the selected data transfer application for use by the user when the user satisfies an authentication mechanism associated with the selected data transfer application; and
disabling the selected data transfer application.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method for managing one or more applications deployed on a mobile electronic device, such as a cellular phone, are disclosed. The system and method enable the user of a mobile electronic device to select one of a plurality of applications deployed on the mobile electronic device for use in a transaction and to authenticate himself or herself prior to initiating the transaction. The transaction may occur via a wireless interface and/or a contact-based interface. In addition, the system and method allow the user to manage applications deployed on a mobile electronic device, including adding new applications, designating nicknames for the applications and setting security codes for each application.
-
Citations
60 Claims
-
1. A method for managing one or more data transfer applications on a mobile electronic device, the method comprising:
-
disabling all of the one or more data transfer applications on the electronic device;
identifying one or more of the data transfer applications which have been registered for use on the electronic device;
displaying an identifier for one or more of the registered data transfer application on the electronic device;
receiving, from a user of the electronic device, a selection for one of the data transfer applications;
enabling the selected data transfer application for use by the user when the user satisfies an authentication mechanism associated with the selected data transfer application; and
disabling the selected data transfer application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
-
26. A method for conducting a data transfer transaction, the method comprising:
-
receive a selection for a data transfer application from one or more data transfer applications on a mobile electronic device;
enabling the selected data transfer application when the user satisfies an authentication mechanism associated with the selected data transfer application;
processing a transaction using the selected data transfer application, wherein the transaction does not require an additional user authentication; and
disabling the selected data transfer application. - View Dependent Claims (27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40)
-
-
41. A method of deploying an application on a mobile electronic device, the method comprising:
-
uploading the application to the mobile electronic device;
receiving, from a user of the mobile electronic device, first authentication data;
receiving, from the user, an identifier for the application; and
storing the first authentication data and the identifier on the mobile electronic device, wherein the application may be selected by providing the identifier to the mobile electronic device and further wherein the application will be enabled for use when the user enters second authentication data which is substantially similar to the first authentication data. - View Dependent Claims (42)
-
-
43. A method of registering an application on a mobile electronic device, the method comprising:
-
uploading the application to the mobile electronic device;
uploading first authentication data to the mobile electronic device, wherein the authentication data corresponds to the application;
generating a flag for the application, wherein the flag is set to a value designating an unregistered state;
receiving, from a user of the mobile electronic device, second authentication data; and
if the first authentication data is substantially similar to the second authentication data, setting the flag to a value designating a registered state.
-
-
44. A mobile device for managing a plurality of data transfer applications, the device comprising:
-
a processor;
a display operably connected to the processor;
at least one input device operably connected to the processor; and
a computer-readable storage medium operably connected to the processor, wherein the computer-readable storage medium contains one or more programming instructions for performing a method of managing the one or more data transfer applications, the method comprising;
disabling all of the data transfer applications on the device;
displaying an identifier for at least one of the data transfer applications on the electronic device;
receiving, from a user, a selection of one of the data transfer applications; and
enabling the selected data transfer application when the user satisfies an authentication mechanism associated with the selected data transfer application. - View Dependent Claims (45, 46, 47, 48, 49, 50, 51)
-
-
52. A system for conducting an exchange of data, the system comprising:
-
a processor;
a display operably connected to the processor;
at least one input device operably connected to the processor;
a communications interface operably connected to the processor; and
a computer-readable storage medium operably connected to the processor, wherein the computer-readable storage medium contains one or more programming instructions for performing a method of conducting the exchange of data, the method comprising;
selecting a data transfer application from one or more data transfer applications stored on the computer-readable storage medium;
enabling the selected data transfer application when a user satisfies an authenticated mechanism associated with the selected data transfer application;
processing a data transfer transaction using the selected data transfer application, wherein the data transfer transaction does not require additional user authentication; and
disabling the selected data transfer application. - View Dependent Claims (53, 54, 55, 56, 57, 58, 59, 60)
-
Specification