Portable electronic authorization system and method
First Claim
1. An apparatus, comprising:
- a housing;
at least one memory, supported by the housing, that stores transaction information for at least one media;
a user authenticator, supported by the housing, that authenticates an identity of a user of the apparatus so as to enable release of an embedded identification code of the apparatus that is unique to the apparatus and that enables a device receiving the embedded identification code to authenticate the identity of the apparatus; and
at least one output, supported by the housing, that, after the user authenticator has authenticated the identity of the user, releases the embedded identification code of the apparatus from the housing.
4 Assignments
0 Petitions
Accused Products
Abstract
In one embodiment an apparatus includes a housing; a user authenticator, supported by the housing, that authenticates an identity of a user; at least one memory, supported by the housing, that stores transaction information for at least first and second media; and at least one output, supported by the housing, that releases at least a portion of the transaction information to a point-of-sale (POS) terminal after the user authenticator has authenticated the identity of the user. In another embodiment, a method involves steps of: storing transaction information for at least first and second media in a memory of a device; receiving as input a user'"'"'s selection of one of the at least first and second media; displaying a visual indication to the user regarding which of the at least first and second media has been selected; and transferring at least a portion of the transaction information from the device to a point-of-sale (POS) terminal.
416 Citations
29 Claims
-
1. An apparatus, comprising:
-
a housing;
at least one memory, supported by the housing, that stores transaction information for at least one media;
a user authenticator, supported by the housing, that authenticates an identity of a user of the apparatus so as to enable release of an embedded identification code of the apparatus that is unique to the apparatus and that enables a device receiving the embedded identification code to authenticate the identity of the apparatus; and
at least one output, supported by the housing, that, after the user authenticator has authenticated the identity of the user, releases the embedded identification code of the apparatus from the housing. - View Dependent Claims (2, 3, 4)
-
-
5. A method, comprising steps of:
-
storing transaction information for at least one media in a memory of a first device;
using the first device to authenticate an identity of a user; and
after authenticating the identity of the user with the first device, releasing an embedded identification code from the first device that is unique to the first device and that enables a second device receiving the embedded identification code to authenticate the identity of the first device. - View Dependent Claims (6, 7, 8)
-
-
9. An apparatus, comprising:
-
a housing;
a user authenticator, supported by the housing, that authenticates an identity of a user;
at least one memory, supported by the housing, that stores secure information identifying at least one account issued by at least one media and non-secure information concerning the device'"'"'s holder or issuer; and
at least one output, supported by the housing, that releases the secure information only after the user authenticator has authenticated the identity of the user, and that releases the non-secure information without requiring the user authenticator to have authenticated the identity of the user. - View Dependent Claims (10, 11, 12, 13)
-
-
14. A method, comprising steps of:
-
storing in at least one memory of a device secure information identifying at least one account issued by at least one media and non-secure information concerning the device'"'"'s holder or issuer;
using the device to authenticate an identity of the user of the device;
releasing the secure information only after the identity of the user has been authenticated; and
releasing the non-secure information without requiring the identity of the user to be authenticated. - View Dependent Claims (15, 16)
-
-
17. A system, comprising:
-
a first device; and
a second device including a user-authenticator for authenticating an identity of a user and having the first device releasably attached thereto such that, when the first device is attached to the second device and after the user-authenticator has authenticated the identity of the user, the second device can cause the first device to embody a machine-readable code after the first device is detached from the second device, the second device including at least one controller configured so as to be capable, during only a predetermined, finite window of time, of causing the first device to embody the machine-readable code, the beginning and ending points of the finite window of time being determined without regard to when the first device is attached to the second device. - View Dependent Claims (18, 19, 20, 21, 22, 23)
-
-
24. A method, comprising a step of:
configuring a first device such that the first device is capable, during only a predetermined, finite window of time, of causing a second device, which is separable from the first device, to generate a machine-readable code. - View Dependent Claims (25, 26, 27, 28, 29)
Specification