Electronic payment schemes in a mobile environment for short-range transactions
First Claim
1. A method enabling a user in a mobile environment to conduct transactions via a self-service merchant terminal, comprising:
- a) maintaining a security key in a mobile phone device;
b) imprinting at least an association of the security key and a mobile phone identification into at least one associated portable pilot;
c) transferring at least the association of the security key and the mobile phone identification from the pilot to a self-service merchant terminal through an initial short-range radio link; and
d) establishing a secure short-range connection between the self-service terminal and the mobile phone based on the transferred security key and the mobile phone identification information, wherein the initial short-range radio link has a significantly smaller radio coverage than the secure short-range connection.
2 Assignments
0 Petitions
Accused Products
Abstract
A short-range transaction system enables a user to conduct transactions with a self-service terminal in a user-friendly environment without using currency. The user carries a portable smart card, which interacts with a mobile phone. After authentication via an RFID connection, the device MAC address and a security key (K) are imprinted in the card. In operation, the user waves the smart card past the self-service terminal and activates an RFID connection. The terminal sends the card a random number. The card returns the MAC address and a result (RES) computed using the hash value and the security key. The terminal using the MAC address and security key establishes a secure connection with the device. The terminal downloads the user'"'"'s transaction interface from the device and displays the user interface at the self-service terminal. The user completes a transaction at the terminal via the user interface.
-
Citations
48 Claims
-
1. A method enabling a user in a mobile environment to conduct transactions via a self-service merchant terminal, comprising:
-
a) maintaining a security key in a mobile phone device;
b) imprinting at least an association of the security key and a mobile phone identification into at least one associated portable pilot;
c) transferring at least the association of the security key and the mobile phone identification from the pilot to a self-service merchant terminal through an initial short-range radio link; and
d) establishing a secure short-range connection between the self-service terminal and the mobile phone based on the transferred security key and the mobile phone identification information, wherein the initial short-range radio link has a significantly smaller radio coverage than the secure short-range connection. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A system for enabling a user in a mobile environment to conduct transactions via a self-service terminal, comprising:
-
a) a mobile device including a short-range communication transceiver and an RFID transceiver;
b) a portable pilot device associated with the mobile device and including a semi-passive RFID transponder;
c) a self-service terminal including a RFID transceiver and a short-range transceiver;
d) means for storing identification information and at least security information in the mobile device;
e) means for imprinting said stored identification and at least an association of the security information of the device over an RFID connection into the associated portable pilot;
f) means for transferring by the pilot said imprinted identification and security information to the self-service terminal over an RFID connection; and
g) means for establishing a secure short-range connection between the self-service terminal and the device based on said transferred identification and security information of the device, wherein the RFID connection has significantly smaller radio coverage than the secure short-range connection. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26)
-
-
27. Apparatus enabling a user in a mobile environment to activate a self-service terminal to conduct transactions, comprising:
-
a) a semi-passive transponder for responding to RF signals transmitted by an associated mobile device;
b) a memory coupled to the transponder;
c) a processor coupled to the transponder and the memory; and
d) means responsive to the transponder for storing unique information related to a mobile device. - View Dependent Claims (28, 29, 30, 31, 32)
-
-
33. A medium, executable in a computer system, enabling a user in a mobile environment to activate a self-service terminal to conduct transactions, the medium comprising:
-
a) program code for storing at least a security key in a mobile phone device;
b) program code for imprinting at least an association of the security key and mobile phone device identification in a portable pilot associated with the mobile phone device;
c) program code for transferring at least the association of the security key and mobile phone device identification from the pilot to a self-service terminal through an initial short-range radio link; and
d) program code for establishing a secure short-range connection between the self-service terminal and the mobile phone device for conducting transactions based on the transferred security key and mobile phone device identification, wherein the initial short-range link has a significantly smaller radio coverage than the secure short-range connection. - View Dependent Claims (34, 35, 36)
-
-
37. A method of enabling a first pilot device to serve as a master pilot for at least one second pilot devices as slave devices capable of interacting with a terminal, comprising:
-
installing a reader and switching means in the first pilot device serving as a master device and further including a processor and storage means;
Imprinting and storing in the master pilot device a phone address and a security key of a mobile phone;
At least one second pilot device, each serving as a slave device to the master device and further including a processor and storage, each slave device capable of receiving and transmitting signals from/to the master device;
Imprinting the phone address, security key and policy restraints in a slave device after receiving an address identifying the slave device; and
using the slave device to interact with a terminal to purchase an item, after a secure connection is established between the terminal and the mobile phone. - View Dependent Claims (38, 39, 40, 41, 43, 44, 45, 46, 47, 48)
-
-
42. The method of 37 further comprising:
comparing the purchased items to prohibited items stored in the slave device.
Specification