Systems and methods for secure wireless transactions
First Claim
Patent Images
1. A method of conducting a wireless transaction, comprising:
- initiating a wireless transaction using a short range wireless communication system of a portable electronic device;
obtaining security information via at least one secondary system of the portable electronic device; and
utilizing the security information obtained via the at least one secondary system to authenticate the portable electronic device for the wireless transaction.
1 Assignment
0 Petitions
Accused Products
Abstract
There is provided systems and methods for to conducting wireless transactions using portable electronic devices. Specifically, for example, a method of conducting a wireless transaction is provided that includes initiating a wireless transaction using a short range wireless communication system of a portable electronic device. The method also includes obtaining security information via at least one secondary system of the portable electronic device and utilizing the security information obtained via the at least one secondary system to authenticate the portable electronic device for the wireless transaction.
321 Citations
61 Claims
-
1. A method of conducting a wireless transaction, comprising:
-
initiating a wireless transaction using a short range wireless communication system of a portable electronic device; obtaining security information via at least one secondary system of the portable electronic device; and utilizing the security information obtained via the at least one secondary system to authenticate the portable electronic device for the wireless transaction. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A portable electronic device, comprising:
-
a processor; a memory operably coupled to the processor; a wireless communication device operably coupled to the processor and configured to communicate with other wireless communication devices to conduct transactions; and at least one device in addition to the wireless communication device configured to obtain security data from a source external to the device and provide the security data to the wireless communication system for use by the wireless communication system during wireless transactions. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A system for conducting secure transactions comprising:
-
a server; and a transaction terminal communicatively coupled to the server, wherein the transaction terminal is configured to communicate with the server to authenticate a portable electronic device for completion of a transaction. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35)
-
-
36. A method of wireless file transfer comprising:
-
generating a code; displaying a code on a display; waiting to receive a request for file transfer, wherein the file transfer request comprises a communication based on the code; and opening a communication channel to complete the file transfer. - View Dependent Claims (37, 38, 39, 40, 41, 42, 43)
-
-
44. A method of authenticating comprising:
-
initiating short range wireless communications between a portable electronic device and a transaction terminal; determining a location of the portable electronic device; providing the location of the portable electronic device to the transaction terminal; and comparing the location of the device with a location of a transaction terminal, wherein if the location of the device corresponds with the location of the terminal, the device is authenticated. - View Dependent Claims (45, 46, 47, 48, 49)
-
-
50. A method for authentication comprising:
-
requesting a user of a portable electronic device to provide authentication information; sensing movement of a portable electronic device; and comparing the sensed movement with a stored movement to determine if the sensed movement correlates with the stored movement. - View Dependent Claims (51)
-
-
52. A method of setting a mode of authentication comprising:
-
selecting a gestural signature button from a setting menu; detecting movement of a portable electronic device; and storing the detected movement. - View Dependent Claims (53, 54, 55)
-
-
56. A method for fraud detection comprising:
-
receiving security information from a device during a transaction with the device; storing the security information; and comparing the security information with previously stored security information to determine if incongruities in transaction patterns exist. - View Dependent Claims (57, 58, 59, 60, 61)
-
Specification