PEER TO PEER TRANSFER BETWEEN NEAR FIELD COMMUNICATION SMART STICKERS
First Claim
1. A method for transferring data between two mobile devices using near field communication, the method comprising:
- maintaining a first application and transaction data in a first memory included in a first secure element, the first secure element removably attached and wirelessly coupled to a first mobile device, the first mobile device configured to use a first communication channel;
executing the first application using a first processor included in the first secure element, the first processor configured to use near field communication, wherein the first application is executed in response to a near field communication inductive interaction with a second secure element removably attached and wirelessly coupled to a second mobile device, wherein execution of the first application facilitates the transfer of the transaction data to the second secure element, the second secure element including a second memory and a second processor configured to use near field communication, the second secure element embedded in a second mobile device;
transmitting the transaction data to the second secure element by using a second communication channel different from the first communication channel.
0 Assignments
0 Petitions
Accused Products
Abstract
A method for configuring a mobile communication device to perform transactions using a second communication channel that is different from a first communication channel through which the mobile communication device sends voice data. The method includes attaching a secure element to the mobile communication device. The secure element includes a memory storing an application, a processor configured to execute the application stored in the memory; and a wireless transceiver configured to send transaction data associated with the executed application through the second communication channel to a terminal that is remote from the mobile communication device.
16 Citations
20 Claims
-
1. A method for transferring data between two mobile devices using near field communication, the method comprising:
-
maintaining a first application and transaction data in a first memory included in a first secure element, the first secure element removably attached and wirelessly coupled to a first mobile device, the first mobile device configured to use a first communication channel; executing the first application using a first processor included in the first secure element, the first processor configured to use near field communication, wherein the first application is executed in response to a near field communication inductive interaction with a second secure element removably attached and wirelessly coupled to a second mobile device, wherein execution of the first application facilitates the transfer of the transaction data to the second secure element, the second secure element including a second memory and a second processor configured to use near field communication, the second secure element embedded in a second mobile device; transmitting the transaction data to the second secure element by using a second communication channel different from the first communication channel. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system comprising:
-
a first memory included in a first secure element, the first memory configured to maintain a first application and transaction data, wherein the first secure element is removably attached and wirelessly coupled to a first mobile device and is configured to use a first communication channel; a first processor configured to execute the first application included in the first secure element, the first processor configured to use near field communication, wherein the first application is executed in response to a near field communication inductive interaction with a second secure element removably attached and wirelessly coupled to a second mobile device, wherein execution of the first application facilitates the transfer of the transaction data to the second secure element, the second secure element including a second memory and a second processor configured to use near field communication, the second secure element embedded in a second mobile device; a transmitter configured to sent the transaction data to the second secure element by using a second communication channel different from the first communication channel. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification