PORTABLE E-WALLET AND UNIVERSAL CARD
First Claim
Patent Images
1. A method of configuring a universal card to emulate a key card, the method comprising:
- receiving, by a mobile computing device, a request to configure a universal card as a key card;
establishing a short range communication link between the mobile computing device and the universal card;
communicating an identifier of the mobile computing device to the universal card, wherein the universal card is configured to determine whether the mobile computing device is authorized to request configuration of the universal card a key card based on the identifier;
prompting, by the mobile computing device, a user of the mobile computing device for authentication information;
determining whether the authentication information is valid; and
in response to determining that the authentication information is valid, sending the request to configure the universal card as a key card from the mobile computing device to the universal card, wherein the universal card comprises a secure element having key card information stored therein and one or more dynamic data communication mechanisms, and wherein the universal card is configured to configure at least one of the one or more dynamic data communication mechanisms to pass the key card information to a key card reader in response to receiving the request to configure the universal card as a key card.
2 Assignments
0 Petitions
Accused Products
Abstract
Universal cards are used in place of all the other traditional cards which a person may want to carry. The universal card can include a short range communications transceiver to communicate with a mobile device. The mobile device can include a user interface and an e-wallet application so that the user can interface with the e-wallet application for programming the universal card via the short range communication link. Once programmed, the universal card emulates a function of a traditional card.
-
Citations
31 Claims
-
1. A method of configuring a universal card to emulate a key card, the method comprising:
-
receiving, by a mobile computing device, a request to configure a universal card as a key card; establishing a short range communication link between the mobile computing device and the universal card; communicating an identifier of the mobile computing device to the universal card, wherein the universal card is configured to determine whether the mobile computing device is authorized to request configuration of the universal card a key card based on the identifier; prompting, by the mobile computing device, a user of the mobile computing device for authentication information; determining whether the authentication information is valid; and in response to determining that the authentication information is valid, sending the request to configure the universal card as a key card from the mobile computing device to the universal card, wherein the universal card comprises a secure element having key card information stored therein and one or more dynamic data communication mechanisms, and wherein the universal card is configured to configure at least one of the one or more dynamic data communication mechanisms to pass the key card information to a key card reader in response to receiving the request to configure the universal card as a key card. - View Dependent Claims (2, 3, 4, 5, 6, 7, 21)
-
-
8. A computer readable medium having instructions embodied thereon for configuring a universal card to emulate a key card, the instructions comprising:
-
instructions to receive, by a mobile computing device, a request to configure a universal card as a key card; instructions to establish a short range communication link between the mobile computing device and the universal card; instructions to communicate an identifier of the mobile computing device to the universal card, wherein the universal card is configured to determine whether the mobile computing device is authorized to request configuration of the universal card a key card based on the identifier; instructions to prompt, by the mobile computing device, a user of the mobile computing device for authentication information; instructions to determine whether the authentication information is valid; and instructions to send, in response to determining that the authentication information is valid, the request to configure the universal card as a key card from the mobile computing device to the universal card, wherein the universal card comprises a secure element having key card information stored therein and one or more dynamic data communication mechanisms, and wherein the universal card is configured to configure at least one of the one or more dynamic data communication mechanisms to pass the key card information to a key card reader in response to receiving the request to configure the universal card as a key card. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A universal card comprising:
-
one or more dynamic data communication mechanisms; and a secure element configured to store key card information; wherein the universal card is configured to; establish a short range communication link with a mobile computing device; receive, from the mobile computing device, an identifier of the mobile computing device; receive authentication information entered into the mobile computing device by a user of the mobile computing device; determine whether the mobile computing device is authorized to request configuration of the universal card a key card based on the identifier and the authentication information; receive a request to configure the universal card as a key card from the mobile computing device; and configure at least one of the one or more dynamic data communication mechanisms to pass the key card information to a key card reader in response to receiving the request to configure the universal card as a key card. - View Dependent Claims (16, 17, 18, 19, 20)
-
-
22. A method of sharing medical information, the method comprising:
-
receiving, by a card comprising a secure element, medical information about a user of a mobile computing device; storing the medical information in the secure element; receiving, by the card, authorization information defining access to the medical information in the secure element; establishing communication with a card reader; receiving, from the card reader, identification information; determining, by the card, whether the card reader is authorized to receive the medical information based on the identification information; and passing the medical information to the card reader in response to determining that the card reader is authorized to receive the medical information. - View Dependent Claims (23, 24, 25)
-
-
26. A method of sharing medical information, the method comprising:
-
receiving, by a card comprising a secure element, medical information about a user from a first computing device; storing the medical information in the secure element, the stored medical information being in an encrypted format; receiving, from a card reader, a first request to access the medical information; passing the medical information in the encrypted format to the card reader in response to receiving the first request to access the medical information; wherein the card reader is configured to decrypt the medical information in the encrypted format using a key. - View Dependent Claims (27, 28, 29, 30, 31)
-
Specification