×

Method and System for Secure Mobile Payment

  • US 20130262309A1
  • Filed: 09/02/2012
  • Published: 10/03/2013
  • Est. Priority Date: 04/02/2012
  • Status: Abandoned Application
First Claim
Patent Images

1. A method for conducting secure payment using mobile communication devices, comprising:

  • creating a first user account for a first user in a central processing server,wherein the first user account creation comprises pairing a first mobile communication device with the first user account,wherein the first mobile communication device being equipped with an optical scanner or camera and configured to communicate with the central processing server, andwherein the first user account creation further comprises creating a first virtual repository of monetary units associating with the first user account;

    creating a second user account for a second user in a central processing server,wherein the second user account creation comprises creating a second virtual repository of monetary units associating with the second user account;

    generating, by the central processing server or a second device, a barcode, wherein the second device being configured to communicate with the central processing server;

    presenting the barcode to the first user;

    optically capturing the barcode by the first mobile communication device;

    processing, by the first mobile communication device, the barcode, decoding information contained in the barcode, and displaying the decoded information to the first user for user verification;

    transmitting, by the first mobile communication device, the decoded information to the central processing server upon user confirmation;

    transferring, by the central processing server, monetary units between the first virtual repository of monetary units and the second virtual repository of monetary units; and

    sending, by the central processing server, to the first user and the second user a notification of result of the transfer;

    wherein the barcode is generated for the second user and comprises encoded data of identity of the second user and security data.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×