Point-of-sale and automated teller machine transactions using trusted mobile access device
First Claim
1. A method for a mobile communication device to conduct a transaction with an unattended point-of-transaction device, comprising:
- establishing a secure wireless telecommunications link between the mobile communication device and an entity that manages the unattended point-of-transaction device;
transmitting, by the mobile communication device, confidential information over the link, the confidential information comprising information that establishes the authorization of the mobile communication device to interact with the unattended point-of-transaction device and information regarding an action the unattended point-of-transaction device is requested to perform in conducting the transaction, wherein the action the unattended point-of-transaction device is requested to perform and at least a portion of the information that establishes the authorization of the mobile communication device to interact with the unattended point-of-transaction device have been entered into a user interface on the mobile communication device;
in response to receiving the confidential information from mobile communication device, verifying, by the entity that manages the unattended point-of-sale transaction device, that the mobile communication device is authorized to interact with the unattended point-of-transaction device;
in response to the verifying, creating, by the entity that manages the unattended point-of-sale transaction device, a transaction file that specifies the action the unattended point-of-transaction device is to perform in conducting the transaction;
assigning, by the entity that manages the unattended point-of-sale transaction device, a transaction identifier that uniquely identifies the transaction to the transaction file;
sending, from the entity that manages the unattended point-of-sale transaction device, the transaction file to the unattended point-of-transaction device;
receiving, by the mobile communication device, the transaction identifier from the entity that manages the unattended point-of-sale transaction device;
verifying, by the mobile communication device, the unattended point-of-transaction device by looking up an identity of a proximate unattended point-of-transaction device and comparing the identity of the proximate unattended point-of-transaction device to an identity of the unattended point-of-transaction device;
transmitting, by the mobile communication device, the transaction identifier to the unattended point-of-transaction device via a near field communication (NFC) transmission;
comparing, by the unattended point-of-transaction device, the transaction identifier received from the mobile communication device to the transaction identifier made available in the transaction file; and
when the transaction identifier received from the mobile communication device matches the transaction identifier made available in the transaction file, performing, by the unattended point-of-sale transaction device, the action specified in the transaction file.
6 Assignments
0 Petitions
Accused Products
Abstract
A method for a mobile device to conduct a transaction with an unattended point-of-transaction device is disclosed. The method comprises transmitting to the unattended point-of-transaction device, via near field communication (NFC), information indicating that the transaction is being initiated; receiving from the unattended point-of-transaction device, via NFC, credentials indicating that the unattended point-of-transaction device is authorized to engage in the transaction; and transmitting to the unattended point-of-transaction device, via NFC, secure information indicating to the unattended point-of-transaction device that the mobile communication device is authorized to conduct the transaction. The secure information may be a PIN entered into the mobile device or a data record specifying an action to be performed by the unattended point-of-transaction device. The data record may be generated by the mobile device based on the entry into the mobile device of the PIN and information specifying the action to be performed by the unattended point-of-transaction device.
-
Citations
18 Claims
-
1. A method for a mobile communication device to conduct a transaction with an unattended point-of-transaction device, comprising:
-
establishing a secure wireless telecommunications link between the mobile communication device and an entity that manages the unattended point-of-transaction device; transmitting, by the mobile communication device, confidential information over the link, the confidential information comprising information that establishes the authorization of the mobile communication device to interact with the unattended point-of-transaction device and information regarding an action the unattended point-of-transaction device is requested to perform in conducting the transaction, wherein the action the unattended point-of-transaction device is requested to perform and at least a portion of the information that establishes the authorization of the mobile communication device to interact with the unattended point-of-transaction device have been entered into a user interface on the mobile communication device; in response to receiving the confidential information from mobile communication device, verifying, by the entity that manages the unattended point-of-sale transaction device, that the mobile communication device is authorized to interact with the unattended point-of-transaction device; in response to the verifying, creating, by the entity that manages the unattended point-of-sale transaction device, a transaction file that specifies the action the unattended point-of-transaction device is to perform in conducting the transaction; assigning, by the entity that manages the unattended point-of-sale transaction device, a transaction identifier that uniquely identifies the transaction to the transaction file; sending, from the entity that manages the unattended point-of-sale transaction device, the transaction file to the unattended point-of-transaction device; receiving, by the mobile communication device, the transaction identifier from the entity that manages the unattended point-of-sale transaction device; verifying, by the mobile communication device, the unattended point-of-transaction device by looking up an identity of a proximate unattended point-of-transaction device and comparing the identity of the proximate unattended point-of-transaction device to an identity of the unattended point-of-transaction device; transmitting, by the mobile communication device, the transaction identifier to the unattended point-of-transaction device via a near field communication (NFC) transmission; comparing, by the unattended point-of-transaction device, the transaction identifier received from the mobile communication device to the transaction identifier made available in the transaction file; and when the transaction identifier received from the mobile communication device matches the transaction identifier made available in the transaction file, performing, by the unattended point-of-sale transaction device, the action specified in the transaction file. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system for conducting a transaction with an unattended point-of-transaction device, comprising:
-
a telecommunications device comprising; a memory; a processor; and an application stored in the memory and executable by the processor to; establish a secure wireless telecommunications link between the telecommunications device and an entity that manages an unattended point-of-transaction device, transmit confidential information over the link, the confidential information comprising information that establishes the authorization of the telecommunications device to conduct the transaction with the unattended point-of-transaction device and information regarding an action the unattended point-of-transaction device is requested to perform in conducting the transaction, wherein the information regarding the action the unattended point-of-transaction device is requested to perform and at least a portion of the information that establishes the authorization of the telecommunications device to interact with the unattended point-of-transaction device have been entered into a user interface on the telecommunications device, receive from the entity that manages the unattended point-of-transaction device a transaction identifier that uniquely identifies the transaction, verify the unattended point-of-transaction device by looking up an identity of a proximate unattended point-of-transaction device and comparing the identity of the proximate unattended point-of-transaction device to an identity of the unattended point-of-transaction device, and transmit the transaction identifier to the unattended point-of-transaction device via a near field communication (NFC) transmission; a system of the entity that manages an unattended point-of-transaction device configured to; in response to receiving the confidential information from the telecommunications device, verify that the telecommunications device is authorized to interact with the unattended point-of-transaction device, in response to the verification, create a transaction file that specifies the action the unattended point-of-transaction device is to perform in conducting the transaction, assign the transaction identifier that uniquely identifies the transaction to the transaction file, and make the transaction file available to the unattended point-of-transaction device; and the unattended point-of-transaction device configured to; compare the transaction identifier received from the telecommunications device to the transaction identifier made available in the transaction file, and when the transaction identifier received from the telecommunications device matches the transaction identifier made available in the transaction file, perform the action specified in the transaction file. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
Specification