Security token for mobile near field communication transactions
First Claim
1. A method comprising:
- detecting, at a mobile device comprising a processor, a security token in communication with the mobile device, the security token comprising a transceiver and a token memory that stores a token logic;
obtaining, at the mobile device, transaction information associated with a transaction;
obtaining, at the mobile device, a restriction to be imposed on the transaction; and
transmitting, by the mobile device, the transaction information and the restriction to the security token for storage on the token logic, wherein the token logic, when executed by the security token, enables a point-of-sale terminal to access the transaction information and to complete the transaction if the restriction is not triggered during the transaction.
1 Assignment
0 Petitions
Accused Products
Abstract
Devices, systems, and methods are disclosed which relate to an NFC-enabled security token that is removably coupled to a mobile device. The security token may be provisioned with the information by the mobile device, then decoupled from the mobile device and used to authenticate the user or perform a transaction at a POS terminal equipped with an NFC reader. The security token includes logic for user-controlled restrictions on allowable purchases, such as payment limits, timeouts, vendor identifiers, allowed purchases, and location-based restrictions. The security token is further equipped with “self-destruct” security features, such as deactivating itself or erasing any sensitive information upon being unable to contact the mobile device for a specified duration, or being subject to an unauthorized or restricted transaction, until such time as it is re-coupled to the mobile device.
-
Citations
20 Claims
-
1. A method comprising:
-
detecting, at a mobile device comprising a processor, a security token in communication with the mobile device, the security token comprising a transceiver and a token memory that stores a token logic; obtaining, at the mobile device, transaction information associated with a transaction; obtaining, at the mobile device, a restriction to be imposed on the transaction; and transmitting, by the mobile device, the transaction information and the restriction to the security token for storage on the token logic, wherein the token logic, when executed by the security token, enables a point-of-sale terminal to access the transaction information and to complete the transaction if the restriction is not triggered during the transaction. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A non-transitory computer storage medium comprising computer-executable instructions stored thereon that, when executed by a processor, cause the processor to perform operations comprising:
-
detecting a security token in communication with a mobile device, the security token comprising a transceiver and a token memory that stores a token logic; obtaining transaction information associated with a transaction; obtaining a restriction to be imposed on the transaction; and transmitting the transaction information and the restriction to the security token for storage on the token logic, wherein the token logic, when executed by the security token, enables a point-of-sale terminal to access the transaction information and to complete the transaction if the restriction is not triggered during the transaction. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14)
-
-
15. A device comprising:
-
a processor; and a memory that stores computer-executable instructions that, when executed by the processor, cause the processor to perform operations comprising; detecting a security token in communication with a mobile device, the security token comprising a transceiver and a token memory that stores a token logic; obtaining transaction information associated with a transaction; obtaining a restriction to be imposed on the transaction; and transmitting the transaction information and the restriction to the security token for storage on the token logic, wherein the token logic, when executed by the security token, enables a point-of-sale terminal to access the transaction information and to complete the transaction if the restriction is not triggered during the transaction. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification