Portable e-wallet and universal card
First Claim
Patent Images
1. A method of configuring a universal card to emulate a key card, the method comprising:
- receiving, by a mobile computing device, a request to configure a universal card as a key card;
establishing a short range communication link between the mobile computing device and the universal card;
communicating, by the mobile computing device, an identifier of the mobile computing device to the universal card, wherein the universal card is configured to determine whether the mobile computing device is authorized to request configuration of the universal card as a key card based on the identifier of the mobile computing device;
prompting, by the mobile computing device, a user of the mobile computing device for authentication information;
determining, by the mobile computing device, whether the authentication information is valid; and
sending, by the mobile computing device, the request to configure the universal card as a key card from the mobile computing device to the universal card in response to determining that the authentication information is valid, wherein the universal card comprises a secure element having key card information stored therein and one or more dynamic data communication mechanisms, and wherein the universal card passes the key card information from at least one of the one or more dynamic data communication mechanisms to a key card reader in response to determining that the mobile computing device is authorized to request configuration of the universal card as a key card and receiving the request to configure the universal card as a key card.
2 Assignments
0 Petitions
Accused Products
Abstract
Universal cards are used in place of all the other traditional cards which a person may want to carry. The universal card can include a short range communications transceiver to communicate with a mobile device. The mobile device can include a user interface and an e-wallet application so that the user can interface with the e-wallet application for programming the universal card via the short range communication link. Once programmed, the universal card emulates a function of a traditional card.
106 Citations
21 Claims
-
1. A method of configuring a universal card to emulate a key card, the method comprising:
-
receiving, by a mobile computing device, a request to configure a universal card as a key card; establishing a short range communication link between the mobile computing device and the universal card; communicating, by the mobile computing device, an identifier of the mobile computing device to the universal card, wherein the universal card is configured to determine whether the mobile computing device is authorized to request configuration of the universal card as a key card based on the identifier of the mobile computing device; prompting, by the mobile computing device, a user of the mobile computing device for authentication information; determining, by the mobile computing device, whether the authentication information is valid; and sending, by the mobile computing device, the request to configure the universal card as a key card from the mobile computing device to the universal card in response to determining that the authentication information is valid, wherein the universal card comprises a secure element having key card information stored therein and one or more dynamic data communication mechanisms, and wherein the universal card passes the key card information from at least one of the one or more dynamic data communication mechanisms to a key card reader in response to determining that the mobile computing device is authorized to request configuration of the universal card as a key card and receiving the request to configure the universal card as a key card. - View Dependent Claims (2, 3, 4, 5, 6, 7, 21)
-
-
8. A non-transitory computer readable medium having instructions embodied thereon for configuring a universal card to emulate a key card, the instructions, when executed by a mobile computing device, causing the mobile computing device to:
-
receive, by the mobile computing device, a request to configure a universal card as a key card; establish a short range communication link between the mobile computing device and the universal card; communicate an identifier of the mobile computing device to the universal card, wherein the universal card is configured to determine whether the mobile computing device is authorized to request configuration of the universal card as a key card based on the identifier of the mobile computing device; prompt a user of the mobile computing device for authentication information; determine whether the authentication information is valid; and send the request to configure the universal card as a key card from the mobile computing device to the universal card in response to determining that the authentication information is valid, wherein the universal card comprises a secure element having key card information stored therein and one or more dynamic data communication mechanisms, and wherein the universal card is configured to configure at least one of the one or more dynamic data communication mechanisms, wherein the at least one of the one or more dynamic data communication mechanisms passes the key card information to a key card reader in response to receiving the request to configure the universal card as a key card. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A universal card comprising:
-
one or more dynamic data communication mechanisms; and a secure element configured to store key card information; wherein the universal card is configured to; establish a short range communication link with a mobile computing device; receive, from the mobile computing device, an identifier of the mobile computing device; receive authentication information entered into the mobile computing device by a user of the mobile computing device; determine whether the mobile computing device is authorized to request configuration of the universal card a key card based on the identifier of the mobile computing device and the authentication information; receive a request to configure the universal card as a key card from the mobile computing device; and configure at least one of the one or more dynamic data communication mechanisms, wherein the at least one of the one or more dynamic data communication mechanisms passes the key card information to a key card reader in response to receiving the request to configure the universal card as a key card and determining that the mobile computing device is authorized to request configuration of the universal card as a key card. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification