Wireless wallet
First Claim
1. A method, comprising:
- initializing, at a secure transaction server (STS), a mobile payment software with a software authentication parameter, as an authentic mobile payment software;
providing an STS correlation between a personal identification entry (PIE) and the authentic mobile payment software;
installing, in a mobile phone, the authentic mobile payment software; and
inputting, by a user, the PIE to the installed authentic mobile payment software to generate according to the PIE and the software authentication parameter a transformed secure authenticable mobile phone cashless monetary transaction over a mobile phone network, as a mobile phone wireless wallet of the user of the mobile phone.
2 Assignments
0 Petitions
Accused Products
Abstract
A mobile phone system and method of initializing, at a secure transaction server (STS), a mobile payment software with a software authentication parameter, as an authentic mobile payment software; providing an STS correlation between a personal identification entry (PIE) and the authentic mobile payment software; installing, in a mobile phone, the authentic mobile payment software; and inputting, by a user, the PIE to the installed authentic mobile payment software to generate according to the PIE and the software authentication parameter a transformed secure authenticable mobile phone cashless monetary transaction over the mobile phone network, as a mobile phone wireless wallet of the user of the mobile phone. The mobile phone authenticable cashless monetary transaction is performed according to an agreement view(s) protocol.
982 Citations
31 Claims
-
1. A method, comprising:
-
initializing, at a secure transaction server (STS), a mobile payment software with a software authentication parameter, as an authentic mobile payment software;
providing an STS correlation between a personal identification entry (PIE) and the authentic mobile payment software;
installing, in a mobile phone, the authentic mobile payment software; and
inputting, by a user, the PIE to the installed authentic mobile payment software to generate according to the PIE and the software authentication parameter a transformed secure authenticable mobile phone cashless monetary transaction over a mobile phone network, as a mobile phone wireless wallet of the user of the mobile phone. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. A mobile phone, comprising:
-
a computer readable medium storing a mobile payment software initialized at a secured transaction server (STS) with a software authentication parameter and correlated with a personal identification entry (PIE), as an authentic mobile payment software; and
a programmed computer processor executing the authentic mobile payment software controlling the mobile phone according to a process comprising;
prompting a user to input the PIE, and generating according to the PIE and the software authentication parameter a transformed secure authenticable mobile phone cashless monetary transaction over a mobile phone network, as a mobile phone wireless wallet of the user of the mobile phone.
-
-
31. A computer system, comprising:
-
a computer server comprising a programmed computer controlling the server according to a process comprising;
initializing a mobile payment software with a software authentication parameter, as an authentic mobile payment software, generating a secured personal identification entry (PIE);
providing a secured correlation between the PIE and the authentic mobile payment software, and providing an online purchasing interface; and
a mobile phone in mobile phone network communication with the server and comprising;
a computer readable medium storing the authentic mobile payment software, and a computer processor executing the authentic mobile payment software controlling the mobile phone according to a process comprising;
interfacing with the online purchasing interface to generate a virtual shopping cart, prompting a user to input the PIE, generating according to the PIE and the software authentication parameter a transformed secure authenticable mobile phone cashless monetary transaction based upon the virtual shopping cart, and transmitting over the mobile phone network the transformed secure authenticable mobile phone cashless monetary transaction to the computer server to execute the transaction.
-
Specification