Patent application number | Description | Published |
20140138435 | PAYMENT OR OTHER TRANSACTION THROUGH MOBILE DEVICE USING NFC TO ACCESS A CONTACTLESS TRANSACTION CARD - A mobile device utilizes an embedded near field communication (NFC) capability to interact with a contactless transaction card to automatically obtain information from the card, e.g. reducing or eliminating the burden of manual user entry of the account information or the like into the mobile device. The mobile device, for a financial account transaction example, may read the information from the card at the time of a transaction, e.g. to facilitate an on-line purchase, an in-store purchase, ATM transaction or the like. The mobile device may store the information from one or more contactless transaction cards, for use in future transactions of various types. The mobile device and/or a server in communication with the mobile device may track various user activities on the mobile device that also utilize information obtained from the contactless transaction card. | 05-22-2014 |
20140324638 | NEAR-FIELD COMMUNICATION (NFC)-BASED RETAIL EXPERIENCE USING A RETAIL KIOSK OR MOBILE DEVICE - A customer is provided with a personalized retail experience using a retail kiosk or mobile device that is enabled for near-field communication (NFC). The kiosk is provided with customer identifying information through an NFC-based communication with a customer's user device. The kiosk authenticates the customer based on the identifying information, retrieves retail information associated with the customer from a back-end server, and provides the personalized retail experience using the retrieved information. In one example, the personalized retail experience is provided based on customer-input received through an NFC reader of the kiosk. Also, the mobile device can be provided with a retail store identifier through an NFC-based communication link with an NFC tag for the store. The personalized retail experience can then be provided through the mobile device based on retail information for the retail store that is retrieved by the mobile device based on the identifier obtained through NFC. | 10-30-2014 |
20150089621 | SECURE LOGIN FOR SUBSCRIBER DEVICES - A network service may receive an authentication request from a subscriber device, the authentication request including a user credential and a device identifier of the subscriber device. The service may validate the authentication request based at least in part on the included user credential, and when the authentication request is validated, provide an authentication reply to the subscriber device indicative of allowance of the subscriber device to access the service, the authentication reply including a hash token keyed to the device identifier of the subscriber device for use in validation of subsequent authentication requests. The service may further generate a second hash token based on the device identifier of a subsequent authentication request; validate a subsequent authentication request according to the hash token and the second hash token; and when the subsequent authentication request is validated, allowing the subscriber device to access the service. | 03-26-2015 |
20150120549 | MOBILE AUTHENTICATION FOR WEB PAYMENTS USING SINGLE SIGN ON CREDENTIALS - Systems and methods for mobile authentication for web payments are disclosed. In some implementations, a proxy server receives, from a computing device different from a mobile device, a request from a user to process a web payment via a payment account associated with the mobile device, the web payment being associated with an online merchant. The proxy server verifies that the mobile device is associated with the user. The proxy server transmits, to a commerce server of the online merchant, payment information for the web payment in response to verifying that the mobile device is associated with the user. | 04-30-2015 |
20150121482 | MOBILE BASED LOGIN VIA WIRELESS CREDENTIAL TRANSFER - Systems and methods for mobile-based login via wireless credential transfer are disclosed. In some implementations, a proxy server receives a registration request for a receiver device for accessing a secure resource. The proxy server registers the receiver device in response to the registration request. The proxy server receives, from a transmitter device, information identifying the transmitter device along with authentication credentials for authenticating the receiver device to access the secure resource. The proxy server identifies the receiver device based on the information identifying the transmitter device. The proxy server forwards, to the receiver device, the authentication credentials for authenticating access of the receiver device to the secure resource. | 04-30-2015 |
20150121496 | REMOTE AUTHENTICATION USING MOBILE SINGLE SIGN ON CREDENTIALS - Systems and methods for remote authentication using mobile single sign on credentials are disclosed. In some implementations, a proxy server receives, from a web access device, a request to access a secure online resource via the web access device. The proxy server receives, from a mobile device different from the web access device, one or more credentials for accessing the secure online resource. The proxy server determines that a geographic distance between the web access device and the mobile device is less than a geographic distance threshold. Upon determining that the geographic distance between the web access device and the mobile device is less than the geographic distance threshold, the proxy server enables the web access device access to the secure online resource. | 04-30-2015 |
20150121501 | CONNECTED AUTHENTICATION DEVICE USING MOBILE SINGLE SIGN ON CREDENTIALS - Systems and methods for device-based authentication are disclosed. In some implementations, a device receives a Single Sign On PIN from a backend server. The device transmits, to a token server, the Single Sign On PIN and credentials of a subscriber identity module (SIM) to request a token for accessing a network resource via a computer different from the device. The token is associated with a user account. The device receives the token from the token server. The device stores the token at a local memory of the device. | 04-30-2015 |
20150149937 | SHARING OF A USER INPUT INTERFACE OF AN APPLICATION SESSION OF ONE APPLICATION BETWEEN TWO OR MORE APPLICATIONS - A primary application and a secondary application installed on a mobile communication device are both configured to obtain input from a user of the device through an application session of the primary application. The primary application transmits a notification to cause the secondary application to begin execution in the background. The primary application further transmits a request for user interface (UI) information to the secondary application. Based on UI information received from the secondary application, the primary application generates a graphical user interface (GUI) including an interface for receiving user input relating to the secondary application. The generated GUI is displayed on the device in the application session of the primary application, and user input relating to the secondary application is received in the application session of the primary application. The primary application then transmits to the secondary application user input identified as relating to the secondary application. | 05-28-2015 |