G06Q20/3229

Mobile commerce payment system

A mobile commerce system and components thereof are provided in which multiple wireless mobile communications devices (mobile devices) (1) each has a unique electronic identification and processing circuit (2) capable of encrypting data utilizing an encryption key and a first software application providing connectivity to commercial webpage servers (4) for purposes that include the conduct of selected transactions involving a payment for goods or services. Each mobile device is independently enabled to conduct financial transactions in real time by communication with a financial institution. Each mobile device further has a second software application termed mobile payment application adapted to interact with the first application to receive data as to a payment required to conclude a transaction conducted by way of a commercial webpage server. The mobile payment application initiates an instruction to the financial institution to make a payment to a payee designated by way of such data wherein the instruction is encrypted utilizing the unique electronic identification and processing circuit.

Integrated mobile trusted service manager

Embodiments of the present invention are directed to a centralized trusted service manager system in the form of a trusted service manager interconnectivity service hub, which facilitates and provides communications between entities involved I mobile contactless payment systems. One embodiment is directed to a method for processing a message related to a mobile payment application on a secure element of a mobile communication device through an interconnectivity services hub including receiving the message from a first entity in a first protocol and determining a trusted service manager associated with the secure element from among a plurality of trusted service managers using a routing table comprising routing information. Then the method continues by determining a second protocol corresponding to the trusted service manager associated with the secure element, translating the message into the second protocol, and sending the translated message to the trusted service manager which communicates with the secure element.

SELF-AUTHENTICATING CHIPS

A self-authenticating chip includes first and second memory regions storing, respectively, first and second authentication codes. The second memory region is adapted to be unreadable and unmodifiable by the chip or a chip reader. The chip also includes a comparator for providing an indicator of whether given input matches the second authentication code. The chip also includes an authentication circuit that is operable to read the first authentication code from the first memory region, present the first authentication code to the comparator, and in response to receiving an indicator from the comparator indicating that the first and second authentication codes match, unlock at least one of (i) a communication interface of the chip to allow data to be transmitted therethrough to a chip reader and (ii) a third memory region of the chip to allow data to be read therefrom.

Multiple authentication and payment system and method using eSIM

A multiple authentication and payment system and method using an embedded subscriber identification module (eSIM) are provided, in which one or more users integrate SIMs through software and perform SIM authentication and payment without physically changing SIMs when an eSIM is installed within a vehicle. The method includes detecting whether each smart device carried by at least one passenger contains a pre-registered eSIM and monitoring whether electronic payment occurs. When electronic payment occurs, a payment cost is determined for each passenger with respect to a payment cost of the electronic payment based on information regarding the pre-registered eSIM, and payment is performed according to the determined payment cost for each passenger.

Terminal and method for mobile payment with trusted execution environment

A mobile terminal is adapted for mobile payment through payment in accordance with transaction data from the customer to a merchant via a payment service provider, and is adapted for a clearing of the payment between bank servers. The terminal is characterized in that a) in the secure runtime environment access data are stored for an authentication between the payment trust application and the payment service provider; and b) the agent is further adapted b1) upon an authentication between the payment trust application and the payment service provider, to transmit access data, or authentication data generated employing access data, between the secure runtime environment and the payment service provider, and b2) to accept from the payment trust application a transaction instruction for a payment in accordance with the transaction data and to send it to the payment service provider. A corresponding mobile payment method for a terminal is likewise specified.

System for harnessing a connected network to securely verify a transaction

A method for harnessing a connected network to securely verify and execute a transaction is provided. The method may include requesting a PIN from a mobile device. The request may be transmitted via a USSD message. The method may also include receiving the PIN from the mobile device. The PIN may be received via a response to the USSD message. The method may also include authenticating the mobile device. The method may also include accessing a third-party network to verify an authentication status of the mobile device. The third-party network may include a plurality of IoT endpoints. Each IoT endpoint may include a stored verification usage process. The stored verification usage process may relate to a user associated with the mobile device. The method may also include executing the transaction upon receipt of an authentication signal from the third-party network.

Trusted internal interface

An interface and device architecture for a payment device. An interface between a payment application installed in a payment device and one or more value-add applications (such as loyalty programs, transit applications, etc.) that are also installed in the payment device. The API or interface design permits communications and data transfer between the payment application and one or more value-add applications. This reduces (and in some cases may prevent) the need for back-end server processing of data that may be relevant to both a payment transaction and to a function of the value-add application. Similarly, the same or another API or interface may enable communications and data transfer between a value-add application and the payment application.

HYBRID COMPUTERIZED MOBILE TRANSACTION CARD
20230196056 · 2023-06-22 ·

A computerized transaction card is provided and includes a plastic form factor resembling a credit card, the form factor including all or a combination of a magnetic stripe, a euro-pay master card and visa (EMV) chip, and or a near field communication (NFC) chip, a micro-controller powered by a rechargeable battery, at least one wireless chip set for sending and receiving data over a local wireless network; and, an interactive display screen for displaying information to a card operator.

Electronic device having multiple subscriber identity modules and method therefor
09848077 · 2017-12-19 · ·

A method is provided including: sensing that a reader is located within a preset distance from an electronic device; determining a Service Identification Module (SIM) from a plurality of SIMS that are available in the electronic device; and communicating with the reader using information stored in the SIM.

METHOD FOR MAKING CONTACTLESS TRANSACTIONS SECURE
20170359358 · 2017-12-14 ·

The invention relates to a method for making a transaction of a contactless application secure, said application (11) being stored in the mobile terminal (10), said transaction taking place between the mobile terminal and a contactless reader (12), said terminal including a security element (14), said method comprising the following steps carried out by the mobile terminal: the application sends (E13) a token representing a piece of sensitive data and a first authentication value relating to the token to the reader, the security element receives (E16) the token and the related first authentication value from the reader, the security element calculates (E17) a second authentication value from the received token and compares the first authentication value with the second authentication value, and sending (E18) the result of the comparison to the reader, said reader cancelling the transaction if the result is negative.