Abstract:
Presented are apparatus and methods for utilizing coupons and the like in the context of a contactless payment process. A processor of a payment-enabled mobile device stores a Proximity Coupon System Environment (PCSE). The PCSE includes coupon applications that provide for an alternative form of payment and/or that influence a final transaction amount for a payment transaction. The method includes storing in a File Control Information (FCI) file of the PCSE a list of the coupon applications, and storing in a FCI file of a Proximity Payment System Environment (PPSE) an indication of the existence of the PCSE. When a payment transaction request is received from a proximity reader, the payment-enabled mobile device transmits the indication of the existence of the PCSE and the list of coupon applications that are to be considered before determining the final transaction amount.
Abstract:
Example embodiments include methods and apparatus for exchanging, using a contactless interface included in a portable device, transaction information associated with an electronic merchant device when the portable device is brought into close proximity to a contactless interface associated with the electronic merchant device, with the information identifying the electronic merchant device and identifying a handover wireless network connected to the electronic merchant device and with information including security credentials required to form a secure connection, establishing a persistent, secure wireless connection with the electronic merchant device, using a wireless network interface in the portable device and the transaction information, over the handover wireless network and exchanging transaction messages between the portable device and the electronic merchant device over the persistent, secure wireless connection during a shopping interval.
Abstract:
A process for secure, safe, and easy provisioning of a wireless device with credentials to connect to a wireless network. A connecting wireless device and an established wireless device both utilize low power transmission at close proximity to exchange wireless connection setting information and/or a password. The connecting wireless device is moved into proximity with the established wireless device and a low power setting is discovered at which the wireless devices may communicate with a sufficiently low error rate. The proximity of the connecting wireless device to the established wireless device is verified and the connecting wireless device is then passed the secret information by the established network device.
Abstract:
The present disclosure provides methods for removing defects nanotube application solutions and providing low defect, highly uniform nanotube fabrics. In one aspect, a degassing process is performed on a suspension of nanotubes to remove air bubbles present in the solution. In another aspect, a continuous flow centrifugation (CFC) process is used to remove small scale defects from the solution. In another aspect, a depth filter is used to remove large scale defects from the solution. According to the present disclosure, these three methods can be used alone or combined to realize a low defect nanotube application solutions and fabrics.
Abstract:
A system and method that identifies and effectuates communication between a connectable client and a wireless human interface device. The wireless human interface device utilizes technologies to abstract the complexities of IP based wired and wireless networks to provide mechanisms to easily discover, associate, utilize and diagnose the wireless human interface device. Through the ensuing abstraction the wireless human interface device can be associated with an unlimited number of connectable networked clients or hosts thus eliminating the requirement of analog switch boxes to connect human interface devices to each connectable host or client, and further providing for the control of local and/or Internet based hosts or clients.
Abstract:
An identification token includes a body and an RFID IC embedded in the body. An antenna is also embedded in the body and is coupled to the RFID IC. A control integrated circuit (CIC) is embedded in the body and coupled to the antenna. A sensor is embedded in the body and is coupled to the CIC. The sensor is actuatable by a user of the identification token.
Abstract:
A payment device and method and system for using the payment device is described capable of utilizing a pre-authorized amount on existing infrastructure, including POS terminals or for using offline pre-paid products on this infrastructure. The updates for the pre-authorized or offline prepaid products can be sent by the issuer and applied by the card contemporaneously with the card's processing of the issuer authentication data but without requiring any additional bytes in the issuer authentication data. The updates performed by the issuer can be larger and more extensive than could be achieved by using any available space in the issuer authentication data.
Abstract:
Techniques are provided for transaction adjustment. A payment device, having an offline balance, is presented to an offline terminal in connection with a putative transaction. If an irregularity with the putative transaction is detected, the offline balance is adjusted responsive to the detection. In one aspect of the invention, such adjustment can be carried out, via offline-terminal interaction, substantially without the use of a security module and cryptographic keys in the offline terminal.
Abstract:
A first command is sent from a payment terminal assembly to a payment device with an on-device balance to compute a cryptogram to complete a putative transaction. It is detected that the cryptogram is not received as expected. In response, an identifier of the payment device and transaction recovery data associated with the putative transaction are stored in a storage area of a terminal memory of the payment terminal assembly. The payment terminal assembly obtains the identifier of the payment device, upon re-presentation of the payment device. Upon such re-presentation, the payment terminal assembly compares the obtained identifier of the payment device to contents of the storage area. Conditioned at least upon the comparing yielding a match, a second command is sent from the payment terminal assembly to the payment device to instruct the payment device to re-produce the cryptogram to complete the putative transaction.
Abstract:
An identification token includes a body and an RFID IC embedded in the body. An antenna is also embedded in the body and is coupled to the RFID IC. A control integrated circuit (CIC) is embedded in the body and coupled to the antenna. A sensor is embedded in the body and is coupled to the CIC. The sensor is actuatable by a user of the identification token.