throbber
Please type a plus sign (4) insidethis box ——f» [)¥]
`
`PTO/SBAG (8-00)
`Approved for use through 10/31/2002. OMB 0651-0032
`LS. Patent and Trademark Office; U.S. DEPARTMENT OF COMMERCE
`Under the Paperwork. Reduction Act of 1995, no persons are required.to respond to a‘collection of information unless:it displays a valid OMB control number.
`
`PROVISIONAL APPLICATION FOR PATENT COVER SHEET
`This is a requestforfiling a PROVISIONAL APPLICATION FOR PATENT under 37 CFR 1.53(c)}.
`
`Given Name(first'and middle [if any]) = Name or Sumame
`
`City and-either State or Foreign Country
`
`Shenzhen, Guangdong, China
`
`INVENTOR(S)
`
`Residence
`
`[| Additional! investors are being narned on the. separately numbered sheets atlached hereto
`TITLE OF THE INVENTION (280 characters:max
`
`Secure Manager to Emulate Multiple Cards
`
`Direct all correspondencefo:
`
`CORRESPONDENCE ADDRESS
`
`ys
`
`Firm or
`Individual Name
`
`26/97
`
`Type Customer Number here
`
`BarCodeftabelhere
`
`eea
`
`ENCLOSED. APPLICATION PARTS (check all that appt
`x Specification Number of Pages
`CX] Drawing(s) Number of Sheets[25|
`[_] Application Data Sheet. See 37 CFR 1.76
`
`Applicant: claims small entity status. See. 37 CFR 4.27.
`A check or money orderis enclosed to coverthe filing fees
`
`The Commissioneris. herebyauthorizedto.charge filing
`
`fees or credit any everpayment.to Depesit Account Number:
`Payment by creditcard. Form PTO-2033 is attached.
`
`required
`
`fee
`
`
`
`The invention was made by an-agency of the United States Government-or under a contract with an agency of the
`United States. Govemment.
`ea No.
`CC Yes, the name ofthe U.S. Gavernment agency andthe Government contract number are:
`
`.
`
`Respectfully submitted,
`
`04/02/2012
`Date
`/joezheng /
`SIGNATURE
`39,450
`(ifappropriate)
`Joe Zhen
`
`
` Docket Number:(408)777-8873 |TYPED or PRINTED NAME [_RFID-o84P|TELEPHONE
`
`
`USE ONLY FOR FILING A PROVISIONAL APPLICATION FOR PATENT
`This collection of information is required by 37 CFR 41.51. The information is used by the public.to file (and by the PTO to process) a
`provisional application. Confidentiality is governed by 35-U.S.C. 122 and 87 CFR 1.14. This collection 1s estimated to take & hours-to
`complete, including gathering, preparing, and ‘submitting the complete
`provisional application to the PTO. Time will vary depending upon
`the individual case.
`Any comments.on fhe amountoftitre you require fo complete this form and/or suggestions for reducing this burden,
`should be sent to the Chief Information Cficer, U.S..Patent and Trademark. Office. U.S: Department of Commerce, Vvashington, D.C.
`20231. DO NOT SEND FEES OR COMPLETED FORMS TO THIS ADDRESS. SEND TO: Box Provisional Application, Assistant
`Commissioner for Patents, Washington, D.C. 20231.
`
`GOOG-1030
`Google LLC v. RFCyber Corp. / Page 1 of 84
`
`GOOG-1030
`Google LLC v. RFCyber Corp. / Page 1 of 84
`
`

`

`
`
`Electronic Patent Application Fee Transmittal
`
`Title of Invention:
`
`Customer Initiated Land-Based Payment Using Secure Elements
`
`
`
`First Named Inventor/Applicant Name: Xiangzhen Xie
`
`Filer:
`
`Joe Zheng
`
`Filed as Small Entity
`
`ProvisionalFiling Fees
`
`Description
`
`Fee Code
`
`Quantity
`
`Sub-Total in
`USD(S)
`
`Basic Filing:
`
`
`
`Pages:
`
`
`Claims:
`
`Miscellaneous-Filing:
`
`Petition:
`
`
`Patent-Appeals-and-Interference:
`
`Post-Allowance-and-Post-Issuance:
`
`Extension-of-Time:
`
`
`
`GOOG-1030
`Google LLC v. RFCyber Corp. / Page 2 of 84
`
`
`
`GOOG-1030
`Google LLC v. RFCyber Corp. / Page 2 of 84
`
`

`

`Sub-Total in
`Quantity AmountFee Code USD(S)
`Description
`
`
`
`
`
`
`
`Total in USD ($)
`
`Miscellaneous:
`
`
`
`GOOG-1030
`Google LLC v. RFCyber Corp. / Page 3 of 84
`
`GOOG-1030
`Google LLC v. RFCyber Corp. / Page 3 of 84
`
`

`

`Electronic Acknowledgement Receipt
`
`
`12442764
`
`Confirmation Number:
`
`
`
`
`Title of Invention:
`
`Customer Initiated Land-Based Payment Using Secure Elements
`
`
`
`First Named Inventor/Applicant Name:
`
`Xiangzhen Xie
`
`ee
`
`Filer Authorized By:
`
`
`Attorney Docket Number:
`
`RFID-O85P
`
`09:54:21
`Time Stamp:
`
`
`
`
`Application Type: Provisional
`
`Paymentinformation:
`
`Submitted with Payment
`
`
`
`Payment Type Credit Card
`
`Payment was successfully received in RAM
`RAM confirmation Number
`
`$125
`
`
`
`Deposit Account
`
`Authorized User
`
`File Listing:
`
`Document
`
`Pocument Pescription
`
`sigs
`
` Filetame Message Digest
`
`File Size(Bytes)/
`
`Multi
`
`Part/.zip (ifappl.)
`
`Pages
`
`
`
`GOOG-1030
`Google LLC v. RFCyber Corp. / Page 4 of 84
`
`GOOG-1030
`Google LLC v. RFCyber Corp. / Page 4 of 84
`
`

`

`Specification
`
`ProvisionalAsFiled.pdf
`
`fb8e9ef4badcl5c2c51b539bf1 O8dfe25.e20|
`
`104038
`
`Specification
`
`Appendix.pdf
`
`289897
`
`7160[6cb86a97bad7245825¢29e91 361758}
`be520
`
`Information:
`
`Drawings-only black and white line
`drawings
`
`742377
`
`Drawings.pdf
`
`62635523d5a77ef4b31 853b6307f4be40b3|
`23b2
`
`Warnings:
`Information:
`
`PROVAppTransmittal.pdf
`Transmittal of New Application
`03 10f03087b3850c8a0d9b9be4f53.c64dbe
`Ob4as
`
`465647
`
`
`
`93681 25adt8c32963b074052bf221633d7)
`
`Warnings:
`
`Fee Worksheet (SBO6)
`
`fee-info.pdf
`
`29255
`
`off
`
`This Acknowledgement Receipt evidences receipt on the noted date by the USPTOof the indicated documents,
`characterized by the applicant, and including page counts, where applicable. It serves as evidence of receipt similar to a
`Post Card, as described in MPEP 503.
`
`
`New Applications Under 35 U.S.C. 111
`If a new application is being filed and the application includes the necessary componentsfor a filing date (see 37 CFR
`1.53(b)-(d) and MPEP 506), a Filing Receipt (37 CFR 1.54) will be issued in due course and the date shownon this
`Acknowledgement Receiptwill establish thefiling date of the application.
`
`National Stage of an International Application under 35 U.S.C. 371
`If a timely submission to enter the national stage of an international application is compliant with the conditions of 35
`U.S.C. 371 and other applicable requirements a Form PCT/DO/EO/903 indicating acceptance of the application asa
`national stage submission under 35 U.S.C. 371 will be issued in addition to the Filing Receipt, in due course.
`
`New International Application Filed with the USPTO as a Receiving Office
`If a new international application is being filed and the international application includes the necessary componentsfor
`an international filing date (see PCT Article 11 and MPEP 1810), a Notification of the International Application Number
`and ofthe International Filing Date (Form PCT/RO/105)will be issued in due course, subject to prescriptions concerning
`national security, and the date shownon this Acknowledgement Receiptwill establish the international filing date of
`the application.
`
`
`Google LLC v. RFCyber Corp. / Page 5 of 84
`
`GOOG-1030
`
`GOOG-1030
`Google LLC v. RFCyber Corp. / Page 5 of 84
`
`

`

`Docket No.: RFID-O85P
`
`In the United States Patent and TrademarkOffice
`
`US Provisional Patent Application for
`
`Customer Initiated Land-Based Payment Using Secure Elements
`
`Inventor(s): Xiangzhen Xie
`C505, Long Tai Xuan, Nanguang Village
`Nanshang District
`Shenzhen, Guangdong Province, 518051, China
`Citizenship: P. R. China
`
`Date of Deposit: April 2, 2012
`# E-filing
`Express Mail Label
`| hereby certify that this paper or fee is being deposited with the United States Postal Service
`using "Express Mail Post Office To Addressee" service under 37 CFR 1.10 on the date
`indicated above and is addressed to "Mail Stop: New Application, Commissionerfor Patents,
`P.O. Box 1450, Alexandria, VA 22313"
`
`Signed:
`
`—_/joe zheng /
`Joe Zheng
`
`
`
`GOOG-1030
`Google LLC v. RFCyber Corp. / Page6 of 84
`
`GOOG-1030
`Google LLC v. RFCyber Corp. / Page 6 of 84
`
`

`

`Customer Initiated Land-Based Payment Using Secure Elements
`
`For many land-based credit or debit card transactions, the paymentprocessis
`
`started by a customer asking for a bill wnen checking out a purchase. A cashier or
`
`service staff will bring a bill to the customer for verification. The customer then hands
`
`out a credit/debit card to the service staff. The service staff brings the card to a Point of
`
`Sales (POS) counterto initiate a transaction payment. The service staff then brings
`
`back a receipt to the customer to authorize the transaction. It is a lengthy processthat
`
`typically takes a couple of minutes. In addition, in the case for debit card transactions, it
`
`is even more troublesome whenthe PIN is needed to authorize the transaction at the
`
`POS.
`
`According to one aspect of our invention, we provide a Mobile POS solution.
`
`Instead of bringing a financial card to the POS, the servicestaff will bring a Mobile POS
`
`to the customerto start a transaction. However, the customer still needs to trust and
`
`relay on the POS by the merchantto start the payment process. As more and more
`
`customers are using personal portable devices such as smart phones, the traditional
`
`payment paradigm assuming only merchant’s dedicated POSable to start secure
`
`paymentis challenged.
`
`In this invention, we propose a method that uses secure
`
`elements as an instrumentto transportbills to customers so that they can initiate
`
`transactions with their personal Near Field Communication (NFC) devices. Secure
`
`elements can be in a form of dedicated contactless smart cards or secure element
`
`components of merchants’ NFC devices. An electronic bill can be either
`

`

`
`created in a smart card at the store’s POS and bring to a customer, or
`
`created in a secure element (SE) of the merchant mobile POS at a customer
`
`Our Solution
`
`Our solution uses a contactless smart card or a secure element in a NFC device to
`
`transport a bill from a merchant to a customer. The customer then uses his NFC
`
`portable device to read the signed bill from the smart card and starts the transaction
`
`using one of the methods that his mobile wallet has enrolled with. This underlying
`
`payment method can bethe traditional payment method such as credit and debit card,
`
`
`
`GOOG-1030
`Google LLC v. RFCyber Corp. / Page 7 of 84
`
`
`
`GOOG-1030
`Google LLC v. RFCyber Corp. / Page 7 of 84
`
`

`

`or new internet payment method such as Paypal, Alipay, or new contactless epurse
`
`such as PBOC2, CEPSortransportation purse. In addition, while most of the mobile
`
`payment methods require the customer to give the cell phone number to the merchants,
`
`our method does not need any contact information to be disclosed. This method
`
`protects customer privacy.
`
`The following figure shows an architecture according to one embodiment of out present
`
`invention.
`
`Payment Network
`
`Payment Authorization Request
`
`SmartBill Payment Gateway
`
`Paymentinfo with-etectronic bill
`
`
`
`
`Payment Authorization Response
`
`
`
`Personal NFC device with
`
`wallet software
`
`Signed electronic bill
`
`Dedicated land-based POS with
`
`contactless reader OR NFC
`
`device with SE (suh as Mobile
`
`Contactless Smart Card
`(or Secure Element in
`NFC devices) with
`SmartBill Applet
`
`Electronic bill
`
`Fig 1. System components
`
`
`
`GOOG-1030
`Google LLC v. RFCyber Corp. / Page 8 of 84
`
`GOOG-1030
`Google LLC v. RFCyber Corp. / Page 8 of 84
`
`

`

`The following figure showsa flowchart or process of performing a transaction according
`to one embodiment of out present invention.
`
`Merchant POS prepares an electronic bill and writes to
`a smartbill applet on his contactless smart card or SE
`on NFC device
`
`Customer service delivers the contactless smartbill
`
`card (or SE) to customer
`
`Customer with NFC device that installed a SmartBill enabled
`
`Wallet Application will retrieve the electronic bill signed by
`the smartbill applet
`
`Electronic bill is displayed on the NFC device screen. Customer
`will verify the amount and add a tip if he wish
`
`Customer can choose a payment method that he enrolled in
`his wallet application to initiate the payment
`
`forwarded back to the merchant
`
`SmartBill enabled application will send the transaction
`information to the backend smartbill gateway for processing
`
`SmartBill gateway verifies the electronic bill and will reject if the
`payment amount is less than the billed amount.
`
`SmartBill gateway from there on uses the traditional financial
`payment networkflow to send payment request and get
`paymentresponse. It also can use new online payment method
`such as Paypal or Alipay to complete transaction.
`
`Once the transaction is approved or denied, the payment
`authorization response will return to the payment gateway to be
`
`Google LLC v. RFCyber Corp. / Page 9 of 84
`
`GOOG-1030
`
`GOOG-1030
`Google LLC v. RFCyber Corp. / Page 9 of 84
`
`

`

`As an exemplary operation, the above flowchart may be described below:
`
`1. Smart Card Applet Issuing Flow
`
`Merchants signed up for smart bill payment will be issued with a numberof contactless
`
`smart cards installed with personalized smart bill applet. The applet can also be
`
`installed on an NFC device with SE.
`
`The following information is personalized in each applet:
`
`e Assigned merchantid
`
`¢ Applet serial number for the merchant
`
`¢ Merchant key (either symmetric or asymmetric key). In general, these are
`
`diversified keys of a set of system master keys.
`
`2. Payment Initiation Flow
`
`As described in the flowchart,
`
`the following are typical Example of
`

`
`Electronic bill
`
`¢ Transaction detail information
`
`e Amount
`

`
`Bill Number
`
`¢ Transaction Time
`
`e Signed electronic bill
`
`¢ Append personalized smart bill info: merchant id, serial number
`
`* Generate a signature (either MAC ordigital digest)
`
`e Payment Information
`
`* Total payment amountincluding tips
`
`
`
`5
`
`
`
`GOOG-1030
`Google LLC v. RFCyber Corp. / Page 10 of 84
`
`GOOG-1030
`Google LLC v. RFCyber Corp. / Page 10 of 84
`
`

`

`*
`
`*
`
`payment method
`
`necessary information needed to conduct the payment
`
`As part of the description of the instant application, the Appendix herewith describes
`
`one exemplary embodiment that may be used to support a payment transaction or
`
`facilitate a payment process. The transaction may be conducted online or offline, with or
`
`without a paymentserver.
`
`The processes, sequencesor steps and features discussed above and in the
`
`appendix (part of the application) are related to each other and eachis believed
`
`independently novel in the art. The disclosed processes and sequences may be
`
`performed alone or in any combination to provide a novel and unobvious system or a
`
`portion of a system. It should be understood that the processes and sequencesin
`
`combination yield an equally independently novel combination as well, even if combined
`
`in their broadest sense;i.e. with less than the specific manner in which each of the
`
`processes or sequences has been reducedto practice in the disclosure herein.
`
`The foregoing and attached areillustrative of various aspects/embodiments of
`
`the present invention, the disclosure of specific sequence/steps and the inclusion of
`
`specifics with regard to broader methods and systemsare not intendedto limit the
`
`scopeof the invention whichfinds itself in the various permutations of the features
`
`disclosed and described herein as conveyed to one ofskill in the art.
`
`Claim
`
`A method for conducting a payment transaction, the method comprising:
`
`initiating the payment transaction by transporting an electronic check to an NFC
`
`device associated with a customer;
`
`requesting a verification on the check from the customer, wherein the check is being
`
`displayed on a display of the NFC device and requesting an action from the
`
`customer;
`
`
`
`GOOG-1030
`Google LLC v. RFCyber Corp. / Page 11 of 84
`
`
`
`GOOG-1030
`Google LLC v. RFCyber Corp. / Page 11 of 84
`
`

`

`receiving a message from the NFC device after the customer authorizes the
`
`payment transaction;
`
`clearing the check after receiving a payment from the consumer against the check,
`
`wherein the payment comesfrom an institution where the customerhas held an
`
`account or the NFC devicedirectly.
`
`
`
`GOOG-1030
`Google LLC v. RFCyber Corp. / Page 12 of 84
`
`
`
`GOOG-1030
`Google LLC v. RFCyber Corp. / Page 12 of 84
`
`

`

`Appendix
`
`Method and apparatus for performing payment transactions
`
`Technical Field
`
`BACKGROUND
`
`[0001]
`
`The present invention is generally related to commerce over networks.
`
`Particularly, the present invention is related to techniques for personalizing a secure
`
`element and provisioning an application such as an electronic purse that can be
`
`advantageously used in portable devices configured for both electronic commerce
`
`(a.k.a., e-commerce) and mobile commerce (a.k.a., m-commerce).
`
`Description of the Related Art
`
`[0002]
`
`Single functional cards have been successfully used in enclosed
`
`environments such as transportation systems. One example of such single functional
`
`cards is MIFARE that has been selected as the most successful contactless smart
`
`card technology. MIFARE is the perfect solution for applications like loyalty and
`
`vending cards, road tolling, city cards, access control and gaming.
`
`[0003]
`
`However, single functional card applications are deployed in enclosed
`
`systems, whicharedifficult to be expanded into other areas such as e-commerce and
`
`m-commerce because stored values and transaction information are stored in data
`
`storage of each tag that is protected by a set of keys. The nature of the tag is that the
`
`keys need to be delivered to the card for authentication before any data can be
`
`accessed during a transaction. This constraint makes systems using such technology
`
`difficult to be expanded to an open environment suchas the Internet for e-commerce
`
`and/or wireless networks for m-commerceas the delivery of keys over a public domain
`
`network causes security concerns.
`
`[0004]
`
`In general, a smart card, chip card, or integrated circuit card (ICC), is any
`
`pocket-sized card with embedded integrated circuits. A smart card or microprocessor
`
`
`
`1
`
`
`
`GOOG-1030
`Google LLC v. RFCyber Corp. / Page 13 of 84
`
`GOOG-1030
`Google LLC v. RFCyber Corp. / Page 13 of 84
`
`

`

`cards contain volatile memory and microprocessor components. Smart cards may also
`
`provide strong security authentication for single sign-on (SSO)within large
`
`organizations. The benefits of smart cards are directly related to the volume of
`
`information and applications that are programmedfor use on a card. A single
`
`contact/contactless smart card can be programmed with multiple banking credentials,
`
`medical entitlement, driver's license/public transport entitlement, loyalty programs and
`
`club memberships to name just a few. Multi-factor and proximity authentication can
`
`and has been embeddedinto smart cards to increase the security of all services on
`
`the card.
`
`[0005]
`
`Contactless smart cards that do not require physical contact between
`
`card and reader are becoming increasingly popular for payment and ticketing
`
`applications such as masstransit and highwaytolls. Such Near Field Communication
`
`(NFC) between a contactless smart card and a reader presents significant business
`
`opportunities when used in NFC-enabled mobile phonesfor applications such as
`
`payment, transport ticketing, loyalty, physical access control, and other exciting new
`
`services.
`
`[0006]
`
`To support this fast evolving business environment, several entities
`
`including financial institutions, manufactures of various NFC-enabled mobile phones
`
`and software developers, in addition to mobile network operators (MNO), become
`
`involved in the NFC mobile ecosystem. By natureof their individual roles, these
`
`players need to communicate with each other and exchange messagesin a reliable
`
`and interoperable way.
`
`[0007]
`
`One of the concerns in the NFC mobile ecosystem is its security in an
`
`open network. Thus there is a need to provide techniques to personalize a secure
`
`element in a contactless smart card or an NFC-enabled mobile device so that such a
`
`device is so secured and personalized when it comesto financial applications or
`
`secure transactions. With a personalized secure element in an NFC-enabled mobile
`
`device, various applications or services, such as electronic purse or payments, can be
`
`realized. Accordingly, there is another need for techniques to provision or manage an
`
`application or service in connection with a personalized secure element.
`
`
`
`2
`
`
`
`GOOG-1030
`Google LLC v. RFCyber Corp. / Page 14 of 84
`
`GOOG-1030
`Google LLC v. RFCyber Corp. / Page 14 of 84
`
`

`

`SUMMARY
`
`[0008]
`
`This section is for the purpose of summarizing some aspects of
`
`embodiments of the present invention and to briefly introduce some preferred
`
`embodiments. Simplifications or omissions in this section as well as the title and the
`
`abstract of this disclosure may be made to avoid obscuring the purposeof the section,
`
`the title and the abstract. Such simplifications or omissions are not intendedtolimit
`
`the scope of the present invention.
`
`[0010]
`
`Broadly speaking, the invention is related to techniques for personalizing
`
`secure elements in NFC devices to enable various secure transactions over a network
`
`(wired and/or wireless network). With a personalized secure element (hence secured
`
`element), techniques for provisioning various applications or services are also
`
`provided. Interactions among different parties are managed to effectuate a
`
`personalization or provisioning process flawlessly to enable an NFC device for a user
`
`thereof to start enjoying the convenience of commerce over a data networkwith
`
`minimum effort.
`
`[0011]
`
`As an example of application to be provided over a secured element, a
`
`mechanism is provided to enable devices, especially portable devices, to function as
`
`an electronic purse (e-purse) to conduct transactions over an open network with a
`
`payment server without compromising security. According to one embodiment, a
`
`device is installed with an e-purse manager (i.¢e., an application). The e-purse manager
`
`is configured to manage various transactions and functions as a mechanism to access
`
`an emulator therein. Secured financial transactions can then be conducted over a
`
`wired network, a wireless network or a combination of both wired and wireless
`
`network.
`
`[0012]
`
`According to another aspect of the present invention, security keys
`
`(either symmetric or asymmetric) are personalized so as to personalize an e-purse
`
`and perform a secured transaction with a payment server. In one embodiment, the
`
`essential data to be personalized into an e-purse include one or more operation keys
`
`(e.g., a load key and a purchasekey), default PINs, administration keys (e.g., an
`
`GOOG-1030
`Google LLC v. RFCyber Corp. / Page 15 of 84
`
`23
`
`
`
`
`
`GOOG-1030
`Google LLC v. RFCyber Corp. / Page 15 of 84
`
`

`

`unblock PIN key and a reload PIN key), and passwords (e.g., from Mifare). During a
`
`transaction, the security keys are used to establish a secured channel between an
`
`embedded e-purse and an SAM (Security Authentication Module) or a backend server.
`
`[0013]
`
`The present invention may be implemented in various forms including a
`
`method, a system, an apparatus, a part of a system or a computer readable medium.
`
`According to one embodiment, the present invention is a method for personalizing a
`
`secure element associated with a computing device. The method comprisesinitiating
`
`data communication with a server, sending device information of the secure elementin
`
`responding to a request from the server after the server determines that the secure
`
`element is registered therewith, wherein the device information is a sequence of
`
`characters uniquely identifying the secure element, and the request is a command
`
`causing the computing device to retrieve the device information from the secure
`
`element, receiving at least a set of keys from the server, wherein the keys are
`
`generated in the server in accordance with the device information of the secure
`
`element, and storing the set of keys in the secure element to facilitate a subsequent
`
`transaction by the computing device.
`
`[0014]
`
`According to another embodiment, the present invention is a method for
`
`personalizing a secure element associated with a computing device. The method
`
`comprises receiving an inquiry to establish data communication between a server and
`
`the computing device, sending a request from the server to the computing device to
`
`request device information of the secure element after the server determinesthat the
`
`computing device is registered therewith, wherein the device information is a
`
`sequence ofcharacters uniquely identifying the secure element, and the requestis a
`
`command that subsequently causes the computing device to retrieve the device
`
`information from the secure element therein, generating at least a set of keys in
`
`accordance with the device information received, delivering the set of keys through a
`
`secured channel over a data network to the computing device, wherein the set of keys
`
`is caused to be stored in the secure element with the computing device, and notifying
`
`at least a related party that the secure element is now personalized for subsequent
`
`trusted transactions.
`
`
`
`4
`
`
`
`GOOG-1030
`Google LLC v. RFCyber Corp. / Page 16 of 84
`
`GOOG-1030
`Google LLC v. RFCyber Corp. / Page 16 of 84
`
`

`

`[0015]
`
`According to still another embodiment, the present invention is a method
`
`for provisioning an application installed in a mobile device, the method comprises
`
`sending to a serveran identifier identifying the application together with device
`
`information of a secure element associated with a mobile device on which the
`
`application has been installed, establishing a secured channel between the secure
`
`element and the server using a setof key set installed in the secure element, receiving
`
`data prepared by the serverto enable the application to function as designed on the
`
`mobile device; and sending out an acknowledgementto a provider of the application
`
`about a status of the application now being active with the secure element on the
`
`mobile device. The data received in the mobile device includes a user interface of the
`
`application per the mobile device and a generated application key set.
`
`[0016]
`
`According to still another embodiment, the present invention is a method
`
`for provisioning an application, the method comprises receiving from a mobile device
`
`an identifier identifying the application together with device information of a secure
`
`element associated with the mobile device on which the application has been installed,
`
`establishing a secured channel between the secure element and the serverusing a set
`
`of key set installed on the secure element, preparing data necessaryfor the
`
`application to function as designed on the mobile device, transporting the data from
`
`the server to enable the application via the secured channel; and notifying a provider
`
`of the application about a status of the application now active with the secure element
`
`on the mobile device.
`
`[0017]
`
`According to yet another embodiment, the present invention is a mobile
`
`device for conducting a transaction over a network, the mobile device comprises a
`
`networkinterface, a secure element, a memory space for storing at least a module and
`
`an application downloaded from the network, a processor coupled to the memory
`
`space and configured to execute the module to cause operations including verifying
`
`whether the application has been provisioned. When it is verified that the application
`
`has not been provisioned, the operations further comprise sending to a servervia the
`
`networkinterface an identifier identifying the application together with device
`
`information of a secure element, establishing a secured channel between the secure
`
`element and the server using a key set installed on the secure element, wherein the
`
`
`
`5
`
`
`
`GOOG-1030
`Google LLC v. RFCyber Corp. / Page 17 of 84
`
`GOOG-1030
`Google LLC v. RFCyber Corp. / Page 17 of 84
`
`

`

`serveris configured to prepare data necessary for the application to function as
`
`designed on the mobile device, receiving the data from the server to associate the
`
`application with the secure element, and sending out an acknowledgementto a
`
`provider of the application about a status of the application that is now active with the
`
`secure element. The processoris further configured to determine if the secure element
`
`has been personalized before performing a provisioning process of the application. If
`
`the secure element has not been personalized, the mobile device is caused to
`
`personalize the secure element with a designed server.
`
`[0018]
`
`One of the objects, features, and advantagesof the present invention is
`
`to enable a mobile device that can be used to perform a secured transaction with a
`
`party (e.g., at a point of sale, with a commercial server or accessing remotely) over an
`
`unsecured network(é.g., the Internet).
`
`[0019]
`
`Other objects, features, and advantagesof the present invention, which
`
`will become apparent upon examining the following detailed description of an
`
`embodiment thereof, taken in conjunction with the attached drawings.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`[0020]
`
`The invention will be readily understood by the following detailed
`
`description in conjunction with the accompanying drawings, wherein like reference
`
`numerals designate like structural elements, and in which:
`
`[0021]
`
`FIG. 1A showsa simplified architecture of an NFC-enabled mobile
`
`device with a secure element (SE);
`
`[0022]
`
`FIG. 1B showsa flowchart or process of personalizing an SE according
`
`to one embodiment of the present invention;
`
`[0023]
`
`FIG. 1C showsrelationships among an SE manufacturer, a TSM admin
`
`and the TSM system for both offline and online modes;
`
`[0024]
`
`FIG. 1D illustrates data flows among a user for an NFC device (e.g., an
`
`NFC mobile phone), the NFC deviceitself, a TSM server, a corresponding SE
`
`manufacturer and an SE issuer;
`
`
`
`6
`
`
`
`GOOG-1030
`Google LLC v. RFCyber Corp. / Page 18 of 84
`
`GOOG-1030
`Google LLC v. RFCyber Corp. / Page 18 of 84
`
`

`

`[0025]
`
`FIG. 1E showsa data flowchart or process of personalizing data flow
`
`amongthree entities: a land-based SAM or a network e-purse server, an e-purse
`
`acting as a gatekeeper, and a single function tag, according to one embodiment;
`
`[0026]
`
`FIG. 2A shows a mobile payment ecosystem in which related parties are
`
`shown in order for the mobile payment ecosystem successful;
`
`[0027]
`
`FIG. 2B showsa flowchart or processof provisioning one or more
`
`applications according to one embodiment;
`
`[0028]
`
`FIG. 2C showsa dataflowillustrating various interactions among
`
`different parties when an application is being provisioned in one embodiment;
`
`[0029]
`
`FIG. 2D showsa data flow among different entities when preparing the
`
`application data in provisioning an application;
`
`[0030]
`
`FIG. 2E showsa flowchart or processfor locking or disabling an installed
`
`application;
`
`[0031]
`
`FIG. 2F shows an exemplary architecture diagram of a portable device
`
`enabled as an e-purse conducting e-commerce and m-commerce, according to one
`
`embodiment of the present invention;
`
`[0032]
`
`FIG. 3A is a block diagram of related modules interacting with each other
`
`to achieve whatis referred to herein as e-purse personalization by an authorized
`
`personnel(a.k.a., personalizing a mobile device or a secure element therein while
`
`provisioning an application);
`
`[0033]
`
`FIG. 3B showsa block diagram of related modulesinteracting with each
`
`other to achieve whatis referred to herein as e-purse personalization by a user of the
`
`e-purse;
`
`[0034]
`
`FIG. 3C showsa flowchart or process of personalizing an e-purse
`
`according to one embodiment of the present invention;
`
`[0035]
`
`FIG. 4A and FIG. 4B showtogether a flowchart or processoffinancing,
`
`funding, load or top-up an e-purse according to one embodiment of the present
`
`invention;
`
`
`
`7
`
`
`
`GOOG-1030
`Google LLC v. RFCyber Corp. / Page 19 of 84
`
`GOOG-1030
`Google LLC v. RFCyber Corp. / Page 19 of 84
`
`

`

`[0036]
`
`FIG. 4C shows an exemplary block diagram of related blocks interacting
`
`with each other to achieve the process FIG. 4A and FIG. 4B;
`
`[0037]
`
`FIG. 5A is a diagram showing a first exemplary architecture of a portable
`
`device for enabling e-commerce and m-commercefunctionalities over a cellular
`
`communications network(i.e., 3G, LTE or GPRS network), according an embodiment
`
`of the present invention;
`
`[0038]
`
`FIG. 5B is a diagram showing a second exemplary architecture of a
`
`portable device for enabling e-commerce and m-commercefunctionalities over a wired
`
`and/or wireless data network (e.g., Internet), according another embodiment of the
`
`presentinvention;
`
`[0039]
`
`FIG. 5C is a flowchart illustrating an exemplary process of enabling the
`
`portable device of FIG. 5A for services/applications provided by one or more service
`
`providers in accordance with one embodiment of the present invention;
`
`[0040]
`
`FIG. 6A is a diagram showing an exemplary architecture, in which a
`
`portable device is enabled as a mobile POS conducting e-commerce and m-
`
`commerce, according to one embodiment of the present invention;
`
`[0041]
`
`FIG. 6B is a diagram showing an exemplary architecture, in which a
`
`portable device is enabled as a mobile POS conducting a transaction upload operation
`
`over a network, according to an embodi

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket