Abstract:
사용자가금융거래를이행하는능력을갖는전자디바이스를분실한경우, 사용자는분실-디바이스소프트웨어애플리케이션을이용하여전자디바이스의공급업체와연관된관리전자디바이스에전자디바이스의분실을보고할수 있다. 이정보의수신에응답하여, 비활성화커맨드를사용자의금융계정과연관된결제네트워크에송신하여전자디바이스를사용하여금융거래를이행하는것을임시로비활성화한다. 특히, 전자디바이스는금융계정에대한결제애플릿을저장하는보안요소를포함할수 있고, 비활성화커맨드는금융계정에대한가상식별자에서금융기본계정번호로의맵핑을비활성화할수 있다. 후속적으로, 사용자가전자디바이스를찾은경우, 사용자는인증정보를전자디바이스에제공함으로써능력(및, 그에따른, 맵핑)을재활성화할수 있다.
Abstract:
PROBLEM TO BE SOLVED: To simulate multi-point gesture input by a computer system using a single pointing device. SOLUTION: Simulation software can receive single pointing inputs such as input from a mouse and convert them into simulated multi-point gesture inputs such as finger pinches, reverse pinches, translation and rotation. This simulation software enables a user to use keyboard keys to perform additional control when generating multi-point gesture inputs. COPYRIGHT: (C)2009,JPO&INPIT
Abstract:
The present disclosure generally relates to making payments with a mobile device. In one example process, the device receives first authentication data, such as fingerprint authentication information, and second authentication data, such as a bank authorization code. The device then transmits a transaction request for a payment transactions. In another example process, the device detects activation of a physical input mechanism and detects a fingerprint using a biometric sensor. The device is enabled to participate in NFC payment transactions. In another example process, the device displays a live preview of images obtained via a camera sensor while the device detects partial credit card information of a credit card in a field of view of the camera sensor.
Abstract:
This relates to allowing a computer system using a single pointing device to simulate multi-point gesture inputs. Simulating software can receive single pointing inputs (such as, for example, input from a mouse) and convert them to simulated multi-point gesture inputs such as finger pinches, reverse pinches, translations, rotation, and the like. The simulating software can also allow the user to use keyboard keys to give the user additional control when generating the multi¬ point gesture inputs.
Abstract:
In some implementations, a computing device can be configured to automatically tum off notifications when generating a notification would cause a disturbance or be unwanted by a user. The device can be configured with quiet hours during which notifications that would otherwise be generated by the computing device can be suppressed. In some implementations, quiet hours can be configured as a time period with a start time and an end time. In some implementations, quiet hours can be derived from application data. For example, calendar data, alarm clock data, map data, etc. can be used to determine when quiet hours should be enforced. In some implementations, the device can be configured with exceptions to quiet hour notification suppression. In some implementations, the user can identify contacts to which the quiet hours notification suppression should not be applied.
Abstract:
In some implementations, a computing device can be configured to automatically tum off notifications when generating a notification would cause a disturbance or be unwanted by a user. The device can be configured with quiet hours during which notifications that would otherwise be generated by the computing device can be suppressed. In some implementations, quiet hours can be configured as a time period with a start time and an end time. In some implementations, quiet hours can be derived from application data. For example, calendar data, alarm clock data, map data, etc. can be used to determine when quiet hours should be enforced. In some implementations, the device can be configured with exceptions to quiet hour notification suppression. In some implementations, the user can identify contacts to which the quiet hours notification suppression should not be applied.
Abstract:
The present disclosure relates to making payments with a mobile device. In one example process, the mobile device receives and stores information for one or more payment accounts on the mobile device. The mobile device is used to make payments using the payment accounts. In some examples, authorization to proceed with a payment is performed before each purchase made by the user. The authorization process can include receiving a verification of the user, such as a fingerprint scan or passcode. In some examples, a payment account is selected from among available payment accounts. In some examples, an indication is displayed of a digital item associated with a purchased item. In some examples, a payment transaction is initiated with participants of an ongoing communication. In some examples, an application of a retailer is invoked based on the availability of the application. In some examples, a purchase recommendation is provided.
Abstract:
The present disclosure generally relates to the use of loyalty accounts, private label payment accounts, and general payment accounts using an electronic device with an electronic wallet. Various accounts are linked to the electronic device. In some examples, the electronic device 5 is NFC-enabled. The electronic device may be used to provide loyalty account information and payment account information to a payment terminal, such as an NFC-enabled payment terminal.
Abstract:
The present disclosure relates to making payments with a mobile device. In one example process, the mobile device receives and stores information for one or more payment accounts on the mobile device. The mobile device is used to make payments using the payment accounts. In some examples, authorization to proceed with a payment is performed before each purchase made by the user. The authorization process can include receiving a verification of the user, such as a fingerprint scan or passcode. In some examples, a payment account is selected from among available payment accounts. In some examples, an indication is displayed of a digital item associated with a purchased item. In some examples, a payment transaction is initiated with participants of an ongoing communication. In some examples, an application of a retailer is invoked based on the availability of the application. In some examples, a purchase recommendation is provided.