Abstract:
If a user loses an electronic device that has the capability to conduct financial transactions, the user may report that the electronic device is lost using a lost-device software application to a management electronic device associated with a provider of the electronic device. In response to receiving this information, a disabling command is sent to a payment network associated with the financial account of the user to temporarily disable use of the electronic device to conduct the financial transactions. In particular, the electronic device may include a secure element that stores a payment applet for a financial account, and the disabling command may disable a mapping from a virtual identifier for the financial account to a financial primary account number. Subsequently, if the user finds the electronic device, the user may re-enable the capability (and, thus, the mapping) by providing authentication information to the electronic device.
Abstract:
Techniques are provided for causing a file to be sent from a source device over a network to one or more destination devices. An intermediary receives a notification of a file and determines which destination device(s) are to retrieve the file. The intermediary may determine the destination device(s) based on one or more attributes of the file. The intermediary may cause the file to be stored in persistent storage that is maintained by a separate storage service. The intermediary may cause the file to be deleted after a particular period of time. The source device may send multiple versions of a file to the intermediary, which determines which destination device is to receive which version. The file may be a digital image and a destination device may be a device that displays a slideshow of digital images while the destination device receives the digital image over a network.
Abstract:
Using electronic devices (such as cellular telephones) that communicate wirelessly, two individuals can make person-to-person payments. In particular, an individual using an electronic device may identify another proximate electronic device of a counterparty in a financial transaction, and may provide an encrypted payment packet to the other electronic device that includes: a financial credential for a financial account of the individual, a payment amount, and a payment sign. When the other electronic device receives the encrypted payment applet, the counterparty may accept the payment in the financial transaction specified by the encrypted payment packet. Then, the other electronic device may provide the encrypted payment packet and another encrypted payment packet (with a financial credential for a financial account of the counterparty, the payment amount and the opposite payment sign) to a third party that completes the financial transaction.
Abstract:
A system and method of locating "friends" having mobile devices connected to a network and associated with a user account is disclosed. The method includes sending a request to a mobile device, the mobile device determining its present geographic location and responding to the requestor with this information. This information may be in the form of a coordinate location such as a GPS location or it may be in the form of a name that the mobile device owner assigned to a particular area (e.g., "home"). Having this location information, a user is able to view the location of the friend that is associated with the mobile device.
Abstract:
One or more relay servers can access first data received from one or more first devices (e.g., a phone, tablet computer, vehicle tracking device, or badge reader). The one or more relay servers can aggregate the data and infer a location of a person. The one or more relay servers can transmit second signals including second data to one or more second devices (e.g., lighting systems, security systems, garage-door openers, music controllers, climate controllers, or kitchen appliances), the second data being based at least in part on the estimated location. The second-signal transmission can be pushed to the second devices or pulled by the second devices. Operations of the second devices can be controlled at least in part on the second data.
Abstract:
Systems, methods, and computer-readable media for using an online resource to manage credentials on an electronic device are provided. In one example embodiment, a method, at an electronic device, includes, inter alia , receiving account data via an online resource, accessing commerce credential status data from a secure element of the electronic device, providing initial credential management option data via the online resource based on the received account data and based on the accessed commerce credential status data, in response to the providing, receiving a selection of an initial credential management option via the online resource, and changing the status of a credential on the secure element based on the received selection. Additional embodiments are also provided.
Abstract:
If a user loses an electronic device that has the capability to conduct financial transactions, the user may report that the electronic device is lost using a lost-device software application to a management electronic device associated with a provider of the electronic device. In response to receiving this information, a disabling command is sent to a payment network associated with the financial account of the user to temporarily disable use of the electronic device to conduct the financial transactions. In particular, the electronic device may include a secure element that stores a payment applet for a financial account, and the disabling command may disable a mapping from a virtual identifier for the financial account to a financial primary account number. Subsequently, if the user finds the electronic device, the user may re-enable the capability (and, thus, the mapping) by providing authentication information to the electronic device.
Abstract:
Systems, methods, and computer-readable media for securely conducting online payments with a secure element of an electronic device are provided. In one example embodiment, a method includes, inter alia, at an electronic device, generating first data that includes payment card data, generating second data by encrypting the first data and merchant information with a first key, transmitting to a commercial entity subsystem the generated second data, receiving third data that includes the first data encrypted with a second key that is associated with the merchant information, and transmitting the received third data to a merchant subsystem that is associated with the merchant information, where the first key is not accessible to the merchant subsystem, and where the second key is not accessible to the electronic device. Additional embodiments are also provided.