Portable computerized wireless payment apparatus and methods

ABSTRACT

A mobile user apparatus and associated methods useful for conducting payment transactions wirelessly, such as at point-of-sale locations. In one embodiment, the mobile user apparatus is a cellular-enabled mobile device that includes a short-range radio frequency device, such as an active-mode capable device, that generates a transmission to a point of sale apparatus, including information relating to an account of the user of the mobile apparatus that is to be charged for the payment. In one variant, the information stored on the mobile device is further configured to receive transaction data wirelessly in return.

PRIORITY

This application is a continuation of and claims priority to co-ownedand U.S. patent application Ser. No. 13/604,511 filed Sep. 5, 2012entitled “PORTABLE COMPUTERIZED WIRELESS INFORMATION APPARATUS ANDMETHODS”, now U.S. Pat. No. 8,413,887, which is a continuation of andclaims priority to U.S. patent application Ser. No. 13/421,713 filedMar. 15, 2012 and entitled “PORTABLE COMPUTERIZED WIRELESS PAYMENTAPPARATUS AND METHODS”, issued as U.S. Pat. No. 8,371,503, which is acontinuation of and claims priority to co-owned and U.S. patentapplication Ser. No. 12/284,492 filed Sep. 22, 2008 entitled “CHATTELMANAGEMENT APPARATUS AND METHODS”, now U.S. Pat. No. 8,205,788, which isa continuation of and claims priority to U.S. patent application Ser.No. 11/015,384 filed Dec. 16, 2004 and entitled “CHATTEL MANAGEMENTAPPARATUS AND METHODS”, now U.S. Pat. No. 7,427,024, which claimspriority to U.S. Provisional Patent Application No. 60/530,812 entitledPOINT-OF-DEPARTURE CHATTEL MANAGEMENT APPARATUS AND METHODS filed Dec.17, 2003, each of the foregoing incorporated herein by reference in itsentirety. This application is also related to co-owned and co-pendingU.S. patent application Ser. Nos. 13/727,306 filed Dec. 26, 2012 andentitled “COMPUTERIZED WIRELESS PAYMENT METHODS”, 13/733,102 filed onJan. 2, 2013 and entitled “COMPUTERIZED INFORMATION AND DISPLAYAPPARATUS”, 13/733,106 filed Jan. 2, 2013 and entitled “PORTABLECOMPUTERIZED WIRELESS PAYMENT APPARATUS AND METHODS”, and 13/756,984filed Feb. 1, 2013 and entitled “PORTABLE COMPUTERIZED WIRELESS PAYMENTAPPARATUS AND METHODS”, and 13/761,077 filed Feb. 6, 2013 and entitled“PORTABLE COMPUTERIZED WIRELESS APPARATUS”, each also incorporatedherein by reference in its entirety.

FIELD OF THE INVENTION

The present invention relates to improved methods and apparatus for themanagement, tracking and recovery of chattel at e.g., transportationfacilities such as airports.

DESCRIPTION OF RELATED TECHNOLOGY

With the heightened level of security at airports and other facilitieswhere large numbers of people gather, many passengers have personal orother items (“chattel”), such as pocket knives, tools, large beltbuckles, wireless devices, personal security devices, etc., that aresubject to confiscation by security personnel at the security checkpointbefore proceeding further. Hence, the passengers or patrons are giventhe choice of either surrendering the items to the security personnel,or attempting to find some other mechanism for their safekeeping.Accordingly, airports and the like collect literally tons of suchpersonal items each year since many people choose simply to surrendertheir items rather than having their progress impeded.

A number of different approaches to chattel (and baggage) tracking andmanagement are present under the prior art. For example, United StatesPatent Publication No 20020163443 to Stewart, et al. published Nov. 7,2002 entitled “Airport valet communication system” discloses an improvedairport valet communication system. The system attaches a vehicle tag toa vehicle. A stall tag is also provided and is placed somewhere withinthe vicinity of a parking stall. To communicate with these two tags, ahandheld computer is provided by the system for communicating with thevehicle tag via radio frequency communication to obtain anidentification of the vehicle and for communicating with the stall tagvia radio frequency communication to obtain an identification of theparking stall so as to correlate the vehicle and the parking stall inwhich the vehicle is parked.

United States Patent Publication No. 20030189094 to Trabitz, publishedOct. 9, 2003 entitled “Baggage tracking system” discloses a passengerand baggage reconciliation system that employs non-programmable, passivetransponder, radio frequency identification (RFID) tags attached tochecked baggage, which enables continuity of reconciliation through anynumber of intra-air transfer points until the destination of the airtravel is reached. If separation of the passenger and baggage occursprior to the planned air travel destination, the system furnishes promptnotification to the airline. While enrollment of the passenger occursupon payment for travel, checked baggage enrollment can occur variouslyoutside the airport building (curbside), at the ticket counter, at thedeparture gate, on board the airplane, or along side the airplane priorto mounting the stairway or on the jet bridge. The interface to theairline carrier's computer reservation system (CRS) to obtain passengerand schedule data permits continuous tracking of passengers and baggagefor the reconciliation process. The CRS creates a passenger name record(PNR) for each traveler, which contains fields for enteringidentification codes for checked baggage. Separate PNR fields and codesare used for each item of baggage that is checked. The PNR entry isobtained from reading the embedded identification number on the attachedRFID tag when the baggage is checked in.

United States Patent Publication No. 20040010430 to Cinquini, et al.published Jan. 15, 2004 entitled “Method and apparatus for providing apersonal item drop off/return service at security checkpoints” disclosesan apparatus and method that provide a personal item return service toan owner of a personal item that is subject to confiscation before theowner is admitted through a security checkpoint and into a secure areadownstream of the security checkpoint. The security checkpoint can belocated at a transportation center (airport, bus or train) or anyentrance to a secure area at a building or sports arena. The owner canpurchase from a vending machine or kiosk a container having sufficientpre-paid postage based on the size or weight of the item, and mail theitem to a destination selected by the owner. The service is locatedadjacent to the security checkpoint so that the owner need not losehis/her place in the security line.

United States Patent Publication No. 20040124982 to Kovach publishedJul. 1, 2004 entitled “Method for tracking and processing passengers andtheir transported articles” discloses a method for tracking and handlingpeople and articles at an airport using Radio-Frequency Identification(“RFID”) tags. The RFID tag contains an electronic microchip with amemory portion, permanently attached to a substrate having a planarantenna. Each RFID tag is tuned to operate at a specific frequency andincludes a unique identifier number stored in the memory portion.Passenger-specific information, such as passenger name, address andflight itinerary may be sent to the microchip for storage in the memoryportion by means of an RF field provided by an external “scanner”device. The scanner also provides a means for reading data stored in thememory portion of the microchip.

United States Patent Publication No. 20040243518 to Clifton, et al.published Dec. 2, 2004 entitled “Individual identity authenticationsystem” discloses an individual identity authentication system forauthenticating an identity of an individual includes a client computersystem and a service provider computer system. The client computersystem may be implemented at various locations, for example, airportterminals, so as to provide ready access for various users toauthenticate the identity of a particular individual. The serviceprovider computer system is in communication with the client computersystem and executes code for causing the service provider computersystem to perform a number of steps. One step includes receiving apersonal identification number (PIN) and a social security number (SSN)of an individual that is entered into a secure terminal associated withthe client computer system. Another step includes authenticating anidentity of the individual when the entered PIN and the entered SSNcorrespond to a registered PIN and a registered SSN of the individual.

Despite the foregoing, there is still a salient need for flexible andefficient chattel management techniques and apparatus, as well aspayment approaches, that provide the user (and in fact the facilityoperator) with a highly configurable and modular system that can bereadily adapted to a number of different paradigms. Such improvedtechniques and apparatus would also ideally be compatible with existingand incipient personal electronics and networking technologies.

SUMMARY OF THE INVENTION

In a first aspect of the invention, a mobile user device enabled forwireless payment is disclosed. In one embodiment, the device includes: apower source; a cellular wireless interface; a global positioning system(GPS)-based wireless receiver; and a short range radio frequency devicedisposed in the mobile user device. In one variant, the radio frequencydevice is configured to be encoded with information specific to a userof the device, the information including payment account informationallowing the user to use the mobile user device to wirelessly pay for atleast one of goods or services by placing the mobile user device inproximity an apparatus at a point of sale of the goods or services.

In another variant, the short range radio frequency device with paymentsource information obviates the user from having to carry at least oneother currency or payment source on their person; and the radiofrequency device comprises an active radio frequency identificationdevice that uses the power source.

In a second aspect of the invention, a method of using acellular-enabled mobile device enabled for wireless payment to pay forat least one of goods or services is disclosed. In one embodiment, themethod includes: obtaining a cellular-enabled mobile device, the mobiledevice comprising a short range passive radio frequency device disposedthereon or therein and which is distinct from a cellular interface ofthe mobile device, the radio frequency device configured to be encodedwith information specific to a user of the device; causing encoding ofthe radio frequency device with the information specific to the user,the information including information relating to an existing paymentsource associated with the user; and placing the mobile device withencoded radio frequency device in proximity to a reader apparatusdisposed at a point of sale of goods or services, the placing allowingthe user to use the mobile device to wirelessly pay for at least one ofthe goods or services from the existing payment source by way of atleast one data transmission from the radio frequency device, the atleast one data transmission comprising at least a portion of theinformation relating to the existing payment source associated with theuser.

In a third aspect of the invention, a method of causing enabling acellular-enabled mobile device for wireless payment for at least one ofgoods or services is disclosed. In one embodiment, the method includes,for a cellular-enabled mobile device, the mobile device comprising ashort range radio frequency device disposed thereon or therein at timeof manufacture of the mobile device, the radio frequency deviceconfigured to be encoded with information specific to a user of thedevice, enabling encoding of the radio frequency device by the user withthe information specific to the user, the information includinginformation relating to at least one of an existing credit or debit orprepaid account associated with the user.

In one variant, the mobile device with encoded radio frequency device isconfigured to, when placed in proximity to an interrogation or readerapparatus disposed at a point of sale of goods or services, allow: (i)the user to use the mobile device to conduct a wireless paymenttransaction for at least one of the goods or services from the at leastone existing account by way of at least one data transmission from theradio frequency device, the transmission comprising at least a portionof the information relating to the existing payment source associatedwith the user; and (ii) the mobile device to receive data related to thewireless payment transaction for storage thereon.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram of one exemplary embodiment of the chattelmanagement system of the invention.

FIG. 1 a is an elevational view of an exemplary hand-heldinterrogator/receiver/display device according to the invention.

FIG. 1 b is a block diagram of one exemplary local network topologyuseful with the chattel management system FIG. 1.

FIGS. 2 a-2 c are perspective views of envelope, box, and tubeembodiments, respectively, of the shipping elements of the invention.

FIG. 3 is a block diagram of another exemplary embodiment of the chattelmanagement system of the invention, adapted for wireless local interfaceand Internet access of a remote server and database.

FIGS. 4 a-4 d are logical flow diagrams of various embodiments ofexemplary methods for conducting financial transactions using, forinstance, a wireless mobile device, according to the disclosure.

DESCRIPTION OF THE INVENTION

Reference is now made to the drawings listed above, wherein likenumerals refer to like parts throughout.

As used herein, the terms “chattel” and “chattels” refers generally toany type of property or possession (regardless of ownership), which maygenerally be carried on or by a person (including within associatedtransport devices such as luggage, etc.). Chattel includes, withoutlimitation, car keys, personal security devices (e.g., mace, pepperspray), knives, handguns, ammunition, tools, personal electronicdevices, pharmaceuticals, cosmetics, jewelry, belt buckles or othermetallized apparel, wrist watches, hats, cellular telephones, USB keys,glasses, magnetic or optical media, electric razors, personal computers,cameras, film, pagers, electronic games, purses, currency, iPods, etc.

As used herein, the term “passenger” shall mean any entity, whetherhuman or otherwise, who utilizes a transportation modality.

As used herein, the term “transportation modality” refers to any form oftransportation for either person, animals, and/or inanimate objectsincluding, without limitation, aircraft, ships, ferries, land vehicles(buses, trains, cars, etc.), shuttles, etc.

As used herein, the term “computer program” is meant to include anysequence of human or machine cognizable steps which perform a function.Such program may be rendered in virtually any programming language orenvironment including, for example, C/C++, Fortran, COBOL, PASCAL,assembly language, markup languages (e.g., HTML, SGML, XML, VoXML), andthe like, as well as object-oriented environments such as the CommonObject Request Broker Architecture (CORBA), Java™ (including J2ME, JavaBeans, etc.) and the like.

As used herein, the term “application” refers generally to a unit ofexecutable software that implements theme-based functionality The themesof applications vary broadly across any number of disciplines andfunctions (such as e-commerce transactions, shipping transactions,entertainment, calculator, Internet access, etc.), and one applicationmay have more than one theme. The unit of executable software generallyruns in a predetermined environment; for example and without limitation,the unit could comprise a downloadable Java Xlet™ that runs within theJavaTV™ environment.

As used herein, the term “database” refers generally to one or moretangible or virtual data storage locations, which may or may not bephysically co-located with each other or other system components.

As used herein, the term “network” refers generally to data orcommunications networks regardless of type, including withoutlimitation, LANs, WANs, intranets, internets, the Internet, cablesystems, telecommunications networks, satellite networks, and VirtualPrivate Networks (VPNs), or collections or combinations thereof, whetherbased on wired, wireless, or matter wave modalities. Such networks mayutilize literally any physical architectures and topologies (e.g. ATM,IEEE-802.3, X.25, Token Ring, SONET, 3G/3GPP/UMTS, 802.11, Hybridfiber-coax (HFC), etc.) and protocols (e.g., TCP/IP, HTTP, FTP, WAP,GPRS, RTP/RTCP, WiFi, 3G, IEEE 802.11, etc.).

As used herein, the term “service provider” refers generally to servicesprovided remotely to the user including, for example, data streaming,data analysis, financial account management and trading, data archivingand storage, Internet access, content delivery, telecommunications, etc.

As used herein, the term “speech recognition” refers to any methodologyor technique by which human or other speech can be interpreted andconverted to an electronic or data format or signals related thereto. Itwill be recognized that any number of different forms of spectralanalysis (such as MFCC (Mel Frequency Cepstral Coefficients) or cochleamodeling, may be used. Phoneme/word recognition, if used, may be basedon HMM (hidden Markov modeling), although other processes such as,without limitation, DTW (Dynamic Time Warping) or NNs (Neural Networks)may be used. Myriad speech recognition systems and algorithms areavailable, all considered within the scope of the invention disclosedherein.

As used herein, the term “CELP” is meant to include any and all variantsof the CELP family such as, but not limited to, ACELP, VCELP, and QCELP.It is also noted that non-CELP compression algorithms and techniques,whether based on companding or otherwise, may be used. For example, andwithout limitation, PCM (pulse code modulation) or ADPCM (adaptive deltaPCM) may be employed, as may other forms of linear predictive coding(LPC).

As used herein, the term “digital processor” is meant generally toinclude all types of digital processing devices including, withoutlimitation, digital signal processors (DSPs), reduced instruction setcomputers (RISC), general-purpose (CISC) processors, microprocessors,gate arrays (e.g., FPGAs), PLDs, reconfigurable compute fabrics (RCFs),array processors, and application-specific integrated circuits (ASICs).Such digital processors may be contained on a single unitary IC die, ordistributed across multiple components.

As used herein, the term “integrated circuit (IC)” refers to any type ofdevice having any level of integration (including without limitationULSI, VLSI, and LSI) and irrespective of process or base materials(including, without limitation Si, SiGe, CMOS and GAs). ICs may include,for example, memory devices (e.g., DRAM, SRAM, DDRAM, EEPROM/Flash,ROM), digital processors, SoC devices, FPGAs, ASICs, ADCs, DACs,transceivers, memory controllers, and other devices, as well as anycombinations thereof.

As used herein, the term “display” means any type of device adapted todisplay information, including without limitation CRTs, LCDs, TFTs,plasma displays, LEDs, and fluorescent devices.

Overview

The present invention allows users at a POD or other location to rapidlyand easily ship their chattels to another location, such as to theirtravel destination or public gathering place (concert, amusement park,sporting event, etc.), to their home, or even a third party. As isknown, millions of personal prohibited items are collected each year atairport security points alone. Faced with the choice of discard orabandoning the item(s) or canceling their travel, the great majority ofpeople choose to abandon the chattel, or perhaps attempt to recover itlater. Massive amounts of such items are collected each day throughoutthe nation's airports.

In its simplest form, the mechanism for shipment comprises a human agentand/or drop box akin to those used for Fedex or other comparable courierservices, that is disposed adjacent to the security checkpoint of thePOD. Standard courier methods are used, which may be aided through theuse of more sophisticated apparatus and techniques so as to facilitaterapid and cost effective use by the customer. A variety of coding and/ortracking methods may be used, including bar codes, magnetic strips, andRFID tags of the general type well known in the art. These techniquesmay also be used in conjunction with one another, such as to performdifferent functions at different points throughout the processing ortransit chain of the chattels.

In more sophisticated embodiment, personal electronics ranging fromuser-specific RFID devices, USB keys, PDAs, handhelds, cell phones orthe like are used to transfer information to and/or from the kiosk orother processing entity associated with the service.

DESCRIPTION OF EXEMPLARY EMBODIMENTS

It is noted that while the system and methods of the invention disclosedherein are described with respect to point-of-departure (POD) managementof chattels, such as might occur at an airport or other transportationfacility, certain aspects of the invention may be useful in otherapplications, including, without limitation, other types of transactionrelating to chattels, such as insuring or valuation thereof, courierservices between two non-POD locations, etc.

Referring now to FIG. 1, a first embodiment of a system utilizing radiofrequency identification (RFID) tags is described. The system 100comprises generally one or more shipping elements 104 with associatedtags 106, and a parent device 102 (e.g., kiosk). The kiosk 102 containsan RF antenna 105, as well as interrogator/reader module 108 andanalysis/display module 110. It will be recognized by those of ordinaryskill that the various components and modules being part of the system100 may be combined or integrated into one physical device asapplicable, or separated, modularized, or any combination thereof; theillustrated embodiment being merely exemplary.

The tags 106 of each shipping element comprise radio frequency ID tags(RFID). RFID tags are well known in the communications art. The mainadvantages of an RFID sensor and tag system over other forms of IDtagging include (a) the orientation of the tag with respect to thesensor is not critical for a correct read of the tag information; (b)communication can occur within comparatively harsh operatingenvironments; and (c) the communication range between the sensor and tagcan be significant even when the RF frequencies used are within thepower limitations of Federal Communications Commission (FCC) rulesconcerning unlicensed transmitters. Accordingly, RFID technology isuseful for several applications, especially those relating to assetinventory and management. RFID tags or various configurations are nowubiquitous and available at extremely low cost, thereby furtherenhancing the economic viability of the present invention.

The process of “reading” and communicating with an RFID tag such as thatused in the system 100 of FIG. 1 comprises bringing a RFID tag withinproximity to an RFID sensor (“reader”) 108 which emanates a radiofrequency or electric wake-up field having a limited range. The RFID tag106 detects the presence of the wakeup field of the reader 108, andsubsequently various forms or protocols of handshake occur between thetag 106 and the reader 108 in order to exchange data. All of thiscommunication between the tag and the sensor is performed using, e.g.,RF carriers (or even wideband waveforms) of one or more prescribedfrequencies. As is well known in the art, so-called “low-frequency”systems operate in the kHz (e.g., 125 kHz) to low-MHz range(unlicensed). Low frequency systems are generally low cost andcomplexity and have comparatively limited range, but are attractivesince the low frequency energy tends to suffer low losses from materialslike metal, polymers, tissue, and the like. High-frequency systemsoperate in the low-MHz to GHz range (sometimes licensed). High-frequencysystems in general have greater range, but are more directional.Additionally, the performance of these high frequency tags may beadversely affected by electromagnetic radiation or proximate metallicobjects.

Additionally, REID tags are generally categorized as being “active”(i.e., carry an associated power source for operation of the on-tagintegrated circuit, and are capable of spontaneous transmission afterreader interrogation), or “passive” which utilizes incident RF energy orelectric field (from the reader, for example) to generate electricalenergy for use by the IC, and transmission. Passive tags are highlyenergy efficient, and require only an extremely small amount ofelectrical power to function.

In the present application, due to the premium on space and desire forultra-light weight and low cost, a small antenna and package form factoris desired. This also avoids disincentives to the disposability of thedevice (and its parent shipping element). Based on the foregoingconsiderations, the present embodiment of the invention utilizes a lowfrequency (e.g., 125 kHz nominal) miniature passive tag having aminiature monopole antenna 109 of the type well known in the art,although it will be recognized that active tag architectures, lower orhigher frequency systems, and alternate antenna configurations (such as“figure 8” loop, etc.) may be used depending on the particularapplication and desired attributes. Passive tags are a preferred mode,yet active tags are a utilitarian and desirable mode as well for certainapplications.

The RFID tag 106 of the present invention further optionally includes anintegrated circuit (IC) device (not shown) including a transceiversection and processing logic, as well as an integrated random accessmemory (RAM) device of the type commonly available with such devicesadapted to store a plurality of data bytes such as data correlating tothe identity of a given user, its date of deposit, its location (i.e.,Terminal A at Airport B), destination, urgency/priority, contentsclassification (e.g., metallic, hazardous, etc.), weight as deposited,user's destination (if different from the shipping destination), contactinformation, etc. and the like. The memory device may also comprise,without limitation, PROMS, EPROMS, EEPROMs, UVEPROMS, SRAMs, DRAMs,SDRAMS, “flash” memory, and ferroelectric memory devices. In thiscapacity, the construction of the parent shipping element 104 issimplified, and less complex “off the shelf” RFID devices meeting thephysical space limitations may be used with little or no adaptation.

In an exemplary embodiment, the RFID tag is distributed on one or moresurfaces of the shipping element using a capacitive type substrate tag.See for example the “Bistatix™” RFID devices previously manufactured byMotorola/Indala Corporation (now ASSA ABLOY). These devices utilize avery thin, lightweight and low cost substrate employing non-metallicprinted circuit technology. They are also extremely rugged, allowing forbending, crumpling, folding, etc., and can be printed on many differenttypes of dielectric substrates. They also utilize an extremely small IC,capable of storing a limited amount of data (e.g., 96 bits), therebymitigating the costs associated with the shipping element 104, and itsoverall form factor. It will also be recognized that the shippingelement surface(s) may be used as the substrate itself, thereby furtherreducing cost. In short, the “tag” can be printed and/or embedded ontoor in the shipping element (box, envelope, carton, canister, etc.) atmanufacture or thereafter in a highly cost-efficient manner. It will berecognized that capacitive or inductive tags may be used consistent withthe invention.

Hence, by employing this (e.g., Bistatix) technology within the element104 of the present invention, the RFID tag may be disposed on anysurface at extremely low cost and low profile. A complementary MotorolaBistatix reader may be used as the reader 108 of FIG. 1, although otherconfigurations may be used as described elsewhere herein.

In operation, the tag “reader” 108 of FIG. 1 interrogates the element(s)104 and RFID device 106 at its designated frequency, causing the tag to“wake” and initiate communications protocols disposed within the tagIC/memory. Once such protocols are established, the reader transmitspreformatted data representative of the parameters desired to be loadedinto the RFID memory device. For, example, a box of “smart” envelopes200 (described below with respect to FIG. 2 a) can be swiped by theinterrogator/reader 108 before use in the kiosk and encoded withidentifying information, such as for example the airport/PODidentification code, date of coding, etc. The envelopes or otherelements 200 can optionally be sequentially encoded with numbers (e.g.,envelope No. 1, 2, 3, etc.) to distinguish one from another.Alternatively, the tags 106 associated with the elements 200 can bepre-coded at manufacture, such as via slightly variant frequency ofemission, etc. A variety of different approaches for distinguishingbetween two similarly situated shipping elements are well known to thoseof ordinary skill in the RFID arts, and accordingly are not describedfurther herein.

As can be readily appreciated, the ability to uniquely identify aplurality of different shipping elements 104 using RF technology hasgreat implications for, inter alia, accounting for such elements duringuse, security scanning and shipment. Herein lies a primary attribute orfeature of the present invention; i.e., tracking and control of a numberof different parcels or elements 104. For example, the present inventionallows the system operator to rapidly inventory and specificallyidentify particular elements 104 before shipment, and afterwards (i.e.,during delivery to the user or designated recipient), thereby easily andefficiently accounting for all elements 104. This is also useful duringsecurity scanning, and inventory before loading on the selectedtransportation mode (aircraft, etc.); e.g. to verify that no one such asa terrorist has surreptitiously inserted a “dummy” package into thetransport bin or other mechanism between unloading of the kiosk andloading onto the aircraft. It will also be recognized, however, that thekiosk or other receptacle (or portion thereof) may simply be made mobileand securable such that it can be directly transferred to the aircraftwithout having to load or unload, thereby potentially frustratingattempts to gain unauthorized access thereto.

The RFID tags 106 of the embodiment of FIG. 1 has further utility forconducting inventory of “smart” shipping elements after manufacture.Since each element carries it's own tag, each capable of uniquelyidentifying itself (whether by unique frequency assignment, or dataencoded on the tag memory and transmitted to the reader), rapid readingof a plurality of tags disposed in close proximity to one another ispossible. For example, a manufacturer, distributor or POD could also usethe system 100 of the present invention to control inventory (such as byplacing a reader at a “choke point” of a storage facility, therebyknowing precisely when each “smart” element 104 was brought in or out ofthe facility), or determine when a re-order of supplies is needed. Usingthe wireless data interface capabilities described subsequently herein,the kiosk can even automatically alert a supplier that it needs moreshipping elements, akin to well known prior art CDPD approaches usedfor, inter alia, vending machines.

In yet another embodiment, the tag reader 108 is placed at the door orportal to the room or space (e.g., airport ingress/egress) by which asubject must pass, thereby necessarily exposing the subject to theinterrogation field generated by the reader 108. Hence, where someonesuch as a terrorist attempts to obtain one or more elements 104 forunauthorized use (such as to try to sneak a package into a bin ofauthorized elements 104) from the kiosk, a security perimeter isestablished and interrogation automatically conducted. This securityperimeter can be quite small, such that anyone attempting to steal orsmuggle in coded envelopes or containers 104 from the kiosk will triggera proximity sensor based on the aforementioned interrogation.

Another feature of the present invention is coordination of the type oftag used, its frequency, its radiated power, etc., thereby allowing theuser to control the range at which the interrogation field generated bythe reader 108 will elicit a response from the tag 106. It isundesirable to have the tags 106 respond at too great a distance, sincethis would necessitate removing the shipping elements in question andthe reader 108 from the proximity of other devices in order to performan inventory (i.e., the user would not be able to spatiallydifferentiate between various tagged shipping elements 104). Hence, theaforementioned low-power low-frequency passive tag is well suited tosuch applications. In the exemplary embodiment, the foregoing parametersare controlled such that the tag reader 108 has an effective “wake up”range of 1-3 ft., thereby allowing sufficient spatial resolution;however, this value can clearly be adjusted as need in the particularapplication. For example, in the “exit door” reader embodiment describedelsewhere herein, a wake-up field lobe having a main axis of 5-10 feetmay be needed to ensure adequate tag coverage as personnelingress/egress.

The RFID tag 106 and reader 108 of the present invention, as well asother wireless or wired data links associated with the apparatus 100,may also optionally utilize an encrypted data protocol, such that anytransmissions from the tag 106 are encrypted, and accordingly must bedecrypted by the authorized reader 108 before processing of the tagdata, and/or writing of the tag 106 by the reader 108, is permitted.Such encryption may be applied using any number of well known techniquesinstituted at the protocol level, or even at the air interface. Forexample, in one embodiment, the RFID tag 106 and reader 108 comprisemore complex variant having a direct sequence spread spectrum (DSSS)communication system incorporating a PN (pseudo-noise) spreading code ofthe type well known in the communications art. In another embodiment, afrequency hopping spread spectrum (FHSS) having a hopping sequence isused to enhance security. The use of multi-bit encryption/encrypted dataprotocols and spread spectrum techniques for security is well known inthe art, and accordingly will not be described further herein. See U.S.Pat. Nos. 5,539,775 entitled “Modulated spread spectrum in RFidentification systems method” issued Jul. 23, 1996, and 5,629,981entitled “Information management and security system” issued May 13,1997, both incorporated herein by reference in their entirety.

In addition or instead of the air interface, encryption may also beapplied at the protocol level, such as where public/private key methods,IKE, IPSec, or other techniques may be used to frustrate surreptitiousinterception or alteration of data transmitted to/from the RFID device,or between other components. Furthermore, well known VPN or othertunneling protocols for encapsulating data during transmission across anentrusted network may be used between various entities of the presentsystem, such as between a kiosk and a local distribution or managementnode.

Additionally, well known secure socket layer (SSL) or equivalentapproaches may be employed across one or more links of the network(s),so as to enhance security.

It will be appreciated that many different variations and combinationsof the foregoing radio frequency communications apparatus and methodsmay be employed consistent with the invention; such different variationsand combinations being too numerous to describe herein. All suchvariations and combinations, however, are easily recognized and withinthe possession of those of ordinary skill.

As shown in FIG. 1, the receptacle module 110 takes the data obtainedfrom the tags 106 via reader 108 and analyzes it according to one ormore algorithms. In the illustrated embodiment, the module 110 comprisesa CISC or RISC processor having one or more computer programs runningthereon, the programs analyzing the digitized tag data and for example,comparing it to stored data representing a series of allowed orauthorized ID values for shipping elements 104, hence enhancingsecurity. The receptacle can also be selectively locked until the reader108 and module 110 validate the authenticity or other informationassociated with the particular transaction (including, e.g., userpayment authorization, maximum allowed weight, size restrictions, etc.).To this end, the kiosk can be configured with an electronic scaleintegrated with the tag reader 108, or other complementary systems. Interms of size, the code of each shipping element 104 advantageouslyhelps the system automatically determine the maximum size of thepackage; i.e., the family designation of each element 104, when read bythe reader 108, tells the central processor that the package cannotphysically be larger than certain dimensions.

It will further be recognized that each item of inventory or shipmentcan have associated with it other descriptive data, as shown in theexample below:

ID Owning Transaction Routing Code Category Description entity dateNumber 0001 Airport 10 × 12 PHL/A Dec. 25, 2003 0000-1111- POD Envelope2222-3333 ShippingThis descriptive data can, in whole or part, also be produced during adiscrepancy alert (or when merely performing a normal transaction) tohelp identify the item in question.

As can be appreciated, the analysis/display functionality of the module110 may also be provided by or integrated with another device. Forexample, so as to reduce clutter or space requirements, an existingdevice such as a Fedex or Airborne drop box, ATM machine, Internet orWiFi kiosk, flight insurance kiosk, etc. may be used as the parentplatform for the reader 108 and/or module 110. Many existing devicesinclude sufficient processing and storage capacity to perform thetransaction processing function(s) along with those normally required bythat equipment, and hence can be readily programmed or otherwise adaptedby those of ordinary skill to accommodate the functionality describedherein. As yet another alternative, a standard desktop or laptop PC, orairport boarding gate terminal may be used to provide the desiredanalysis/display functionality, such as where the user gets the itemthrough security, yet none-the-less desires to ship the item rather thancarry it on the aircraft.

As yet another alternative, the reader 108 and analysis/display module110 may be integrated into a single device 170 (FIG. 1 a), such as ahandheld device akin to portable GPS receivers now ubiquitous. The user(which may be an employee, or even the shipper) may simply then pick upthe unit, interrogate the items to be shipped (thereby encoding thepackage and retrieving ID data for the database in data communicationwith the handheld), and then deposit the package in a one-way accessreceptacle (which may also be interlocked with the handheld via wired orwireless link if desired).

As previously referenced, it will be recognized that the methods of theinvention (as exemplified in FIG. 1) are ideally embodied in the form ofone or more computer programs. Such program(s) may be rendered invirtually any programming language/environment including for example C,C++, Java, Fortran, Basic, Visual Basic, Unix, Peri, CORBA, or any othermedium capable of reasonably implementing such a functionality.

In one exemplary embodiment, the reader module 108 comprises an antennaportion with embedded antenna 105, the latter being either monopole ordipole as desired to interface with the antenna structure of the tag 106at the selected centerline frequency(ies). The antenna 105 of the moduleof the exemplary embodiment generates the wakeup or interrogation fieldneeded to elicit a response from the tag 106 when the module is broughtin sufficient proximity to the tag or vice-versa. The interrogationfield intensity can also be made adjustable by the user, such that eachfacility can “tune” its module to the desired range/sensitivity. Thisadjustment can also be accomplished automatically and/or algorithmically(such as under control of the kiosk's central processor previouslydescribed herein, or an associated microcontroller).

The reader module 108 is also optionally equipped with a RF transceiver,such as a Bluetooth 2.4 GHz or IEEE-802.11a/b/g device, forcommunications with other entities, such as a local server or wirelessgateway to another network. For example, the SiW1502 Radio Modem ICmanufactured by Silicon Wave Corporation of San Diego, Calif., is alow-power consumption device with integrated RF logic and Bluetoothprotocol stack adapted for Bluetooth applications. The chip is a fullyintegrated 2.4 GHz radio transceiver with a GFSK modem contained on asingle chip. The SiW1502 chip is offered as a stand alone IC or, may beobtained with the Silicon Wave Odyssey SiW1601 Link Controller IC. TheSiW1502 form factor is 7.0×7.0×1.0 mm package which is readily disposedwithin the interior volume of the kiosk described herein, or even aportable reader or “wand” which may be used by the carrier, such as forproviding hand scans of chattels. An RF transceiver and modulator deviceis adapted to generally comply with the well known “Bluetooth™” wirelessinterface standard, IEEE-802.11, UWB, or alternatively, so-called “3G”(third generation) communications technologies. The Bluetooth wirelesstechnology allows users to make wireless and instant connections betweenvarious communication devices, such as mobile devices (e.g., cellulartelephones, PDAs, notebook computers, remote monitoring stations, andthe like) and desktop computers or other fixed devices. Since Bluetoothuses radio frequency transmission, transfer of data is in real-time. TheBluetooth topology supports both point-to-point and point-to-multipointconnections. Multiple ‘slave’ devices can be set to communicate with a‘master’ device. The devices are authenticated (optionally) using aRAND-based bonding or pairing process of the type well known in the art(e.g., in Mode 3 link layer security, or Mode 2 “L2CAP” or service-basedsecurity). In this fashion, the kiosk/reader of the present invention,when outfitted with a Bluetooth wireless suite, may communicate directlywith other Bluetooth compliant mobile or fixed devices including asubject's cellular telephone, PDA, notebook computer, desktop computer,or other kiosks. Alternatively, a number of different RF-enabled “wands”performing chattel scanning may be monitored in real time at acentralized location, such as the kiosk or even a remote location usingthe kiosk or a local wireless gateway as a proxy node.

Bluetooth-compliant devices, inter glia, operate in the 2.4 GHz ISMband. The ISM band is dedicated to unlicensed users, including airports,thereby advantageously allowing for unrestricted spectral access. Theexemplary modulator uses one or more variants of frequency shift keying,such as Gaussian Frequency Shift Keying (GFSK) or Gaussian Minimum Shiftkeying (GMSK) of the type well known in the art to modulate data ontothe carrier(s), although other types of modulation (such as phasemodulation or amplitude modulation) may be used.

Spectral access of the device is accomplished via frequency hoppingspread spectrum (FHSS), although other approaches such as frequencydivided multiple access (FDMA), direct sequence spread spectrum (DSSS,including code division multiple access) using a pseudo-noise spreadingcode, or even time division multiple access may be used depending on theneeds of the user. For example, devices complying with IEEE Std.802.11a/b/f/g may be substituted for the Bluetooth transceiver/modulatorarrangement previously described if desired. Literally any wirelessinterface capable of accommodating the bandwidth and/or otherrequirements of the system may be used.

For example, in the case of an airport, the UWB system described belowmay be considered optimal, due to its low radiated power level, e.g.,less than −41.3 dBm/MHz according the FCC unlicensed spectral UWB maskissued circa late 2003. This low power reduces the chance of deleteriousinterference with, e.g., aircraft communications systems, IFF systems,or other instrumentation or control functions.

In yet another embodiment of the invention, the module 400 utilizes anultra wide-band (e.g., TM-UWB, OFDM, etc.) protocol for communicationwith other entities. Specifically, in one embodiment, the module 400 isfitted with a TM-UWB SoC device which utilizes pulse-position modulation(PPM), wherein short duration Gaussian pulses (nanosecond duration) ofradio-frequency energy are transmitted at random or pseudo-randomintervals and frequencies to convey coded information. Information iscoded (modulated) onto the short duration carrier pulses by, inter alia,time-domain shifting of the pulse. For example, a pulse encodes a bit bybeing temporal shifting of the pulse with respect to a reference, suchthat a “late” pulse encodes a “0”, while an early pulse encodes a “1”.This scheme is somewhat akin to the well known frequency shift keying(FSK), wherein two (or more) side-band frequencies are utilized toencode data; e.g., 67 kHz down-shift=0; 67 kHz up-shift=1. TM-UWBdevices have the advantage of ready penetration of various mediums, aswell as ultra-low power consumption and low spectral density, therebyreducing power requirements and potential interference with otherdevice, respectively. In one exemplary variant, the TM-UWB device of theinvention comprises a half duplex, 2.0 GHz with variable data rate inexcess of 1 Mbps with no forward error correction (FEC). The Gaussianmonopulse is of the form:V(t)=(t/τ)e ^(−(t/τ)2)Where τ is a time decay constant related to the Gaussian monopulseduration, and center frequency f_(c)=k/τ. The monopulse's bandwidth andcenter frequency are therefore directly related to the monopulse'stemporal width or duration. This approach also shifts the transmissiontime of each monopulse over a significant time interval in accordancewith a pseudo-nose (pn) “hopping” code of the type well known in theart, thereby advantageously distributing spectral density to make thespread. This approach is roughly comparable to frequency hopping spreadspectrum (FHSS) except in the time domain. Exemplary devicesincorporating TM-UWB components including the timer, correlator, anddigital baseband signal processor and controller units (not shown) areavailable from IBM Corporation (SiGe or silicon germanium-based) in theform of a chip set, although it will be recognized that an integratedsingle device is optimal for the invention. Additional detail on theimplementation of TM-UWB systems is found in, e.g., “Time ModulatedUltra-Wideband for Wireless Applications”; Time-Domain Corporation,2000, which is incorporated herein by reference in its entirety.

By using ISM or UWB communications, the RF module can alsoadvantageously communicate with its parent device (e.g., a central nodeor gateway, another kiosk 110 with transceiver, etc.) without mutualinterference with the RF signal of the tags 106, the latter operating at125 kHz in the nominal embodiment.

In another exemplary embodiment of the system, an object-orienteddistributed program having client and server portions distributed onrespective client and server devices is utilized (FIG. 1 b). As usedherein, the terms “client device” and “personal electronic device” (PED)include, but are not limited to, personal computers (PCs), whetherdesktop, laptop, or otherwise, personal digital assistants (PDAs) suchas the Apple Newton®, “Palm®” family of devices, handheld computers suchas the Hitachi “e-Plate” or Dell Axim, personal communicators such asthe Motorola Accompli devices, Motorola EVR-8401, J2ME equipped devices,cellular telephones, set-top boxes, or literally any other devicecapable of interchanging data with a network. Such devices may interfaceusing wired or optical fiber mechanisms such as an IEEE Std. 802.3Ethernet interface, Digital Subscriber Line (DSL), V.90 modem, DOCSISmodem, hybrid fiber-coax (HFC) cable, or alternatively via wirelessmechanisms and protocols such as IS-95/CDMA-2000, Bluetooth™, IrDAinterface, IEEE Std. 802.11(a) or (b), Wireless Application Protocol(WAP)/WTLS, GPRS, GSM, third-generation or “3G” systems (3GPP/UMTS), orany other of myriad data communication systems and protocols well knownto those of skill in the communications arts. Creation of such computerprograms is readily accomplished by those of ordinary skill in theprogramming arts, and accordingly is not described further herein.

As shown in FIG. 1 b, the distributed software embodiment of thearchitecture 150 utilizes a server portion 152 and client portion 154distributed on respective server 156 and client devices 158, ostensiblydisposed at different physical locations, and in data communication witheach other via a network 160. The client portion 154 of the software canbe made “thin” to accommodate the comparatively lower hardwarecapabilities associated with many client devices 158. This architecture150 is especially well suited to an object oriented programmingenvironment (e.g., CORBA), as will be recognized by those of ordinaryskill. In use, the user manually or automatically establishescommunication between the client device and the sever portion, therebyallowing for transfer of data relevant to the impending transaction,such as the user's home address, credit card or payment information,etc. This approach obviates the user having to (i) stand at the kioskand enter the information manually, and (ii) saves time since the linkcan be established while the user is performing other tasks, such aswalking to the security checkpoint, parking their car, etc. Hence, theuser merely need walk to the kiosk, insert their chattel into a shippingelement 104, and deposit it on the reader 108. When authenticated andencoded, the receptacle will open to allow the element 104 to gravityfeed into the locked receptacle. Alternatively, the encoding can beperformed after entry into the receptacle (so as to frustratesurreptitious encoding and removal).

The aforementioned communication channel between the client device andmodule/server can also be used for two-way (i.e., forward and reversechannel) traffic, such as where transaction information is transmittedback to the client device for storage thereon. Alternatively, suchinformation may be transmitted to a third party or proxy, such as to ane-mail server or URL, wherein the information is directly or indirectlyprovided to the user (such as via a direct confirmatory e-mail, or as aline item on a monthly statement). The transmitted information mayoptionally include date/time, user ID, location, routing or trackingnumber, payment method, and even other information such as the weight ofthe shipment, results of a security scan (e.g., by an installed e-beam,X-ray, neutron, magnetometer, or chemical “sniffer” device co-locatedwith the kiosk), an image of the tracking label, estimated time/date ofdelivery, addressee, listing of contents, etc. The transfer ofinformation to the client device may be fully automated, conditionalupon assent from the user, or fully manual as desired.

The foregoing architecture may also be used to remotely initiateprocesses on other devices, such as PEDs, “smart” phones, networkagents, or home PCs. For example, in one exemplary variant, the clientdevice software is programmed to initiate an O/S window or Java appletrunning on a J2ME or equivalent equipped distant (e.g., PED) device upontransmission of a prompt corresponding to a given event. The window orapplet includes a user name/password feature, wherein the distant usermay instruct their client software to initiate certain algorithms oractions, such as transmission of personal information. In oneembodiment, a WAP 2.0 client and proxy are utilized. Alternatively, ofcourse, the distant end user may access the desired target IP address orother network node via the Internet or comparable network directly viathe PED, thereby effectuating the desired transaction.

In another embodiment of the invention, a SIP (Session InitiationProtocol) enabled device or comparable is used to establish a secureuser session to transmit the required information. In one variant, a“PoC” (push-to-talk {PTT} over cellular) approach is used, wherein theuser's mobile device includes an architecture that supportsinstantaneous communications via, e.g., the aforementioned SIP protocollayered over a UMTS IMS architecture of the type well known in thecommunications arts. For example, the user's client process can beconfigured to instigate a PoC session upon the user selecting thechattel proxy or application server as a “buddy” and invoking a PTTtransmission. So-called “PTx” or “push-to-anything” technology may beused for this purpose; e.g., pre-formatted packages of data necessary toperform chattel management or related functions can be immediatelytransmitted to the desired receiver via a one-button transmitfunctionality. These packets may be encapsulated for security purposes,e.g., via an application layer or other protocol such as Digest, IPSec,MIKEY, etc. Alternatively, where Bluetooth is utilized, the proxy orapplication server can conduct a (e.g., user-permissive) object pullaccording to the K-11 or OBEX profiles.

The proxy or application server may also require authentication of theuser (or mutual authentication) before any data push or pull is allowed,such as via a RAND challenge-based approach or the like. This helpsmitigate “spoofing” or surreptitious denial of service to the user, andsubstitution of an unauthorized device in place of the true chattelowner, or reception of the user's personal data by an unauthorizeddevice.

In another embodiment, the user's cellular telephone equipped withAssisted GPS (A-UPS) or other such locating system can be used toprovide forwarding information. Specifically, in one variant, the user'sA-GPS system is prompted to save the coordinates of a particularlocation where the package must be delivered. For example, a user maywant his chattel shipped to a third party where he/she is presentlylocated. The user can merely push a soft function key on their clientprocess, the soft function key either saving the coordinate for a latertime/date, or transmitting it to a designated agent (such as the chattelmanagement proxy) described elsewhere herein. That way, the user canmerely specify the saved/transmitted location as the destination,without having to remember addresses, zip codes, etc. for thedestination. Alternatively, the user can maintain a log or listing ofsaved GPS coordinates (and or address information) for easy recall at alater date.

In a manner somewhat analogous to the A-GPS, the user can also use theirclient process to exchange information with other user's devices (suchas via a Bluetooth “discovery” process or OBEX object exchange). Forexample, a user may want their chattel shipped to a friend they aretraveling with; the user can then handshake with their friend's deviceto pull/receive an electronic business card with the required deliveryinformation. Such an approach may be useful where the chattel is rentedout or intended for temporary use. Consider, for example, where the userrents a car, drives to the airport, leaves the car, and approaches thesecurity checkpoint. The user can (while at the car rental agency) useeither GPS location or “pushed/pulled” data as the basis for acommunication to the chattel management system, the data instructing thelatter as to where to return the car keys. Myriad other configurationswill be recognized by those of ordinary skill provided the presentdisclosure.

In yet another exemplary embodiment, a user can utilize a moresimplified device for communicating with the kiosk or module 110. Forexample, a coded RFID device (to be distinguished from that in theshipping element 104) may be used to automatically provide thekiosk/module 110 with the user's information, much in the way the priorart Mobil “Speed Pass” provides fueling station pumps with paymentinformation, or the MasterCard Paypass system allows for commercialtransactions. As another option, a USB key of the type well known in theart can be simply plugged into an accessible USB port of the module 110,thereby potentially both (i) transferring the user's information, and(ii) saving a user record of the transaction within the user's key. Thisapproach can be coupled with the rapid drop capability describedelsewhere herein, such that the kiosk associates a given chattel passedthrough its aperture or slot with a given user. For example, in onevariant, the user simply places the chattel in a holding slot orreceptacle, this action which prompts the user via a CRT, LCD, TFT,LEDs, audio prompt, or other UI to scan their RFID device past a sensor.After the kiosk controller/processor module and reader interrogates andretrieves the desired information from the RFID device (and also anotherentity or database, if desired, such as a pay authorization entity), theuser is presented with a visual or other display of the shippinginformation, at which point the user may confirm or cancel. Ifconfirmed, the kiosk then automatically opens the aperture or slot toreceive the user's device. Internal mechanisms within the kiosk theneither (i) tag the chattel as belonging to a particular user, such asvia attachment of a tag or label, insertion in a “tagged” shippingelement 104, diversion to a segregated chute or container, etc.Alternatively, the user can be prompted to affix a bar code, label, tag,or other identifying device, such as may be issued by the kiosk. Handsorting of the various chattels may then be accomplished by personnelemptying the kiosk receptacle. In another embodiment, computer-readablepurchase receipts using multi-dimensional bar codes of the type wellknown in the art, or other comparable mechanisms, may be used consistentwith the invention for encoding the chattels and/or shipping elements104.

As yet another alternative, the user may simply affix their personalRFID device to the chattel, scan as previously described (such as wherethe receptacle holding slot/aperture is integrated with or proximate thepersonal RFID reader), and authorize, at which point their chattel andtheir personal RFID device are collectively shipped to the destination.This variant obviates use of the second RFID device within the shippingelement, since the user's RFID device contains all of the necessaryinformation, some of which can be encoded onto the device at the time ofscan at the kiosk. For example, the user's RFID device can be equippedto have sufficient storage capacity and to receive data from the kioskreader/interrogator such that this encoding of additional informationoccurs seamlessly.

As yet another alternative, the kiosk may be fitted with a card readeradapted to receive cards pre-encoded (“pre-paid”) with a given monetaryvalue. For example, as is well known, cards bearing magnetic media maybe encoded at a remote terminal after the user deposits a given amountof currency. Such cards are currently employed, for example, inlibraries where photocopy machines are present, or fortelecommunications services. In the present context, the user mightdeposit a comparatively large amount of currency at the encodingterminal to encode or pre-pay for the deposited amount. Subsequentinsertions of the card into the card reader read the encoded data(correlating to a currency balance remaining), subtract the amount ofthe current transaction, and then recode the card commensurate with theremaining balance. In this fashion, the user may avoid having to carrycurrency or change each time they wish to use the terminal; rather, theysimply swipe or insert/retract the card from the reader/encoder, therebyautomatically debiting the card.

As yet another alternative, a user's pre-paid cellular device can beexchanged for services in shipping their chattel. In one exemplaryembodiment, the prepaid cellular device is configured to interface withthe kiosk (such as via direct physical or wired connection, or wirelesslink such as RF, inductive, IRdA, or other) such that the serviceprovider for the prepaid device authorizes payment of the chattelshipping via the cell phone/kiosk interface.

As even another alternative, the user who travels frequently canpre-code their devices using apparatus disposed at the POD, their home,or other locations. For example, in one embodiment, the user can attachan RFID devices to their chattels of any significant worth (e.g., cellphone, PDA, car keys, etc.) and encode them with their personalinformation. Alternatively, these devices may be disposed within thechattels at time of manufacture, and then encoded at or after purchaseby the user. Once encoded, these devices can then be immediately scannedwhen placed in proximity to the reader 108 at the kiosk or otherlocation. This obviates having to carry another currency source orpersonal RFID device.

FIGS. 4 a-4 d illustrate various exemplary embodiments of methods 400,420, 440, 460 of conducting financial or payment transactions usinge.g., the aforementioned wireless-enabled user device having personalinformation (such as e.g., credit, debit, or prepaid accountinformation) encoded therein.

In another embodiment, user-specific biometric data can be used alone orin conjunction with other data sources to authenticate or provide therequired input to the kiosk. For example, in one variant, the user'sfingerprint, retinal scan, facial recognition software scan, orvoiceprint are used in a two-of-two, three-of-three, etc. coincidencecircuit; i.e., when all inputs can be authenticated and correlated toone individual, the user's data is accessed (such as may be kept in asecure data facility in data communication with the kiosk or its proxy)and used as the basis for payment, shipping destination, etc.

In another embodiment, the system 100 can be coupled to the passengerreservation system operated by the relevant transportation agent (e.g.,airline or travel agent), such that upon entry of the user's personalinformation, the reservation system is accessed to retrieve the user'sdestination and/or routing information. The option of “route todestination” can then be presented to the user, such as via a touchscreen display on the kiosk, thereby allowing one-touch destinationselection. Other options may include “home”, “office”, or any partiesdesignated by the user either manually or via download of informationfrom the personal RFID device or client device (e.g., PDA or cellphone).

The foregoing approaches also have the added benefit (to varyingdegrees) of reducing overhead costs associated with setting up andmanaging the trust, since electronic transactions/reporting are oftenmore cost efficient that manual performance (such as by employeesinteracting with various entities in person or over the telephone or viamail).

It will also be recognized that use of the invention in a PODapplication may also carry certain economies of scale which can beexploited to the advantage of the carrier or others. For example, wheremany people traveling on an aircraft utilize the services describedherein to forward their chattel to their travel destination, that sameaircraft on which they are traveling can be used as the carriermechanism for these chattels. Hence, if the shipping and securityscanning procedures of the chattels can be accomplished rapidly enough,the chattels can optionally be loaded on the very same aircraft (oranother traveling to that same destination), and provided to thetraveler upon their egress from the aircraft using procedures which arein effect substantially the inverse of those described herein forregistering/shipping the chattel.

In yet another embodiment, the shipping service provided to the user canbe virtual in nature either in place of or in conjunction with thetangible services previously described. For example, where the user hasan electronic device with important information (e.g., laptop, PDA,etc.), yet they are not allowed to take the device or magnetic media onthe aircraft or other modality, they can (i) download the relevantinformation to a proxy agent (e.g., software process) running on thekiosk or its proxy, and direct the proxy agent to forward theinformation to a designated real or virtual storage location (such as ane-mail account, accessible URL, third party storage facility, etc.), and(ii) utilize the kiosk to physically transfer the device to a designatedlocation. Hence, where the user simply needs a few data files from theirPDA, they can download these using, e.g., a Bluetooth, WiFi, or otherwireless link and encrypted protocols to the proxy, which then forwardsthe files via e-mail to an account accessible by the user at thedestination. They then contemporaneously ship the device to their homefor later retrieval.

It will also be recognized that depending on the configuration of thetag 106, it may be encoded at time of deposit (or before/after, such asvia the user's PDA which can transmit data to the kiosk module 110 or aconnected device) with various other types of information, includingvisual or voice data. Hence, the shipping element can carry audibleinstructions or information when decoded at the destination using anappropriate reader with audio capability. Hence, the package can also beauthenticated to some degree by the recipient before opening it. Othertypes of information, including images, data, etc. can also be encodedinto the shipping element.

In another variant, the kiosk may be equipped to generate photographic,IR, X-ray, spectrographic, or even holographic images of the chattelfor, e.g., (i) electronic transmission to the user at the destination,such as where merely the appearance or other attribute of the device isimportant or sufficient; (ii) for a security or “purchase receipt”record of what was actually deposited at the kiosk, e.g., for insurancepolicy claim use or loss claims against the carrier; or (iii) use by thecarrier in sorting a bin of chattels. In the case of option (iii), usersmay simply swipe their personal RFID device, which after authorization,results in the kiosk generating the image of the chattel, one (tactileor electronic) copy being provided to the user either directly orindirectly, such as via paper copy or e-mail to the user's designatedaccount, and one for use by the carrier in sorting the receptacle. Otherdata relating to the chattel may also be obtained andencoded/transmitted, such as the item's weight, ferrouscontent/magnetization, electric field, luminance, fluorescence, orphosphorescence, fast neutron activation (FNA) signature, etc.

Referring now to FIG. 2 a-2 e, various embodiments of the “smart”shipping element 104 of the invention are described. In theseembodiments, the RFID tag 106 is disposed within a soil, pliablesubstrate (which may be part of the shipping element 104 itself orotherwise mated thereto, such as using an adhesive). Ideally, the tag106 is made as discreet as possible, thereby not alerting users to itspresence. An envelope (FIG. 2 a), box (FIG. 2 b), and tube (FIG. 2 c)are shown, although other forms may be used. The envelope pouch of FIG.2 a is ideally formed from a flexible material such as a polymer (e.g.,polyethylene), Tyvek, or even paper, although other materials such asaramid fibers, elastomers, shrink-wrap or thermally responsive polymers,or flexible composites may be used as well. In yet another embodiment(not shown) the non-metallic conductive inks of the tag 106 are printeddirectly on the pliable material during manufacture (and the IC matedaccordingly). The exemplary “Bistatix” tag 106 is generallysubstrate-agnostic, and therefore will operate suitably using thematerials listed above or others.

It will be apparent from the foregoing discussion that myriad differenttypes of shipping element 104 and tag 106 configurations may be used,the foregoing embodiment being merely exemplary. The receptacle/kioskmay be adapted to accept only certain shapes and/or sizes of element104, thereby limiting what can be deposited therein.

In yet another embodiment, the kiosk can be configured to automaticallypackage the chattel for the user, the latter merely depositing down asized slot or aperture. The slot or aperture (in conjunction with othermechanical elements) creates an upper bound on the size of chattel thatcan be inserted. The user then merely swipes their personal RFID devicepast the reader, which encodes the tag 106 on the shipping element,seals the element 104, and charges the user's account based on theprevailing cost structure (e.g., weight/destination/priority/specialhandling). If for whatever reason the item cannot be processed, such aswhere it is too heavy or the user's payment method is refused, the kioskmerely activates a chute at the bottom of the kiosk to eject the user'schattel into a tray, much akin to a vending machine. Again, the slot oraperture can be actuated only upon conditions precedent if desired, suchas authentication of the user's payment source, etc.

In another embodiment, the kiosk includes an LCD display and magneticcard reader of the type well known in the art e.g., similar to thosecommonly found on gasoline pumps. Such terminal also includes a “soft”keypad having a plurality of fixed or soft (programmable or softwarecontrolled) function keys. Such soft keypad may comprise, for example, acapacitive keypad, CRT-based “touch screen”, LCD, TFT, or any othersimilar technology. It will be recognized that mechanical keys or buttonassemblies may also be used; however, such devices are generally lessweather and foreign-matter resistant, and require greater maintenance.The function keys provide a number of different functions to the user,including a “print receipt” function (which may be coupled to a paper orelectronic receipt functionality), debit/credit select keys, transactionacknowledgement key, as well as an alpha-numeric keypad for enteringdata such as passwords, YIN inputs, etc. Such functions and technologyare well known to those of ordinary skill in the electronic arts, andaccordingly not described further herein.

Once the commands for the desired transactions have been received by thekiosk, the user is prompted and then selects their payment mode (e.g.,debit card) via a fixed function key, and then swipes their card throughthe card reader. When the magnetic strip (or smart card) is read by thereader, the user's debit information is transferred to the processor ofthe terminal, wherein the algorithm running thereon next initiates arequest for the user's password or “PIN” code via the display device (oralternatively via an audio interface driven by e.g., stored CELP voicedata file, not shown). After the user enters the PIN code or passwordvia the keypad, the authorization is obtained from the user's CCA orfinancial institution using any number of existing commercial financialtransaction secure links well known in the industry. Once authorized,the controller of the controller issues a command to enable the reader108 and, optionally unlock the locking device to allow insertion of theshipping element 104.

In yet another embodiment, the chattels of two or more users can beaggregated into a common shipment or shipping element 104 in order toreduce costs. For example, where a number of passengers in a securitycheckpoint are traveling to the same destination, and a plurality ofthem have chattels which cannot be taken on board, the users can pair upin groups of two or more and utilize a common shipping element. To thisend, the POD facility, air carrier, etc. can also provide or facilitatesuch a service, such as where the air carrier provides a kiosk wherebyall user's with rejected chattels can deposit their chattels forshipment to the destination via the passenger's aircraft or anotheraircraft/mode. This service may be provided either gratuitously or for afee.

In another embodiment, the user, carrier or service provider can provide“stick-on” or otherwise selectively attachable RFID, bar code, magneticstrips, or even printed tags which the user can apply to their chattelsfor tracking. For example, in one case, the user can apply a number ofpre-coded bar code labels to each of their chattels before travel (oreven at the POD once they know that the chattel cannot be transportedvia the selected modality). The user then simply scans the label with abar code reader provided a the kiosk (akin to a prior art supermarketcheckout kiosk), and deposits the chattel in the receptacle (whether ina shipping element 104 or not) for subsequent handling by the carrier.

To this end, users can establish pre-existing accounts, much like aprior art Fedex or UPS account, whereby the payment, shipment, etc.information is already known by the carrier. Multiple different optionscan also be selected by the user such as, e.g., at time of scanning,wherein the CRT or other kiosk display device prompts the user to selecta shipping destination, etc. The carrier can also utilize theaforementioned economies regarding co-location to make the service morecost efficient. For example, a kiosk at San Diego Airport is likely toreceive a large number of chattels from people in the greater San Diegoarea requesting that the chattels be returned to their home address,thereby allowing for grouping of deliveries for greater economy.

Furthermore, “intelligent” kiosk management can be utilized, whether inoperation and/or construction, so as to increase economies. For example,the kiosk or subsequent handling mechanisms can be configured toselectively sort the deposited shipping elements or chattels based ondestination. Furthermore, the controller module of the kiosk can beprogrammed to alert a parent or proxy node of the need for unloading ofthe receptacle under certain conditions, such as when a sufficientnumber of items for a given destination are received. In order to reducecost to the user, the latter may also be given the option to trade costfor latency; i.e., if a user can wait longer to get their chattel back,their cost of shipment can be lowered. This dynamic is particularlyrelevant to the present invention, since many travelers won't arriveback home for several days anyway, thereby increasing their tolerance tolonger shipping delays.

This metric can also be managed by the kiosk or carrier, such as wherekiosks are preferentially distributed (or alternatively are equippedwith receptacles equating to different shipping priorities or delays)such that their users are skewed towards the relevant portion of thepopulation. For example, a “long delay” shipment kiosk may be placed atthe international terminal, a shorter latency kiosk may be suited betterto the domestic or commuter flight terminals.

Also, the carrier or provider of the kiosk can coordinate with othercarriers (such as Fedex or UPS) so as to intelligently schedule andmanage distribution of the chattels to their destinations. For example,with data coupling of the kiosk carrier system with that of othercarriers, and coordination there between, duplication of routes can beminimized, such as through a cross-carrier distribution agreement.

As shown in FIG. 3, the Internet or other internet/intranet is used asthe basis for one embodiment of the “backbone” of the system 300. Thesystem 300 includes, for example, a backend server 306, a plurality of“front end” kiosk devices 308, including one or more mobile WAP-enabledwireless devices 310, the kiosks interfaced through a wireless basestation 312 and WAP gateway 314 of the type well known in the art, thelatter being in data communication with the Internet 302. The WAPassociated WTLS security protocols may also be employed if desired.Clearly, the use of WAP and a wireless topology in this embodiment ismerely illustrative.

The Internet 302 advantageously makes use of the well known andgenerally ubiquitous TCP/IP protocol, thereby assuring compatibility andaccess by a wide variety of existing client devices. The server 306 iscoupled to a database 307 which provides, inter alia, storage ofuser-related data and information such as personal information,statistics, security information, credit card information, etc. It willbe recognized that multiple database entities may be used, such multipleentities being either co-located or disparate. The database 307 may alsobe functionally (as opposed to physically) partitioned and firewalled,such that various types of data are restricted from access by certainentities. Additionally, the POD kiosks 308 may coupled directly to theInternet, LAN, WAN, MAN, intranet, etc. via a service provider 332(dedicated or otherwise).

The kiosks 308 may include for example audio-visual apparatus such as anH.323-compliant protocol suite adapted for transfer of audio-visual databetween the user and a customer service agent 336, whereby the user andagent can communicate audibly (such as via VoIP software installed onthe Kiosk and agent terminal) and visually to complete the transaction.Alternatively, the kiosk 308 can be configured with speech recognitionsoftware of the type now well known in the art to convert audible speechby the user to text or other data which is then utilized by the distantend to accomplish any number of functions such as chattel deposit androuting, providing on-demand information, etc. A text-to-speech (TTS)capability may also be employed, wherein pre-stored or dynamicallygenerated data files may be converted to audible speech at the kiosk.Alternatively, pre-stored CELP or similar compressed speech data filesmay be decompressed and played at the Kiosk to provide audioinformation.

A capacitive or other type of touch screen is optionally provided as aninput device, with the display of the kiosk 308 (not shown) acting asboth a display device and an input device, thereby simplifying the userinterface.

In another embodiment, a peer-to-peer arrangement (either aided by anetwork agent or server, or true P2P) may be used as the model forcommunications between entities, whether customer-to-carrier,customer-to-customer, carrier-to-carrier, etc.). It is even envisionedthat a user-based bidding or barter system may be established, such aswhere users may place bids on unclaimed chattels (somewhat akin to theprior art “eBay” paradigm), or barter between themselves via P2P toexchange chattels. For example, a user unable to carry a given chattelon an aircraft may invoke a P2P session over their WiFi and solicit abid for the chattel form another party on say, an incoming aircraft orwaiting to pick up a passenger in the terminal. The selling user canthen deposit the chattel in a nearby kiosk as described elsewhereherein, and the purchaser can be electronically enabled to access thechattel after payment is made. Hence, the kiosk can act as an electronictransaction arbiter and temporary storage location, for a fee to beextracted from the seller or buyer (or both). The particular kiosk wherethe chattel is deposited can also be readily identified to the purchaservia their PED or other means, such as a page to their cell phone, etc. Auser can also reroute their chattel to another location after deposit.These transactions can also be conducted via cell phone if desired,again with the kiosk or system 100 acting as the intermediary for thetransaction.

It will be recognized that myriad different audio, display, and inputtechnologies may be utilized consistent with the invention to transferinformation between the user and the “agent” of the carrier.

Furthermore, the term “kiosk” is not limited to any particular physicallayout, location, or arrangement. For example, a kiosk may be fixed ormobile, stand-alone or as part of another structure or component, indooror outdoor, etc.

Also, the kiosks or their components also need not be in one physicallocation; rather a “virtual” kiosk scattered at various locationsthroughout the POD for example is envisaged, acting electronically asone kiosk. In this fashion, data received and actions taken by variousdifferent physical kiosks can be coordinated and/or analyzed as desired.

Furthermore, the kiosks of the present invention(s) need not be fixed,but may also be mobile, such as where they are mounted on vehicles whichare roving in nature. In one variant, an airport cart is configured witha mobile kiosk with secure WiFi or UWB link; the driver drives the cartto different security locations periodically to pick up chattels fromusers (or merely allow them to interact with the kiosk as previouslydescribed herein), or even for incidental user contact, much the way onewaves down a taxicab.

As yet another option, the interface between the shipping agent or itsproxy and the user may be implemented using a virtual private network(VPN) of the type well known in the art, which provided secureend-to-end communications between two or more points via an untrustednetwork such as the Internet. This embodiment may be implemented via theaforementioned WAP/WTLS technology suite and associated protocol stacks,through a dedicated or shared RADIUS server and tunneled packets, or anyother comparable arrangement capable of restricting access to thetransmissions, database or other repositories of information to onlyauthorized personnel. Use of such security technology may be animportant criteria in certain contexts, since users may want to havetheir personal data (i.e., identity, place of residence, credit cardinformation, etc.) maintained in strict confidence to avoid any fear ofsurreptitious theft and use of this information without authorization(e.g., “identity theft”), or attempts to interfere with the delivery ofthe shipping element at or near its destination.

The Internet may also advantageously be used as a medium for receipt ofshipment requests or solicitation of new prospective participants, inthat a URL (e.g., designating a worldwide website) may be used toprovide information, receive data, requests for additional information,etc. Furthermore, meta-tags embedded in the site will key Internetsearch engines to locate the site upon the initiation of an appropriatesearch using an Internet search engine (such as Yahoo!, Google™, etc.).In one embodiment, an applet or comparable browser mechanism isinitiated upon such search, the applet being configured to alert theuser to the existence of the URL/website when a search havingappropriate parameters is initiated.

It will be appreciated that the chattel transport services describedherein may also be provided in conjunction with other services, whetherrelated or not. For example, chattels may be stored (either at the PODor another location) for a finite period of time at the user's request,somewhat like an airport or bus terminal locker. In one variant, thetransport destination may be designated as OPOD (original POD), suchthat the user can merely pay for the storage of his/her chattel, andthen recover it at a later time, such as upon the completion of theirreturn flight. Others may also be authorized to access the storagefacility/receptacle, such as family members, etc.

Other services may comprise, e.g., cleaning, repair, maintenance,testing, etc. of the chattel, registration in a database, etc. The usermay also be presented with POS (point of sale) options at the POD forthese or other goods/services, such as flight insurance, chattelshipment insurance, MP3 or music downloads, or even carrier-authorizedreplacement chattels for those being surrendered by the user.

It is also noted that the various tracking or marking mechanismsdescribed herein (i.e., RFID, bar codes, magnetic strips, etc.) are notexclusive of one another, and in fact may be used together to advantage,such as to perform different functions at different points throughoutthe processing or transit chain of the chattels. For example, the RFIDtagging approach may be more suitable to one portion of the chain (suchas user interface at the kiosk), whereas magnetic media may be moredesirable for other processing tasks. These different media may also bemade selectively removable if desired, so that a chattel or shippingelement 104 can be “marked” and “unmarked” if desired during processing,delivery, security scanning, etc. Encodings used on the shippingelements can also be made human readable if desired to facilitate suchprocessing.

It should be recognized that while the foregoing discussion of thevarious aspects of the invention has described specific sequences ofsteps necessary to perform the methods of the present invention, othersequences of steps may be used depending on the particular application.Specifically, additional steps may be added, and other steps deleted asbeing optional. Furthermore, the order of performance of certain stepsmay be permuted, and/or performed in parallel with other steps. Hence,the specific methods disclosed herein are merely exemplary of thebroader methods of the invention.

While the above detailed description has shown, described, and pointedout novel features of the invention as applied to various embodiments,it will be understood that various omissions, substitutions, and changesin the form and details of the device or process illustrated may be madeby those skilled in the art without departing from the invention. Thedescribed embodiments are to be considered in all respects onlyillustrative and not restrictive. The scope of the invention is,therefore, indicated by the appended claims rather than the foregoingdescription. All changes that come within the meaning and range ofequivalence of the claims are to embraced within their scope.

What is claimed is:
 1. A mobile user device enabled for wirelesspayment, comprising: a power source; a cellular wireless interface; aglobal positioning system (GPS)-based wireless receiver; and a shortrange radio frequency device disposed in the mobile user device andpowered at least in part by the power source; wherein the mobile userdevice is configured to be encoded with payment source informationspecific to a pre-existing payment account of a user of the device, thepayment source information allowing the user to use the mobile userdevice to wirelessly pay for at least one of goods or services byplacing the mobile user device in proximity to a reader apparatus at apoint of sale of said goods or services; wherein the short range radiofrequency device and payment source information obviates the user fromhaving to carry at least one other currency or payment source on theirperson; wherein the short range radio frequency device comprises anactive radio frequency identification device configured to generate atransmission including at least a portion of the payment sourceinformation; and wherein the short range radio frequency device isdisposed in the mobile user device at time of manufacture of the mobileuser device, and comprises an integrated circuit with data memory and anantenna.
 2. The device of claim 1, wherein the short range radio deviceis configured to generate the transmission in reply to a radio frequencysignal from the reader apparatus, the signal which is received by theshort range radio frequency device when the mobile user device isbrought in proximity to the reader apparatus.
 3. The device of claim 1,wherein the encoding with payment source information comprises encodingof the mobile user device by a third party after manufacture of themobile user device.
 4. The device of claim 1, wherein the at least aportion of the payment source information in the transmission comprisesinformation related to a credit or debit card account of the user, thedevice configured to store the information in a secure data repositorythat restricts access to only one or more authorized persons, the accesssubject to receiving user-specific authentication information from theuser, the authentication information being useful to authorize thewireless payment for the at least one of the goods or services.
 5. Thedevice of claim 4, wherein the mobile user device comprises at least onecommerce transaction related application computer program configured torun thereon, the at least one application having been downloaded to themobile user device via a network after the device's manufacture.
 6. Thedevice of claim 1, wherein the mobile user device further comprises aWireless Application Protocol (WAP) 2.0 client process.
 7. The device ofclaim 1, wherein the mobile user device comprises a smart-phone, and thepayment source information comprises payment source information for anaccount that is associated with a billing account for cellular servicefor the smart-phone.
 8. The device of claim 1, wherein the mobile userdevice comprises a smartphone, and the payment source informationcomprises information associated to a pre-existing debit or credit cardaccount, the debiting of the account which is configured to be at leastin part caused by the reader apparatus via a secure network.
 9. Thedevice of claim 1, wherein the payment source information comprisesaccount information configured to enable access of a remote server withassociated database with user credit or debit card account-relatedinformation for verification and charging of the credit or debit cardaccount for the at least one goods or services.
 10. The device of claim1, further comprising at least one Java-based application 0computerprogram operative to run on the mobile user device, the at least oneapplication computer program having a commerce transaction-based theme.11. The device of claim 10, wherein the at least one applicationcomputer program has been downloaded via a network onto the mobile userdevice after the device's manufacture.
 12. The device of claim 1,further comprising at least one application computer program operativeto run on the mobile user device, the at least one application computerprogram having a commerce transaction-based theme and having beendownloaded via a network onto the mobile user device after the device'smanufacture, the at least one application comprising an applet or windowthat can be instantiated to permit the user to enter at least one of auser name or password.
 13. The device of claim 1, wherein the paymentsource information comprises information associated with a pre-paidaccount, the user having previously financially compensated an issuer ofthe pre-paid account before the payment using the short range radiofrequency device.
 14. The device of claim 1, further comprising both aBluetooth wireless interface and a Wi-Fi wireless interface.
 15. Thedevice of claim 14, wherein the short range radio device is configuredto generate the transmission in reply to a radio frequency signal fromthe reader apparatus, the signal which is received by the short rangeradio frequency device when the mobile user device is brought inproximity to the reader apparatus.
 16. The device of claim 15, furthercomprising at least one application computer program operative to run onthe mobile user device, the at least one application computer programhaving a commerce transaction-based theme and having been downloaded viaa network onto the mobile user device after the device's manufacture,the at least one application comprising an applet or window that can beinstantiated to permit the user to enter at least one of a user name orpassword.
 17. The device of claim 16, further comprising a clientapplication program configured for communication with a server program,communication between the client application and the server programbeing useful for communication of data to the mobile user device forstorage thereon, the data for communication comprising data relating tothe payment for the goods or services.
 18. The device of claim 1,further comprising a client application program configured forcommunication with a server program, communication between the clientapplication and the server program being useful for communication ofdata to the mobile user device for storage thereon, the data forcommunication comprising data relating to the payment for the goods orservices.
 19. The device of claim 18, wherein the server program isconfigured to require authentication of the user before any of saidcommunication of said data is allowed.
 20. The device of claim 1,wherein said GPS receiver enables provision of location data associatedwith a particular location relating to the goods or services or thepoint of sale.
 21. The device of claim 1, further comprising anapplication program configured to enable reception of data at the mobileuser device for storage thereon, the received data comprising datarelating to the payment for the goods or services.
 22. A mobile userdevice enabled for wireless payment, comprising: a power source; acellular wireless interface; a global positioning system (GPS)-basedwireless receiver; a wireless LAN (WLAN) interface; a Bluetoothinterface; and a short range radio frequency device disposed on or inthe mobile user device and powered at least in part by the power source;wherein the mobile user device is configured to be encoded with paymentinformation specific to the user and allowing the user to use the mobileuser device to wirelessly pay for at least one of goods or services byplacing the mobile user device in proximity to a reader apparatus at apoint of sale of said goods or services; wherein the short range radiofrequency device and payment information obviates the user from havingto carry at least one other currency or payment source on their person;wherein the radio frequency device comprises a radio frequencyidentification device having an active mode and configured to generate acommunication including at least a portion of the payment information;and wherein the encoding with information specific to a user of thedevice, the information including payment information, comprisesencoding of the mobile user device after its manufacture.
 23. The deviceof claim 22, wherein the short range radio device is configured togenerate the communication in reply to a radio frequency signal from thereader apparatus, the signal which is received by the short range radiofrequency device when the mobile user device is brought in proximity tothe reader apparatus.
 24. The device of claim 22, wherein the at least aportion of the payment source information in the communicationscomprises information associated with a credit card account, the deviceconfigured to store the information in a secure data repository thatrestricts access to only one or more authorized persons.
 25. The deviceof claim 24, wherein the device is further configured to elicituser-specific authentication information from the user, theauthentication information being useful to authorize the wirelesspayment for the at least one of the goods or services.
 26. The device ofclaim 25, wherein the elicitation of user-specific authenticationinformation from the user comprises use of an applet or windowinstantiated on the mobile user device by which the user is prompted toenter a password.
 27. The device of claim 25, wherein: the mobile userdevice comprises at least one commerce transaction related applicationcomputer program configured to run thereon; and the payment sourceinformation comprises a pre-existing financial account, the accountwhich is accessible to the interrogation apparatus or reader via aninternetwork.
 28. The device of claim 22, wherein the payment sourceinformation comprises account information configured to enable access ofa remote server with associated database with user credit or debit cardaccount-related information for verification and charging of the creditor debit card account for the at least one goods or services.
 29. Thedevice of claim 22, further comprising: at least one Java-basedapplication computer program operative to run on the mobile user device,the at least one application computer program having a commercetransaction-based theme, the at least one application computer programdownloaded via a network onto the mobile user device after the device'smanufacture.
 30. The device of claim 22, wherein the payment sourceinformation comprises information associated with a pre-paid account,the user having previously financially compensated an issuer of thepre-paid account before the payment using the short range radiofrequency device.
 31. The device of claim 22, further comprising acommerce-related client application configured to run on the mobiledevice, wherein said GPS receiver and said application cooperate toenable provision and use of location data associated with a particularlocation relating to the goods or services or the point of sale.
 32. Amethod of causing enabling of a cellular-enabled smart-phone forwireless payment for at least one of goods or services, the methodcomprising: providing a cellular-enabled smart-phone, the smart-phonecomprising a global positioning system (GPS)-based receiver and a shortrange radio frequency device disposed thereon or therein at time ofmanufacture of the smart-phone, the smart-phone configured to be encodedwith information associated with at least one of an existing credit ordebit or prepaid account of a user of the smart-phone; and enablingencoding of the smart-phone by the user with said information; whereinthe encoded smart-phone with radio frequency device is configured to,when placed in proximity to reader apparatus disposed at a point of saleof goods or services, allow: the user to use the smart-phone to conducta wireless payment transaction for at least one of the goods or servicesfrom the at least one existing account by way of at least one datatransmission from the radio frequency device, the transmissioninstigated at least in part by electromagnetic energy radiated by thereader apparatus, the at least one data transmission comprising at leasta portion of the information relating to the at least one existingaccount of the user; and the smart-phone to receive data related to thewireless payment transaction for storage thereon; and wherein theconduct of the wireless payment transaction further causes data relatedto the transaction to be transmitted to a network entity for inclusionon a monthly account statement of the user.
 33. The method of claim 32,wherein the data related to the transaction includes at least one of (i)a date/time; (ii) at least one of a) a user identification and/or b) alocation of the transaction, and/or (iii) a payment method.
 34. Themethod of claim 32, wherein the data related to the transaction includes(i) a date/time; (ii) a location of the transaction, and (iii) a paymentmethod.
 35. The method of claim 34, wherein transfer of the data to thesmart-phone is fully automated.
 36. The method of claim 34, wherein theencoded smart-phone with radio frequency device is further configuredto, when placed in proximity to a reader apparatus disposed at a pointof sale of goods or services, allow instantiation of an applet or windowon the smart-phone to prompt a user for entry of at least a passwordassociated with the account.
 37. A method of causing enabling of acellular-enabled smart-phone for wireless payment for at least one ofgoods or services, the cellular-enabled smart-phone comprising a powersource and a short range radio frequency device disposed thereon ortherein at time of manufacture of the smart-phone, the smart phoneconfigured to be encoded with information relating to at least one of acredit or debit or prepaid account associated with a user of thesmart-phone, short range radio frequency device comprising at least onemode of operation whereby it uses the power source to generate a datatransmission, the method comprising: identifying the credit or debit orprepaid account for the user; and enabling encoding of the smart-phoneby the user with said information; wherein the encoded smart-phone withradio frequency device is configured to, when placed in proximity to areader apparatus disposed at a point of sale of goods or services,allow: the user to use the smart-phone to conduct a wireless paymenttransaction for at least one of the goods or services from the at leastone existing account by way of at least the data transmission from theradio frequency device, the at least one data transmission comprising atleast a portion of the information relating to the at least one existingaccount associated with the user; and the smart-phone to receive datarelated to the wireless payment transaction for storage thereon; andwherein the method further comprises, upon conduct of the wirelesspayment transaction, transmitting data related to the transaction to anetwork entity for inclusion on a monthly account statement of the user.38. The method of claim 37, wherein the data related to the transactionincludes at least (i) a date/time; and (ii) a payment method.
 39. Themethod of claim 38, wherein transfer of the data to the smart-phone isfully automated.
 40. The method of claim 37, further comprising enablingthe encoded smart-phone with radio frequency device to, when placed inproximity to a reader apparatus disposed at a point of sale of goods orservices, instantiate an applet or window on the smart-phone to prompt auser for entry of at least a password associated with the account.
 41. Amethod of causing enabling of a cellular-enabled smart-phone forwireless payment for at least one of goods or services, thecellular-enabled smart-phone comprising a global positioning system(GPS)-based receiver and short range radio frequency device disposedthereon or therein at time of manufacture of the smart-phone, thesmart-phone configured to be encoded with information relating to anexisting credit or debit or prepaid account of a user of the device, themethod comprising: accessing the existing credit or debit or prepaidaccount of the user in order to produce said information; enablingencoding of the smart-phone with said information; wherein the encodedsmart-phone with radio frequency device is configured to, when placed inproximity to a reader apparatus disposed at a point of sale of goods orservices, allow: the user to use the smart-phone to conduct a wirelesspayment transaction for at least one of the goods or services from theat least one existing account by way of at least one data transmissionfrom the radio frequency device, the transmission instigated at least inpart by electromagnetic energy radiated by the reader apparatus, the atleast one data transmission comprising at least a portion of theinformation relating to the existing payment account associated with theuser; and the smart-phone to receive data related to the wirelesspayment transaction for storage thereon, the data related to thetransaction including at least one of (i) a date/time; (ii) at least oneof a) a user identification and/or b) a location of the transaction,and/or (iii) a payment method, and transfer of the data to thesmart-phone being fully automated and requiring no further user actionor intervention.
 42. The method of claim 41, wherein the method furthercomprises, upon conduct of the wireless payment transaction,transmitting data related to the transaction to a network entity forinclusion on a monthly account statement of the user.
 43. The method ofclaim 41, further comprising enabling the encoded smart-phone with radiofrequency device to, when placed in proximity to an interrogation orreader apparatus disposed at a point of sale of goods or services,instantiate an applet or window on the smart-phone to prompt a user forentry of at least a password associated with the account.
 44. Acellular-enabled smart-phone capable of wireless payment for at leastone of goods or services, the cellular-enabled smart-phone comprising aglobal positioning system (GPS)-based receiver and short rangeactive-capable radio frequency device disposed thereon or therein attime of manufacture of the smart-phone, the smart-phone configured to beencoded with information relating to an existing credit or debit orprepaid account of a user of the device, the smart-phone configuredaccording to the method comprising: accessing the existing credit ordebit or prepaid account of the user in order to produce saidinformation; enabling encoding of the smart-phone with said information;wherein the encoded smart-phone with radio frequency device isconfigured to, when placed in proximity to an interrogation or readerapparatus disposed at a point of sale of goods or services, allow: theuser to use the smart-phone to conduct a wireless payment transactionfor at least one of the goods or services from the at least one existingaccount by way of at least one data transmission from the radiofrequency device, the transmission powered at least in part by a powersource of the smart-phone, the at least one data transmission comprisingat least a portion of the information relating to the existing paymentaccount associated with the user; and the smart-phone to receive datarelated to the wireless payment transaction for storage thereon.
 45. Amethod of conducting a wireless payment transaction for at least one ofgoods or services using a cellular-enabled mobile device, comprising:providing a reader apparatus at a point of sale, the reader apparatusconfigured to communicate with a short range radio frequency devicedisposed on or within the cellular-enabled mobile device at time ofmanufacture of the mobile device, the radio frequency device encodedwith information specific to a user of the device, the informationincluding information relating to at least one of an existing credit ordebit or prepaid account associated with the user; communicating withthe radio frequency device when the mobile device is placed in proximityto the reader apparatus, the communicating comprising at leasttransmitting radio frequency energy to the radio frequency device andreceiving from the radio frequency device a subsequent communication,the subsequent communication comprising at least a portion of theinformation relating to at least one of an existing credit or debit orprepaid account associated with the user; causing the user to enteruser-specific authentication or security information necessary tofurther process the payment transaction; after the user has entered theuser-specific authentication or security information, utilizing at leastthe at least portion of the information relating to at least one of anexisting credit or debit or prepaid account associated with the user tocomplete processing of the payment transaction; transmitting datarelated to the payment transaction to an entity associated with anaccount associated with the user of the mobile device; and transmittingdata related to the payment transaction to the mobile device for storagethereon.
 46. The method of claim 45, wherein the data transmission tothe mobile device comprises transmitting data including at least (i) adate/time; and (ii) a payment method.
 47. The method of claim 46,wherein the method further comprises storing on the mobile devicelocation data obtained from a GPS-based receiver of the mobile devicerelating to the point of sale.
 48. The method of claim 45, wherein thecausing the user to enter user-specific authentication or securityinformation necessary to further process the payment transactioncomprises causing instantiation of an applet or window on the mobiledevice to prompt a user for entry of at least a password associated withthe account.
 49. A mobile user device enabled for wireless payment,comprising: a power source; a cellular wireless interface; a wirelessLAN (WLAN) interface; a Bluetooth interface; a global positioning system(GPS)-based wireless receiver; and a short range radio frequency devicedisposed on or in the mobile user device; wherein the mobile user deviceis configured to be encoded with payment source information specific toa user of the device, the payment source information allowing the userto use the mobile user device to wirelessly pay for at least one ofgoods or services by placing the mobile user device in proximity to areader apparatus at a point of sale of said goods or services; whereinthe short range radio frequency device and payment source informationobviates the user from having to carry at least one other currency orpayment source on their person; wherein the radio frequency devicecomprises a radio frequency identification device configured to utilizethe at least the power source to generate a transmission to the readerapparatus, the transmission including at least a portion of the paymentsource information; and wherein the short range radio frequency deviceis disposed in the mobile user device at time of manufacture of themobile user device, the radio frequency device comprising an integratedcircuit with data memory, and an antenna.
 50. The device of claim 49,further comprising at least one computer program configured toinstantiate an applet or window on the mobile device to prompt a userfor entry of at least a password associated with the account.
 51. Thedevice of claim 50, wherein the mobile device is configured to receivedata related to the payment transaction at the mobile device for storagethereon, the data to be received and stored by the mobile devicecomprising transmitting data including at least (i) a date/time; and(ii) a payment method.
 52. The device of claim 50, wherein the mobiledevice is configured to receive an MP3 or music download at the mobiledevice for storage thereon as part of the payment transaction.
 53. Thedevice of claim 50, wherein the mobile device is further configured tostore, on the mobile device, location data obtained from the GPS-basedreceiver and relating to the point of sale.
 54. A method of conducting awireless payment transaction for at least one of goods or services usinga cellular-enabled mobile device, comprising: providing a readerapparatus for use at a point of sale, the reader apparatus configured tocommunicate with a short range radio frequency device disposed on orwithin the cellular-enabled mobile device at time of manufacture of themobile device, the radio frequency device encoded with informationspecific to a user of the device, the information including informationrelating to at least one of an existing credit or debit or prepaidaccount associated with the user, the communication with the radiofrequency device occurring when the mobile device is placed in proximityto the reader apparatus, the communication comprising at leasttransmission of radio frequency energy to the radio frequency device andreceipt from the radio frequency device a subsequent communication, thesubsequent communication comprising at least a portion of theinformation relating to at least one of an existing credit or debit orprepaid account associated with the user; wherein as part of thetransaction, the user enters user-specific authentication or securityinformation necessary to process the payment transaction; utilizing atleast the at least portion of the information relating to at least oneof an existing credit or debit or prepaid account associated with theuser to complete processing of the payment transaction; transmittingdata related to the payment transaction to an entity associated with anaccount associated with the user of the mobile device; and causingtransmission of data related to the payment transaction to the mobiledevice for storage thereon.
 55. The method of claim 54, wherein the datatransmission to the mobile device comprises transmitting data includingat least (i) a date/time; and (ii) a payment method.
 56. The method ofclaim 55, wherein the method further comprises storing on the mobiledevice location data obtained from a GPS-based receiver of the mobiledevice relating to the point of sale.
 57. The method of claim 54,wherein the user entry of user-specific authentication or securityinformation necessary to process the payment transaction comprises entryafter instantiation of an applet or window on the mobile deviceconfigured for entry of at least a password associated with the account.