Preference-driven advertising systems and methods

ABSTRACT

The present invention relates to a person&#39;s personal preferences. These personal preferences are detected or determining according to several different systems and methods and based on these preferences personal services are provided to the person. Certain embodiments of the invention utilize a “so-called” smart card, including a card with EMV contacts, for determining those preferences and/or for providing services.

CROSS-REFERENCE TO RELATED APPLICATIONS

The present application claims priority, under 35 U.S.C. 119(e), to theprovisional patent application filed on Jul. 15, 2015, assignedapplication No. 62/192,688, and entitled Method and System for SecurelySuggesting Loyalty and Payment Account Information and AdvertiseConsumer Information, which is incorporated herein.

The present application also claims priority, under 35 U.S.C. 119(e), tothe provisional patent application filed on Jul. 30, 2015 and assignedapplication No. 62/198,817, entitled Methods and Systems Related toMulti-Factor, Multi-Dimensional Hidden Security PINs, which isincorporated herein.

The present application also claims priority, under 35 U.S.C. 119(e), tothe provisional patent application filed on Jul. 30, 2015 and assignedapplication No. 62/198,989, entitled Electronic Crypto-CurrencyManagement Method and System, which is incorporated herein.

The present application also claims priority, under 35 U.S.C. 119(e), tothe provisional patent application filed on Dec. 2, 2015 and assignedapplication No. 62/262,138, entitled Method and System to Organize andManage Financial Transactions, which is incorporated herein.

FIELD OF THE INVENTION

The present invention relates to the general field of consumer datamanagement and mobile services, specifically personalized services andpreference management.

BACKGROUND OF THE INVENTION

Today, more information is collected about an individual than everbefore in order to personalize advertisements and marketing, as well asproducts and services. Data collection prior art includes methods suchas a variety of web analytics that collect user behavior while on theinternet. Likes and dislikes, number of clicks on topics, previoussearch results, transaction trends and the like are all used withmethods such as AdSense and others to personalize marketing to theindividual products and services that the individual has shown interestin the past. Yet, collection of information is more difficult away fromthe computer, where vacationers, shoppers and the like frequent.Furthermore, some individuals may wish to have information collectedfrom them, while others may not. Likewise, privacy is also a concernbetween some consumers who like to receive advertisements and othersthat do not.

It is well-known to those in the art that relevance-driven advertisingyields better results than general digital marketing and merchandisingtechniques. WO 2008170176 A2 illustrates a method is used whereinadvertisements may be sent out to consumers who “opt in” to a givenadvertisement network. In some embodiments advertisements may be sentbased on the user's personal preferences, while in other embodiments,directed advertising may be based on the user's search history. EP2357035 A2 discusses a method is used wherein an advertising serversends advertisements to an advertising engine, which is capable ofreceiving the advertisements through a given application.

US published patent application 20140136309 describes a method to payelectronically with a single financial card from a single account.Herein, an intermediary account is utilized to make a payment. First, atransaction-processing request is sent to an optimization engine, whichthen processes the information as directed by a database. A secondtransaction request is then sent to a financial instrument of theintermediary account such as a credit card. In some embodiments, thefinancial instrument is selected to benefit the consumer. For example,in some cases the financial instrument with the most rewards may beselected. Similar methods are described in prior art such as USpublished patent application 20140136353 and WO 2015009427 A1.

US published patent application 20120130885 describes a method wherein abuyer is identified with a given institution. Some embodiments includemethods wherein a time interval is used to add security, while in otherembodiments biometrics may be used to identify the user.

Described in US published patent application 20090287564 is a method andsystem to process a transaction. Herein an account is selected by givencomputer instructions. In some embodiments these instructions select theaccount for the transaction based on given rewards information.

Described in U.S. Pat. No. 8,489,112 is a method and system to sendawards to a mobile phone, when the mobile phone enters an enclosedspace. The phone is detected when it replies to an ultrasonic sound sentby a transmitter within the enclosed space. A computer server thenresponds by sending an award to the mobile phone. In some embodiments,the enclosed space may be a retail store. The retail store may then, asin one method, recognize the award as having monetary value.

US published patent application 20130707895 is a method and system toadvertise marketing information to a mobile device. The method describedutilizes a series of tracking devices and tags along with a custom salespresentation module to communicate and send advertising and monetaryrewards information to a user's mobile device. Advertising informationis displayed graphically to the user and in some embodiments the usermay respond to the advertisements.

Described in US published application 20130282474 is a method and systemto provide rewards to a mobile computing device. In some embodiments asdescribed herein, the mobile computing device is a multi-dynamic card,which is utilized to receive rewards based on the information it maygive to a merchant terminal. The more information the card provides, themore rewards it receives. In some embodiments, the reward may only beactivated and used after the multi-dynamic card has been shown to themerchant terminal.

Some prior art, such as the method described in U.S. Pat. No. 8,775,241uses a POS system to advertise rewards to the consumer. Herein, a useris able to scroll through a series of different rewards options as insome embodiments, while also being able to store loyalty information onhis smart card as in other embodiments.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates a the provision of a greeting personal service.

FIG. 2 illustrates devices for sharing preferences for use in tailoringpersonal services.

FIG. 3 illustrates an IoT environment.

FIG. 4 illustrates services.

FIG. 5 illustrates restrictions on the release of data

FIG. 6 illustrates providing a tailored advertisement on a billboard.

FIG. 7 illustrates a smart card.

FIG. 8 illustrates components of a computer.

FIGS. 9-11 illustrate EMV cards.

FIG. 12 illustrates internal components of an EMV card.

FIG. 13 illustrates an EMV card and a card reader.

FIGS. 14 and 15 illustrate charging an EMV card.

FIG. 16 illustrates a swiping action using an EMV card.

FIG. 17 illustrates EMV contacts.

FIGS. 18-21 illustrate alternative embodiments for providing wake-upservices.

FIG. 22 illustrates proximity detection between two devices.

FIG. 23 illustrates an information providing service.

FIG. 24 illustrates use of a card to make a transaction.

FIGS. 25 and 26 illustrate business-related transactions.

FIGS. 27 and 28 illustrate gesture and position PINS.

FIG. 29 illustrates a request for check-in information.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

Before describing in detail the particular methods and apparatusesrelated to mobile services to support information transfer betweenindividuals and other entities to facilitate personalized transactionssuch as but not limited to travel, entertainment, retail and financial,it should be observed that the embodiments of the present inventionreside primarily in a novel and non-obvious combination of elements andmethod steps. So as not to obscure the disclosure with details that willbe readily apparent to those skilled in the art, certain conventionalelements and steps have been presented with lesser detail, while thedrawings and the specification describe in greater detail other elementsand steps pertinent to understanding the embodiments.

The presented embodiments are not intended to define limits as to thestructures, elements or methods of the inventions, but only to provideexemplary constructions. The following embodiments are permissive ratherthan mandatory and illustrative rather than exhaustive.

The present application describes several different inventions relatedto, in one sense, a person's personal preferences. Detecting ordetermining those preferences and providing personal services responsiveto those services are two aspects of the present invention. Certainembodiments of the invention utilize a “so-called” smart card, includinga card with EMV contacts, for determining those preferences and/or forproviding services.

PROVIDING PERSONALIZED SERVICES SUMMARY: This invention describesmethods and systems to securely collect, manage and distribute databetween two or more devices 10 to facilitate personalized services asshown in FIG. 1. “Personalized services” 30 modify or customize contentin response to data received about one or more individuals, devices,and/or objects, called “entities” hereafter.

Personalized services enhance user experience while facilitating variousactivities such as but not limited to advertising, commerce, security,retail, marketing, event/location driven multi-media and virtually anytype of exchange between an individual and devices by customizingcontent responsive to preferences received from users or user devices.Services may be distributed across one or more devices that negotiatewith one another to transfer data, with the owner's permission, whichcan be granted at the time of data exchange, or in some embodiments,pre-authorized prior to the time of data exchange.

BASIC DESCRIPTION: As a non-limiting example, FIG. 1 describes a firstdevice 11, a cell phone in this example, receiving and sending data 20to a second device 12, a Point-of-Sale (PoS) terminal in this example,that then personalizes one or more services 50 in response to the datareceived from the first device. In a simple example, the personalizedresponse could be a greeting by a second individual, provided inresponse to data received from a second device, to welcome a firstindividual by name, member, or other identification data provided to thesecond device from the first device.

As a non-limiting extension to this example, the first device 11 mayperform a transaction with a second device 12, whereby the accountchosen to make a payment on the first device 11 is suggested (orpersonalized) by the second device 12 to the first device based onpreferences, location, merchant, loyalty, rewards or other information,as non-limiting examples, provided by the first or second devices 10.One or both of the devices 10 could then send personalized data 20,information specific to this transaction or loyalty/reward in thisexample, to the other, or one or both devices 10 may reach-back to oneor more remote services 30 or a third device (not shown) that then sendsdata 20 to one or more of the first or second devices 10.

As people shop, travel, conduct transactions, or dine and the like, theylike to take a number of items along. Unfortunately, few of these itemsare convenient to carry while at the beach or pool, and the collectionof multiple devices make it difficult to manage within pockets while ona run or other exercise. Cell phones, wallets, room keys and the likeare all items that are considered must haves while traveling, but don'tnecessarily conform to swimming in salt water or playing in the sand.Furthermore, no one device provides users with all the utility they mayrequire while on vacation, shopping, or dining.

To further illustrate the system of personalized services 30 responsiveto data 20 from one or more other devices, one device 12 become aware tothe presence of a first device 11 may exchange data 20 between thedevices 10 in close proximity with one another to promote personalizedservices 50, with reach-back to remote services 70 for closed-loopsystems between devices or services that are remote to one another asshown in FIG. 1.

This non-limiting example illustrates how a first device may becomeaware of a second or more devices described herein and may not onlysupport services among devices that are local to one another as shown inFIGS. 2 and 3, but also devices that are remote to one another, orcombinations of local, remote, network topologies, peer-to-peer, RFID,Bluetooth, Internet of Things (IOT) and the like to enable extendedecosystems that include devices that are remote and/or local inproximity to one another as shown in FIG. 1.

ECOSYSTEMS/RELATIONSHIPS BETWEEN DEVICES AND HOW THEY COMMUNICATE TOPASS INFORMATION—INTER-AWARE: According to embodiments of the presentinvention, one or more of these features may be supplied within one ormore devices 10 that interact with data 20 to provide personalizedservices. These collections of devices and services that interact and/orbecome inter-aware with one another as shown in FIG. 2 are referred toas “inter-aware systems”, groups, “clusters” or “ecosystems” 40,hereafter.

IOT (INTERNET OF THINGS) AND OTHER DEVICE ECOSYSTEMS: The invention isnot limited by any one specific form factor or device, but may consistof electronics within various devices including IOT (Internet of Things)devices, wearables, portables, mobile devices, computers and the like,collectively called “devices” hereafter. Likewise, the grouping,clusters and/or interactions between devices are not limited to a single“ecosystem” of devices and applications, but rather transcend deviceinteractions, network topologies, and communications protocols toinclude but not be limited to Bluetooth, Bluetooth Low Energy (BLE),beacons, RFID (Radio Frequency Identification), wake-up signals,communication “advertisements” or the like. As one device detects thepresence of one or more other devices, services may be personalized inresponse to data shared among devices.

DEVICE DESCRIPTIONS: In some embodiments, personalized services may notbe limited to a single device, but rather distributed among multipledevices as described in co-owned U.S. patent application Ser. No.15/018,496 entitled Distributed Method and System to ImproveCollaborative Services Across Multiple Devices, filed Feb. 8, 2016,which is incorporated herein in its entirety. For instance, mobile,wearable and other transitory systems may interact within an IOT(Internet of Things) ecosystem as described in FIG. 3. IOT devicesinclude but are not limited to wearables on an individual 100, and/ordoor locks 101, blinds 102, televisions 103, home automation devices,thermostats 104, lights, fans, light switches 105, alarm systems 106,appliances 107, digital picture frames 108, cooking tools, musicequipment, gaming equipment, desktop computers, computer servers, laptopcomputers 109, vehicles, garage door openers, keyless locks and otherdevices that facilitate the “internet of things.”

Wearables (or wearable devices) may include but are not limited towatches, bands, glasses, jewelry, shirts, pants, belts, belt buckles,buttons and the like. Jewelry could include but is not limited to rings,bracelets, anklets, necklaces, ear rings, nose rings, cuff links and thelike.

Portables may include but are not limited to wallets, cards, smartcards, smart wallets, key chains, accessories, glasses, FOBs, pens, andthe like.

Mobile devices may include but are not limited to phones, tabletcomputers, laptops, and the like.

Computers may include but are not limited to a point-of-sale (PoS)terminal or a device operative with a point-of-sale location, personalcomputers, servers and the like. Such computers may include both oreither transitory and non-transitory memory elements.

TYPES OF PERSONALIZED SERVICES: Personalized services 50, some shown inFIG. 4, may include but are not limited to services that relate to oneor more of the following: a wake-up or prompt, hospitality 51,identification (ID) 52, information 53, business card, contacts,authentication 54, security, cryptographic (crypto), tokenization 55,transaction 56, preferences 57, preference collection 58, preferenceanalytics 59, accounting 60, budgets, finance, fraud detection,notification 61, administration 62, food 63, beverage, smoking, grocery,refrigerator contents, accommodations 64, check-in/check-out, room key,travel 65, shopping 66, advertisements 67, sales, discounts, coupons,promotions, location, proximity, reward 68, loyalty, environmental,entertainment, medical conditions, medical records, health 69, exercise,pedometer, fall detection or other services that are customized inresponse to the personal information and the like, collectively called“personalized services” or “services” hereafter.

Any one or more of the devices 10 could provide preferences or executepersonalized services 50 within the group 40.

DATA AND INFORMATION AS RELATED TO PERSONAL SERVICES: Data 20 orinformation may be sent between devices 10 within a group 40 as shown inFIG. 2 and FIG. 4. Data may be transmitted between devices according tovarious communications systems and protocols, including but not limitedto signals, beacon, advertisement packet, RF (radio frequency signal)such as but not limited to NFC (Near Field Communication) or WiFi, RFID(Radio Frequency Identification), voltage or communications via aphysical contact, inductive signals, magnetic signals, messages,movements, prompts, and other methods that wake-up or prompt a device tomake it aware of the proximity of another device, collectively called“wake-up data” hereafter.

Data or information that can be carried during a communications sessioninclude but are not limited to: names, pictures, identification,initials, biometrics, behavior metrics, distinguishable characteristics,social security, numbers, membership numbers, birthdays, height, weight,hair color, eye color, licenses, passports, visas and virtually anythingthat identifies an individual, user, device and/or object, collectivelycalled “identification data” hereafter; business card, telephone contactinformation, address, and other contact information typically found on abusiness card or contact record, collectively called “contactinformation” hereafter; addresses, locations, secrets, numbers,pictures, biometrics, voter registration and any personal data,collectively called “private data” hereafter; categories, labels and thelike called “administration or administrative data” hereafter;locations, acknowledgement, device identifiers, store, storeidentifiers, names, coordinates, geolocation, movement, direction,distance, radius, number of steps, inter-device awareness and the like,collectively called “proximity” information hereafter; preferredseating, cuisine, dishes, meals, food, drinks, deserts, snacks, spice,hotness, allergies and other eating related preferences collectivelycalled “dining preferences”, “eating preferences” or “drinkingpreferences” hereafter; favorite rooms, floors, bed size, pillow, bedtop, views, temperature, wake-up time, amenities and other room, hotel,housing, resort or sleeping preferences, collectively called“accommodation preferences” hereafter; seating, pre-screen for security,ticket and travel information and the like, collectively called “travelpreferences” hereafter; frequent shops, purchase categories, purchaseitems, spending amounts and the like, collectively called “shoppingpreferences” hereafter; other preferences called simply “preferences”hereafter; sales, bargains, products, services, discounts, refunds,specials, coupon, discount and other advertisements, collectively called“advertisement data” hereafter; accounts, payment account numbers(PANs), ATM numbers, brands, cryptograms, currency, crypto-currency,tokens and other financial data and the like, collectively called“financial data” hereafter; purchases, receipts, currency, amountssales, prices, items, codes, and other transaction related information,collectively called “transaction data” hereafter; rewards, points,numbers, loyalty, bar codes and other reward information and the like,collectively called “reward data” hereafter; medical history,conditions, surgeries, health issues, vitamins, medicines, pharmacies,insurance and other medical related information, collectively called“medical data” hereafter; biometrics, knowledge-metrics, electronicmetrics, behavior-metrics, names, user names, passwords, PINs (personalidentification numbers), credentials, cryptograms, tokens, codes,pairing codes, dynamic pairing codes, and biometrics such as but notlimited to face, pictures, voice, fingerprints, voice, iris, scent,heartbeat, behavior metrics, gestures, images, distinguishingcharacteristics, symmetric, asymmetric, addresses, locations, secrets,numbers, voter registration identifiers, social security, numbers,birthdays, height, weight, hair color, eye color, licenses, passports,visas, passcodes, questions, answers to questions, symmetric andasymmetric and any information that authenticates or identifies a user,a device or an object, collectively called “authentication data”hereafter; room, beds, size of beds, pillow, temperature, number ofdays, check-in and check-out dates, room rate and other informationrelating to checking into a room, collectively called “check-in data”hereafter; categories, codes, transaction, currency, amounts and otheraccounting or budget data, collectively called “accounting data” or“budget data” hereafter. Data may also be referred to as “information”herein.

Consumer items may include but are not limited to: Food, beverage,smoking, seating (Dining or Snacking?) and the like; travel, cruises,vacations, locations, resorts, recreational activities, transportation,and the like; real-estate, homes, condominiums and the like;entertainment, multimedia and the like; health, medical, vitamins,pharmaceuticals, exercise, spas and the like; accommodations, hotels,motels, resorts, bed-and-breakfasts and the like; products, toys,automobiles, and the like.

TRIGGERS THAT MAY BEGIN PROVISION OF PERSONAL SERVICES: Personalizedservices may be activated based on a various triggers, including but notlimited to a user's activity, a timer, a specific time, or a timeinterval, a response to a query, a transaction, motion detected orspecific motion detected such as walking, running, standing, driving, orsleeping. In this way, power is conserved through activating ofpersonalized services only when a user is active.

DETECTING PRESENCE OF DEVICES FOR DELIVERY OF PERSONAL SERVICES: Devicesmay be detected or sensed by a number of methods and system, includingbut not limited to beacons, advertisements (such as Bluetoothcommunicated advertisements, or advertisements communicated using othercommunications systems), notifications, prompts, wake-up signals,triggers, or other communication methods or systems that prompt orcommunicate information to or from a device or service. For example, afirst device may make a second device aware of its presence

As a user or first device comes within a zone or range of a seconddevice, the second device senses proximate presence of the first deviceor a location of the first device, and arranges for the provision ofservices to the user or to the first device responsive to the proximatedevice or location.

PRESENCE ZONE: A zone may be a range of approximate 100 meters or lessin some close proximity applications, although there are no limitationson the range of a “zone” as such depends on the ability of thecommunicating devices to “see” each other.

COMMUNICATIONS SYSTEMS AND METHODS TO PROVIDE PERSONAL SERVICES:Communication techniques are important for many facets of the presentinvention and those skilled in the art are aware of many such systemsthat can be used depending on the desired outcome and the distancebetween communicating entities. Some examples of such communicationstechniques for communicating to a first device or from the first deviceto a second device include, but are not limited to: Bluetooth, BluetoothLow Energy (BLE), WiFi, RFID (Radio Frequency Identification), RF (RadioFrequency), WiFi, QR codes, light, ultrasonic, sound and the like.

DEVICE LOW POWER STATES AND WAKE-UP SERVICES: In one embodiment, theelectronics devices are held in an ultra low-power state including butnot limited to powered-off or an ultra low-power state. One or morecircuits may be awakened by a variety of methods including but notlimited to motion, movement (via accelerometer, gyro, magnetometer,piezo device or equivalent movement sensing component), timer,wake-on-sense (a method that detects 13.56 MHz from Near FieldCommunication transmission), or via a clever sensing method thatutilizes no additional power by sensing a human touch as an interrupt,collectively called “wake-up methods” hereafter.

These methods and systems for waking-up circuitry within the device maybe configured, in some embodiments, to either be completely passive,where a device wakes-up and/or utilizes power from the environment toperform a function or action. In other embodiments, devices utilizenon-rechargeable power sources, such as but not limited to primarybatteries, or power sources that may be charged such as but not limiteda super capacitor or equivalent power source. In some embodiments,rechargeable power sources may or may not be separate from one or morebatteries that power the rest of the circuitry.

Once the circuit containing one or more microprocessors and/orprogrammable logic is awakened, it may be configured to immediatelyperform features, such as but not limited to beacons, signals,advertisement packets, communications, low power sensing or the like,collectively called “communications” hereafter.

MOTION STATES TO REDUCE POWER CONSUMPTION: A variety of intervals fortransmission and/or receiving may also be configured to further reducepower. Beacons and/or communications may be configured to transmit orreceive based on a duty cycle or interval. These intervals may bechanged based upon the state of motion or user-defined states or times.“States” may be derived by user interaction or in some embodiments,movement. Those familiar with the art recognize that a multi-statemachine may be used to manage the states of a device such that functionsand features may be controlled by the current state of the device. Thus,transmission, reception, intervals or duty cycles and the like may bedynamically changed based on the state of motion detected.

TRANSMISSION OF BEACON AT INTERVAL BASED ON MOTION: When motion isdetected, the interval between beacons or other communication signalsmay be changed based upon the characterization of the motion(s).

For a non-limiting example, walking may be differentiated from handlingor small movements, driving, falling, or stationary, collectively called“motion states” hereafter. Motion may be characterized or detected viaseveral methods and devices including but not limited to anaccelerometer, gyro, piezo device, magnetometer or other motion sensingcomponents or devices. Using such components, motion states may bedetected based on measured acceleration and/or direction over someinterval or duty cycle. Like communication, motion measurements may alsobe controlled via duty cycles and intervals and dynamically changedbased on the state of the device to conserve power.

SLEEP STATE: A device may be placed and/or put itself into a sleep statebased on inactivity. During this inactivity, the interval ofcommunications may be reduced or communications not performed at all.Conversely, as a person is walking, the device could wake up andcommunicate at some interval. Likewise, if motion is characterized asdriving, a different communication interval may be configured for thatspecific device state.

SLEEP STATES/LOW POWER: The first or second devices may be kept is a“sleep state” to conserve power. Methods to awaken a device from a sleepstate include beacons or the sending/receiving of other radio-frequencysignals or electromagnetic field (EMF) emissions, a button or othermanual action, detection of location, motion, specific motion activationcomprising at least one of walking or running or standing or sleeping ordriving, or combinations.

TRIGGERING AND AWAKENING: Once awakened or triggered, a device maydetect the presence of another device, or in some embodiments, begintransmitting a signal so that the other device can detect the proximityof the signal-originating device. Personalized services are triggeredresponsive to detection of a triggering device, triggering individual ortriggering object in close proximity to the user.

NO-BUTTON DEVICE (USING MOTION): Thus, under this invention, no “button”or other activation is required to turn-on (or wake-up) the device otherthan to move the device, and power may be conserved by dynamicallysetting both the intervals to detect and/or characterize motion states,as well as communications.

WALKING AND OTHER MOTION STATES: For non-limiting examples, beacons,wake-up signals, advertising packets, advertising information and/orother communications may be configured to transmit or receive as anindividual walks or travels through a defined region, for example anarea within a retail store. Since most individuals walk intoestablishments, classification of walking is important to activatevarious services to communicate with one or more devices at theestablishment. Alternatively, the mere presence of the individual in theestablishment is sufficient to activate various services, including thedelivery of advertising information.

PARAMETERS OF PERSONAL SERVICE: Parameters of delivered services are notlimited to only communication, proximity, and motion detection and thelike. Other service parameters may also be variable, configurable by auser and/or dictated by the “state” of any device associated with thedelivery of a personal service.

AUTHENTICATION FOR APPROVAL OF INFORMATION EXCHANGE FOR OFFERINGPERSONAL SERVICES: A first device may request information from a seconddevice. The latter may respond automatically, or in some embodiments,with credentials that must be “approved for release” by the first deviceor by the owner or user of the first device. The approval may requiresome action to be taken by the first device or by the user of the firstdevice, or the second device may be automatically approved by the user.In this instance, the user may be required to authenticate locally withthe device and/or approve the release of information.

USER CONTROL OF DATA AND AUTHENTICATION: One encompassing aspect of thepresent invention is that the user has control of any information sentto another party or device. Information may be categorized intoclassifications 80 that govern distribution such as but not limited tothe example shown in FIG. 5. To maximize convenience, informationclassified as public 81 or “pre-approved” by its owner may be sent bythe first device to other devices at any time, without interaction withthe user. To increase security, other data may require acknowledgement82 from the user prior to release of the information. Other categoriesinclude but are not limited to authentication, which could be, in someembodiments, a “timed authentication” 83 that requires anotherauthentication based on a time duration since the last time a user hasauthenticated with one or more devices, and/or multi-instanceauthentication 84, which requires a another instance of authenticationand/or authentication with a second device 85 before the information isreleased. Multi-instances and multiple modes of authentication arefurther described in patent application entitled Multi-Instance SharedAuthentication (MISA) Method and System Prior to Data Access, filed onJun. 23, 206 and assigned application Ser. No. 15/191,466, which isincorporated herein in its entirety.

Likewise, an owner may refuse to receive certain information on adevice, such as certain advertisements, discounts, rewards, or otheroffers and/or requests for information. The owner may disable receipt ofall incoming information or only information related to identifiedproducts or services. In this way, the owner of the data (user) alwayshas control over receipt and/or release of information.

SUGGESTION OF ACCOUNT TO USE: In some non-limiting embodiments, anadvertisement, for example, may ask a user to use a certain service orvirtual item such as but not limited to a loyalty card. As a user entersan establishment or geographic location, the establishment may suggestthe use of payment, reward, and/or loyalty accounts, and/or suggest oneor more payment types or methods, as non-limiting examples. In thisexample, a user may accept or refuse that account or payment methodsuggested.

DATA MINING FOR OFFERS OR ADVERTISEMENTS: One method of the presentinvention entails using data mining (a form of determining userpreferences) to direct advertisements or offers to users. In someembodiments (non-limiting), information including but not limited topast purchases or items searched (on-line and off-line) may be utilizedin correlation with or without one or more given algorithms to directadvertisements or offers that may be pertinent to the user. A user mayalso disable advertisements or reject advertisements and/or the datamining feature in some non-limiting embodiments.

DERIVING PREFERENCES DIRECTLY FROM USER OR FROM DATA MINING: A uniquefeature of this invention is that preferences may be directly input to afirst device by a user, or in some embodiments, derived from data miningefforts during user activity. Under this aspect of the invention, auser's preferences may be determined from user interaction with a firstdevice and between a first device and other devices. These preferencescan then be used to provide personal services to the user.

DERIVING PREFERENCES FROM OFF-LINE ACTIVITY: This invention bridges thegap between brick-and-mortar consumer behavior and internet consumeranalytics by tying off-line user interactions of brick-and-mortarestablishments with one-line user interactions on the internet. Offlineuser behavior is becoming more accessible with the advent of theinternet of things, wearable and mobile devices. Activities that can bedetected and collected by this device include exercise, eating, drinkingand smoking habits, movement to frequent locations that as well asinteractions with brick-and-mortar establishments such as but notlimited to transactions, movement and consumer locations within a storeindicating possible interest in products, transfers of data such asmedical information, etc.

DERIVING PREFERENCES FROM ONLINE BEHAVIOR: Online consumer behavior,likes and dislikes, and other interest captured by cookies and othermethods of Big Data online are well-known. Number of clicks, websitesvisited, purchases, likes and dislikes, responses to questionnaires andthe like are all consumer analytics that are used to sell to businessesand marketing firms and even pop up new advertisements responsive toinformation gathered about a user.

CONSUMER BIG DATA—DATA ANALYTICS AND MERGING PREFERENCES FROM ONLINE ANDOFF-LINE BEHAVIORS: Under this invention, information collected duringany of these user activities may be stored on a first device. Theinformation collected may be analyzed on the first device or in someembodiments, downloaded to a second or third device and analyzed there.Those well-versed in the art will recognize that data analytics ofconsumer data consists of determining features, trends, characteristics,likes and dislikes, and other information collected about consumers orpeople or user behavior. In the context of this invention, thisinformation may be analyzed to derive preferences, or in someembodiments, merged with other data. Likewise, preferences from offline,online, or combinations may be may be modified, merged, added, deletedor administered with preference from online services.

PRIORITY AND WEIGHT: In some embodiments, a user may have control overthese preferences, how and when they are made available to variousservice providers, and their priority or weight so that they may beprioritized within algorithms, statistical analysis and othermathematical calculations by service providers so that they may bestcustomize the service for one or more preferences from a plethora ofuser preferences. The priority or “weight” may be used by services todetermine “how much” a person likes or dislikes a certain product,service or activity. Service provides may use the priority or weight topersonalize the service, content or other information, products orservices.

PREFERENCE ADMINISTRATION: Whether derived or selected or input, etc., auser may modify, add, delete or administer the preferences in anydevices in which the preferences are stored, whether online or off-line.

UPDATING PREFERENCES: Once the preferences are determined, they may besupplied to update the personal preferences stored in the first devicefrom at least one of a second device, a computer, a wearable, an IOTdevice, a portable device, a mobile device, a website, a service, anapplication or software.

COFFEE SHOP EXAMPLE: For instance, as a non-limited example, a usercould walk into a coffee shop and place an order. Information that couldbe collected during this action by a first device includes selecting theestablishment and time entered, time spent looking at a menu, the timelooking at an advertisement or “special of the day”, the product and/oramount purchased, any reward, loyalty, coupons, discounts oradvertisements used with the transaction, the time spent within theestablishment, any other subsequent products and/or amounts purchased,and the time the user (and the first device) left the building.

BUSINESS PROMPTING—COFFEE SHOP EXAMPLE: The user in the coffee shop mayalso be queued by a first device at the end of the activity (leaving thecoffee shop) to administer one or more preferences derived from thisactivity. For instance, the user could state whether he or she liked ordisliked the product, the business, the brand, the service, etc. Ofcourse, any data analytics or preferences regarding the user could alsobe sent back to the business or establishment.

MULTIPLE PREFERENCES AND PRIORITY: In some embodiments, more than onepreference or a combination of (weighted) preferences may be utilized aspart of the personalized service. In other embodiments where more thanone device with preferences is present, a calculation such as but notlimited to an average, aggregate, number of priority preferences, range,etc. could be performed to determine which personalized service is to besupported, and what modifications to that service need to be performedto personalize the service (or better personalize the service) based onthe multiple user preferences. Herein, the priority or weight given tovarious preferences could be a factor in the determination of whichservice to use and which modifications to perform with each service.

In some embodiments, weights could be increased based on increasebehavior or habits of the user. For instance, if a user repeatedlyorders the same coffee at the same coffee shop at the same time of day,the weight of that preference could increase. Conversely, if a userslows the frequency of drinking a specific coffee, for example, theweight would decrease.

DEFINITION OF DISPLAYS AND BILLBOARDS: Non-limiting examples of apersonalized service responsive to preferences communicated from morethan one first device include but are not limited to advertisements on abulletin board, display or billboard. As shown in FIG. 6, a device (assensor by the road in one non-limiting example) 18 may detect thepresence of one or more devices 13 (a device inside or attached to avehicle, such as a smart card, for a non-limiting example). Informationsuch as preference may be sent from the device 13 to the device 18. Thedevice 18 may then change the content of a billboard 19 in response tothe preferences collected.

Vehicles herein may include but are not limited to automobiles, trucks,bicycles, carts and virtually any multi-wheeled device.

Likewise, as individuals with the device 13 containing preference pass adisplay in a mall, the advertisement service on one or more displaydevices (including broadcast devices) can be modified to reflect theuser's preferences.

Examples of broadcast devices include but are not limited to a display,a billboard or a roadside display visible from a road, a speaker, anelectronic menu, video images, still images or sound on a multimediadevice responsive to the user's preferences as received from the firstdevice when the first device is within a zone of the second device.Information that may be broadcast includes images, video or text orcombinations.

DEFINITION OF INFORMATION THAT CAN BE COLLECTED FOR ANALYTICS(PREFERENCE DERIVATION): Information that could be collected to aid inthe derivation of preferences may include but is not limited to personalinformation, user activities, motion, transactions, locations, internetinteraction, phone interaction, IOT (internet of things) interaction andother actions performed by a user or a first device. Information may becollected from various user activities including but not limited toactions; transactions; purchases; payments; movements; the event andtime duration for entering, staying or leaving businesses orestablishments or even locations within a store such as a retailcounter, row, aisle or area near certain products or services, or nearbulletin boards, displays, speakers or the like, or even billboards orsensors that control any of these broadcasting devices; exercise;interactions with the internet of things (IOT) or the like; or in someembodiments, internet-related interactions such as but not limited toviews; website views; advertisement views; computer clicks; informationdisplayed on a website' website content; social media activities;responses to questionnaires; data analytics or the like, as well asother data or activity rich environment where a user's preferences couldbe derived.

SMART CARD INTRODUCTION: In one embodiment, a device may take the formof a smart card 13 as shown in FIG. 7. The card 13 may support standardsfor identification cards, or support standards for payment cards,rewards, loyalty, insurance and the like, or in some embodiments,support beacons, communications, room keys, and/or combinations of each.Similar to FIG. 1, FIG. 7 illustrates how a smart card 13, may interactwith personalized services 50 on other devices 10, in this case a smartphone 11 and a point-of-sale (PoS) 12 terminal, as non-limitingexamples. A smart card may be the same shape and size of a payment card,but with electronics inside.

Communications 20 such as but not limited to low-power beacons, may beutilized to detect the presence of one or more low-power devices 10 suchas smart phones 11 and smart cards 13, as non-limiting examples. Likethe example in FIG. 1, one device 11 may “wake-up” another device 13 toexchange data 21 between devices 10 to promote personalized services 50,with reach-back to remote services 70 (on a server 15, for example) forclosed-loop systems.

PAYMENT AND COMMUNICATIONS: The invention may also support other formsof communication and payment. Communication methods include but are notlimited to NFC (Near Field Communication), Smart Swipe, Wi-Mag (WirelessMagnetic Transmission), Bluetooth and/or BLE, WiFi, barcode and/or QRCode may be supported as well as contact and contactless EMV. Othercommunications methods may also be supported for communications as wellas payment including but not limited to Personal Area Network (PAN),acoustic methods such as ultrasonic and optical methods such as infraredand dynamic QR code. Such communications techniques may involveencrypted and/or unencrypted data, authentication activities, paymentactivities, identification, and the like.

LOADING THE CARD: Under this invention, any one or more knowncommunications methods can be used individually or in combination totransfer information to the card. For a non-limited example, a user mayselect information by swiping to scroll through credit and/or debitcards, loyalty, reward, insurance, identification and virtually any cardor information found within a wallet. A user may tap a selection sensorto select a specific card and transfer that card's information to one ormore of the communication channels to perform payment.

VALIDATION OF CARD DATA SERVICE: As a non-limiting example, informationsuch as but not limited to credit card information captured by a cameraon a user device may be sent to a service for validation. The servicemay then send encrypted information, tokens, applets, or otherinformation back to the device to transfer back to the user device. Anauthentication process may also be associated with this data/phototransfer, especially if the data/photo is deemed to be privateinformation.

AUTO-SENSING OF MULTIPLE COMMUNICATIONS TECHNIQUES): In someembodiments, the payment information may be held until a sensor istriggered for a specific payment communication channel to make thepayment (transfer and/or negotiate the payment). For a non-limitedexample, a user device or smart card could be configured to supportmultiple payment communications could wait to transfer or negotiate thepayment information based on sensing EMV, NFC, Magnetic Stripe, orBluetooth. Under this embodiment, no payment information would betransferred or negotiated until the card is inserted into an EMV reader,or detects an NFC reader, or detects a magnetic stripe reader, orreceives a communication over Bluetooth to make a Bluetooth payment.Once a payment communications method has been sensed, the device coulddisable the other payment communication methods, or in some embodiments,wait a timeout period before disabling the payment state.

SELECTING CATEGORIES: Likewise, users may configure categories wherebyone or more touch or proximity sensors are used to scroll and selectcategories. Categories may be customized by another interface, such as aphone or computer, as well as local to the user device.

COMPONENTS OF A DEVICE/COMPUTER: In various embodiments, a user device(or any other device associated with the embodiments of the presentinvention) may contain one or more of the following components (or thefollowing capabilities) within electronics 100 as shown in FIG. 8: amicroprocessor, microcontroller and/or System on Chip (SOC) 101, memory(flash 102, RAM 103, and/or FRAM 104), crypto devices 105, anti-tamperdevices 106, location devices 107 such as but not limited to GPS 134,displays 108, semi or fully transparent touch displays 109, buttons 110,optical sensors 111 and/or other interface controls such as but notlimited to infrared, photodiodes, and/or image sensors, LED (LightEmitting Diodes) 112, proximity sensors 113, biometric sensors 114 suchas but not limited to finger, heartbeat, face, IRIS and voice sensors,switches 115, microphone 116, amplifier 117, speaker, vibration or otherdevices that may provide haptic feedback per user interaction 118,battery, super capacitor, or equivalent power source 119, wirelessbattery recharging circuitry 120, power harvesting sensors and circuitry121 and various interfaces including but not limited to Bluetooth 122,BLE (Bluetooth Low Energy) 123, NFC (Near Field Communications) 124,RFID 125, PAN (Personal Area Network), Wi-Fi 126, communications devicesoperating according to the specification 801.15.4 127, Edge devices 128,3G devices 129, 4G devices 130, LTE devices 170, antennas 132, balun 133and/or tuning networks, coils 134, GPS (Global Positioning System) 135,secure element 136, accelerometer or equivalent motion detection devices137, physical contacts 138 such as EMV-8, EMV-6 or equivalent 138, orvirtually any other electronic component. Other non-limiting examplesinclude electronics that utilize displays 108, touch panels or touchscreens 109, buttons 110, speakers 118, microphones 116, image sensors111 and other sensors as interfaces to a user, and/or combinations ofany electronics.

Batteries 119 may include but are not limited to lithium-ion, lithiumpolymer, super capacitor, rechargeable, primary chemistries and thelike, and may also be thin enough to fit into extremely thin productssuch as a smart card 13 as shown in FIG. 7.

DESCRIPTION OF CARD: With reference to FIG. 9, a card comprises displays108, including but are not limited to LCD (Liquid Crystal Display), OLED(Organic Light-Emitting Diode), or other thin displays such as but notlimited to e-paper, o-paper, bi-stable displays 108 and the like and/orLEDs. The display(s), which may provide notifications or feedback to auser or to other devices, must be thin enough to fit into extremely thinproducts such as a smart card as shown. Other components of the cardinclude physical contacts 138 and/or EMV contacts 139, an accelerometer,a gyroscope, a magnetometer or other motion-detection devices 137. Thecard also includes buttons or controls 110A, 110B, and 110C, or hiddenbuttons or controls 110D that could be used for a variety of purposesincluding but not limited user interface controls to changing data andimagery displayed. User interface controls could include tapping,multiple taps, tap and hold for a period of time, or swiping across thebutton areas, but the buttons may be capacitive, resistive, or simplycopper pads under the laminate of the smart card.

EXEMPLARY CARD: Cards such as illustrated in FIG. 9 can be used for avariety of purposes. For example, data that can be displayed related tocategories of information as shown in FIG. 10, such as a “Loyalty” 180.Categories may be fixed, or in some embodiments, configured by the uservia a software application or another interface local or remote to thedevice.

Other non-limiting examples of data that can be displayed includesidentification data such as a picture 181 of a face as shown in FIG. 11.Other data (not shown in a figure) can include emergency or contact data(such as address and phone number), financial data (such as paymentand/or account information), reward data (such as points), loyalty datasuch as company name, a bar code or a QR code, information as toproximate institutions/stores, etc. (such as store name), brandinginformation, card issuing party, signatures, alias information thatrepresents some data, account or information (such as “My Visa #1”card), emergency information (such as name, phone number, addresses,medical and allergy conditions and the like), medical information suchas conditions, medicines and the like, receipts, advertisement data(such as discounts, sales, and coupons and the like), subway, train andother transportation related tickets or tokens, account information,authentication data (such as credentials), check-in data, and accountingand/or budget data.

In addition to displaying data, data may also be sent or received overcommunications networks with other devices as shown in FIG. 3,supporting personalized services to wake-up, automate and secure data tomake user transactions more convenient.

REDUCING COMPONENT COUNT BY COMBINING FUNCTIONS: In one embodiment ofthe invention, the component count (on a card, for example) is minimizedto simplify the electronics, which decreases cost and power.Communications techniques including RFID (Radio FrequencyIdentification) and NFC (Near Field Communication), are used to reducechip count. These circuits may be powered, for example, by harvestingpower from the RF signals or NFC signals at the reader (a transmitter atthe frequency of the circuitry of the device).

In keeping with this minimalist approach, one embodiment consists of asimple BLE (Bluetooth Low Energy) circuit that enables applications suchas but not limited to identification, preferences, payments, rewards,loyalty, advertisement, entertainment and geo-location. Theseembodiments can be within the form factor of any of the devicesdescribed above, such as but not limited to smart cards, smart bands,jewelry, wearable devices, any relatively small electronic devices, andthe like.

BLE AND NFC COMBINED: In another embodiment, BLE and NFC features may becombined onto the same device, such as a smart card 13 of FIG. 7 as anon-limiting example. Certain components may serve dual purposes toreduce chip count, complexity, power and cost. Component count may bereduced further by combining functions, such as but not limited tocombining RFID, NFC, WiFi, Bluetooth or BLE, touch control, processingand other features on the same SOC (System on Chip) 101 of FIG. 12. ASIC(Application Specific Integrated Circuit) may also be included. Othernon-limiting components, such as a display 108, physical contacts 138,accelerometers 137, antenna 132, batteries 119, and buttons 110,biometric sensors 114, and power harvesting devices 121 are shown inFIG. 12.

IOT STAMP: Combining BLE and NFC onto the same SOC or ASIC enablesfurther reduction to form a tiny electronic system, such as for an IoTdevice. The NFC, BLE and Wi-Mag antennas may be combined into a singlemultipurpose antenna controlled by different GPIO and antenna interfaceson the SOC or ASIC. This multi-purpose architecture requires someisolation and impedance matching/balancing between RF and GPIOinterfaces to protect internal circuitry while a different function isperformed. Such features are described in more detail in the co-ownedpatent application, entitled Accordion Antenna Structure, filed on Apr.4, 2016 and assigned application Ser. No. 15/089,844, which isincorporated herein in its entirety.

Using other techniques, such as wire-bonding, the aforementionedfeatures (especially as used for IOT devices) can be further combinedinto a thin, small integrated module form factor roughly the size of apostage stamp. Furthermore, these features may be combined to fit undercontacts such as EMV contacts. This approach achieves a miniature IOTstamp that supports BLE, NFC, Wi-Mag (wireless magnetic transmission),multiple payment types and multiple communication methods, closeproximity detection, low power touch sensing, power harvesting, andmotion activation to support ultra-low power IOT, distributed and/orpersonalize services.

In some embodiments, this miniature integrated IOT module or stamp maybe utilized within other electronic products such as wearabletechnologies, while in other embodiments, the module may be inserted asa complete module into a smart card to simplify manufacturing of thesmart card. The IOT stamp may also be configured to be inserted intoother electronic devices, such as but not limited to smart cards,watches, bands and the like, using tiny contacts that engage a circuitboard or flex circuit to integrate with other features within theelectronic device. Under this configuration, a small o-ring like deviceor epoxy or glue may be used to waterproof and keep the connectionstable.

SMART CARD TOUCH PADS: Touch pads may be used for to authenticate a usernoting the manner and direction of tapping and swiping over touchsensors. See commonly-owed patent application entitled Methods andSystems Related to Multi-Factor Multi-Dimensional Hidden Security PINS,filed on Jul. 30, 2015 and assigned application No. 62/198,817, which isincorporated herein in its entirety.

Training could be performed on the user device, or securely communicatedto another device to perform the training. For a non-limiting example, auser may configure his or her PIN by any combination of tapping a smartcard by tapping short twice, long once, and swiping three times left and3 times down, as a non-limiting example.

Another method to authenticate relates to card position detection whileauthenticating. This detection can be performed by an accelerometer orequivalent. For a non-limiting example, the pattern of how a user deviceis held could be recognized such as holding the card horizontally, thenvertically, then horizontally, then along the “Z” axis (out of theplane). The algorithm may be enhanced by the amount of time the user'sfinger is held in each position.

POSITION PIN To add more security, the position of the card may beselected as a user taps or swipes as previously discussed. Under thismethod, a user may move the card in a certain pattern. As a user movesthe card, the direction, speed, and duration of the movement of the cardis characterized so that if it repeated, it is recognized.

BEHAVIOR-METRIC DESCRIPTION: Various parameters may be recognized as auser taps and swipes one or more touch or proximity sensors, such as butnot limited to direction, pattern, speed, duration, surface area, andpressure of depression These parameters may be used to characterize theindividual's behavior, not just the actual PIN. Certain behavior metricsare described in a commonly-owned patent application entitled,Biometric, Behavioral-Metric Knowledge-Metric and Electronic-MetricDirected Authentication and Transaction Method and System filed on Jul.5, 2016 and assigned application Ser. No. 15/202,515, which isincorporated herein in its entirety.

CLOSE-PROXIMITY AUTHENTICATION: The user device may also beauthenticated by its close proximity to another authenticated devicesuch as a phone, tablet, computer, laptop and the like; wearable such asbut not limited to wallet, keychain, jewelry, watch, band or the like;other smart cards or combinations.

Authentication may also be performed by another device, such as but notlimited to a phone, that passes credentials to the user device that theuser device recognizes and authenticates. This could be a singleauthentication code or event, or require negotiation between the twodevices to confirm authentication. For instance, a user couldauthenticate using a biometric such as voice, face, fingerprint or othermethod from another device, such as but not limited to a phone, whichthen negotiates with the user device to authenticate.

Other types of authentication may also be supported, in some embodimentsincluding but not limited to biometrics such as but not limited tovoice, face, IRIS, scent, thought and Finger. For voice, a microphone orother acoustic device may be onboard the user device. Other biometricmethods that may be utilized include heartbeat, face, IRIS, eye, finger,scent and the like. Any of these and other biometric and/or behaviormetrics may also be used for authentication and account/informationselection, or both, via another devices, such as but not limited to aphone, to authenticate with the user device and direct a payment.

MOVEMENT FOR CONTROLS (WITHIN THE CARD): Movement of the user device ora smart card may also be used for other applications including but notlimited to controls. For a non-limiting example, movement of the cardsuch as rotating to the left or right in a quick fashion could act as aleft/right scroll through information contained on the card or containedon a display screen, for example. Motion in one direction, such as theforward direction, can select a specific information element such as butnot limited to a payment card selected for payment. Other movementscould be used for various other features including but not limited tomenu display, selection from screen text or icon, category scrolling,feature selection; audio and video controls, changing thermostattemperature or changing lighting effects, etc.

HAPTIC FEEDBACK (IN A DEVICE OR CARD): Haptic feedback, such as aspeaker, vibration method, buzzer or other method that provides feedbackof a gesture back to the user.

MULTI-EMV—ENERGY HARVESTING, COMMS, TOUCH, PAYMENT: In addition tosupporting payment transactions over the physical contacts of EMV 138including but not limited to transactions that conform to ISO 7816, thisinvention also introduces the concept of using EMV contacts to supportother features such as but not limited to energy harvesting,communications and/or a touch sensor 138 within a small area on adevice, such as but not limited to a smart card 13 as shown in FIG. 12.Repurposing of the EMV contacts to support power harvesting,communication, wake-up, touch sensor as well as EMV payments is uniqueand non-obvious, given it enables multiple features within a small areathat is already available on typical payment cards used today.

Under some embodiments, power may be harvested from a variety of methodsincluding but not limited to power harvesting from NFC (a method thatharvests power from 13.56 MHz from Near Field Communicationtransmission), Bluetooth, WiFi or other radio frequencies (RF), piezo,solar, acoustic and RF (Radio Frequency) energy sources, collectivelycalled “energy harvesting” methods hereafter.

Under this multi-purposing EMV aspect of the invention, energy may beharvested from physical contacts 138 of EMV (Euro Pay MasterCard Visa)contacts 139 typically found on most cards today. Under this invention,rechargeable power sources may be recharged from power harvested fromenergy harvesting methods previously described, such as but not limitedcollecting power from contacts 137 on a device such as but not limitedto a smart card 13 that harvests power from EMV contacts 138 whileinserted into an EMV reader 14 as shown in FIG. 13, or in someembodiments, while inserted into an EMV charging device 15 connected toa wall plug 15 as shown in FIG. 14 or connected to a laptop 17 as shownin FIG. 15. Since pin C1 (see FIG. 17) is always voltage, the voltagecan be harvested from this pin as a card is used, charging arechargeable battery within the card.

REPURPOSING EMV—COMMUNICATIONS: This multi-purpose EMV invention alsosupports a communication purpose for the EMV contacts. Under thisinvention, communications between two EMV cards may be established, forexample by by detecting the presence of the other device. Under thisembodiment, the card detects a non-payment device or card, for example,through a variety of means including but not limited to voltage and/ornon-voltage, and/or communications on one or more of the pins, achievedby toggling between voltage and receiving communications or justreceiving communications over a single pin after interrupt.

By connecting EMV to interfaces on a microprocessor that then connectsto a secure element, or that is the secure element in some embodiments,the EMV contacts may be then utilized as an alternative communicationpath and/or touch sensor. This architecture described in FIG. 16illustrates how multiple functions may be supported by using amicroprocessor to reconfigure connections such as GPIO (general purposeinput output) to support multiple purposes including but not limited tocommunications, wake-up and touch interfaces.

Connecting to a USB device achieves communication with EMV contacts on auser device, such as but not limited to a smart card, which is a uniquemethod to perform services with faster data rates than slower interfacessuch as BLE. This is particularly advantageous for remote updates andother communications that require large amounts of data. Thus, in someembodiments, communications to and from the user device, such as a smartcard, can be performed via wireless interfaces, such as but not limitedto WiFi or Bluetooth, while in other embodiments, via physicalinterfaces such as but not limited to USB and/or EMV contacts, or instill other embodiments, combinations of physical and wirelesscommunications.

REPURPOSING EMV—MULTIPLE COMMUNICATIONS TECHNIQUES: This methodincreases security by requiring two interfaces, as well as increases thespeed of certain services that may require larger bandwidth or data sizesuch as but not limited to remote software or firmware updates. Unlikeprevious art that communicates between a phone and a card purely overBluetooth, this method enables communications over the EMV contacts fornon-payment devices, or combinations of Bluetooth, WiFi, NFC, MagneticStripe, display, in some embodiments. For a non-limiting example, theuser could control the configuration of the user device via Bluetooth.

For applications that require more secure communications such as but notlimited to programming a user device with payment or other information,data can be sent over two or more communications channels, such asBluetooth and EMV, and/or encrypted over both channels. In the same way,authentication for certain tasks could require multiple communicationchannels where portions of the authentication/Negotiation are passedover multiple channels.

MULTI-EMV—TOUCH: In the embodiment that includes a motion detectionmethod to wake-up the circuit, the circuit that may be set to send abeacon or communication signal, or may also set a processor orequivalent controller in a low power state that waits for anothertrigger. In some embodiments, that trigger may include but not belimited to one or more touch sensors. Under one embodiment, EMV contactsmay be repurposed to act as touch sensors as well.

DESCRIPTION OF EMV TOUCH—LOW POWER WAKE-UP METHOD One such low-powertouch sensor utilizes two or more pins to send an interrupt to wake-upthe circuitry. Most microprocessors have an ultra low power state or“deep sleep” state where the core processor is turned off to conservepower, but peripheral devices are maintained. With such components, theprocessor and/or other circuitry can be held at an extremely low powerstate while keeping a voltage on one or more pins or pads of theprocessor. Likewise, one or more other pins or pads of the processor canbe configured as interrupts, which can be triggers when a user touchesacross one or more pins held at a voltage and one or more pinsconfigured as interrupts. This method may also be applied to circuitrywithout use of the microprocessor to further conserve power utilizing aseries of FETs or equivalent to short across two or more pins and thus,wake-up the FET to turn on and hold the circuit in a powered state. Oneor more microprocessors may then turn off the circuit by resetting theFET, effectively turning itself and the entire circuit off. This methodmay be referred to as “Ultra-Low Power Sensing (ULPS) herein.

ULPS low-power wake-up innovation enables a number of embodiments,including the re-use of a standard EMV contact on a payment card.Typically, the contacts on an EMC card are exposed in order to enablepayments via EMV, frequently called “contact” payments,chip-and-signature or “chip-and-pin”. Under this invention, these EMVcontacts on card may be repurposed to provide wake-up, touch interface,battery recharging and communications, as well as other features andfunctions.

Wake-up can be performed by the aforementioned low-power wake-up methodwhere a microprocessor (or FET) may keep one or more pins high (withvoltage), while sensing one or more other pins as interrupts. Thus,under this embodiment, a user may wake-up all or a portion of circuitryby tapping and/or swiping the EMV contacts. This may be performed as asimple stand-alone wake-up, or in combination with other wake-ups suchas accelerometers, capacitive, infrared and/or other touch or proximitysensors, as non-limiting examples.

EMV TOUCH: EMV contacts may also be used as a touch sensor by applyingthis same method. As shown in FIG. 16 EMV contacts may be used as atouch sensor as well. Functions associated with the EMV contacts mayinclude short, medium and long taps; double and triple taps, and swipesleft, right, up or down or a combination of these motions. Swiping isachieved by using more than one pair of clever sense touch pins to helpidentify direction. The advantage of this method is that interrupts arethe fastest sampling a microprocessor can perform. Thus, under suchembodiments that utilize clever sense for EMV, EMV contacts on a cardmay be used to provide very high accuracy with lower rejection or falseswipes than other touch methods, especially at extremely low poweroperation.

EMV-6 (i.e., six contacts) may be used, but EMV-8 provides betteraccuracy for detection of swiping since it may utilize three pairs ofcontacts. Two pins of EMV-8 are reserved for voltage and ground, whilethe other six are available for various functions such as VPP, CLK,Reset, I/O, and the like. By connecting the pins to a microprocessor,these pins may be repurposed to act as touch sensors. See FIG. 17.

Under such embodiments, some pins are configured with a voltage whileother pins are configured as interrupts (sensors). The pins may beconfigured in alternating patterns. As a user swipes from left to right,one or more of the interrupts is triggered by the finger touching acrossthe interrupt and a voltage pin. As the 2^(nd) column of pins (alsoreferred to as pads, contacts, terminals controls) on the right istouched, interrupts on one or more pins on the right row are detected,indicating a swipe right. Conversely, a right to left swipe may bedetected in the same way, by detecting one or more interrupts on theright before detecting one or more interrupts on the right.

In the same manner, the direction of up and down swipes may be detectedby the order which the interrupts are detected. Up and down aredifferentiated from left to right by the order of interrupts detected intime, and where two interrupts are detected simultaneously on one sideversus another. Taps are calculated by all interrupts being detectedsimultaneously within a threshold.

REPURPOSING EMV—MULTI-TOKENIZATION: EMV may also be multi-purposed formore than one tokenization. For standard EMV, the contacts are used topass a token. The interface to the contacts is dictated by ISO 7816.Tokens are generated by the issuer via an applet on a secure element orover the cloud using host card emulation (HCE), whereby the token may bedownloaded from a remote server, or combinations of the two.

All of the multi-purpose uses of the EMV will not impact the primarypurpose of EMV, which is to perform payment. A payment terminal isdetected as dictated by EMV and payment tokens are passed accordinglyaccording to conventional operation of the EMV card.

EXAMPLES OF PERSONAL SERVICES: This invention brings the personalizationof service found at high-end hotels, resorts and hotels such as but notlimited to Ritz hotels to every day establishments by offering speed andconvenience, as well as security and utility. Personalized servicessupporting inter-communications between devices enable a plethora ofapplications. A device could be considered to enable shopping,advertisement, identification, entertainment, security, hospitality,dining, payment, rewards, loyalty, travel, accommodations, room keys,location driven multi-media capture (such as events or activities likeat a resort or ski lift) and other applications, markets or industriesthat facilitate personalized service, as non-limiting examples.

DEFINITION OF ESTABLISHMENTS: Establishments may include but not belimited to restaurants, hotels, retail, vendors, stores, security,casinos, theaters, entertainment, businesses and other entities, and thelike, collectively called “establishments” herein. Communications may betransmitted by the user device, the establishment device, or both.

The various descriptions of personalized services herein are set forthas examples only and are not meant to be limiting.

SERVICE EXAMPLES, WAKE-UP: Three non-limiting examples of a “wake-upservice” are illustrated in FIG. 18. One example illustrates anapplication on a mobile device recognizing a business is in closeproximity, responds by sending advertisement packets to wake-up andinvite another device to establish connection to communicate. Otherexamples illustrate application waking up a device (such as a card) andthe device waking up the application.

Another example in FIG. 19 shows a device cycling through beacon andcommunication advertisements to allow connection with a mobileapplication, which upon receipt of a wake-up, signal wakes-up andconnects to the device to exchange information.

Yet another example in FIG. 20 illustrates a device sending a signal toa business, which upon receipt of the wake-up signal, wakes-up andconnects to the device to exchange information.

SERVICE EXAMPLES: PROXIMITY: FIG. 21 illustrates another non-limitingpersonalized service, whereby a first device periodically sends a beaconbased upon some time interval and a mobile app sends an alert to theuser if one or more devices do not respond within a time period, therebyachieving a “proximity service”. Conversely, the app or one or moreother devices could also periodically communicate with the first devicewhereby the device detects and alerts the user if a device is missing.

Beacon and/or communication intervals may be updated local to a firstdevice, or from another device such as a mobile device. These intervalsmay also “adapt” to various activities such as that detected by a motionsensor. For instance, beacons and/or communications may be slower duringsleeping that in walking or daily activity, for example. This adaptivetransmission method conserves power as previously described herein.

PICTURE TRACKER: Another example of an application that utilizes aproximity service is a picture tracker, where a picture or video/audiotaken on entertainment activities such as but not limited to amusementparks, resorts, ski slopes, rides, theme parks and the like is linked toa beacon that identifies the user whose picture was taken. In thisembodiment, a device that controls the picture taking could alsocommunicate with another device to automatically download an identifierof the picture (such as ride and number, locale, etc.), the time of thepicture, or the picture itself.

PERSONALIZED MOTION SERVICES: Another example of a personalized serviceincludes data collection of movements by a user. A smart card, forexample, with an accelerometer or other motion sensor embedded couldcollect movements of a user. In this embodiment, the device (smart cardin this example), could be used as a step counter, pedometer or mileagetracker. Another service that may leverage motion detection include falldetection, where the identity of an individual is sent viacommunications methods previously described to alert authorities that afall has taken place.

DATA MINING—WHAT USER LOOKED AT: Proximity service may also be used toperform data mining. A good example is determining what a user looked atin a store by detecting the user identity and the location the userstood, and the time the user stood at that location using proximitybeacons and RFID or Bluetooth BLE or the like.

For embodiments that include Bluetooth or WiFi, one device may detectthe absence of another device. For instance, a phone could detect that asmart card is missing based on lack of response over Bluetooth or WiFiover a period time. Likewise, a key-chain may detect the absence of botha phone and smart card. This mutual proximity method provides a simplesecure mechanism that could also be used to send an alarm, or indicator,to alert the user of the absence of one or more of the other devices viaone of the devices, or in some embodiments, to locate one or more of theother devices. See FIG. 22.

Devices may be located using a variety of means not limited to Bluetoothpower measurements, TDOA (Time Difference of Arrival), RFDOA (RadioFrequency Difference of Arrival), triangulation (where two or moredevices triangulate with one or more other devices), or in someembodiments, GPS (Global Positioning System, which uses satellites tolocate one or more devices) or other geolocation methods.

SERVICE EXAMPLES: INFORMATION: FIG. 23 shows a non-limiting example of ageneral “information service” whereby a mobile app sends a signal, suchas but not limited to a beacon, to wake-up a device and/or shareinformation such as but not limited to preferences. Upon receiving thewake-up signal, the device authenticates with the app and beginsadvertising via a communication advertisement such as using BLE. Uponconnecting with the device, the app requests information from the devicewhich then sends the requested information.

Other embodiments include but are not limited to devices sharinginformation once a device is aware of another device in close proximity,with or without wake-up or authentication and with or without the seconddevice comprising an establishment. An information service maypersonalize the information such as contact or business card data, inone non-limiting embodiment, or medical records, car, house and medicalinsurance information, or virtually any information or data in othernon-limiting embodiments. Under some embodiments, information is sharedbetween two or more user devices, while in other embodiments one or moredevices are associated with a business and/or establishment.

SERVICE EXAMPLES: IDENTIFICATION: According to this embodiment relatedto “identification services”, one or more devices introduce themselvesto one or more other devices as they come into close proximity with oneanother. According to this example, a first or second device advertisesa wake-up signal to make the other device aware of its close proximity.With some embodiments, a second device may recognize a first device bythe UUID (Universally Unique Identifier) within a beacon sent by thefirst device. In other embodiments, other identification informationmight be communicated including but not limited to one or more of apicture, a name, initials, biometrics, behavior-metrics,electronic-metrics, knowledge-metric, distinguishable characteristics,numbers and the like. Numbers could be social security, membership,identification, licenses, passports, visa, club, frequent flyer, reward,loyalty or virtually any number that may identify an individual.

Once received, an establishment may utilize the identificationinformation to personalize various services such as but not limited tohospitality, advertisements, rewards, payments and the like.

SERVICE EXAMPLES: HOSPITALITY: In a simple non-limiting example of apersonalized “hospitality service”, a device associated with a businessestablishment may connect and request identification information from auser device, which then, upon receipt of identification data, anindividual identifying the individual from the identificationinformation greets the individual approaching the businessestablishment.

Other non-limiting examples that may utilize identification data orinformation include but are not limited to personalizing authentication,security, cryptographic (crypto), or tokenization services. Onenon-limiting example include use of these services to validate theidentity at a payment terminal or a check-out line. Under this example,a picture or other identification or authentication data may be sent bya first user device to a second device associated with a retail orpoint-of-sale (PoS) terminal. Upon receipt of the identification orauthentication information, an individual may compare the data toresponses from an individual such as including answers to questions,picture of a face, or other distinguishable characteristics that couldbe used to identify or verify an individual is who he or she says he orshe is. In some embodiments, the question, picture or other informationcould change for each transaction to improve security.

AUTHENTICATION SERVICE: Another non-limiting example is authenticationservices that are personalized based on biometric, behavior-metric,knowledge-metric, or electronic-metric information that is sent from onedevice to another device. Upon receipt of the data, an algorithmcompares the information received from the device with informationcollected from the individual live to authenticate the individual.

Authentication may also be personalized in a variety of applicationsincluding security services such as access control, timecard management,and/or customization of credentials for logging into devices, computers,services, websites and/or applications. Under one embodiment, apersonalized authentication service may detects a device, door, website,software and the like requiring credentials to provide the device and oruser access. In some instances, the device (smart card for example)could generate and/or manage the credentials.

Under some embodiments, cryptographic services may be used to generatecredentials per information provided by the user and/or the device tosupport dynamic codes that may be used for authentication. The conceptof dynamic pairing is described and claimed in co-pending andcommonly-owned application Ser. No. 14/217,202, entitled The Unpassword:Risk Aware End-to-End Multi-Factor Authentication via Dynamic Pairingand filed on Mar. 17, 2014, which is incorporated herein in itsentirety.

In other embodiments tokenization services could be used to generatecryptographic messages, cryptograms or tokens that may be personalizedresponsive to information received by a user or device. In addition,multiple tokens may be personalized to improve security of transactions,authentication, and payments. Multi-tokenization and personalizedtokenization is described further in the co-owned patent applicationentitled Personalized and Dynamic Tokenization Method and System, filedon Jul. 14, 2016 and assigned application Ser. No. 15/210,728, which isincorporated herein in its entirety.

SERVICE EXAMPLES: TOKENIZATION: For a non-limiting example, a firstdevice, such as but not limited to a smart device such as a smart watch,smart band or smart card, could send a token responsive to informationreceived from a user, or in some embodiments, another device. Tokens maybe generated via cryptographic elements local to the first device, or insome embodiments, received from a second device such as but not limitedto a cell phone. In yet other embodiments, a first device may connect toa remote tokenization service directly, or via a second device. A seconddevice, a cell phone in this example, could communicate to a thirddevice, a tokenization service in this example, via an application orsoftware, or in some embodiments, the second device could be tethered tothe internet to connect to the remote tokenization service.

MULTI-TOKENIZATION: Tokens and/or cryptograms may be generated by avariety of methods including but not limited to local generation such asEMV, HCE (host card emulation), and/or cloud-based tokenization servicessuch as MasterCard, Visa, American Express and the like. The presentinvention supports Interfaces over which tokens and/or cryptograms maybe directed include but are not limited to methods to transmit data to amagnetic stripe reader, such a wireless electromagnetic (Wi-mag)antenna, “direct contact” methods, including but not limited to adynamic EMV chip), and/or an inductive coil. Other interfaces or formsof communication may include but are not limited to RFID (radiofrequency identification), NFC (near field communication), BLE(Bluetooth® low energy), Bluetooth®, Wifi®, PAN (personal area network),3G standards, 4G standards, Bar code, QR code, sound/acoustic and/orlight.

Herein, one or more devices may be utilized to select an account,generate and/or transmit a token or cryptogram, and/or direct thepayment to a payment interface and/or device. Devices that can be usedto select, generate and direct payment include but are not limited tosmart wallets, cellphones, tablets, smart watches, and/or any othermobile or wearable device, called “smart wallets” hereafter. Devicesthat can be used to make payment are called “payment devices” hereafter.Services that generate tokens and/or cryptograms are called“tokenization services” hereafter.

A user may direct a token using one or more inputs including but notlimited to behavioral inputs, biometric inputs, and/or a PIN (personalidentification number). Herein, behavioral inputs are some action thatcan be performed that uniquely identifies a user. Such inputs mayinclude but are not limited to voice inputs, touch inputs, facialexpressions, gestures, behaviors, drawings or the like.

SERVICE EXAMPLES: TRANSACTION SERVICE: FIG. 24 illustrates a“transaction service” whereby, in this non-limiting example, arestaurant (waiter or waitress or user) requests a payment afterestablishing a connection with a device and receiving and greeting amember via identification service, and receiving preferences perpreference service. A user selects a payment method using a seconddevice, in this non-limiting example, and hands the first device to awaitress or waiter who thereby makes a payment with the first device viaone of several payments methods, NFC in this non-limiting example.

Transactions may include card-to-card transactions (as in the smart cardexample), mobile to card, or any first device to a second device.Transactions could exchange rewards, points, currencies, business cards,and other information.

In some embodiments, a first device (such as a smart card for anon-limiting example), may be detected by a second device (such as ataxi or toll), and provide payment or account or alias information to anaccount to make a payment transaction.

Upon completion of the payment transaction, a point-of-sale (PoS) devicemay send reward information to the user device via a personalized“reward service.” Under this non-limiting example, transactionsperformed or reward points may be sent to a first device, then to anapplication that removes them from device after “synchronizing” thereward point total before updating the reward balance on the firstdevice.

As transactions are completed, a user device may periodically wake-up amobile app on the user's phone, which then establishes a communicationconnection and receives transaction information from the device. Ascommunications are established between a device and other devices orservices, one or more transactions saved on the device may betransferred to an application, server, cloud or other entity that mayhave more memory, bandwidth, sustainable power, processing power or thelike, and deleted from the user device which may have limited memory asa wearable or other device. Reward points and/or currencies such ascrypto-currencies may also be synchronized between the user device andother devices, applications, servers or cloud.

Devices associated with establishments may also respond to communicationand/or a beacon with information such as advertisements or requests forpayment. Establishments may also recommend a specific payment methodthat a user possess such as specific payment account, or advertise a newpayment account whereby the user may “sign-up” by approving the transferof private information requested by the establishment.

SERVICE EXAMPLES: PAYMENT SUGGESTION: In some embodiments, a seconddevice may make customize a suggestion to a first device or another userdevice as to which transaction method or type perform the transaction.Such as personalized “suggestion service” may suggest information toperform a transaction with, such as a payment method such as but notlimited to NFC, EMV, Wi-Mag and the like; a token or tokenizationmethod, cryptogram, or the like; a payment card such as but not limitedto a specific credit or debit card, a payment account, alias to any ofthe previously mentions payment accounts or the like; a rewards orloyalty account or number; or sales, discounts, promotions, coupons, orthe like. Suggestions could be triggered by a variety of means includingbut not limiting to preferences and/or store name or location.

SERVICE EXAMPLES: LOCATION: In another embodiment, a “location service”on a second device sends an advertisement packet to wake-up a userdevice or “first device” after detecting a business, entity orestablishment is nearby. Location services enable lower power devicessuch as smart cards, bands, watches and the like to remain “asleep”, orat a low power state, until a location is detected. Location may beachieved using a variety of means not limited to beacons, Bluetoothpower measurements, TDOA (Time Difference of Arrival), RFDOA (RadioFrequency Difference of Arrival), triangulation (where two or moredevices triangulate with one or more other devices), or in someembodiments, GPS (Global Positioning System, which uses satellites tolocate one or more devices) or simply a message sent from a seconddevice to a first device indicating the business name or location.

FIG. 25 is another non-limiting example whereby a first device may sendidentification and/or “preferences” as requested by a second device, inthis case a business establishment, and the second device may sendcommercial advertisements or other information tailored to thepreferences received per a personalized “advertisement service”.Advertisements may include but not be limited to sales, discounts,promotions, coupons, marketing materials, brochures, clubs, loyalty,reward, programs or any multi-media or electronic advertisement. In someembodiments, an advertisement may be sent to a first deviceelectronically where in other embodiments advertisements may becommunicated visibly, audibly, or combination via multi-media.

The introduction of preference-based personalized services under thisinvention opens up a plethora of new and exciting applications andservice that bring convenience to the user while shopping, driving,dining, eating, drinking, traveling and other activities wherepreferences may make user activities more convenient.

SERVICE EXAMPLES: SHOPPING: A non-limiting example of personalizedservices responsive to preferences performed during shopping. As a userwalks into a store, mall or other business establishment, a device suchas but not limited to a visual, audio or multi-media display, bulletinboard or the like may personalize the advertisement or content on thebulletin board responsive to information such as shopping preferencesgathered from a first device owned, operated, or carried by the user.Since many establishments may have more than one person pass by aspecific location, the second device may choose to customize contentbased on preferences received from a single device, multiple devices, anaverage, or another statistical approach.

DRIVING: Similar to shopping at retail stores, malls, and otherland-based establishments, another non-limiting example relates to thepresentation of advertisements while driving. As users of devicescontaining preferences drive along a road, second devices communicatingwith billboards may personalize content in response to preferencesreceived by one or more individuals within an automobile. Like multiplepeople walking past a multi-media display in a store or mall, the seconddevice may choose preferences from a single, multiple, average, orstatistical method. Under some embodiments, the first device may be awearable, mobile, or other device, or in some embodiments, physicallyattached to an automobile, bicycle, skateboard or other transportationdevice.

In some embodiments, a first device is able to characterize motion asdriving, and conserve power by configuring itself in various powersaving modes. One such non-limiting mode comprises configuring itselfwith preferences in a passive or semi-passive mode, waiting for a signalfrom a second device, in this case a device associated with a billboardor equivalent roadside advertisement. Once a signal from the seconddevice is received by a first device, the first device wakes up andprovides

DINING: In another non-limiting example, a user may enter a restaurant.Upon entering the restaurant, the user's preferences for dining may beautomatically transferred to one or more devices of the restaurant.Preferences as referenced herein may include but are not limited topreferred foods, allergens, favorite entrees, favorite appetizers,favorite beverages and desserts, food and drinks most commonly orderedby the user, and/or any other non-limiting diet information. After theuser's preferences have been shared, one or more advertisements may bedisplayed or read to the user including but not limited to menu items,deals, and/or promotions.

In some non-limiting embodiments, a warning may be displayed orillustrated to the user if the user attempts to click, select, view ororder a menu item that is an allergen. In other embodiments, items andother content on the electronic menu are customized responsive topreferences such as likes and dislikes of food, beverages, smoking,seating, allergies, ingredients, spices, temperature, time cooked (welldone, medium, rare, etc.), dishes, cuisine, meals, quantity and thelike. This preferential menu can better serve

GROCERIES: In another non-limiting example of services providedaccording to a user's preferences, a user may enter a store or othernon-limiting institution including a grocery store, the user'spreferences may be downloaded from a user device to the grocery store.After receiving the user's preferences, the grocery store may add theuser to one or more of its membership programs based on the user'spreferences. Additionally, responsive to the provided preferences, agrocery store device can communicate with the user's device and identifylocations for her grocery preferences, prices therefor, healthyalternatives, etc.

The user device may also include a list of needed grocery items, asdetermined by a prior communication session with another device in theuser's house (monitoring refrigerator contents, for example). Thisshopping list can be communicated to a device in the grocery store in asimilar fashion to the grocery preferences.

TRAVEL: A non-limiting example includes traveling on a trip. Considertravel where typically time-consuming activities are automated. Forinstance, as the owner of the information on a device walks through thepre-check at the airport, the authorities may automatically approve theuser based on information released from the device. In one embodiment, asmart card, watch or “travel band”, as non-limiting examples of“devices”, may wake-up, characterize the movement of the individual, andsend data at an interval either configured by the user, based onactivity, and/or the characterization of movement, or combinations.

Personalized services that might be used in this example includewake-up, identification and authentication services.

Information that is transferred between devices under this embodimentmay include but is not limited to an approval code, authentication code,or other cryptographic message; reward number; flight or train number;geographic information such as but not limited to locations traveled inthe last n days; the number of authentications the user has performedwith the user device, or similarly, the time of each authentication theowner has authenticated with the device and/or the type ofauthentication; and personal info such as name, address, locationstaying while in country, allergies, medical issues, shot records, phonenumber, date of birth, passport number and other passport or visainformation, drivers license and/or other personal identifyinginformation. In some embodiments, this information may be in the form ofa token, generated from one or more of the information described aboveand recognized by one or more establishment (or security, in this case)devices.

Another example is when a user walks into an establishment such as aplane, train, taxi, hotel, restaurant, entertainment establishment(bars, night clubs, theaters, musicals, casinos or other entertainmentestablishments), and the like. A beacon may be transmitted at aninterval configured by the user or by characterization of the movementof the person, derived from an accelerometer or equivalent component onthe device, or a combination of both. Here, the establishment maypersonalize the service to the customer by greeting the owner of theinformation on the user device such as “welcome Mr. Tunnell” as he orshe approaches the lobby, counter, table or equivalent location byreceiving some identifying information via the beacon, Bluetooth, BLE,WiFi or equivalent communication.

Information that can be exchanged according to this non-limiting exampleincludes, a user's name, seat number, preferences such as smoking ornon-smoking, pets or no pets, allergies, medical issues, shot records,connecting flights or trains, dining and/or drinking preferences,seating, sleeping and/or other preferences that personalize the serviceto the user.

SECURITY: In another embodiment, the user may be prompted to perform anadditional authentication, such as but not limited to type in a PIN(Personal Identification Number), Tap Code (tap areas on a device), TapCode/Position combination (where the tap code is entered for as thedevice is held in one or more positions for form a “position PIN”),password, gesture, biometrics and the like, or combinations of each oradditional authentication steps such as but not limited to answeringpersonal questions. Under this embodiment, the device could notify theuser via some sound, words, vibration, buzzer, display, or in otherembodiments, by sending a notification to another device, such as aphone, watch, band, and/or jewelry to notify the user that additionalinformation and/or authentication is required. See examples set forth inFIG. 27 (position in conjunction with tapping a card sensor) and FIG. 28(drawing a gesture on a display of a smart phone while the smart phoneis placed in different positions).

Position PINs are further described in the co-owned patent applicationentitled Methods and Systems Related to Multi-Factor Multi-DimensionalHidden Security PINS, filed on Jul. 30, 2015 and assigned applicationNo. 62/198,817, which is incorporated herein in its entirety.

ACCOMMODATIONS: As the user approaches a hotel lobby, the user devicecould be interrogated (communicate) with the establishment device toobtain information to check-in the individual. Thus, under thisembodiment, the owner of the information could configure the device toautomatically check-in the individual by releasing the pertinentinformation. In some embodiments, the user may be prompted to approvethe release of certain private information, such as but not limited topayment account information. Thus, as an establishment could check-inthe owner of the information on the user device as the owner approachesthe lobby. FIG. 29 illustrates a check-in process using a mobileapplication that responds to a beacon signal and executes a check-inprocedure.

Information that can be exchanged according to this embodiment includesbut is not limited to an approval code, authentication code, or othercryptographic message; reward number; flight or train number; geographicinformation such as but not limited to locations traveled in the last“n” days; the number of authentications the user has performed with theuser device, or similarly, the time of each authentication the owner hasauthenticated with the device and/or the type of authentication; paymentinformation; and personal info such as name, address, location stayingwhile in country, allergies, medical issues, shot records, phone number,date of birth, passport number and other passport or visa information,drivers license and/or other personal identifying information, and/orany other information regarding customizing the service for a specificindividual or room.

ROOM KEYS: One or more establishment devices may also respond bydownloading one or more room keys to a user device. This information forthe room key could be in the form of a token or other cryptogram, orsome other identifier, key or the like. Validity time duration, roomnumber, and other information may also be sent to the device where theuser device may then be used as a room key, specific for a given room orduration, or access to other entertainment or locations.

Once configured, the device may be used to open a door just like a roomkey. In this embodiment, a door may be opened using method such as thosedescribed in the commonly-owned patent application entitled UniversalAuthentication and Data Exchange Method, System and Service, filed onMar. 17, 2014, and assigned application Ser. No. 14/217,289, which isincorporated herein in its entirety.

These methods include magnetic stripe, wireless magnetic stripe, NFC,Bluetooth, BLE, WiFi, RFID, sound, light, and the like.

ADMINISTRATION (CHANGE PREFERENCES): Under another non-limiting exampleof an “administration service”, the mobile app sends a wake-up signal tothe device, which upon receipt, begins advertising to allow connection.Under this embodiment, communications could be established from overphysical contacts, such as from a laptop to EMV contacts on a smart carddevice via a USB to smart card reader as a non-limiting example, or viaa Bluetooth advertisement packet from a smart phone to a smart watch, asanother non-limiting example.

Upon connecting with the device, users may perform variousadministrative functions via the application such as but not limited toassigning or un-assigning a member, updating software and rebooting,retrieving the firmware version and battery level of the device, andadding/modifying and/or deleting categories, records, and public andprivate information with the device.

AUTHENTICATION SERVICE: Another example of a personalized serviceincludes authentication. Authentication may be performed by symmetric,asymmetric, biometrics, knowledge-metrics, behavior-metrics,public/private and/or combinations and/or other methods. One such methodemploys risk scores without passing personal information such as but notlimited to the techniques described in the co-pending, commonly-ownedpatent application assigned application Ser. No. 14/217,202, entitledThe Unpassword: Risk Aware End-to-End Multi-Factor Authentication viaDynamic Pairing, and filed on Mar. 17, 2014, which is incorporatedherein in its entirety.

In some embodiments, the user device may be used to authenticate withother devices such as internet, servers, applications, websites, phones,tablets, laptops, desktop and other computing devices, as well as IOT(Internet of Things) devices such as environmental, lighting, fire andsecurity alarms, fans, refrigerators, cooking and dish washing devices,and entertainment devices so that services such as but not limited tolighting, food, alarms, music, television, and the like may bepersonalized by the presence of the user device.

Information the user's device may store and/or generate includes such asbut not limited to user names, passwords, keys, and/or dynamic pairingcodes such that end-to-end authentication and/or encryption/decryptionmay take place between the user device and other devices. In this way,the user device may be used as an FOB or authentication device for otherdevices.

NOTIFICATION SERVICE: A device and a mobile app may send notificationsto one another. Notifications from the may include texts, chats, emails,phone calls, and the like, but also battery charge or level, paymentmethod, connectivity, and the like. In some embodiments, notificationsmay also activate and light and LED. Notifications may also be sent todevices responsive to notifications, messages, text messages, phonecalls, emails, alarms, accounting information, budget information, fraudalerts, other alerts and any notices that require alerting the user ordevice. For a non-limiting example, a first device stores telephonenumbers of a user. When a second device receives a fraud alert from abank, the second device contacts a first device to obtain the telephonenumber, whereby the first device provides the number, the second devicecalls the phone number and the user answers.

SWIMMING (NOTIFICATIONS): In a non-limiting example of notifications, auser may wish to go for a swim. Since the device is indeed his or herroom key and is waterproof, the user may wish to leave his or her cellphone behind and just take the user device with the room key informationwith him. If the user decides to take his or her cell phone with him,notifications from the cell phone to the user device may keep the userup to date on texts, chats, emails, phone calls, and the like while inthe pool. If the user wishes to purchase some food or a drink, the usermay simply select the payment account from multiple payment accountsstored on the user device and make the payment using any one of multiplepayment communications including but not limited to EMV, NFC, magneticstripe, Wi-Mag, QR Code, BLE and the like.

REWARDS: As a user utilizes the user device for payment, rewards may benotified back to the user on the user device. This may be accomplishedby the user device receiving specific information regarding thetransaction including but not limited to amount, time of purchase, itemspurchased, store name, location and the like. For point-of-sale (POS)systems that cannot communicate back to the user device directly, aservice and/or app may collect data from the financial institutionholding the owner's account and send that to an app on a user's device,such as a cell phone, that then in turn collects and/or sends thetransaction information to/from the user device to calculate the reward,points or the like for the transaction. If the reward is not calculatedlocal to the user device, as in some embodiments, it may be calculatedby the service and/or app, and send to the user device for display onthe display local to the user device. In this way, the user may keeptrack of all rewards for various reward and loyalty accounts astransactions are made.

POCKET ACCOUNTANT: An additional feature of this “closed-loop” system ofcollecting transaction information for every transaction is fraudprevention. Since every transaction to an account may be sent to auser's device via a service or app, the user may confirm or deny thetransaction. The application may also automatically match the paymentinformation received from the point of sale system with the paymentinformation received by the user device from a service that sendspayment information to the app from a bank or issuer.

In addition, each transaction may be approved by the user and trackedper a specific category or code or accounting code in order to maintaina budget. The closed transactional method and system could maintain abudget for multiple parties, such that a husband and wife could vieweach others purchases, and determine how much has been spent against abudgeted amount for a given category. The specific transactions may becoded, either automatically or via suggestion to the user, foraccounting purposes. Thus, typical expenses for a household or businessmay be tracked via codes such as travel, food, office and the like.

The invention herein incorporates each of these features within the userdevice, and in some embodiments, the user device, an app on a phone orother computing device, or service on a server or cloud, or combinationsof each.

Other exemplary services that can be provided according to the presentinvention relate to: a check-In service wherein private information isreleased from a card or device to check-in at an establishment;inventory management detection of all contents in close proximity to adevice or card (e.g., a wallet, purse, luggage); a preferences analyticsservice wherein preferences are tailored to a history of informationcollected from a card or user, such as locations visited, transactionsperformed (amount, what was purchased, etc.), spending habits, trends,then combined with other analytics collected from social media, such aslikes/dislikes, from web search services.

An exemplary system for implementing the various software aspects of theinvention includes a computing device or a network of computing devices.In a basic configuration, computing device may include any type ofstationary computing device or a mobile computing device. Computingdevice typically includes at least one processing unit and systemmemory. Depending on the exact configuration and type of computingdevice, system memory may be volatile (such as RAM), non-volatile (suchas ROM, flash memory, and the like) or some combination of the two.System memory typically includes operating system, one or moreapplications, and may include program data. Computing device may alsohave additional features or functionality. For example, computing devicemay also include additional data storage devices (removable and/ornon-removable) such as, for example, magnetic disks, optical disks, ortape. Computer storage media may include volatile and non-volatile,removable and non-removable media implemented in any method ortechnology for storage of information, such as computer readableinstructions, data structures, program modules or other data. Systemmemory, removable storage and non-removable storage are all examples ofcomputer storage media. Non-transitory computer storage media includes,but is not limited to, RAM, ROM, EEPROM, flash memory or other memorytechnology, CD-ROM, digital versatile disks (DVD) or other opticalstorage, magnetic cassettes, magnetic tape, magnetic disk storage orother magnetic storage devices, or any other physical medium which canbe used to store the desired information and which can be accessed bycomputing device. Any such computer storage media may be part of device.A computing device may also have input device(s) such as a keyboard,mouse, pen, voice input device, touch input device, etc. Outputdevice(s) such as a display, speakers, printer, etc. may also beincluded. Computing device also contains communication connection(s)that allow the device to communicate with other computing devices, suchas over a network or a wireless network. By way of example, and notlimitation, communication connection(s) may include wired media such asa wired network or direct-wired connection, and wireless media such asacoustic, RF, infrared and other wireless media.

Computer program code for carrying out operations of the inventiondescribed above may be written in a high-level programming language,such as C or C++, for development convenience. In addition, computerprogram code for carrying out operations of embodiments of the presentinvention may also be written in other programming languages, such as,but not limited to, interpreted languages. Some modules or routines maybe written in assembly language or even micro-code to enhanceperformance and/or memory usage. It will be further appreciated that thefunctionality of any or all of the program modules may also beimplemented using discrete hardware components, one or more applicationspecific integrated circuits (ASICs), or a programmed digital signalprocessor or microcontroller. A code in which a program of the presentinvention is described can be included as a firmware in a RAM, a ROM anda flash memory. Otherwise, the code can be stored in a tangiblecomputer-readable storage medium such as a magnetic tape, a flexibledisc, a hard disc, a compact disc, a photo-magnetic disc, a digitalversatile disc (DVD). The present invention can be configured for use ina computer or an information processing apparatus which includes amemory, such as a central processing unit (CPU), a RAM and a ROM as wellas a storage medium such as a hard disc.

The “step-by-step process” for performing the claimed functions hereinis a specific algorithm, and may be shown as a mathematical formula, inthe text of the specification as prose, and/or in a flow chart. Theinstructions of the software program create a special purpose machinefor carrying out the particular algorithm. Thus, in anymeans-plus-function claim herein in which the disclosed structure is acomputer, or microprocessor, programmed to carry out an algorithm, thedisclosed structure is not the general purpose computer, but rather thespecial purpose computer programmed to perform the disclosed algorithm.

A general purpose computer, or microprocessor, may be programmed tocarry out the algorithm/steps of the present invention creating a newmachine. The general purpose computer becomes a special purpose computeronce it is programmed to perform particular functions pursuant toinstructions from program software of the present invention. Theinstructions of the software program that carry out the algorithm/stepselectrically change the general purpose computer by creating electricalpaths within the device. These electrical paths create a special purposemachine for carrying out the particular algorithm/steps.

Unless specifically stated otherwise as apparent from the discussion, itis appreciated that throughout the description, discussions utilizingterms such as “processing” or “computing” or “calculating” or“determining” or “displaying” or the like, refer to the action andprocesses of a computer system, or similar electronic computing device,that manipulates and transforms data represented as physical(electronic) quantities within the computer system's registers andmemories into other data similarly represented as physical quantitieswithin the computer system memories or registers or other suchinformation storage, transmission or display devices.

Several co-owned applications are related to the present invention andeach is incorporated herein in its entirety, including: the patentapplication filed on Jun. 23, 2015 and assigned application Ser. No.15/191,466, entitled Personalized and Intelligently Connected Method andSystem to Authenticate and Backup Data on a Device; the provisionalpatent application filed on Jul. 5, 2015 and assigned application No.62/188,684, entitled Behavioral-Directed Authentication Method andSystem; the provisional patent application filed on Apr. 3, 2015 andassigned application No. 62/143,028, entitled Miniature, Multi-purposeAntenna Method and System for Low-Power Close-Proximity Communicationsand Energy Transfer; the provisional patent application filed on Jul.14, 2015 and assigned application No. 62/192,218, entitled PersonalizedTokenization System and Method.

In some other embodiments, the establishment may send the beacon, whilethe device may receive the beacon and respond, or vice versa. Thepresent invention is not specific to which devices send the beacon.Information that the establishment may send may include but not belimited to store name, identity, geolocation, advertisement, and thelike. In other embodiments, the device and the establishment may simplycommunication with one another. In yet another embodiment, the devicemay send a beacon or communication with another device, such as a smartphone. Information that may be passed includes configuration informationfrom a user interface on an application on the phone.

What is claimed is:
 1. A system for supplying information to apurchaser, the system comprising: a first device for storing productpreferences of the purchaser and broadcasting relevant productpreferences upon entering an establishment or responsive to receiving asignal upon entering the establishment, the relevant product preferenceslimited to products available for purchase within the establishment, thefirst device in a sleep state and upon entering the establishment orreceiving the signal, the first device switched to an awake state; areceiving device receiving the relevant product preferences; and thereceiving device or a second device responsive to the receiving devicepresenting information to the purchaser that is customized to therelevant product preferences, and includes a location within theestablishment of products available for purchase that are responsive tothe relevant product references, the information presented as an imageon a display, sound from a speaker, video images, still images, or soundon a multimedia device.
 2. The system of claim 1 wherein theestablishment comprises an overnight accommodation facility, and whereinthe information comprises downloading a room key to the first device orconfiguring the first device to function as a room key.
 3. The system ofclaim 1 wherein the first device is one of a smart card, a smart wallet,a smart phone, a wearable device, a mobile device or a portable device.4. The system of claim 1 wherein the video image or the still imagecomprises current advertisements.
 5. The system of claim 1 wherein oneor more of the relevant product preferences is assigned a weight and theinformation provided to the purchaser is responsive to the weight, andwherein the weigh is changed based on subsequent behavior of thepurchaser.
 6. The system of claim 1 wherein the information is derivedfrom an aggregate or an average of the relevant product preferencesreceived from more than one first device.
 7. The system of claim 1wherein the information presented comprises advertisement informationresponsive to a current location of the purchaser and related to aproduct preference proximate the current location of the purchaser. 8.The system of claim 1 wherein the purchaser is within the establishmentand the information presented to the purchaser comprises anadvertisement for a product and a location of the product within theestablishment.
 9. The system of claim 1 the relevant preferencescomprising pre-approved preferences for broadcast without interventionof the purchaser and approval preferences requiring purchaser approvalprior to broadcasting.
 10. The system of claim 1 wherein the relevantpreferences are divided into classes, and each class is governed byauthentication and encryption requirements.