Near field communication device capable of operating in a powered or unpowered mode

ABSTRACT

In some implementations, a near field communication (NFC) device may determine whether the NFC device is to perform a wireless transaction in a powered mode or an unpowered mode, and may selectively perform the wireless transaction in the powered mode or the unpowered mode based on determining whether the NFC device is to perform the wireless transaction in the powered mode or the unpowered mode. The wireless transaction may be performed using power from a power source internal to the NFC device when the wireless transaction is performed in the powered mode. The wireless transaction may be performed without using power from the power source internal to the NFC device when the wireless transaction is performed in the unpowered mode.

RELATED APPLICATION

This application is a continuation of U.S. patent application Ser. No.15/823,154, filed Nov. 27, 2017 (now U.S. Pat. No. 10,218,412), which isincorporated herein by reference.

BACKGROUND

Near field communication (NFC) may refer to a set of communicationprotocols that enable two devices to establish communication by bringingthe devices within close proximity (e.g., 4 cm) of one another. NFCdevices may be used in contactless payment systems, in socialnetworking, for sharing contacts, photos, videos, files, and/or thelike.

SUMMARY

According to some possible implementations, a near field communication(NFC) device may include an internal power source, a secure element, anNFC antenna, and one or more components at least partially implementedin hardware. The one or more components may be configured to determinewhether the NFC device is to perform a contactless transaction in apowered mode or an unpowered mode, and may be configured to selectivelyperform the contactless transaction in the powered mode or the unpoweredmode based on determining whether the NFC device is to perform thecontactless transaction in the powered mode or the unpowered mode. Thecontactless transaction may be performed using power from the internalpower source when the contactless transaction is performed in thepowered mode. The contactless transaction may be performed using onlypower from an external NFC field when the contactless transaction isperformed in the unpowered mode.

According to some possible implementations, a method may includedetermining, by a near field communication (NFC) device, whether the NFCdevice is to perform a wireless transaction in a powered mode or anunpowered mode. The method may include selectively performing, by theNFC device, the wireless transaction in the powered mode or theunpowered mode based on determining whether the NFC device is to performthe wireless transaction in the powered mode or the unpowered mode. Thewireless transaction may be performed using power from a power sourceinternal to the NFC device when the wireless transaction is performed inthe powered mode. The wireless transaction may be performed withoutusing power from the power source internal to the NFC device when thewireless transaction is performed in the unpowered mode.

According to some possible implementations, an apparatus may include aninternal power source, a controller configured to receive power from theinternal power source, and an integrated circuit that includes anantenna and a secure element capable of selectively performing a nearfield communication (NFC) data transmission in a powered mode or anunpowered mode. The NFC data transmission may be performed using powerfrom the internal power source and using information received from thecontroller when the NFC data transmission is performed in the poweredmode. The NFC data transmission may be performed without using powerfrom the internal power source and without using information from thecontroller when the NFC data transmission is performed in the unpoweredmode.

BRIEF DESCRIPTION OF THE DRAWINGS

FIGS. 1A and 1B are diagrams of an overview of an example implementationdescribed herein;

FIG. 2 is a diagram of an example environment in which systems and/ormethods, described herein, may be implemented;

FIG. 3 is a diagram of example components of one or more devices of FIG.2; and

FIG. 4 is a flow chart of an example process for performing an NFCtransaction in a powered or unpowered mode.

DETAILED DESCRIPTION

The following detailed description of example implementations refers tothe accompanying drawings. The same reference numbers in differentdrawings may identify the same or similar elements.

An NFC device may include a secure element capable of securely hostingan application and/or an operating system, storing confidential dataassociated with the application and/or operating system, and/or storingcryptographic data (e.g., a cryptographic key and/or the like)associated with the application and/or operating system. For example, asecure element may host an application for performing a transaction, andmay store credentials and/or cryptographic keys for authenticating thetransaction. A secure element may assist with performing different typesof transactions, such as financial transactions (e.g., contactlesstransactions) using different payment methods, user identification,access, transit, ticketing, and/or the like. To perform different typesof transactions, the NFC device may load different applications onto thesecure element, and may execute a particular application to perform aparticular type of transaction.

If the NFC device does not include an internal power source (e.g., abattery and/or the like), then the NFC device may use power obtainedfrom an NFC field to load an application onto a secure element and/orunload an application from the secure element. However, using powerobtained from an NFC field may be cumbersome and slow, and may requirethe NFC device to be placed and held within the NFC field while one ormore applications are transferred to/from the secure element and/orconfigured to perform a transaction. If the NFC device includes aninternal power source, then the NFC device may use power obtained fromthe internal power source to load an application onto the secureelement, unload an application from the secure element, configure anapplication for performing a transaction, and/or the like. This isfaster and less cumbersome than using power from an NFC field, butrequires that the internal power source have sufficient power to performthese operations.

Some implementations described herein permit an NFC device to switchbetween using power from an internal power source and power from an NFCfield to assist with performing a transaction. In this way, one or moreapplications can be quickly loaded, unloaded, and/or configured when theinternal power source has sufficient power, and the NFC device can fallback to using power from an NFC field to load, unload, and/or configurean application when the internal power source does not have sufficientpower. Additional details are described herein.

FIGS. 1A and 1B are diagrams of an overview of an example implementation100 described herein. As shown in FIG. 1A, an NFC device may include apower source internal to the NFC device, a controller, a secure element,and an NFC antenna. As shown by reference number 105, in someimplementations, the NFC device may be capable of performing atransaction in a powered mode, such as when a remaining power level ofthe power source is sufficient to power the transaction to be performedby the NFC device and/or one or more operations associated with thetransaction (e.g., monitoring transaction data, communicating betweenthe controller and the secure element, enhancing a speed and/or range ofthe transaction, and/or the like), when additional processing is to beperformed in connection with the transaction (e.g., fraud monitoring,transaction analytics, and/or the like), when a user, merchant,transacting party, or other party associated with the transaction sets apreference for performing transactions in the powered mode, and/or thelike. In this case, as shown by reference number 110, the secure element(e.g., a processing component of the secure element) may use power fromthe power source to assist with performing the transaction. For example,the secure element may use power from the power source to load anapplication associated with the transaction into memory of the secureelement, to unload an application not associated with the transactionfrom memory of the secure element, to configure an application forperforming the transaction, and/or the like.

Additionally, or alternatively, as shown by reference number 115, thesecure element may use transaction information, provided by thecontroller, to perform the transaction in the powered mode. For example,the controller may store one or more applications in memory, and mayprovide information and/or instructions to the secure element forloading an application, for configuring an application, for executing anapplication, and/or the like. The application may include an applicationfor performing the transaction (e.g., a financial application, a transitapplication, a ticketing application, an access application, an identityverification application, and/or the like), an application for improvingsecurity of the transaction, and/or the like. Additional details aredescribed elsewhere herein.

As shown by reference number 120, when performing the transaction in thepowered mode, the NFC device may perform the transaction using powerfrom the internal power source and/or using information from thecontroller. For example, the secure element may interact with anexternal device, such as a transaction terminal, using an NFC antenna(e.g., which may operate using power from an externally generated NFCfield, even in the powered mode). The transaction may include anyinteraction that uses NFC to exchange information between the NFC deviceand the transaction terminal, such as a data communication, a financialtransaction, a transaction to provide access to a secure area, aticketing transaction, a transit transaction, an identificationtransaction, and/or the like.

By performing a transaction using power from an internal power sourcewhen the internal power source has sufficient power to perform thetransaction, the NFC device may increase the speed at which thetransaction is performed as compared to using power from an NFC field.Furthermore, the reliability of the transaction may be improved becausethe NFC device need not be positioned within an NFC field to providepower for the transaction. Furthermore, by using information (e.g., anapplication) from a controller of the NFC device, other aspects of thetransaction may be improved, such as security of the transaction,flexibility of the transaction, and/or the like.

As shown in FIG. 1B, and by reference number 125, in someimplementations, the NFC device may be capable of performing atransaction in an unpowered mode, such as when a remaining power levelof the internal power source is not sufficient to power the transactionto be performed by the NFC device and/or one or more operationsassociated with the transaction, when additional processing need not beperformed in connection with the transaction (e.g., fraud monitoring,transaction analytics, and/or the like), when a user, merchant,transacting party, or other party associated with the transaction sets apreference for performing transactions in the unpowered mode, and/or thelike. In this case, as shown by reference number 130, the secure element(e.g., a processing component of the secure element) may not use powerfrom the internal power source to assist with performing thetransaction. Instead, as shown by reference number 135, the secureelement may use power from an externally-generated NFC field to assistwith performing the transaction. For example, the secure element may usepower from an NFC field generated by one or more NFC field generators(e.g., a transaction terminal, a mobile device, a smart phone, and/orthe like) to load an application associated with the transaction intomemory of the secure element, to unload an application not associatedwith the transaction from memory of the secure element, to configure anapplication for performing the transaction, and/or the like.

Additionally, or alternatively, as shown by reference number 140, thesecure element may not use transaction information from the controllerto perform the transaction in the unpowered mode. In this case, thesecure element may store a minimum amount of information, in memory ofthe secure element, that is required for performing a basic transaction(e.g., one or more credentials, cryptographic keys, and/or the like).

As shown by reference number 145, when performing the transaction in theunpowered mode, the NFC device may perform the transaction using powerfrom the NFC field and/or without using information from the controller.For example, the secure element may interact with an external device,such as a transaction terminal, using an NFC antenna (e.g., which may bepowered using the external NFC field). The transaction may include anyinteraction that uses NFC to exchange information between the NFC deviceand the transaction terminal, such as a data communication, a financialtransaction, a transaction to provide access to a secure area, aticketing transaction, a transit transaction, an identificationtransaction, and/or the like.

By performing a transaction using power from an externally-generated NFCfield when the internal power source does not have sufficient power toperform the transaction, the NFC device may ensure that the transactioncan be performed regardless of the power level of the internal powersource. Additionally, or alternatively, the NFC device may performtransactions in a flexible manner (e.g., based on whether to performadditional processing for the transaction, based on a user preference,based on a merchant preference, and/or the like). Furthermore, someimplementations described herein may improve operation of the NFC deviceand conserve resources that would otherwise be wasted by a failedtransaction (e.g., where the NFC device begins a transaction with powerfrom the internal power source, but runs out of power before thetransaction is completed).

As indicated above, FIGS. 1A and 1B are provided merely as examples.Other examples are possible and may differ from what was described withregard to FIGS. 1A and 1B.

FIG. 2 is a diagram of an example environment 200 in which systemsand/or methods, described herein, may be implemented. As shown in FIG.2, environment 200 may include an NFC device 205, a transaction terminal210, and an NFC field generator 215. As further shown, NFC device 205may include a power source 220, a controller 225, a management component230, and a transaction integrated circuit (IC) 235, which may include asecure element 240 and an NFC antenna 245. Devices of environment 200may interconnect via wired connections, wireless connections, or acombination of wired and wireless connections.

NFC device 205 includes one or more devices capable of communicatingusing NFC. For example, NFC device 205 may include a phone (e.g., amobile phone, a smart phone, a radiotelephone, and/or the like), atablet computer, a laptop computer, a transaction card (e.g., a smartcard, a credit card, a debit card, a transit card, and/or the like), asmart wallet, a wearable device (e.g., a smart watch, smart eyeglasses,smart clothing, and/or the like), an Internet of Things (IoT) device,and/or the like. In some implementations, NFC device 205 may be capableof performing a contactless transaction, such as a financialtransaction, an access transaction, a transit transaction, a ticketingtransaction, and/or the like.

Transaction terminal 210 includes one or more devices capable ofinteracting with NFC device 205 to perform a transaction. For example,transaction terminal 210 may include a contactless transaction terminal,an NFC reader, a self-checkout station, a kiosk, a point-of-sale (PoS)terminal, a security access terminal, an automated teller machine (ATM)terminal, a phone (e.g., a mobile phone, a smart phone, aradiotelephone, and/or the like), a desktop computer, a laptop computer,a tablet computer, and/or the like. Transaction terminal 210 may includeone or more input devices and/or output devices to facilitate obtainingtransaction information from NFC device 205. Example input devices oftransaction terminal 210 may include an NFC antenna, a number keypad, atouchscreen, a magnetic strip reader, a chip reader, a camera, a scanner(e.g., a barcode scanner, QR code scanner, and/or the like), and/or aradio frequency (RF) signal reader. Example output devices oftransaction terminal 210 may include a display device, a speaker, aprinter, and/or the like. NFC device 205 may interact with transactionterminal 210 to perform a transaction.

NFC field generator 215 includes one or more devices, external from NFCdevice 205, capable of generating an NFC field. For example, NFC fieldgenerator 215 may include a phone, a transaction terminal (e.g.,transaction terminal 210), a tablet computer, a laptop computer, atransaction card, a smart wallet, a wearable device, an Internet ofThings (IoT) device, and/or the like. In some implementations, NFCdevice 205 may obtain power from an NFC field generated by NFC fieldgenerator 215, and may use the power to power controller 225 and/orsecure element 240 when NFC device 205 is to perform a transaction in anunpowered mode. Additionally, or alternatively, power from an NFC fieldgenerated by NFC field generator 215 may be used to power NFC antenna245 (e.g., regardless of whether NFC device 205 is operating in apowered mode or unpowered mode, in some cases).

Power source 220 includes one or more devices, internal to NFC device205, capable of supplying power. For example, power source 220 mayinclude a battery (e.g., a rechargeable battery, a non-rechargeablebattery, and/or the like), a power supply, a capacitor, and/or the like.In some implementations, NFC device 205 (e.g., controller 225 and/orsecure element 240) may obtain power from power source 220 when NFCdevice 205 is to perform a transaction in a powered mode. In someaspects, NFC device 205 may include a single power source 220, which maysupply power for performing a transaction and/or may supply power to oneor more other components of NFC device 205 (e.g., a processor, a storagecomponent, an input component, an output component, a communicationinterface, and/or the like). In some aspects, NFC device 205 may includemultiple power sources 220. In some aspects, a single power source 220may be dedicated to supplying power solely for performing a transaction,while other powers sources 220 supply power to other components of NFCdevice 205.

Controller 225 includes one or more devices capable of receiving,generating, storing, processing, and/or providing information and/orinstructions that assist with performing a transaction. For example,controller 225 may include a processor, such as processor 320 describedbelow in connection with FIG. 3. Additionally, or alternatively,controller 225 may include memory, such as memory 330 described below inconnection with FIG. 3. In some implementations, the memory may storeinformation associated with performing a transaction (e.g., one or moreapplications, a configuration for one or more applications, and/or thelike), and the controller may provide such information to secure element240 to perform the transaction (e.g., in a powered mode). In someimplementations, controller 225 may receive power from power source 220.

Management component 230 includes one or more devices capable ofcontrolling whether transaction IC 235 (e.g., secure element 240 and/orNFC antenna 245) receives power from power source 220 and/or receivesinformation from controller 225. For example, management component 230may include a switch, a gate, a controller, a processing component,and/or the like. In some implementations, management component 230 mayinclude a bidirectional logic level shifter to control signals betweencontroller 225 and secure element 240 (e.g., to couple or decouplecontroller 225 and secure element 240, to prevent signals from beingpassed between controller 225 and secure element 240, and/or the like).Additionally, or alternatively, management component 230 may include adiode (e.g., an ideal diode) and/or a switch (e.g., a load switch) tocontrol signals between power source 220 and secure element 240 (e.g.,to couple or decouple power source 220 and secure element 240, toprevent signals from being passed between power source 220 and secureelement 240, and/or the like). In some implementations, managementcomponent 230 may couple transaction IC 235 to power source 220 and/orcontroller 225 when NFC device 205 is to perform a transaction in apowered mode, and/or may decouple transaction IC 235 from power source220 and/or controller 225 when NFC device 205 is to perform atransaction in an unpowered mode. In some implementations, managementcomponent 230 may include a booster to improve transaction speed and/orrange of NFC antenna 245 when NFC device 205 performs a transaction in apowered mode.

Transaction IC 235 includes an integrated circuit that connects secureelement 240 and NFC antenna 245. For example, transaction IC 235 mayinclude secure element 240, NFC antenna 245, and a connection betweensecure element 240 and NFC antenna 245.

Secure element 240 includes one or more devices capable of securelyhosting an operating system and/or an application, and/or storingconfidential information (e.g., a credential, cryptographic information,and/or the like). For example, secure element 240 may include auniversal integrated circuit card (UICC), a secure digital (SD) card(e.g., a microSD card and/or the like), an embedded secure element,and/or the like. In some implementations, secure element 240 may includea tamper resistant hardware platform. In some implementations, secureelement 240 may host a personalized card application and a cryptographickey required to perform a financial transaction (e.g., with transactionterminal 210). In some implementations, secure element 240 may store acredential, such as a username, a password, biometric information, atoken, a certificate for signing documents, and/or the like.

NFC antenna 245 includes an antenna capable of transmitting and/orreceiving information using an NFC protocol. For example, NFC antenna245 may include a loop antenna (e.g., an NFC loop antenna), an inductor(e.g., an NFC inductor), and/or the like. In some implementations, NFCantenna 245 may be integrated into secure element 240 (e.g., may be partof the same integrated circuit, such as transaction IC 235).

The number and arrangement of devices shown in FIG. 2 are provided as anexample. In practice, there may be additional devices, fewer devices,different devices, or differently arranged devices than those shown inFIG. 2. Furthermore, two or more devices shown in FIG. 2 may beimplemented within a single device, or a single device shown in FIG. 2may be implemented as multiple, distributed devices. Additionally, oralternatively, a set of devices (e.g., one or more devices) ofenvironment 200 may perform one or more functions described as beingperformed by another set of devices of environment 200.

FIG. 3 is a diagram of example components of a device 300. Device 300may correspond to NFC device 205, transaction terminal 210, NFC fieldgenerator 215, power source 220, controller 225, management component230, transaction IC 235, secure element 240, and/or NFC antenna 245. Insome implementations, NFC device 205, transaction terminal 210, NFCfield generator 215, power source 220, controller 225, managementcomponent 230, transaction IC 235, secure element 240, and/or NFCantenna 245 may include one or more devices 300 and/or one or morecomponents of device 300. As shown in FIG. 3, device 300 may include abus 310, a processor 320, a memory 330, a storage component 340, aninput component 350, an output component 360, and a communicationinterface 370.

Bus 310 includes a component that permits communication among thecomponents of device 300. Processor 320 is implemented in hardware,firmware, or a combination of hardware and software. Processor 320 is acentral processing unit (CPU), a graphics processing unit (GPU), anaccelerated processing unit (APU), a microprocessor, a microcontroller,a digital signal processor (DSP), a field-programmable gate array(FPGA), an application-specific integrated circuit (ASIC), or anothertype of processing component. In some implementations, processor 320includes one or more processors capable of being programmed to perform afunction. Memory 330 includes a random access memory (RAM), a read onlymemory (ROM), and/or another type of dynamic or static storage device(e.g., a flash memory, a magnetic memory, and/or an optical memory) thatstores information and/or instructions for use by processor 320.

Storage component 340 stores information and/or software related to theoperation and use of device 300. For example, storage component 340 mayinclude a hard disk (e.g., a magnetic disk, an optical disk, amagneto-optic disk, and/or a solid state disk), a compact disc (CD), adigital versatile disc (DVD), a floppy disk, a cartridge, a magnetictape, and/or another type of non-transitory computer-readable medium,along with a corresponding drive.

Input component 350 includes a component that permits device 300 toreceive information, such as via user input (e.g., a touch screendisplay, a keyboard, a keypad, a mouse, a button, a switch, and/or amicrophone). Additionally, or alternatively, input component 350 mayinclude a sensor for sensing information (e.g., an ambient light sensor,a photodiode, a photodetector, a global positioning system (GPS)component, an accelerometer, a gyroscope, and/or an actuator). Outputcomponent 360 includes a component that provides output information fromdevice 300 (e.g., a display, a speaker, and/or one or morelight-emitting diodes (LEDs)).

Communication interface 370 includes a transceiver-like component (e.g.,a transceiver and/or a separate receiver and transmitter) that enablesdevice 300 to communicate with other devices, such as via a wiredconnection, a wireless connection, or a combination of wired andwireless connections. Communication interface 370 may permit device 300to receive information from another device and/or provide information toanother device. For example, communication interface 370 may include anEthernet interface, an optical interface, a coaxial interface, aninfrared interface, a radio frequency (RF) interface, a universal serialbus (USB) interface, a Wi-Fi interface, a cellular network interface, orthe like.

Device 300 may perform one or more processes described herein. Device300 may perform these processes based on processor 320 executingsoftware instructions stored by a non-transitory computer-readablemedium, such as memory 330 and/or storage component 340. Acomputer-readable medium is defined herein as a non-transitory memorydevice. A memory device includes memory space within a single physicalstorage device or memory space spread across multiple physical storagedevices.

Software instructions may be read into memory 330 and/or storagecomponent 340 from another computer-readable medium or from anotherdevice via communication interface 370. When executed, softwareinstructions stored in memory 330 and/or storage component 340 may causeprocessor 320 to perform one or more processes described herein.Additionally, or alternatively, hardwired circuitry may be used in placeof or in combination with software instructions to perform one or moreprocesses described herein. Thus, implementations described herein arenot limited to any specific combination of hardware circuitry andsoftware.

The number and arrangement of components shown in FIG. 3 are provided asan example. In practice, device 300 may include additional components,fewer components, different components, or differently arrangedcomponents than those shown in FIG. 3. Additionally, or alternatively, aset of components (e.g., one or more components) of device 300 mayperform one or more functions described as being performed by anotherset of components of device 300.

FIG. 4 is a flow chart of an example process 400 for performing an NFCtransaction in a powered or unpowered mode. In some implementations, oneor more process blocks of FIG. 4 may be performed by NFC device 205.

As shown in FIG. 4, process 400 may include determining that a nearfield communication (NFC) transaction is to be performed by an NFCdevice (block 410) and determining whether the transaction is to beperformed in a powered mode or an unpowered mode (block 420). Forexample, NFC device 205 may determine that NFC device 205 is to performan NFC transaction. The NFC transaction may include an exchange ofinformation via NFC (e.g., an NFC data transmission and/or datareception), and may include a financial transaction, a contactlesstransaction, a wireless transaction, a transaction for identityverification, a transaction for accessing a secured area, a transittransaction, a ticketing transaction, a transaction to transmit a file,and/or the like. In some implementations, NFC device 205 may determinethat NFC device 205 is to perform the NFC transaction based on a requestreceived from transaction terminal 210 (e.g., a request to perform thetransaction).

In some implementations, NFC device 205 may determine whether NFC device205 is to perform the transaction in the powered mode or the unpoweredmode based on a remaining power level of power source 220 (e.g., a powersource internal to NFC device 205). For example, if the remaining powerlevel of power source 220 is less than or equal to a threshold, then NFCdevice 205 may determine that NFC device 205 is to perform thetransaction in the unpowered mode. Conversely, if the remaining powerlevel of power source 220 is greater than or equal to a threshold, thenNFC device 205 may determine that NFC device 205 is to perform thetransaction in the powered mode. In some implementations, the thresholdmay correspond to an amount of power required to perform thetransaction. Additionally, or alternatively, the threshold may be zero,which may correspond to power source 220 being completely drained.

Additionally, or alternatively, the threshold may correspond to anamount of power required to perform the transaction using one or moreapplications. For example, secure element 240 may require a first amountof power (e.g., a lesser amount) to perform the transaction using abasic transaction application, and may require a second amount of power(e.g., a greater amount) to perform the transaction using an applicationthat increases security of the transaction as compared to the basictransaction application. If the remaining amount of power of powersource 220 is greater than the first amount but less than the secondamount, then NFC device 205 may perform the transaction by powering thebasic transaction application using power from power source 220.Additionally, or alternatively, NFC device 205 may select one or moreapplications to be loaded onto secure element 240 and used to performthe transaction based on the remaining power level of the internal powersource. For example, if the remaining amount of power of power source220 is greater than the first amount but less than the second amount,then NFC device 205 may load the basic transaction application ontosecure element 240 without loading the application to increase securityonto secure element 240.

Additionally, or alternatively, NFC device 205 may determine whether NFCdevice 205 is to perform the transaction in the powered mode or theunpowered mode based on a preference (e.g., a preference of atransacting party, such as a user, a merchant, and/or the like). Forexample, a user of NFC device 205 may indicate that NFC device 205should only operate in the powered mode to provide additional securityfor transactions, for example. As another example, a merchant associatedwith transaction terminal 210 may only accept transactions from NFCdevices 205 operating in a powered mode (e.g., to increase security ofthe transaction). In this case, the preference may be communicated toNFC device 205 (e.g., via transaction terminal 205) and/or may be storedby NFC device 205, and may be used to determine whether to perform thetransaction in a powered mode or an unpowered mode.

Additionally, or alternatively, NFC device 205 may determine whether NFCdevice 205 is to perform the transaction in the powered mode or theunpowered mode based on a type of the transaction (e.g., a financialtransaction, an access transaction, a fare card transaction, a transittransaction, a ticketing transaction, an identity verificationtransaction, and/or the like). For example, some transaction types maybe associated with additional processing (e.g., for security,transaction analytics, and/or the like). In this case, NFC device 205may determine a type of the transaction, and may determine whether toperform the transaction in the powered mode or the unpowered mode basedon a type of the transaction (e.g., based on information stored by NFCdevice 205). Additionally, or alternatively, different types oftransactions may be associated with different preferences, as describedabove, and NFC device 205 may determine whether to perform thetransaction in the powered mode or the unpowered mode based on a type ofthe transaction and a preference associated with the type oftransaction.

Additionally, or alternatively, if power source 220 is used to powerother components of NFC device 205 other than controller 225, then powersource 220 may determine an amount of power needed to power the othercomponents (e.g., for a threshold amount of time), and may set athreshold for determining whether to perform the transaction in thepowered mode or the unpowered mode based on the amount of power neededto power the other components (e.g., for the threshold amount of time).In this way, power may be reserved for other components of NFC device205. In some implementations, NFC device 205 may shut off the othercomponents to conserve power for a transaction when a remaining powerlevel of power source 220 satisfies a threshold.

Additionally, or alternatively, NFC device 205 may determine an amountof time that it will take to harness sufficient power from NFC fieldgenerator(s) 215 to power the transaction, and may determine whether toperform the transaction in the powered mode or the unpowered mode basedon the amount of time. For example, NFC device 205 may compare theamount of time to a threshold. In some implementations, if the amount oftime is greater than or equal to a threshold, then NFC device 205 mayperform the transaction in the powered mode. Conversely, if the amountof time is less than or equal to a threshold, then NFC device 205 mayperform the transaction in the unpowered mode.

As further shown in FIG. 4, if the transaction is to be performed in thepowered mode (block 420—POWERED MODE), then process 400 may includeperforming the transaction using power from an internal power sourceand/or using information from an internal controller (block 430). Forexample, if NFC device 205 performs the transaction in the powered mode,then NFC device 205 may use power from power source 220 (e.g., internalto NFC device 205) to perform the transaction. In this case, secureelement 240, NFC antenna 245, and/or controller 225 may receive powerfrom power source 220 to perform the transaction. In someimplementations, NFC device 205 (e.g., management component 230) maycouple an integrated circuit, that includes secure element 240 and NFCantenna 245, with power source 220 when the transaction is performed inthe powered mode. In some implementations, NFC antenna 245 may receivepower from power source 220 to increase a speed and/or a range of thetransaction (e.g., using a booster component of NFC device 205).

Additionally, or alternatively, if NFC device 205 performs thetransaction in the powered mode, then NFC device 205 may use informationfrom controller 225 (e.g., internal to NFC device 205) to perform thetransaction. Such information may include, for example, an applicationfor performing the transaction, a configuration for the application,and/or the like. For example, if NFC device 205 performs the transactionin the powered mode, then NFC device 205 may load one or moreapplications, associated with performing the transaction, onto secureelement 240 (e.g., for provisioning secure element 240 for thetransaction, for requesting one or more credentials for authentication,and/or the like). In some implementations, NFC device 205 (e.g.,management component 230) may couple an integrated circuit, thatincludes secure element 240 and NFC antenna 245, with controller 225when the transaction is performed in the powered mode. For example,controller 225 may receive power from power source 220 to monitortransaction data from secure element 240 and/or provide a result of themonitoring to secure element 240 (e.g., to indicate whether to completethe transaction and/or the like), to communicate with secure element 240during the transaction, and/or the like. In this way, the transactionmay be performed more quickly and/or in an improved manner (e.g., withimproved security and/or the like) when NFC device 205 has sufficientinternal power from power source 220 to perform the transaction, may beperformed in accordance with a preference, may be customized for aparticular type of transaction, and/or the like.

As further shown in FIG. 4, if the transaction is to be performed in theunpowered mode (block 420—UNPOWERED MODE), then process 400 may includeperforming the transaction using only power from an externally generatedNFC field and/or without using information from an internal controller(block 440). For example, if NFC device 205 performs the transaction inthe unpowered mode, then NFC device 205 may perform the transactionwithout using power from internal power source 220. In this case, NFCdevice 205 may use power only from an NFC field generated by an NFCfield generator 215 to perform the transaction. In this case, secureelement 240 and/or NFC antenna 245 may receive power from the NFC fieldto perform the transaction. In some implementations, NFC device 205(e.g., management component 230) may decouple an integrated circuit,that includes secure element 240 and NFC antenna 245, from power source220 when the transaction is performed in the unpowered mode.

In some implementations, NFC device 205 may perform the transactionusing different applications based on whether NFC device 205 performsthe transaction in the powered mode or the unpowered mode. For example,secure element 240 may require a first amount of power (e.g., a lesseramount) to perform the transaction using a basic transactionapplication, and may require a second amount of power (e.g., a greateramount) to perform the transaction using an application that increasessecurity of the transaction as compared to the basic transactionapplication. If the remaining amount of power of power source 220 isgreater than the first amount but less than the second amount, then NFCdevice 205 may perform the transaction by powering the basic transactionapplication using power from power source 220. Additionally, oralternatively, NFC device 205 may select one or more applications to beloaded onto secure element 240 and used to perform the transaction basedon the remaining power level of the internal power source. For example,if the remaining amount of power of power source 220 is greater than thefirst amount but less than the second amount, then NFC device 205 mayload the basic transaction application onto secure element 240 withoutloading the application to increase security onto secure element 240.

In some implementations, NFC device 205 may perform the transactionusing a same application regardless of whether NFC device 205 performsthe transaction in the powered mode or the unpowered mode. In this case,the transaction may take longer to perform in the unpowered mode, andmay be performed more quickly in the powered mode.

Additionally, or alternatively, if NFC device 205 performs thetransaction in the unpowered mode, then NFC device 205 may not useinformation from controller 225 (e.g., internal to NFC device 205) toperform the transaction. For example, if NFC device 205 performs thetransaction in the unpowered mode, then NFC device 205 may prevent oneor more applications, associated with performing the transaction, frombeing loaded onto secure element 240. In some implementations, NFCdevice 205 (e.g., management component 230) may decouple an integratedcircuit, that includes secure element 240 and NFC antenna 245, fromcontroller 225 when the transaction is performed in the unpowered mode.In this way, the transaction may be performed despite NFC device 205 nothaving sufficient internal power from power source 220 to perform thetransaction, may be performed in accordance with a preference, may becustomized for a particular type of transaction, and/or the like.

Although FIG. 4 shows example blocks of process 400, in someimplementations, process 400 may include additional blocks, fewerblocks, different blocks, or differently arranged blocks than thosedepicted in FIG. 4. Additionally, or alternatively, two or more of theblocks of process 400 may be performed in parallel.

Some implementations described herein permit an NFC device to switchbetween using power from an internal power source and power from an NFCfield to assist with performing a transaction. In this way, one or moreapplications can be quickly loaded, unloaded, and/or configured when theinternal power source has sufficient power, and the NFC device can fallback to using power from an NFC field to load, unload, and/or configurean application when the internal power source does not have sufficientpower.

The foregoing disclosure provides illustration and description, but isnot intended to be exhaustive or to limit the implementations to theprecise form disclosed. Modifications and variations are possible inlight of the above disclosure or may be acquired from practice of theimplementations.

As used herein, the term component is intended to be broadly construedas hardware, firmware, or a combination of hardware and software.

Some implementations are described herein in connection with thresholds.As used herein, satisfying a threshold may refer to a value beinggreater than the threshold, more than the threshold, higher than thethreshold, greater than or equal to the threshold, less than thethreshold, fewer than the threshold, lower than the threshold, less thanor equal to the threshold, equal to the threshold, or the like.

It will be apparent that systems and/or methods, described herein, maybe implemented in different forms of hardware, firmware, or acombination of hardware and software. The actual specialized controlhardware or software code used to implement these systems and/or methodsis not limiting of the implementations. Thus, the operation and behaviorof the systems and/or methods were described herein without reference tospecific software code—it being understood that software and hardwarecan be designed to implement the systems and/or methods based on thedescription herein.

Even though particular combinations of features are recited in theclaims and/or disclosed in the specification, these combinations are notintended to limit the disclosure of possible implementations. In fact,many of these features may be combined in ways not specifically recitedin the claims and/or disclosed in the specification. Although eachdependent claim listed below may directly depend on only one claim, thedisclosure of possible implementations includes each dependent claim incombination with every other claim in the claim set.

No element, act, or instruction used herein should be construed ascritical or essential unless explicitly described as such. Also, as usedherein, the articles “a” and “an” are intended to include one or moreitems, and may be used interchangeably with “one or more.” Furthermore,as used herein, the term “set” is intended to include one or more items(e.g., related items, unrelated items, a combination of related andunrelated items, etc.), and may be used interchangeably with “one ormore.” Where only one item is intended, the term “one” or similarlanguage is used. Also, as used herein, the terms “has,” “have,”“having,” or the like are intended to be open-ended terms. Further, thephrase “based on” is intended to mean “based, at least in part, on”unless explicitly stated otherwise.

What is claimed is:
 1. A transaction card, comprising: an internal powersource; a secure element; an NFC antenna; and one or more components, atleast partially implemented in hardware, configured to: determinewhether the transaction card is to perform a contactless transaction,with a transaction terminal, in a powered mode or an unpowered mode; andselectively perform the contactless transaction in the powered mode orthe unpowered mode based on determining whether the transaction card isto perform the contactless transaction in the powered mode or theunpowered mode, the contactless transaction to be performed using powerfrom the internal power source when the contactless transaction isperformed in the powered mode, or the contactless transaction to beperformed using power generated from an external NFC field generated byan NFC field generator when the contactless transaction is performed inthe unpowered mode, the NFC field generator being a device external tothe transaction card.
 2. The transaction card of claim 1, where the NFCantenna is integrated into the secure element.
 3. The transaction cardof claim 1, where the one or more components are further configured to:selectively load one or more applications, associated with performingthe contactless transaction, onto the secure element, the one or moreapplications to be loaded onto the secure element when the contactlesstransaction is performed in the powered mode, or the one or moreapplications not to be loaded onto the secure element when thecontactless transaction is performed in the unpowered mode.
 4. Thetransaction card of claim 3, where the one or more applications areselected based on a current power level of the internal power source. 5.The transaction card of claim 1, where the one or more componentsinclude: an integrated circuit that includes the secure element and theNFC antenna, a controller to receive power from the internal powersource, and a management component configured to: couple the integratedcircuit with at least one of the controller or the internal power sourcewhen the contactless transaction is performed in the powered mode, ordecouple the integrated circuit from at least one of the controller orthe internal power source when the contactless transaction is performedin the unpowered mode.
 6. The transaction card of claim 1, where the oneor more components, when determining whether the transaction card is toperform the contactless transaction in the powered mode or the unpoweredmode, are configured to: determine that the transaction card is toperform the contactless transaction in the unpowered mode based ondetecting that a current power level of the internal power source isbelow a threshold required to perform the contactless transaction. 7.The transaction card of claim 1, where the one or more components, whendetermining whether the transaction card is to perform the contactlesstransaction in the powered mode or the unpowered mode, are configuredto: determine that the transaction card is to perform the contactlesstransaction in the powered mode or the unpowered mode based at least oneof on: a preference of a transacting party, or a type of contactlesstransaction.
 8. A method, comprising: determining, by a transactioncard, whether the transaction card is to perform a wireless transaction,with a transaction terminal, in a powered mode or an unpowered mode; andselectively performing, by the transaction card, the wirelesstransaction in the powered mode or the unpowered mode based ondetermining whether the transaction card is to perform the wirelesstransaction in the powered mode or the unpowered mode, when usingtransaction power from a power source internal to the transaction card,the wireless transaction to be performed in the powered mode; or whenusing transaction power other than from the power source internal to thetransaction card, the wireless transaction to be performed in theunpowered mode.
 9. The method of claim 8, where selectively performingthe wireless transaction in the powered mode or the unpowered modecomprises: coupling a secure element and an NFC antenna to the powersource internal to the transaction card when the wireless transaction isperformed in the powered mode, or decoupling the secure element and theNFC antenna from the power source internal to the transaction card whenthe wireless transaction is performed in the unpowered mode.
 10. Themethod of claim 8, where selectively performing the wireless transactionin the powered mode or the unpowered mode comprises: executing one ormore applications associated with the wireless transaction when thewireless transaction is performed in the powered mode, or configuring toprevent execution of the one or more applications associated with thewireless transaction when the wireless transaction is performed in theunpowered mode.
 11. The method of claim 10, where the one or moreapplications include one or more applications to increase security ofthe wireless transaction.
 12. The method of claim 8, where determiningwhether the transaction card is to perform the wireless transaction inthe powered mode or the unpowered mode comprises: determining that thetransaction card is to perform the wireless transaction in the unpoweredmode based on determining that the power source internal to thetransaction card is insufficient.
 13. The method of claim 8, wheredetermining whether the transaction card is to perform the wirelesstransaction in the powered mode or the unpowered mode comprises:determining whether the transaction card is to perform the wirelesstransaction in the powered mode or the unpowered mode based on comparinga current power level of the power source internal to the transactioncard to a threshold.
 14. The method of claim 13, where the threshold isdetermined based on an amount of power required to perform the wirelesstransaction.
 15. The method of claim 13, where the threshold isdetermined based on an amount of power required to perform the wirelesstransaction using one or more applications.
 16. An apparatus,comprising: an internal power source; a controller configured to receivepower from the internal power source; and an integrated circuit thatincludes an antenna and a secure element capable of selectivelyperforming a near field communication (NFC) data transmission in apowered mode or an unpowered mode, the NFC data transmission to beperformed using power from the internal power source and usinginformation received from the controller when the NFC data transmissionis performed in the powered mode, or the NFC data transmission to beperformed using power other than from the internal power source when theNFC data transmission is performed in the unpowered mode.
 17. Theapparatus of claim 16, where the information includes information forexecuting one or more applications associated with the NFC datatransmission.
 18. The apparatus of claim 17, where the one or moreapplications include one or more of: a first application to increasesecurity of the NFC data transmission, or a second application thatpermits a particular type of NFC data transmission.
 19. The apparatus ofclaim 16, where the apparatus is configured to: determine whether theapparatus is to perform the NFC data transmission in the powered mode orthe unpowered mode based on comparing a remaining power level of theinternal power source and a threshold; and instruct the secure elementto perform the NFC data transmission in the powered mode or theunpowered mode based on determining whether the apparatus is to performthe NFC data transmission in the powered mode or the unpowered mode. 20.The apparatus of claim 19, where the threshold is determined based on anamount of power required to perform the NFC data transmission.