Systems and methods for providing near field communications

ABSTRACT

Methods and systems are disclosed for providing Near Field Communications. In certain embodiments, an Android mobile operating system based mobile device is configured with software that, when executed by one or more processors, determines whether the mobile device is to perform an NFC communication with a contactless payment terminal (CPT) using a secure element associated with an NFC controller included in the mobile device. Based on the determination, the mobile device is configured to execute software that performs communications with the CPT using the NFC controller.

CROSS REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No. 16/509,026, filed on Jul. 11, 2019, which is a continuation of U.S. patent application Ser. No. 15/813,554, filed on Nov. 15, 2017, which is a continuation of U.S. patent application Ser. No. 14/025,197, filed on Sep. 12, 2013, which claims priority under 35 U.S.C. § 119 to U.S. provisional patent application No. 61/702,230, filed on Sep. 17, 2012. The contents of which are hereby incorporated by reference in their entirety.

TECHNICAL FIELD

The disclosed embodiments generally relate to communication systems and, more particularly, to processes and systems for providing near field communications with or without the use of a secure element.

BACKGROUND

Currently, mobile device operating systems are configured to detect only a handful of ISO-14443 device types to facilitate near-field communications (NFCs). NFC is a short-range radio technology that enables wireless communication between devices. NFC is an open-platform technology and is based on and extends on RFID technologies. But some devices using the ISO-14443 standard, including Proximity Coupling Devices (PCDs), remain unsupported by certain operating systems, such as Android™. Thus, to detect and use these unsupported devices, use of a secure element, which provides an environment in which data/processes may be securely stored and/or executed, must be sacrificed.

Accordingly, there is a need for systems and processes that enable devices, such as mobile devices using an Android™ operating system, to communicate with PCDs using a secure element

SUMMARY

Methods and systems consistent with the disclosed embodiments provide NFC capabilities through software that, when executed by a processor, allow a mobile device to request that a PCD be detected, and ultimately communicated with, using a secure element despite employing an operating system that does not support PCOs. According to some embodiments, the mobile device may initialize a discovery mode to detect and ultimately communicate with a PCD to perform a transaction, such as a financial transaction, with or without the secure element.

Additional objects and advantages will be set forth in part in the description which follows, and in part will be obvious from the description, or may be learned by practicing embodiments of the present disclosure. The objects and advantages will be realized and attained by means of the elements and combinations particularly pointed out in the appended claims.

Consistent with disclosed embodiments, a mobile device for processing transactions is disclosed. The mobile device may comprise a processor and memory storing instructions that, when executed by the processor, perform operations. The operations performed by the mobile device may include initializing a discovery mode to detect the contactless payment terminal and, once detected, identifying a near field communication protocol associated with the contactless payment terminal. The operations performed by the mobile device may also include providing a selection to the user regarding whether or not to use a secure element to perform the transaction when the near field communication protocol is not supported by an operating system associated with the mobile device. Finally, the operations performed by the mobile device may include conducting the transaction based at least on the user selection.

Consistent with disclosed embodiments, a method is disclosed for processing transactions. The method may comprise initializing a discovery mode to detect the contactless payment terminal and identifying a near field communication protocol associated with the contactless payment terminal. The method may also include providing a selection to the user regarding whether or not to use a secure element to perform the transaction when the near field communication protocol is not supported by an operating system associated with the mobile device. Finally, the method may include conducting the transaction based at least on the user selection.

Consistent with disclosed embodiments, a non-transitory computer-readable medium is disclosed storing instructions that, when executed by a processor, cause the processor to perform operations. The operations may include initializing, via one or more processors, a discovery mode to detect the contactless payment terminal. Further, the operations may include identifying a near field communication protocol associated with the contactless payment terminal and providing a selection to the user regarding whether or not to use a secure element to perform the transaction when the near field communication protocol is not supported by an operating system associated with the mobile device. Finally, the operations may include conducting, via the one or more processors, the transaction based at least on the user selection.

Consistent with other disclosed embodiments, tangible computer-readable storage media may store program instructions that are executable by one or more processors to implement any of the processes disclosed herein.

It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only, and are not restrictive of the disclosed embodiments.

BRIEF DESCRIPTION OF THE DRAWINGS

The accompanying drawings, which are incorporated in and constitute apart of this specification, illustrate several embodiments and, together with the description, serve to explain the disclosed principles. In the drawings:

FIG. 1 is a diagram of an exemplary system that may be used to implement the disclosed embodiments.

FIG. 2 is a flowchart of an exemplary process flow consistent with the disclosed embodiments.

FIG. 3 is a flowchart of an exemplary process flow consistent with the disclosed embodiments.

FIG. 4 is a flowchart of an exemplary process flow consistent with the disclosed embodiments.

DETAILED DESCRIPTION

Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings and disclosed herein. Wherever convenient, the same reference numbers will be used throughout the drawings to refer to the same or like parts.

FIG. 1 shows an exemplary system 100 that is configured to perform one of more software processes that, when executed by a processor, provide one or more aspects of the disclosed embodiments. The components and arrangements shown in FIG. 1 are not intended to be limiting to the disclosed embodiment, as the components used to implement the disclosed processes and features disclosed here may vary.

In one embodiment, system 10000 includes a mobile device 100 and contactless payment terminal (CPT) 300. The components of mobile device 100 may be implemented in hardware, software, or a combination of both hardware and software, as will be apparent to those skilled in the art. In accordance with certain disclosed embodiments, mobile device 100 may be a mobile computer-based system, such as, for example, cellular telephone, tablets, hand held computing devices (e.g., smart phones), tablets, laptops, and any other type of mobile computer-based system. Alternatively, mobile device 100 may be configured as a particular apparatus, embedded system, dedicated circuit, and the like based on the storage, execution, and/or implementation of the software instructions that perform one or more operations consistent with the disclosed embodiments. According to some embodiments, mobile device 100 may include one or more processors 101, memory 107 storing an operating system 102 and one or more software programs 103, an input/output component 104, and a near field communication (hereinafter “NFC”) controller 105 with a secure element 106. For example, mobile device 100 may be a contactless integrated circuit cards using the ISO-14443 standard. In other embodiments, mobile device 100 may be an NFC-enabled smart phone emulating a contactless financial card or keyfob. Other components known to one of ordinary skill in the art may be included in mobile device 100 to process, transmit, provide, and receive information consistent with the disclosed embodiments.

Processor(s) 101 may be one or more known processing devices, such as a microprocessor from the Pentium™ family manufactured by Intel™ or the Turion™ family manufactured by AMD™. Processor(s) 101 may include a single core or multiple core processor system that provides the ability to perform parallel processes simultaneously. For example, processor 101 may be a single core processor that is configured with virtual processing technologies known to those skilled in the art. In certain embodiments, processor 101 may use logical processors to simultaneously execute and control multiple processes. Processor 101 may implement virtual machine technologies, or other similar known technologies to provide the ability to execute, control, run, manipulate, store, etc. multiple software processes, applications, programs, etc. In another embodiment, processor(s) 101 may include a multiple-core processor arrangement (e.g., dual or quad core) that is configured to provide parallel processing functionalities to allow mobile device 100 to execute multiple processes simultaneously. One of ordinary skill in the art would understand that other types of processor arrangements could be implemented that provide for the capabilities disclosed herein.

Mobile device 100 may include one or more storage devices configured to store information used by processor 101 (or other components) to perform certain functions related to the disclosed embodiments. As discussed above, for example, memory 107 may store instructions to enable processor (s) 101 to execute software, such as one or more applications, network communication processes, operating system software, and any other type of application or software known to be available on mobile devices. Memory 107 may be a volatile or non-volatile, magnetic, semiconductor, tape, optical, removable, nonremovable, or other type of storage device or tangible computer-readable medium. In one embodiment, operating system 102 is an Android™ operating system for mobile devices.

NFC controller 105 may be a device with logic that is configured to execute NFC-related operations. Alternatively, NFC controller 105 may be software that is stored in memory 107, or a separate memory device in mobile device 100. NFC controller 105 may operate and be configured according to architectures and designs known to one of ordinary skill in the art. In one embodiment, NFC controller 105 includes a secure element 106 providing an environment in which processes and data may be securely stored and/or executed. In other embodiments, secure element 106 may be separate from NFC controller 105, such as a separate embedded device in the mobile device, a SIM/UICC card that functions as the secure element, or software located in memory that may or may not be the same memory that hosts NFC controller 105. For example, secure element 106 may provide delimited memory for applications operating according to disclosed embodiments. In certain embodiments, secure element 106 is configured and operates as know n secure elements for NFC devices. For example secure element 106 may store applications, credentials (e.g., usernames and/or passwords), and/or other information associated with secure execution of applications.

I/O 104 may be one or more components that enable mobile device 100 to communicate with external devices. I/O 104 may include input/output components known to those skilled in the art. For example, I/O devices 104 may be one or more devices configured to allow data to be received and/or transmitted by mobile device 100. I/O devices 304 may include one or more digital and/or analog devices that allow mobile device 100 to communicate with other machines and devices, such as other components of systems 1000. For example, I/O devices 104 may include a screen for displaying NFC communication payment methods or providing information to the user. I/O devices 104 may also include one or more digital and/or analog devices that allow a user to interact with mobile device 100, such as a touch-sensitive area, buttons, or microphones. I/O devices 104 may also include one or more accelerometers to detect the orientation and inertia of mobile device 100. I/O devices 104 may also include other components known in the art for interacting with other components of system 1000.

Contactless payment terminal (CPT) 300 may be any known NFC device designed to communicate with mobile device 100. For example, CPT 300 may be a “contactless payment terminal,” such as point of sale terminal, automated teller machine, signage, RFID or similar tag mounted on any type of equipment, product, person, and the like, or any other device that is configured to communicate with NFC mobile devices to facilitate a financial transaction that are known in the art As shown, in some embodiments, CPT 300 may include a display 301. Display 301 may show information regarding transactions, such as amounts due for a purchase and may further display information confirming receipt of payment.

FIG. 2 shows a flowchart of an exemplary process that may be performed by mobile device 100 consistent with certain embodiments. In one aspect, processor(s) 101 may execute software stored in memory 107 (or another memory) to perform NFC communications consistent with the disclosed embodiments. For exemplary purposes, disclosed embodiments are discussed in the context of financial transactions. Disclosed embodiments, however, are not limited to financial transactions and may include, for example, product tracking, information collecting (e.g., retrieving data from a sign, document, etc. configured with CPT capabilities), etc.

At step 210, mobile device 100 may be configured to execute software that receives a user command to initiate a financial transaction. For example, the mobile device may have received a user command to initiate a program associated with NFC and/or financial transactions. In other embodiments, mobile device 100 may become prompted by a message from CPT 300 regarding a potential upcoming financial transaction. At step 220, mobile device 100 may generate a query that is presented on a display device of mobile device 100. In one aspect, the query may request a response indicating whether mobile device 100 is to communicate with a CPT (e.g., CPT 300) using the NFC secure element 106. Mobile device 100 may then receive an indication in response to the query whether further communication with the CPT 300. If the response indicates that communication should be made (step 220; NO), the process may end. Otherwise (step 220; YES), mobile device 100 may execute software to initiate a discovery mode to identify one or more CPTs 300 with which to communicate (step 230). Upon detection of at a CPT 300 (step 240), mobile device 100 may execute software to identify the NFC protocol employed by the CPT 300 (step 250)

If the identified NFC protocol is supported by the operating system of mobile device 100 (step 260; YES), the process may continue as shown in FIG. 4 . As shown in FIG. 4 , the mobile device 100 may use the operating system to follow the appropriate NFC communication and/or ISO standards (step 410) to perform one or more transactions with the detected CPT 300 (step 420). According to some embodiments, any type of transaction may be performed, such as financial, product tracking, information collecting (e.g., retrieving data from a sign, document, etc. configured with CPT capabilities), etc.

If the identified NFC protocol is not supported by the operating system of mobile device 100 (step 260; NO), the process may continue as shown in FIG. 3 . According to some embodiments, mobile device 100 may employ an Android™ operating system that lacks support for the detected PCT's NFC protocol of ISO-14443 used for PCDs. As shown in FIG. 3 , mobile device 100 may execute software that prompts the user as to whether the secure element should be used to communicate with CPT 300 (step 310). If mobile device 100 receives an indication that the secure element should be used (step 310; YES), mobile device 100 access an NFC controller associated with mobile device 100 (step 320). Mobile device 100 may also execute software that conforms to the ISO standards associated with the identified NFC protocol to access the secured element (step 330). Mobile device 100 may also execute software to confirm the mobile device is within a predetermined range of the CPT 300 (step 340) and, once confirmed, may communicate with the CPT 300 to conduct a transaction using the secure element (step 350). In some aspects, the predetermined range is determined by the identified NFC protocol and/or associated ISO standard. According to some embodiments, any type of transaction may be performed, such as financial, product tracking, information collecting (e.g., retrieving data from a sign, document, etc. configured with CPT capabilities), etc.

If mobile device 100 receives an indication that the secure element should not be used (step 310; NO), mobile device 100 may access an NFC controller associated with mobile device 100 (step 360). Mobile device 100 may also execute software to confirm the mobile device is within a predetermined range of the CPT 300 (step 370) and, once confirmed, may communicate with the CPT 300 to conduct a transaction using the secure element (step 380). In some aspects, the predetermined range is determined by the identified NFC protocol and/or associated ISO standard. According to some embodiments, any type of transaction may be performed, such as financial, product tracking, information collecting (e.g., retrieving data from a sign, document, etc. configured with CPT capabilities), etc.

The disclosed embodiments, in certain aspects, may be implemented with mobile devices configured to execute the Android™ operating system for mobile devices. Typical Android™ based NFC devices are not configured to perform communications with CPTs without going through a secure element. Aspects of the disclosed embodiments enable such Android™ based NFC devices to selectively perform secure element communications in accordance with known ISO standards or non-secure element communications.

The foregoing description has been presented for purposes of illustration. It is not exhaustive and is not limited to the precise forms or embodiments disclosed. Modifications and adaptations of the embodiments will be apparent from consideration of the specification and practice of the disclosed embodiments. For example, the described implementations include hardware and software, but systems and methods consistent with the present disclosure can be implemented as hardware alone.

Computer programs based on the written description and methods of this specification are within the skill of a software developer. The various programs or program modules can be created using a variety of programming techniques. For example, program sections or program modules can be designed in or by means of Java, C, C++, assembly language, or any such programming languages. One or more of such software sections or modules can be integrated into a computer system, computer-readable media, or existing communications software.

Moreover, while illustrative embodiments have been described herein, the scope includes any and all embodiments having equivalent elements, modifications, omissions, combinations (e.g., of aspects across various embodiments), adaptations or alterations based on the present disclosure. The elements in the claims are to be interpreted broadly based on the language employed in the claims and not limited to examples described in the present specification or during the prosecution of the application, which examples are to be construed as non-exclusive. Further, the steps of the disclosed methods can be modified in any manner, including by reordering steps or inserting or deleting steps. It is intended, therefore, that the specification and examples be considered as example only, with a true scope and spirit being indicated by the following claims and their full scope of equivalents. 

What is claimed is:
 1. A contactless terminal operates designed to communicate with mobile devices over near-field communications (“NPC”), comprising: at least one storage device storing a set of instructions; and at least one processor coupled to the at least one storage device, the set of instructions configuring the at least one processor to perform operations comprising: determining a mobile device operates a protocol unsupported by an operating system of the at least one processor; retrieving, from a controller, instructions to initiate a secure element, the secure element executing instructions that conform to the protocol to provide an environment in which data may be securely stored or executed; determining whether a distance between the at least one processor and the mobile device is within a range; and communicating with the mobile device using the secure element when the distance is within the range.
 2. The contactless terminal of claim 1, wherein determining the mobile device operates the protocol by the operating system comprises: initiating a discovery mode; detecting the mobile device based on wireless signals; and identifying the protocol operated by the mobile device.
 3. The contactless terminal of claim 2, wherein the range is determined by identifying the protocol operated by the wireless device.
 4. The contactless terminal of claim 1, wherein: the contactless terminal further comprises a display coupled to the at least one processor; and the operations further comprise displaying a query in the display after determining the distance between the at least one processor and the mobile device is within the range, the query indicating whether the contactless terminal is to communicate with the mobile device using the secure element.
 5. The contactless terminal of claim 1, wherein the secure element comprises a memory device storing: instructions that conform with wireless protocols; and credential information.
 6. The contactless terminal of claim 1, wherein: the contactless terminal comprises an NFC controller; and the NFC controller comprises the secure element.
 7. The contactless terminal of claim 6, wherein: the protocol is an NFC protocol; the mobile device is an NFC-enabled smartphone; the contactless terminal is a point of sale terminal; and the contactless terminal is configured to communicate with NFC-enabled devices.
 8. The contactless terminal of claim 1, wherein the secure element comprises a SIM card or a UICC.
 9. The contactless terminal of claim 1, wherein the secure element comprises credentials for secure execution of applications.
 10. The contactless terminal of claim 1, wherein the range is based on the protocol.
 11. A method for operating contactless terminals designed to communicate with mobile devices over near-field communications (“NPC”), comprising: determining a mobile device operates a protocol unsupported by an operating system of a contactless terminal; retrieving instructions to initiate a secure element, the secure element executing instructions that conform to the protocol to provide an environment in which data may be securely stored or executed; determining whether a distance between the contactless terminal and the mobile device is within a range; and communicating with the mobile device using the secure element when the distance is within the range.
 12. The method of claim 11, wherein determining the mobile device operates the protocol by the operating system comprises: initiating a discovery mode; detecting the mobile device based on wireless signals; and identifying the protocol operated by the mobile device.
 13. The method of claim 12, wherein the range is determined by identifying the protocol operated by the wireless device.
 14. The method of claim 11, wherein: the contactless terminal further comprises a display coupled to at least one processor; and wherein the display displays a query in the display after determining the distance between the at least one processor and the mobile device is within the range, the query indicating whether the contactless terminal is to communicate with the mobile device using the secure element.
 15. The method of claim 11, wherein the secure element comprises a memory device storing: instructions that conform with wireless protocols; and credential information.
 16. The method of claim 11, wherein: the contactless terminal comprises an NFC controller; and the NFC controller comprises the secure element.
 17. The method of claim 16, wherein: the protocol is an NFC protocol; the mobile device is an NFC-enabled smartphone; the contactless terminal is a point of sale terminal; and the contactless terminal is configured to communicate with NFC-enabled devices.
 18. The method of claim 11, wherein the secure element comprises a SIM card or a UICC.
 19. The method of claim 11, wherein the secure element comprises credentials for secure execution of applications.
 20. The method of claim 11, wherein the range is based on the protocol. 