Near field communication activation and authorization

ABSTRACT

A method of activation and authorization of a near field communication (NFC) enabled device comprising: receiving login information from an NFC enabled device; sending packet data via a network in response to receiving the login information from the NFC enabled device; and receiving corresponding data from the NFC enabled device in response to the sending of the packet data, the sending of the packet data and the receiving of the corresponding code facilitates the activation and authorization of the NFC enabled device, and the subsequent activation of the NFC device via a NFC link without further authorization of the NFC enabled device, is described herein.

RELATED APPLICATIONS

This application is a continuation patent application of U.S. patentapplication Ser. No. 12/241,557, filed Sep. 30, 2008, which claimspriority and the benefit of U.S. Provisional Application No. 61/024,758,filed Jan. 30, 2008; and U.S. Provisional Application No. 61/034,890,filed Mar. 7, 2008, the entire disclosures of which are incorporatedherein by reference.

BACKGROUND

1. Field of the Invention

The present disclosure relates generally to financial transactions andmore particularly to peer-to-peer payment between mobile devices usingnear field communication in a network environment.

2. Related Art

Arguably, mobile phones are currently the most widespread mobilecomputing device in the world. They have become ubiquitous companions inour life, enabling communication nearly anytime and anywhere tofacilitate information access to mobile services and the Internet. Inaddition, mobile phones have become multimedia computing platforms withintegral digital cameras for taking pictures and video, playing music,recording conversations, and for organizing our lives.

Using physical objects as entry points to data and services can easemobile communication and information access. Augmentation of theenvironment enables physical mobile interactions, which involve a user,a mobile device, and a physical object or another mobile device. Theobject is augmented with some kind of technology and subsequently storesinformation. The information is typically associated with a mobileservice that might be triggered through an interaction with the physicalobject. Physical mobile interactions make it possible to bridge the gapbetween the physical and virtual world. In order to supportcommunication between the mobile device and the augmented object,communication technologies are required.

Different short-range communication technologies have been integratedinto mobile devices in recent years. The process began with infraredtransceivers for synchronizing applications with a desktop computer.Bluetooth technology evolved and overcame some of the problemsexperienced with infrared. However, when attempting to connect twodevices with Bluetooth the setup is often lengthy and is very often notuser-friendly.

Radio Frequency Identification (RFID) is another technology that hasbeen easily integrated into mobile devices such as cell phones, PDAs, orcomputers. RFID works with active communication devices (transceiver orread-write device) and passive non-powered tags (transponder). The tagsare relatively small, inexpensive, and can store information making themsuitable for augmenting physical objects unobtrusively. The transponderis attached to objects that are to be identified and containsinformation such as product price or vehicle identification, forexample. The transceiver emits an electromagnetic signal that activatesthe tag and enables the transceiver to read the tag's information and/oralter it, assuming the tag is re-writeable. Usually, the transceiver isin communication with a computer or similar device to which theinformation is passed.

Near Field Communication, herein referred to a “NFC” is the mostrecently explored technology for object augmentation to bring mobiledevices and physical objects together to enable a user to interact withthe augmented objects for information and/or data communication.

In this regard, NFC is a short range high frequency wirelesscommunication technology that enables the exchange of data betweendevices over a relatively short distance. NFC is based on RFIDtechnology and uses many of the same working principles. The technologyis standardized in ISO/IEC 18092 (International Organization forStandardization/International Electrotechnical Commission), ECMA-340(European association for standardizing information and communicationsystems), and ETSI 102.190 (European Telecommunications StandardsInstitute). All of these standards define the NFC Interface andProtocol-1 (NFCIP-1), see FIG. 1, which specify the modulation schemes,coding, transfer speeds and frame format of the RF interface of NFCdevices, as well as initialization schemes and conditions required fordata collision-control during initialization for both passive and activeNFC modes.

NFC is also standardized in ISO/IEC 21481 and ECMA 352, whichcorresponds to NFC Interface and Protocal-2 (NFCIP-2). The NFCIP-2standard specifies the mechanism to detect and select one communicationmode out of three possible communication modes typical of NFC devices(Peer-to-Peer, Read/Write Card, and Card Emulation), as further shown inFIG. 1.

NFC is compatible with ISO/IEC 14443 type A and type B (proximity cardsoperating at a maximum distance of 20 cm), ISO/IEC 15693 (vicinity cardsoperating at a distance from 10 cm to 2 m), and to the FeliCacontactless smart card system. Accordingly, an NFC device cancommunicate with both exiting ISO 14443 smartcards and readers, as wellas with other NFC devices, and is compatible with existing contactlessinfrastructure already in use for, among other things, publictransportation, payment, and promotion/advertising.

As mentioned above and shown in FIG. 1, a key feature of NFC devices isthat the NFC chip that is integrated into the NFC device can read out anRFID tag's information, emulate a smart card so that a reader can accessits data, or communicate directly with another NFC device inpeer-to-peer fashion when the two NFC devices are brought in closeproximity or together. In other words, NFC technology enablescommunication between devices that both have active power and computingcapabilities, as well as communication between powered devices andpassive tags.

For operating in Reader Mode it is sufficient to hold the NFC devicenear a compatible tag that stores some information (typically 1 Kb-4kb). This information could be, for example, a bookmark of a companywebsite in the company advertising poster, a timetable of a bus near abus stop, some tourist information beside works of art near a museum,etc. With peer-to-peer communication mode it is possible, for example,to synchronize calendars between two NFC PDAs, or to set-up networks(Bluetooth, Wi-Fi, etc.) simply by holding the two NFC devices in closeproximity to each other. In card emulation mode, the NFC device can hostvirtual payment cards and enable the user to make payments. For example,it is possible to buy a travel ticket while providing management ofassociated customer loyalty and bonus programs. In card emulation modeit is also possible to control access, i.e., the NFC device acts as akey.

Prior to utilizing many known NFC devices for the first time, some sortof pre-operationally process is typically required. In this regard, thepresent disclosure describes an activation and authorization processthat may provide security features, as well as check NFC devicecompatibility and pre-configure the device accordingly.

SUMMARY

For purposes of summarizing the disclosure, exemplary embodiments ofpeer-to-peer payments between mobile devices using near fieldcommunication in a network environment have been described herein.

In one embodiment, a method of activation and authorization of a nearfield communication (NFC) enabled device comprises transmitting logincompiled information via a network; receiving packet data in response tothe login information; transmitting a corresponding code in response tothe packet data received, the receiving of the packet data and thetransmitting of the corresponding code facilitates the activation andauthorization of the NFC enabled device; storing the packet data in theNFC enabled device; and activating the NFC enabled device via an NFClink, wherein the stored packet data permits the subsequent activatingof the NFC enabled device via the NFC link without further authorizingof the NFC enabled device.

In another embodiment, a method of activation and authorization of anear field communication (NFC) enabled device comprises receiving logininformation from an NFC enabled device; sending packet data via anetwork in response to receiving the login information from the NFCenabled device; and receiving corresponding data from the NFC enableddevice in response to the sending of the packet data, the sending of thepacket data and the receiving of the corresponding code facilitates theactivation and authorization of the NFC enabled device, and thesubsequent activation of the NFC device via a NFC link without furtherauthorization of the NFC enabled device.

These and other embodiments will become readily apparent to thoseskilled in the art from the following detailed description of thevarious embodiments having reference to the attached figures, theinvention not being limited to any particular preferred embodiment(s)disclosed.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 shows that an NFC enabled device can read out an RFID tag'sinformation, emulate a smart card so that a reader can access its data,or communicate directly with another NFC device in peer-to-peer fashionwhen the two NFC devices are brought in close proximity or in directcontact.

FIGS. 2 and 3 show the establishment of Bluetooth or a similar shortrange technology communication between two computers using NFC.

FIG. 4 shows the use of an NFC enabled computer (PC) and NFC enabledmobile phone to download a game application from a website directly intothe mobile phone.

FIG. 5 shows an example of NFC devices communicating consumer accountinformation via radio frequency to a retailer's payment terminal.

FIG. 6 shows system and method for enabling a peer-to-peer financialtransaction between mobile devices using near field communication in anetwork environment in accordance with one embodiment.

FIG. 7 shows application(s) activation in accordance with oneembodiment.

FIGS. 8A and 8B show a typical “known” request for money and acontrasting request for money in a peer-to-peer financial transactionbetween mobile devices using near field communication in a networkenvironment in accordance with one embodiment.

FIG. 9 shows examples of various interface screens that be applicable toa sender's mobile device and/or a recipient's mobile device forconducting a peer-to-peer financial transaction between mobile devicesusing near field communication in a network environment in accordancewith one embodiment.

Embodiments of the invention are understood by referring to the detaileddescription that follows. It should be appreciated that like referencenumerals are used to identify like elements illustrated in one or moreof the figures, wherein showings therein are for purposes ofillustrating embodiments of the invention and not for purposes oflimiting the same.

DETAILED DESCRIPTION

Exemplary embodiments will now be described with references to theaccompanying figures, wherein like reference numbers refer to likeelements throughout. The terminology used in the description presentedherein is not intended to be interpreted in any limited or restrictivemanner simply because it is being utilized in conjunction with adetailed description of certain embodiments. Furthermore, variousembodiments (whether or not specifically described herein) may includenovel features, no single one of which is solely responsible for itsdesirable.

As indicated above, NFC is a short-range wireless connectivitytechnology that evolved from a combination of existing contactlessidentification and interconnection technologies. Operating at 13.56 MHzvia magnetic field induction (two loop antennas are located within eachother's near field) and transferring data at up to 424 Kbits/second, NFCprovides simple communication between electronic devices. This meansthat no restrictions are applied and no licenses are required for use ofthe NFC devices in the RF band. NFC is both a “read” and “write”technology. Furthermore, combining the read and write modes in more thantwo mobile devices enables a third peer-to-peer mode by alternatingbetween read and write modes. As indicated above, the underlying layersof NFC technology follow universally implemented ISO, ECMA, and ETSIstandards. Because the transmission range of NFC is short, NFC-enabledtransactions are relatively secure. However, relatively higher layercryptographic protocols such as TLS, SSL, or the like, may be used.

In this regard, the NFC interface and protocols primarily targetconsumer electronics users that will be able to use the secure means ofcommunication between various devices without exerting much effort inconfiguring their “network”. Communication between two NFC-compatibledevices occurs when they are brought in close proximity with a wave ortouch of the device(s). This action will engage the NFC wireless devicesinterfaces and configure them to link up in a peer-to-peer networkallowing for the automated and transparent establishment of the networkconnection between the devices.

NFC protocol distinguishes between an Initiator device and a Targetdevice of the NFC network communication. Any device may be either anInitiator or a Target. The Initiator, as indicated by the name, is thedevice that initiates and controls the exchange of data. The Target isthe device that answers the request from the Initiator. A device mayalso be both initiator and target as described in the peer-to-peer mode.

NFC protocol further distinguishes between two modes of operation:Active mode and Passive mode. All devices support both communicationmodes. In the active mode of communication, both devices, i.e., theInitiator and the Target, generate their own RF field to carry the data.In the passive mode of communication, only one device (Initiator)generates the RF field while the other device (Target) uses loadmodulation to transfer the data. The may be an important factor forbattery-powered devices since conservation of energy is generally a highpriority. As such, the protocol allows a device, such as a mobile phone,to operate in a power-saving mode (passive mode of NFC communication).In other words, the passive mode does not require both devices togenerate the RF field and allows the complete communication to bepowered from one side only. (The device will still need to be poweredinternally, but it does not have to “waste” the battery on powering theRF communication interface.)

The difficulty in using long-range protocols like Bluetooth and WirelessEthernet (Wi-Fi) is in selecting the correct device from a multitude ofdevices in the operating range and providing the right parameters to theconnection. However, NFC overcomes this difficulty as once theconfiguration data has been exchanged using NFC, the devices can setupand continue to communicate for longer range and faster protocols usingBluetooth or Wireless Ethernet (Wi-Fi).

For example, as represented by the double arrowhead labeled (2) in FIG.2, ordinarily, to establish Bluetooth communication between twocomputers, the two devices would have to be setup manually with apassword to protect communication. However, as shown by the arrowlabeled (1) in FIG. 2, NFC may be used as a first step in establishing,e.g., a Bluetooth communication link by simply touching the two devicestogether or bringing the two devices into close proximity with eachother. By touching the devices at a “hotspot,” they will open a dataconnection to exchange the parameters of the Bluetooth communication andestablish a secret key without any further action required on the partof the user. As shown in FIG. 3, once Bluetooth communication isestablished, the devices can be moved away from each other in a secondstep as communication between the devices continues using the session ofBluetooth that was previously established.

Substantially the same NFC procedure may be used to establish a wireless(Bluetooth, Wi-Fi, etc.) connection with a variety of devices, frommobile phones that enable payment or transfer of information to digitalcameras that send their photos to a television set with just a touch.For example, as shown in FIG. 4, by using an NFC enabled personalcomputer (PC) and an NFC enable mobile phone, a game application may bedownloaded from a website directly into the mobile phone from the PC.

NFC capabilities further include information access via smart posterapplication. In this example, the user touches the NFC enabled mobilephone against a tag embedded in a poster or similar object, whichtriggers the transmission of a URL to the phone. The URL could be used,for example, to direct a user to a website where the user can gatherinformation or download a special coupon or token.

As shown in FIG. 5, other examples of NFC applications include mobilecell phones, cards, or key fobs that have a built-in integrated circuit(IC) chip and antenna. The chip is able to emulate contactless smartcards. Consumers use the NFC device to communicate consumer accountinformation via radio frequency to a retailer's payment terminal such asthe VIVOpay line of contactless payment systems manufactured byVIVOtech. The payment terminal then connects to the appropriatefinancial networks or other back-end processing system to authorize thetransaction. Once authorized, the consumer completes the transaction andreceives payment confirmation.

Mobile cell phones or “wallet phones” may include a prepaid wallet thatcan be used for mobile payment. Users interact with readers at point ofsale (POS) terminals; cash machines to recharge the wallet; and accesscontrol systems located, for example, at train stations, airports,hotels, etc., using the wallet phone to make purchases. FIG. 6 shows asystem and method for enabling a peer-to-peer financial transactionbetween mobile devices using near field communication in a networkenvironment in accordance with one embodiment. The system and method forenabling a peer-to-peer financial transaction between mobile devices 100may include a first NFC enabled mobile device 105 and a second NFCenabled mobile device 110, a network 115 to enable connectivity betweenentities/elements and the flow of information, and a third party paymentprovider system 120 (PPS) for, among other things, payment processing(verification, authorization, and confirmation) of the financialtransaction between the mobile devices 105, 110, as well as the debitingand crediting of appropriate user accounts associated with each user 140and 145.

As used herein, the twill “mobile device” is a broad teen and mayinclude, but is not limited to a cell phone, PDA, key fob, smartcard,computer or PC, or similar type of augmented object or device.

Each of the mobile devices 105, 110 are NFC enabled and may include,among other things, a user identifier 125, NFC service application 126,network communication application 127, and other applications 128, 129,etc., including a payment provider application, a browser application, atoolbar application, etc., as may be necessary to enable NFCcommunication between the mobile devices 105, 100 and the paymentprovider system 120 via the network 115.

Broadly, the NFC service application 126 provides those features thatgenerally enable NFC communication between NFC enabled devices, but mayalso enable the user to activate various multimedia features, as well asenable financial transactions via “send money”, “request money”, “sendcontact information”, “acquire contact information”, etc., icon linkedapplications.

Likewise, the payment provider application provides those features thatgenerally enable the mobile device 105, 110 to communicate with thepayment provider system 120, but may also enable the user to activatevarious multimedia features, as well as enable financial transactionsvia “send money”, “request money”, “send contact information”, “acquirecontact information”, etc., icon linked applications.

Accordingly, persons of ordinary skill in the art will understand thatthe use of a NFC service application and a payment provider application,or the use of a single bundled application that is the functionalequivalent of the NFC service application and the payment providerapplication in any mobile device depends on a number of factors includedmanufacturer preference, cost, and intended use, to name a few.Accordingly, the term “application”, “applications”, or “application(s)”as used herein indicates that an NFC service application, paymentprovider application, or a bundle application having capabilities ofboth the NFC service application and the payment provider application ispresent in the mobile device.

In one embodiment, the network 115 may be implemented as a singlenetwork or a combination of multiple networks. For example, in variousembodiments, the network may include the Internet and/one or moreintranets, landline networks, wireless networks, and/or otherappropriate types of communication networks. In another example, thenetwork may comprise a wireless telecommunications network (e.g.,cellular phone network) adapted to communicate with other communicationnetworks, such as the Internet.

The payment provider system 120 may include, among other things, aserver identifier 130, a payment processing application 131, and anaccount database 132 having account information 133 and other databases134, 135, etc., as may be required to enable payment processing betweenthe mobile devices 105, 110.

In one embodiment, a financial transaction between mobile devices 105,110 may include the transfer or sending of money from the first mobiledevice 105 (sender) to the second mobile device 110 (recipient), In thisregard, preconditions for the successful completion of the transfer ofmoney between mobile devices 105, 110 include the assumption that thefirst mobile device 105 and the second mobile device 110 are NFCenabled; a payment provider service application 126, NFC serviceapplication, or bundled application is present on the sender's 140mobile device 105; and the sender 140 has a previously establishedpayment provider account 132.

In this regard, the application(s) setup may be facilitated over-the-air(OTA), wherein depending on implementation, an OTA application/softwaredownload may be initiated upon an action, such as a call to the paymentprovider system 120 or other dialable service, or can be performedautomatically when visiting a service site.

Alternatively, the application(s) setup may be facilitated by usinganother NFC chip, wherein for example, a pre-loaded NFC card issued bythe payment provider system 120 or other entity may be pre-loaded with abasic application, account information, URL, etc., such that whentouched to an NFC enabled mobile device the information is transferredto the mobile device to permit access to an OTA site where the paymentprovider application/software download can be initiated.

In one embodiment, an initial payment provider application activationprocess may be required to be completed prior to utilizing theapplication(s) 126-129 for the first time. In this regard, as shown inFIG. 7, application(s) activation may begin with the user entering logininformation such as phone number, pin number, email address and/orpassword, etc., in the mobile device 105, 110. The application forwardsthe information and a public key (unique identifier) 125 based on theNFC mobile device's chip to the payment provider system 120. In oneembodiment, network connectivity for the communication of voice and/databetween the mobile device 105, 110 and the payment provider system 120may be facilitated by an HTTPS (Hyper Text Transfer Protocol Secure)connection over a general packet radio service (GPRS). GPRS is a packetbased wireless communication service that offers continuous connectionto the Internet or other network 115 for mobile phone and computerusers. GPRS is based on GSM (Global System for Mobile Communication) andcomplements existing services such as circuit switched cellular phoneconnections and the Short Message Service (SMS), i.e., text message.Persons of skill in the art will understand similar protocols andwireless services may be utilized within the scope of the disclosure toenable wireless connectivity and communication between the mobiledevices and the payment service provider.

In response to receiving the user's information and unique identifier,the service provider system 120 sends packet information to the mobiledevice 105, 110. The packet information from the payment provider system120 to the mobile device may include data relating to country, currency,language, activation code and/or security keys. A corresponding codegenerated by the application is then communicated back to the paymentprovider system 120 from the mobile device 105, 110.

In this regard, such a back-and-forth communication or “handshake”between the mobile device 105, 110 and the payment provider system 120allows for user and/or system verification, authorization, andcompatibility check to complete the application(s) activation process.Typically, the user 140, 145 is then notified that the application isactivated. Packet information previously sent from the payment providersystem 120 to the mobile device 105, 110 is stored on the chipset forfuture use when activating the application(s) 126-129. The paymentprovider system 120 may further communicate a short welcome text messageto the mobile device 105, 110.

After the initial setup and activation of the application(s) iscomplete, subsequent activation of one or more of the application(s) mayoccur upon activation of the mobile device. In one embodiment, themobile device 105 may be a cell phone in which activation may occur uponopening the mobile device 105. In another case, the sender 140 may berequired to touch a feature (icon, pushbutton, etc.) on the mobiledevice 105 to access and activate one or more of the application(s). Instill another case, activation of one or more of the applications mayoccur upon “tapping” or bringing the mobile device 105 in closeproximity with another NFC enabled device.

Upon activation of the mobile device 105, the sender 140 may bepresented with menu options for enabling various functions includingthose associated with multimedia features, e.g., music, video, games,etc., user contact information, and those relating to financialtransactions such as “request money”, “send money”, etc.

The sender 140 would then choose the desired function from the menuoptions, for example, “send money” in the case of a proposed moneytransfer between the mobile devices 105, 110. In one embodiment, thesender 140 would asked to enter, in no particular order, fundingparticulars including the funding source e.g., MC, VISA, AMEX, Citibank,PPS account, or other funding source, the amount of money to be sent,and login information (PIN, passcode, password, etc.).

Persons of ordinary skill in the art will understand that in the absenceof an affirmative choice of one or more presented funding particularspreset default settings may be enabled. In addition, the sender 140 willtypically have the opportunity to review and edit the payment choicesprior to communicating the payment request to the payment providersystem 120.

Upon activation of the mobile device 110 the recipient 145, like thesender 140, may be presented with menu options for enabling variousfunctions including those associated with multimedia features, e.g.,music, video, games, etc., user contact information, and those relatingto financial transactions such as “request money”, “send money”, etc.

The recipient 140 of the intended money transfer would then choose thedesired function from, for example, “receive money” or “ready, wait” (adefault setting having implications of what is being shared) in the caseof the above described proposed money transfer between the mobiledevices 105, 110. In one embodiment, by choosing the “receive money”function the recipient implicitly/explicitly agrees to provide certaindesignated information such as email address, phone number, accountinformation, etc., to facilitate funding by the payment provider system120 to the designated recipient account, digital wallet (phone), oremail address where funds may be deposited or acquired.

The sender 140 then touches or “taps” the NFC enabled mobile device 110of the recipient 145 to enable the transfer of the designated recipientinformation from the recipient's mobile device 110 to the sender'smobile device 105 via NFC.

Persons of ordinary skill in the art will understand that although themethod(s)/step(s) are illustrated and described herein as occurring in acertain order, the specific order, or any combination or interpretationof the order, is not required. Obvious modifications will makethemselves apparent to those of ordinary skill in the art, all of whichwill not depart from the essence of disclosed subject matter, and allsuch changes and modifications are intended to be encompassed within thescope of the disclosure.

For example, recipient information may be acquired prior to selectingthe funding source and/or the monetary amount to be sent by the sender140. In this regard, the acquisition of recipient information mayautomatically activate the “send money” function on the sender's mobiledevice 105 thereby presenting the menu options for enabling variousfunctions including those relating to financial transactions, asdescribed above.

The sender's payment request is then automatically communicated(submitted) to the payment provider system 120 for processing including,among others, verification, authorization, distribution, andconfirmation. Alternatively, the sender 140 may review the paymentrequest information prior to submission of the payment request to thepayment provider system 120.

Upon completing payment processing the payment provider system maycommunicate a SMS notification, i.e., successful transfer of funds,successful deposit of funds, amount of transfer or deposit, or someother related message informing the sender 140 and/or recipient 145 ofthe payment processing results such as an email, phone call, or amultimedia messaging service (MMS) message. Sender 140 and/or recipientnotifications may further include an audio, visual, and/or tactileindication such as a vibration in the respective device.

In summary, in one embodiment, contact information transfer iscommunicated directly via NFC from the recipient's mobile device 145 tothe sender's mobile device 140. Payment review is done via NFC from thesender's mobile device 140 to the recipient's mobile device 145 showingthe conditions of the financial transaction. The payment request iscommunicated OTA to the payment provider system 120 in real-time, whilenotifications and confirmations are communicated to the sender's mobiledevice 140 and the recipient's mobile device via SMS and/or MMS and/orother form of indicator.

As described above, peer-to-peer payment between mobile devices 105, 110may be facilitated using near field communication in a networkenvironment. In this regard, objects such as mobile devices 105, 110 maybe augmented with a chip to permit users to gather information and/orconduct financial transactions. Such transactions include the paymentfor goods, receiving money, transferring money, and transferring andreceiving user information.

With reference to FIG. 6, in one embodiment, a financial transaction maycomprise a two step or “two-tap” process between NFC enabled mobiledevices 105 and 110 in which a first “tap” between the devicescommunicates contact information e.g., cell phone number or emailaddress, and a second “tap” between the devices communicates the paymentrequest to the payment provider system 120. As discussed above, thesender 140 may be given the opportunity to review and edit certain ofthe details of the transaction, e.g., payment amount, funding account,after affecting the first tap and before effecting the second.

In the two-tap embodiment, a money transfer or financial transactionbetween the respective NFC enabled devices 105 and 110 of a sender 140and a recipient 145 is facilitated by a third party service provider120, such as PayPal, and comprises: 1) the sender 140 entering a paymentrequest (e.g., amount, funding instrument, and the like) into his or herNFC device 140, 2) the sender then gathering recipient information via afirst tap between the respective NFC devices, 3) the sender then sendingthe request to the third party provider 120, which is effected by asecond tap between the two devices, and 4) the service provider 120sending confirmation of the transaction to the sender and recipient. Thetwo NFC devices 105 and 110 may connect, for example, to the Internet toeffect the money transaction, and additional information can betransferred along with payment, such as user ID, avatars, icons, and thelike. Once the transaction is in progress or completed, the users may benotified, such as by means of an audio and/or visual indication and/or avibration of the respective NFC devices.

In an alternative embodiment, as shown in FIG. 6C, after entry of thepayment request, contact information gathering and payment requestcommunication with a service provide, as described above, may beaffected with a single tap between NFC enabled mobile devices 105 and110.

The systems and methods for payment between mobile devices 105 and 110using near field communication in a network environment may be utilizedto facilitate an “open loop” financial transaction in which a one timevirtual credit card or debit account is issued by the payment providersystem 120 and used by a merchant so that the user and merchant view theprocess as a standard financial transaction.

Alternatively, the systems and methods for payment between mobiledevices 105 and 110 using near field communication in a networkenvironment may be utilized to facilitate a “closed loop” financialtransaction in which the payment provider system 120 provides POSterminals for merchants. In this regard, a user can “tap” his or hermobile device 105 on the POS terminal to pay for merchandise and themerchant is paid directly through the payment provider system 120.

FIGS. 8A and 8B respectively illustrate a typical “known” request formoney and a contrasting request for money in a peer-to-peer financialtransaction between mobile devices using near field communication in anetwork environment in accordance with one embodiment of the presentinvention.

In contrast to the known four-step process for requesting money, a moneyrequest utilizing NFC includes a first step of (1) the recipient sendinga request for money to the sender via NFC, a second step of (2) thesender authorizing payment with the payment provider system via OTA, anda third step of (3) the payment provider system notifying the recipientof the transfer of funds. In this regard, by communicating informationvia NFC, the sender only needs to enter a PIN to approve payment withthe payment provider system.

Similar to the money request disclosed in FIG. 8B, a “charge for aservice” may be conducted in a peer-to-peer financial transactionbetween mobile devices using near field communication in a networkenvironment in accordance with one embodiment. In this regard, in thefirst step of FIG. 8 data content, for example a music download, may becommunicated to the sender's mobile device along with a money requestfor the music download from the recipient's mobile device via NFC. Ifthe sender agrees to the purchase or sending of money for the musicdownload the process would continue as disclosed in step (2) and step(3) above.

FIG. 9 shows examples of various interface screens that can be displayedon a sender's and/or a recipient's mobile device for conducting apeer-to-peer financial transaction between two mobile devices using nearfield communication in a network environment in accordance with oneembodiment of the present disclosure.

Although the systems and methods of the present invention have beendescribed and illustrated herein with reference to certain specificexample embodiments thereof, it should be understood that a wide varietyof modifications and variations may be made to these without departingfrom the spirit and scope of the invention, as defined by the claimsappended hereafter and their functional equivalents.

What is claimed is:
 1. An apparatus comprising: a near fieldcommunication (NFC) enabled device adapted to: communicate logininformation and a public key associated with the NFC enabled device viaa network to a server; receive packet data from the server sent inresponse to the login information; communicate a corresponding code tothe server in response to the receipt of the packet data, wherein thereceipt of the packet data and the communication of the correspondingcode facilitates activation and authorization of the NFC enabled device;and store the packet data and access the stored packet data to permitsubsequent activation of the NFC enabled device via an NFC link withoutfurther authorization of the NFC enabled device.
 2. The apparatus ofclaim 1, wherein the NFC enabled device is further adapted to receivethe login information from a user.
 3. The apparatus of claim 1, whereinthe login information further comprises one of a phone number, pinnumber, email address, or password.
 4. The apparatus of claim 1, whereinthe packet data includes data associated with the NFC enabled device andcomprises one of country, currency, language, or security code.
 5. Theapparatus of claim 1, wherein the NFC enabled device comprises a cellphone, a personal digital assistant (PDA), a smart phone, a computer, ora personal computer (PC).
 6. The apparatus of claim 1, whereinactivation of the NFC device via the NFC link includes one of tappingthe NFC enabled device with another NFC enabled device, or positioningthe NFC enabled device in close proximity to another NFC enabled device.7. The apparatus of claim 1, wherein the NFC enabled device comprises acell phone, a personal digital assistant (PDA), a smart phone, acomputer, or a personal computer (PC).
 8. The apparatus of claim 6,wherein the other NFC enabled device comprises a cell phone, a fob, asmartcard, a personal digital assistant (PDA), a smart phone, acomputer, a personal computer (PC), or a point of purchase (POP)terminal.
 9. A method comprising: communicating, by a hardwareprocessor, login information and a public key associated with aNear-Field Communication (NFC) enabled device to a server for initialactivation of the NFC enabled device at the server; receiving, by thehardware processor, packet data generated by the server based on thelogin information and the public key; generating a corresponding codebased on the packet data received; communicating the corresponding codeto the server; storing the packet data for subsequent activation of theNFC enabled device; and authorizing the NFC enabled device at the serverautomatically without requiring login information by accessing thestored packet data when an NFC link is subsequently established.
 10. Themethod of claim 9, further comprising generating the public keyassociated with the NFC enabled device and receiving use specificinformation from a user.
 11. The method of claim 10, wherein the userspecific information comprises one of a phone number, pin number, emailaddress, or password.
 12. The method of claim 9, where the packet dataincludes data associated with the NFC enabled device and comprises oneof country, currency, language, or security code.
 13. The method ofclaim 9, wherein the NFC enabled device comprises a cell phone, apersonal digital assistant (PDA), a smart phone, a computer, or apersonal computer (PC).
 14. The method of claim 9, wherein the NFC linkis established by one of tapping the NFC enabled device with another NFCenabled device, or positioning the NFC enabled device in close proximityto another NFC enabled device.
 15. The method of claim 14, wherein theother NFC enabled device comprises a cell phone, a fob, a smartcard, apersonal digital assistant (PDA), a smart phone, a computer, a personalcomputer (PC), or a point of purchase (POP) terminal.
 16. The method ofclaim 9, further comprising notifying a user of the NFC enabled devicethat the NFC enabled device has been authorized at the server.
 17. Amethod comprising: receiving login information from an NFC enableddevice; sending packet data via a network in response to receiving thelogin information from the NFC enabled device; and receivingcorresponding data from the NFC enabled device sent in response to thesending of the packet data, wherein the sending of the packet data andthe receiving of the corresponding code facilitates activation andauthorization of the NFC enabled device, and authorizing the NFC enableddevice without requiring the login information from the NFC enableddevice when an NFC link is subsequently established at the NFC enableddevice.
 18. The method of claim 17, wherein the login informationcomprises a public key associated with the NFC enabled device.
 19. Themethod of claim 17, wherein the login information further comprises oneof a phone number, pin number, email address, or password.
 20. Themethod of claim 17, wherein the packet data includes data associatedwith the NFC enabled device and comprises one of country, currency,language, or security code.