摘要:
A method and system for approval by a verification computer of an online transaction between a user computer and a merchant computer over the Internet. The user computer transmits a transaction request to the merchant computer, which may include a product to be purchased and the payment amount. The merchant computer transmits to the verification computer a verification request including a first data string associated with the payment card (such as a debit card account number or a portion thereof) and the payment amount. The verification request is stored at the verification computer with a transaction identifier and a verification data string, which are also transmitted to the merchant computer. The merchant computer stores the verification data string as an expected verification data string and the transaction identifier, transmits the transaction identifier to the user computer, and the user computer transmits the transaction identifier to the verification computer. This may be accomplished by the merchant computer redirecting the web browser of the user computer to the verification computer. The user computer also transmits a second data string associated with the payment card (such as the PIN for the debit card) after being requested by the verification computer. The verification computer uses the transaction identifier received via the user computer to retrieve the verification request previously stored with that received transaction identifier, and then it performs a verification step by using the first data string associated with the payment card retrieved from storage and the second data string associated with the payment card received from the user computer to verify if the transaction should be approved, e.g. by determining if an account associated with the payment card is sufficient to cover the payment amount in the verification request. The verification computer will, upon successful verification that the transaction should be approved, transmit a verification approval message to the user computer, which includes the transaction identifier and the verification data string associated therewith as a confirmation verification data string, and the user computer transmits the verification approval message to the merchant computer. This may also be accomplished by the verification computer redirecting the web browser of the user computer to the merchant computer with the appropriate data. The merchant computer uses the transaction identifier in the verification approval message to retrieve an expected verification data string it had previously stored. The merchant computer then compares the expected verification data string with the confirmation verification data string from the verification approval message and indicates that the transaction has been approved if the comparison is positive.
摘要:
Computer readable storage mediums, electronic devices, and accessories having stored thereon data structures. A data structure includes a pin selection field operable to identify a connector pin and cause a host device to select one of a plurality of communication protocols for communicating with an accessory over the identified connector pin. The data structure also includes an accessory capability field defining an accessory identifier that uniquely identifies the accessory.
摘要:
An adapter for connecting an accessory to a portable electronic device includes a first connector compatible with a connector of the portable electronic device and a second connector compatible with a connector of the accessory. The connectors of the accessory and the portable electronic device are otherwise incompatible with each other. The adapter provides two levels of authentication. First, the adapter authenticates itself to the portable electronic device. If this first authentication is successful, then the adapter authenticates the accessory to the adapter.
摘要:
Computer readable storage mediums, electronic devices, and accessories having stored thereon data structures. A data structure includes a pin selection field operable to identify a connector pin and cause a host device to select one of a plurality of communication protocols for communicating with an accessory over the identified connector pin. The data structure also includes an accessory capability field defining an accessory identifier that uniquely identifies the accessory.
摘要:
A method and system for approving a transaction between a customer and a merchant including the steps of transmitting a transaction request from a customer to a merchant; transmitting a verification request from the merchant to a verification entity, the verification request comprising first data; the customer device transmitting second data to the verification entity; and the verification entity performing a verification step by using the first data and the second data to verify if the transaction should be approved.
摘要:
Improved techniques for communicating between a portable electronic device and an accessory (or auxiliary) device are disclosed. The accessory device can augment or supplement the functionality or capabilities of the portable electronic device. For example, in one embodiment, the accessory device can provide wireless communication capabilities to the portable electronic device. In one embodiment, the portable electronic device pertains to a portable media player and thus provide media data for storage, playback or transmission. In one embodiment, the accessory device is attachable to the portable electronic device.
摘要:
Improved techniques for communicating between a portable electronic device and an accessory (or auxiliary) device are disclosed. The accessory device can augment or supplement the functionality or capabilities of the portable electronic device. For example, in one embodiment, the accessory device can provide wireless communication capabilities to the portable electronic device. In one embodiment, the portable electronic device pertains to a portable media player and thus provide media data for storage, playback or transmission. In one embodiment, the accessory device is attachable to the portable electronic device.
摘要:
A portable computing device (PCD) can control the operating state of a component within an accessory. For example, an accessory can have some components (e.g., a video processor) that are used for some operations but not for others. A PCD can determine whether a particular component will be used and can instruct the accessory to set the component to a desired state, e.g., powered up when in use and powered down when not in use. In some embodiments, the PCD can use status information provided by the accessory in determining a desired state for the accessory component. For example, in the case of a video converter accessory, if no display device or other video receiver is connected to the accessory, a video processor within the accessory can be powered down.
摘要:
A method for communicating data using a “burst protocol” includes enabling power to transmitters and receivers when needed to balance power consumption with latency and unscheduled communication. A transmitter transmits a plurality of packets indicative of substantially the same payload. Power then may be disabled to the transmitter. A first predetermined time is determined to enable a receiver. A second predetermined time is determined to disable the receiver. Power then may be enabled to the receiver based on the first predetermined time. The payload is output in response to receiving one or more of the plurality of packets. Power to the receiver is disabled based on the second predetermined time.
摘要:
A method for associating file activity of an application with the graphical display of the file on a screen comprises loading by an operating system an executable code of a message monitoring program adapted to monitoring a message sent by an operating system to a document display window. The message monitoring program establishes a system-wide window hook using available operating system API functions associated with one or more functions in a library of the message monitoring program. The message monitoring program library is loaded into the memory space of a newly started application program, the import table of the application is fixed with addresses of functions from the message monitoring program library, and the application's main window function is substituted with a message monitoring program window function.