Abstract:
Methods, systems, and computer readable media for over the air provisioning of soft cards on devices with wireless communications capabilities are disclosed. According to one method, a soft card provisioning application is instantiated on a device with wireless communications capabilities. A card number for a soft card desired to be provisioned on the device is obtained from a user of the device. An issuer identification number retrieved from the card number is communicated to a provisioning configuration server over an air interface. A provisioning issuer server network address is obtained from the provisioning configuration server based on the issuer identification number. The provisioning information server is connected to, and card-issuer-specific challenge information is obtained therefrom. The challenges are presented to the user, and the user's responses to the challenges are received. A connection is made to the provisioning issuer server corresponding to the network address. The challenge responses are communicated to the provisioning issuer server. Soft card image data and personalization data, where the personalization data includes personalized embossed and pre-printed data, are received from the provisioning issuer server over the air interface. The soft card is provisioned for use on the device based on the data received over the air interface.
Abstract:
A USB control circuit for increasing USB endpoints includes a token detection circuit. The USB control circuit is configured to receive a first logical endpoint (LEP) address and a USB token. The token detection circuit is configured to determine a direction of a USB data transfer in accordance with a USB token type. The USB control circuit includes an endpoint configuration and status control logic circuit in communication with the token detection circuit. The endpoint configuration and status control logic circuit is configured to control configuration and status information associated with each of a plurality of LEP input buffers and LEP output buffers. The USB control circuit is configured to generate a second LEP address in accordance with a combination of the first LEP address and the determined direction to increase a quantity of LEPs without increasing a quantity of physical endpoint buffers of a USB device.
Abstract:
Methods, systems, and computer readable media for registering in a merchant sponsored program using a near field communication (NFC) device is disclosed. In one embodiment, the method includes interfacing an NFC enabled mobile device with a smart poster associated with a merchant sponsored program to obtain a merchant sponsored program identifier from the smart poster, and receiving, at a merchant backend server, a request message for merchant sponsored program registration information from the NFC enabled mobile device, wherein the request message from the NFC enabled device includes the merchant sponsored program identifier. The method further includes obtaining merchant sponsored program registration information associated with the merchant sponsored program using the merchant sponsored program identifier and providing the merchant sponsored program registration information to the NFC enabled mobile device.
Abstract:
Methods, systems, and computer readable media for utilizing a consumer opt-in management system are disclosed. According to one aspect, the method includes interfacing a near field communication (NFC) enabled mobile device with a touch point associated with an electronic marketing program to obtain touch point identification information from the touch point and receiving, at a trigger management server (TMS), an opt-in request message from the NFC enabled mobile device, wherein the opt-in request message includes a subscriber identifier associated with the NFC enabled mobile device and the touch point identification information. The method further includes accessing a business rules database using at least one of the subscriber identifier and the touch point identification information from the opt-in request message to identify an electronic marketing program identifier and using the electronic marketing program identifier to trigger the provisioning of content data associated with the electronic marketing program to the NFC enabled mobile device.
Abstract:
Apparatus, systems, and methods may operate to allocating encrypted memory locations to store encrypted information, the information to be encrypted and decrypted using a single hypervisor. Further activity may include permitting access to a designated number of the encrypted memory locations to a single application executed by an associated virtual machine (VM) subject to the hypervisor, and denying access to the designated number of the encrypted memory locations to any other application executed by the associated VM, or any other VM. In some embodiments, the operational state of the associated VM may be restored using the encrypted information. Additional apparatus, systems, and methods are disclosed.
Abstract:
Methods, systems, and computer readable media for facilitating the use of wireless smart devices to purchase goods or services that are not available at a purchaser's location are provided. According to one aspect of the subject matter described herein, a method for facilitating the use of a wireless smart device to purchase goods or services is provided. The method includes providing a smart poster that advertises a good or service and is locatable in an area that is accessible by a potential purchaser of a good or service. The method includes directing, using a mechanism in or on the smart poster, the wireless smart device to access a section of an merchant's website specific to the good or service in response to the wireless smart device interfacing with the smart poster. The method further includes providing, via the wireless smart device, an option for the potential purchaser to purchase the good or service in a manner that bypasses a payment register in a retail location of the merchant.
Abstract:
Proxy caching for directory services are presented. Requests for directory resources are intercepted and an inspection of cache is made to determine whether a resource being requested is identified in cache. When an identifier for the resource is identified in cache, a corresponding directory service associated with a cache entry for that resource is used to supply the resource; otherwise the resource is supplied by a directory service selected by policy.
Abstract:
Selective durability in a directory database is presented. A directory database that provides durability processing includes a mechanism where selective attributes for directory resources can turn durability processing off. So, when a directory transaction is encountered having a durability processing turned off, the directory database processes that directory transaction without first flushing the directory transaction from memory to storage.
Abstract:
Pharmaceutical compositions comprising eszopiclone, including its pharmaceutically acceptable salts, hydrates, clathrates, solvates, polymorphs, and mixtures thereof. The invention also relates to processes for preparing the compositions and their methods of use.
Abstract:
Systems, methods, and computer program products for supporting multiple contactless applications using different security keys on a wireless smart device are disclosed. According to one aspect, the subject matter described herein includes a method for supporting multiple contactless applications using different security keys on a wireless smart device. The method includes, at a wireless smart device configured to communicate with a wireless smart device reader, the wireless device including a plurality of contactless applications and a contactless application memory for use by the plurality of contactless applications, initializing a portion of the memory such that access to the portion of memory requires the use of a shared secret key known to the plurality of contactless applications. The method includes reserving the portion of memory for use by one of the plurality of contactless applications by using the shared secret key to set access privileges for the portion of memory such that access to the portion of memory requires the use of a application-specific secret key associated with the one application and not known to the other applications.