摘要:
A method for obtaining a digital signature is disclosed. Upon receipt of request for a digital signature within a customer computer, a Mobile electronic transaction proxy within the customer PC notifies a web browser of the request for the digital signature and assists in obtaining a digital signature on a data string included within the request. After the digital signature is obtained, the data string along with an appended digital signature is transmitted back to a requesting party.
摘要:
A method and apparatus for enabling anonymous communications from a first Bluetooth device to a second Bluetooth device is disclosed wherein a temporary identification number associated with the first Bluetooth device is obtained and used in transmissions from the first Bluetooth device to the second Bluetooth device. A temporary identification number provides no clear indication of the particular Bluetooth communications device transmitting messages.
摘要:
A method and apparatus for enabling anonymous communications from a first Bluetooth device to a second Bluetooth device is disclosed wherein a temporary identification number associated with the first Bluetooth device is obtained and used in transmissions from the first Bluetooth device to the second Bluetooth device. A temporary identification number provides no clear indication of the particular Bluetooth communications device transmitting messages.
摘要:
A method and apparatus for enabling anonymous communications from a first Bluetooth device to a second Bluetooth device is disclosed wherein a temporary identification number associated with the first Bluetooth device is obtained and used in transmissions from the first Bluetooth device to the second Bluetooth device. A temporary identification number provides no clear indication of the particular Bluetooth communications device transmitting messages.
摘要:
An access control system includes an access control device, a wireless communication device, and a central controller. The central controller issues authorization codes to the wireless communication device. The wireless communication device is used by an authorized party to enable or activate a protected function secured by an access control device. To enable or activate the protected function, the authorized party uses the wireless communication device to transmit an access request to the access control device, which responds by transmitting an authentication challenge to the wireless communication device. The wireless communication device must transmit a valid authentication response based on the authentication challenge and a valid authorization code stored in its memory. If a valid authentication response is received, the access control device enables or activates the protected function.
摘要:
A method and apparatus for providing payment information stored upon an electronic personal device during a transaction is disclosed. A plurality of brand identifiers having payment information associated therewith are stored within a memory of the electronic personal device. A user interface enables a user to provide input to control logic which is responsive to the user inputs for defining a priority order for displaying the brand identifiers. A display enables the brand identifiers to be displayed according to the established priority order.
摘要:
The present invention comprises an apparatus and method for generating and storing an electronic portrait of a buyer within a personal device such as a mobile telephone. An electronic portrait enables the generation of a physical identifier for comparison to the buyer by a seller during a transaction. Using the physical identifier transmitted to the seller via a wireless communications link, the seller can establish whether or not the buyer is authorized to make the transaction.
摘要:
The present invention comprises an apparatus and method for generating and storing an electronic portrait of a buyer within a personal device such as a mobile telephone. An electronic portrait enables the generation of a physical identifier for comparison to the buyer by a seller during a transaction. Using the physical identifier transmitted to the seller via a wireless communications link, the seller can establish whether or not the buyer is authorized to make the transaction.