摘要:
A merchant is provided the ability to receive and process wireless financial transactions through interaction with a mobile device. The merchant can be authenticated with an account-based service through various techniques including biometric techniques. The merchant can receive a customer's payment information for a sales transaction and input such payment information into the mobile device through various interfaces, such as a keypad, voice recognition, pattern recognition. The mobile device can also include a card reader that can automate entry of the payment information from a credit card, debit card or other identification card.
摘要:
Seamless connectivity by a user device between a licensed and an unlicensed network is provided through capturing of MAC address information relating to one or more access points servicing the licensed and/or the unlicensed networks. One or more access points can be chosen as a designated access point. If the access point is available for communication with the device and other device criteria is met, the access point is designated. If designated, when the device is in vicinity of the access point seamless and transparent connectivity is automatically established with that access point.
摘要:
The claimed subject matter provides systems and/or methods that facilitate collecting data within a wireless communications network. A device can be connected to a wireless communications network. A retrieval component incorporated into the wireless communications network can automatically collect identification data associated with the device, the identification data specifies the type of device connected to the wireless communications network.
摘要:
Methods and apparatus for secure over-the-air (OTA) programming, and particularly, activation, of a wireless unit in a particular communications system. The unit stores a stored key having been generated by using a key algorithm (K-algorithm) with an identifier associated with the unit as an input to the K-algorithm. The unit may receive information such as parameters and a verification number from a communications system for the purpose of programming the unit. The verification number is generated by using an authorization algorithm (A-algorithm) having the parameters and a key as A-algorithm inputs. They key is generated by the K-algorithm having the identifier associated with the K-algorithm input. In response to the receipt of the parameters and the verification number, the wireless unit generates a trial verification number by using the A-algorithm with the parameters and the stored key as trial inputs. The unit compares the verification number to the trial verification number for a match. When finding the match, the unit uses the parameters for programming of the unit in the particular communications system. When failing to find the match, the unit fails to use the parameters for the programming.
摘要:
Software, at a networked central computer or at a wireless mobile user device, uses GPS coordinates of a mobile user device's current location to determine a polygon in which the GPS coordinates lie. Upon determining the polygon that surrounds the current location, the software can perform a task related to the polygon. Examples of tasks include: determining traffic camera images to display on the mobile user device based on the location, speed, and heading of the user device. The images can include advertisements that pertain to the general vicinity, or demographics of those typically in the vicinity, of the cameras' coverage area. Another task includes associating performance data from a vehicle, and stored in a table, for a given location with a corresponding polygon that surrounds the location; processing the data; and assigning a risk value to the polygon based on the corresponding performance data.
摘要:
Systems, methods, and apparatus for facilitating secure over-the-air (OTA) programming are presented herein. A device can store a key, which can be based on a key algorithm (K-algorithm) and an identifier associated with the device. The device can receive information such as parameter(s) and a verification number from a communications system. The verification number can be generated by using an authorization algorithm (A-algorithm) based on the parameter(s) and a K-algorithm input. The device can generate a trial verification number by using the A-algorithm with the parameter(s) and the key as trial inputs. The device can compare the verification number to the trial verification number, and in response to the verification number being at least similar to the trial verification number, the device can use the parameter(s) for programming of the device.