Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
SYSTEM AND METHOD FOR ACTIVATING TELEPHONE-BASED PAYMENT INSTRUMENT
Document Type and Number:
WIPO Patent Application WO/2007/134010
Kind Code:
A3
Abstract:
A payment instrument in the form of a cell phone (102) is loaded with account information and activated as a payment instrument by reading account information from a nearby RFID device (204), and entering a user PIN or password (206). In one embodiment, the account information is read from an RFlD tag (204) provided to the user, and the password is entered on the phone keypad. In a second embodiment, the account information is read from an RFID device (320) at an ATM or kiosk (310) after the user inserts a card (302) into a card reader (316) at the ATM or kiosk and enters the password (306) at the ATM or kiosk keypad (314).

Inventors:
HUMPHREY WENDY (US)
DEWAN SUNIL (US)
OSWALD DANIEL J (US)
Application Number:
PCT/US2007/068388
Publication Date:
March 27, 2008
Filing Date:
May 07, 2007
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
FIRST DATA CORP (US)
HUMPHREY WENDY (US)
DEWAN SUNIL (US)
OSWALD DANIEL J (US)
International Classes:
G06K5/00
Foreign References:
US20070057038A12007-03-15
US7194438B22007-03-20
US20050211760A12005-09-29
US7004385B12006-02-28
US20030191721A12003-10-09
Other References:
See also references of EP 2038227A4
Attorney, Agent or Firm:
GIBBY, Darin, J. et al. (Two Embarcadero CenterEighth Floo, San Francisco CA, US)
Download PDF:
Claims:

WHAT IS CLAIMED IS:

1. A method for activating a payment instrument in the form of a mobile device, wherein the mobile device employs telecommunications signaling and has a payment instrument module that employs separate wireless signaling for storing and transmitting an account identifier, the method comprising: associating a personal identifier with the account identifier and providing that personal identifier to a user prior to activation of the payment instrument; placing the mobile device in proximity to an external wireless device; transmitting an account identifier from the external wireless device to the payment instrument module; requesting a personal identifier be provided by the user; and enabling the payment instrument to use the transmitted account identifier if the requested personal identifier provided by the user matches the personal identifier associated with the account identifier.

2. The method of claim 1 , wherein the personal identifier is requested from the user prior to transmitting the account identifier from the external wireless device.

3. The method of claim 1, wherein the personal identifier is requested from the user after transmitting the account identifier from the external wireless device.

4. The method of claim 1 , wherein the payment instrument module and the external wireless device each include an RFED device.

5. The method of claim 4, wherein the RFID device in the payment instrument module and in the external wireless device employs near field communications (NFC).

6. The method of claim 1, wherein the mobile device is a wireless telephone.

7. The method of claim 6, wherein the external wireless device is a passive RFID tag.

8. The method of claim 7, wherein the RFID tag is provided to the user prior to activation.

9. The method of claim 8, wherein the RFID tag is mailed to the user.

10. The method of claim 9, wherein the telephone includes a keypad, and where in the user initiates the activation by using a key on the keypad.

11. The method of claim 10, wherein the personal identifier associated with the account identifier is a personal identification number (PIN) provided to the user separately from the RFID tag.

12. The method of claim 11 , wherein the PIN associated with the account identifier is mailed to the user separately from the RFID tag.

13. The method of claim 11, wherein the PIN associated with the account identifier is provided to the user with instructions for activating the payment instrument, wherein the consumer in accordance with such instructions places the wireless device in close proximity to the RFID tag, and wherein the user receives further instructions on the display of the telephone, including an instruction to enter the PIN at the keyboard.

14. The method of claim 6, wherein the external wireless device is an active or hybrid RFID device located at a publicly accessible terminal.

15. The method of claim 14, wherein the terminal is a self-service terminal.

16. The method of claim 15, wherein the self-service terminal is an ATM.

17. The method of claim 16, wherein the user receives a card for use in activating the payment instrument, the card including the account identifier.

18. The method of claim 17, wherein the account identifier is stored on a magnetic stripe on the card.

19. The method of claim 18, wherein the card is inserted into a card reader at the ATM in order to initiate the activation of the payment instrument.

20. The method of claim 19, wherein the requested PIN is provided by the user at a keyboard at the ATM.

21. The method of claim 1 , wherein the account identifier includes data identifying either the user or an account of the user.

22. A system for activating an payment instrument in the form of an RFID enabled telephone, the telephone including an RFID device for storing and transmitting an account identifier, the system including; a PIN associated with the account identifier; an external RFID device for transmitting the account identifier to the telephone; and

a programmed processor for instructing a user to enter a PIN at a keypad associated with either the external device or the telephone, and activating the payment instrument if the PESf entered at the keypad matches the PDSf associated with the account identifier.

23. The system of claim 22, wherein external RFID device is a passive RFID tag provided to the user, wherein the programmed processor is part of the telephone and instructs the user to enter a PESf on the keypad of the telephone.

24. The system of claim 22, further comprising a financial host storing a record of the PDSf associated with the account identifier, wherein the telephone transmits the user entered PESf to the financial host, and wherein the financial host provides an acceptance message to the telephone if the PESf stored at the financial host matches the user entered PESf.

25. The system of claim 24, wherein the telephone includes a payment instrument module, wherein the payment instrument module comprises the RFID device, a security processor and a memory, and wherein the programmed processor is the security processor.

26. The system of claim 24, wherein telephone comprises a master control processor and wherein the programmed processor is the master control processor.

27. The system of claim 22, wherein the external RFID device is an active or hybrid RFID device located at a self-service terminal, wherein the self-service terminal

includes a display and a keypad, and wherein the programmed processor instructs the user at the self-service display to enter a PIN on the keypad of the self-service terminal.

28. The system of claim 27, wherein the self-service terminal is an ATM.

29. The system of claim 28, wherein the user is provided a card having the account identifier stored thereon, and wherein the user provides the card to a card reader at the ATM in order to initiate the activation of the payment instrument.

30. A system for activating a payment instrument in the form of a mobile device, wherein the mobile device employs telecommunications signaling and has a payment instrument module that employs separate wireless signaling for storing and transmitting an account identifier, the system comprising: means for associating a personal identifier with the account identifier and providing that personal identifier to a user prior to activation of the payment instrument; means for transmitting an account identifier from the external wireless device to the payment instrument module when the mobile device is placed in proximity to an external wireless device; means for requesting a personal identifier be provided by the user; and means for activating the payment instrument to use the transmitted account identifier if the requested personal identifier provided by the user matches the personal identifier associated with the account identifier.

31. A method for activating a payment instrument for use by a consumer, wherein the payment instrument comprises a wireless telecommunications device using telecommunications signaling, and an RFID unit integrated with the wireless device, the RFID unit using short range proximity signaling separate from the telecommunications signaling and for providing an account identifier to an RFID reader in order to conduct transactions, the method comprising: associating a personal identification number (PIN) with an account identifier and providing that PIN to the consumer; placing the wireless unit in close proximity to an external RFID device; transmitting the account identifier from the external RFID device to the integrated RFID device, requesting a PIN be provided by the consumer;

activating the payment instrument to use the transmitted account identifier if the requested PIN provided by the consumer matches the PIN associated with the account identifier.

Description:

Attorney Docket No.: 20375-695-PC

SYSTEM AND METHOD FOR ACTIVATING TELEPHONE-BASED

PAYMENT INSTRUMENT

CROSS-REFERENCES TO RELATED APPLICATIONS [0001] NOT APPLICABLE

STATEMENT AS TO RIGHTS TO INVENTIONS MADE UNDER FEDERALLY SPONSORED RESEARCH OR DEVELOPMENT [0002] NOT APPLICABLE

REFERENCE TO A "SEQUENCE LISTING," A TABLE, OR A COMPUTER

PROGRAM LISTING APPENDIX SUBMITTED ON A COMPACT DISK. [0003] NOT APPLICABLE

BACKGROUND OF THE INVENTION

[0004] Smart cards are used for conducting transactions, such as purchases at a retail locations, financial transactions at ATMs, fees at toll road pay booths, and the like. Some smart cards have contact-less interfaces and employ a variety of wireless technologies, including Bluetooth, infrared, and radio frequency such as RFID (radio frequency identification) technology. One form of RFID technology that has been recently used in smart cards is Near Field Communications (NFC), which permits exchange of data between an RFID device or "tag" and an RFID reader, when the tag and reader are touched or brought within several inches of each other. RFID devices employing NFC technology operate at a radio frequency range of 13.56 MHz, use very small amounts of power, and comply with published standards, including ISO (International Standards Organization) 18092, ISO 21481, ECMA (formerly European Computer Manufacturers Association) 340, 352 and 356, and ETSI (European Telecommunications Standards Institute) TS 102 190. When incorporated into contact-less smart cards, they are also compatible with commercially available smart card infrastructure based on ISO/IEC 14443, which includes devices and technology such as the Phillips MIFARE® smart card technology and the Sony® FeIiCa Card.

[0005] Such technology has also been placed in wireless telephones, PDA's and similar devices, which can be used as payment instruments in lieu of card-like structures. This eliminates the need for a consumer to carry a separate smart card. Thus, the account data (for one or more card accounts) may be stored in and used from a single wireless device (e.g., cell phone) that is carried by the consumer.

[0006] Cell phones that employ RFID devices and that may be used as payment instruments have recently become available, such as the Nokia 3220 cell phone, which is described in the Nokia Press Release, "Nokia Unveils the World's first NFC product - Nokia NFC Shell for Nokia 3220 Phone, " dated November 2, 2004 (available at www.press.nokia.com), Harris, C, Nokia 's First NFC Product - Why It's Important, dated November 4, 2004 (available at www.digital -lifestyles.info), and O'Connor, M., RFID Phone Payment Systems Good to Go, dated April 25, 2005 (available at RFIDjournal.com).

[0007] Once loaded with the proper account information, a cell phone that is enabled as a payment instrument works like any other contact-less smart card. However, there are a limited number of methods used to initially load the necessary account information into the cell phone, and such methods are often not convenient for the consumer and are prone to privacy and security issues. For example, one method is providing a phone (or a "shell" or cover for a phone) to the consumer with the account information preloaded, and the customer thus needs to replace the cell phone (or cover) if there should be a change in smart card accounts. Another method of loading account information is to require the phone be taken to a specific, secure location where the phone can be connected to a terminal by a representative of the card issuer, and the account information downloaded (e.g., through a physical adaptor or through cabling). Neither of these approaches provide flexibility for a customer to have an account added (or changed) when the customer already has possession of a phone with RFID or similar functionality.

BRIEF SUMMARY OF THE INVENTION

[0008] Embodiments of the present invention provide methods and systems for activating a payment instrument (in the form of a mobile device, such as a telephone) by reading account information (an account identifier) from an external wireless device, loading the information into the phone, and entering an authentication code (such as a PIN), password, or biometric vector.

[0009] In some embodiments, activation is accomplished by loading account information into the telephone using an RFID device within the telephone and an external ELFID device, and using the keypad of the telephone or a keypad of a self-service terminal (e.g., ATM) to enter the password.

[0010] hi one embodiment, a method is provided for activating a payment instrument in the form of a mobile device, where the mobile device employs telecommunications signaling and has a payment instrument module that employs separate wireless signaling for storing and transmitting an account identifier. The method includes associating a personal identifier with the account identifier and providing that personal identifier to a user (cardholder) prior to activation of the payment instrument, placing the mobile device in proximity to an external wireless device, transmitting an account identifier from the external wireless device to the payment instrument module, requesting a personal identifier be provided by the user, and activating the payment instrument to use the transmitted account identifier if the requested personal identifier provided by the user matches the personal identifier associated with the account identifier.

[0011] A more complete understanding of the present invention may be derived by referring to the detailed description of the invention and to the claims, when considered in connection with the Figures.

BRIEF DESCRIPTION OF THE DRAWINGS

[0012] Fig. 1 illustrates a telephone-based payment instrument that may be activated in accordance with embodiments of the present invention.

[0013] Fig. 2 illustrates one embodiment of a system for activating a telephone-based payment instrument, using an RFID tag and a PIN (personal identification number) that have both been mailed to the consumer.

[0014] Fig. 3 illustrates an alternative embodiment, using an ATM for activating a telephone-based payment instrument.

[0015] Figs. 4A and 4B are flow diagrams illustrating an activation process used in connection with the system of Fig. 2.

[0016] Figs. 5 A and 5B are flow diagrams illustrating an activation process used in connection with the system of Fig. 3.

[0017] Fig. 6 is a flow diagram illustrating program steps carried out by the payment instrument module in activating the telephone-based payment instrument.

DETAILED DESCRIPTION OF THE INVENTION

[0018] There are various embodiments and configurations for activating payment instruments pursuant to the present invention. Further, payment instruments to be activated may take a number of different forms, one of which is shown in Fig. 1 as a mobile device or cell phone 102. The phone 102 functions both as a user communications device (for making telephone calls, and if web enabled, for sending emails, accessing internet websites, etc.), and also as a contact-less smart card, enabling the user to conduct transactions at POS (point-of-saie) terminals, ATMs, toll booths, and many other locations where financial transactions are conducted.

[0019] Wireless phones that serve as payment instruments are known, and descriptions can be found, for example, in U.S. Patent Application Publication No. 2004/0030601, filed by Russell L. Pond et al., which is hereby incorporated by reference.

[0020] As conventional, the phone 102 includes a keypad or keyboard 104 and a display 106. It also includes a payment instrument module (to be described later) that provides contact-less smart card (RFID) functionality to the phone so that the phone may be used as a payment instrument. Briefly, RFID features permit the presence of the phone to be detected when in proximity to an RFID reader at locations where transactions are to be made (e.g., a retail POS system). The cell phone sends account information (stored in the phone) using short range radio signaling in response to a request from the reader (the short range signaling complies with NFC protocols and standards as described earlier, and is separate from the wireless telecommunications signaling that the phone might otherwise use for normal voice and data communications). The account information and the transaction to be conducted may be verified by entering a user PESf, e.g., at the keyboard 104. Depending on the particular application and configuration, the display 106 of the phone may provide instructions to lead the user/customer through the transaction. Further details of exemplary uses for and configurations of the payment instrument/phone 102 can be found in previously referenced U.S. Patent Application Publication No. 2004/0030601.

[0021] While not shown in Fig. 1, but as conventional, the phone 102 has a master control unit (MCU) or processor that may be programmed to control the overall operation of the phone.

[0022] The functionality that enables the phone 102 to serve as a payment instrument is illustrated in Fig. 1 as a payment instrument module 110. The module 110 includes an RFID device 120 for transmitting and receiving short range radio signals, a security processor 122, and a memory 124. Depending on the application, the RFID device 120 may be either passive or active. If passive, it relies on the power from the radio signals of a nearby RFID reader. If active, it has a source of power, such as the battery of cell phone 102 (seen as an optional connection in Fig. 1), and may always be transmitting (or listening for) RFED signals. In other cases, device 120 may be a hybrid RFID device that is "asleep" (and draws no power) until either deliberately turned on (e.g., by pressing a designated key of the cell phone), or upon being placed in proximity to an RFID reader, which reader provides sufficient power through radio signals to "wakeup" the RFID device and thereafter cause it to be powered by its own source (e.g., the cell phone battery). The security processor 122 provides security and other processing for data transmitted or received by the RFID device, with security implemented by programmed code and logic that encrypts/decrypts data using well known encryption techniques. The processor 122 may also be programmed to carry out an activation process, e.g., by receiving account data through RFID device 120 and storing that data in memory 124, and authenticating the account data by verifying a user PIN, which will be described in greater detail below.

[0023] The payment instrument module 110 may be interconnected with the phone 102 in several different ways. For example, in some embodiments, the module 110 may be incorporated into a removable telephone cover that is attached and connects to the phone for communications signaling and for power, hi other embodiments, the module 110 may be an RFID card that plugs into a card connector in phone 102, with the card including a subscriber identity module (SIM) that provides user identification and memory for storage of programming logic and data. In yet other embodiments, module 110 may be integrated into the internal circuitry of phone 102 and share functionality with at least some existing phone cell components.

[0024] As illustrated in Fig. 1, the payment instrument module 110 may also be connected to the MCU or main processor of the cell phone, and accordingly, in some embodiments, at

least some of the functionality for accomplishing activation could be carried out by processing and memory devices within the cell phone 102, in addition to or in lieu of the programmed functions carried out by processor 122 and memory 124.

[0025] Referring to Fig. 2, there is shown a system 200 for activating a cell phone-based payment instrument in accordance with one embodiment of the invention. The phone 102 is activated as a payment instrument through the use of an RFID tag 204 (in this embodiment, a passive RFID device) that is provided to the user and that includes account identifying data pertaining to the user (account number, user identification number, etc.), and a unique PIN that is also provided to the user, such as in a letter 206. Li some embodiments it is desired for the RFID tag 204 and letter 206 to be provided separately for security purposes, to reduce the likelihood that an unauthorized person with access to the phone will be able to use it to steal account information or use it to conduct fraudulent transactions. For example, the RFID tag 204 and the letter 206 may be mailed separately and at different times. As another example, the RFID tag may be provided in person or through the mail as part of a promotional campaign, with stored data pertaining to a new, conditional account that may be set up for the user only upon acceptance of the RFED tag (and acceptance of terms and conditions associated with the new account). If the RFID tag is accepted (e.g., through a telephone call to a financial institution), the PIN is separately mailed to the user.

[0026] A process representing one embodiment for activating the phone in the system 200 of Fig. 2 will be described later in conjunction with Figs. 4A and 4b. Briefly, the RFID device 120 (in this embodiment, either an active or "hybrid" RFID device) in phone 102 reads the user account data from RFID tag 204 when the user "waives" or places the phone at or near the RFID tag 204. The user then enters at the phone keyboard the PIN provided in letter 206, and if it correctly matches the PIN associated with the account, the user is authenticated and the account data in the cell phone may be used thereafter to conduct transactions. As part of the authentication process, the PIN entered by the user is transmitted through a wireless telecommunications network 208 (e.g., the network operated by a telecommunications carrier providing phone service to the user) to a wireless host 220, which in turn routes the PIN over a network 222 (e.g., a public network such as the internet) to a financial host 224, where the user's account is maintained, and where a record of the PIN assigned to the user is stored (the host 224 includes a PIN authentication server). If the entered PIN is a correct match, the financial host 224 returns an acceptance message (through data network 222, wireless host 220 and wireless network 208) to the phone, and the payment instrument is activated.

[0027] Figure 3 illustrates a system 300 for activating a cell phone-based payment instrument in accordance with another embodiment of the invention, where a user having a phone with smart card capability is provided a magnetic stripe card 302 and a letter 306 with a PIN. The card stores (on the magnetic stripe) account identifying information, relating to a new account or an existing account of the user. The user takes the card 302 and the phone 102 to a conveniently located ATM 310, kiosk or similar self-service terminal. The ATM 310 has a display 312, a keyboard 314, a card reader 316, and an RFID reader 320. The ATM communicates through an ATM network 330 to an ATM host 331, and over a data network 332 to a financial host 340 that maintains account information for the user.

[0028] A process representing one embodiment for activating the phone in the system 300 of Fig. 3 will be described later in conjunction with Figs. 5 A and 5B. Briefly, account identifying data is read from the card 302, and the user is instructed (e.g., at display 312) on steps for activating the payment instrument, including placing the phone near the RFID reader 320 at the ATM, which then senses the presence of the phone. In some embodiments, the card 302 may also store the PIN, so that the user is authenticated at the ATM immediately after inserting the card and entering the PIN. The account information on the card is then encoded into the phone and it is ready for use as a payment instrument.

[0029] In other embodiments, the account data on the card 302 is used to access records within financial host 340, including a record of the correct PIN for the user. If the PIN entered at the keyboard 314 of ATM 310 matches a PIN associated with the account at host 340, an acceptance (authenticating) message is transmitted to the ATM 310 which causes the account information read from card 302 to be loaded from reader 320 into memory 124 of the phone, in order to activate the payment instrument feature of the phone. If desired, additional account information from host 340 may also be loaded into the phone (e.g., additional accounts, PINs to be used in subsequent transactions, account balances, etc.).

[0030] Also, while the disclosed embodiments envision the activation process being carried out with the card 302 being issued solely for the purpose of activating the phone, it should be appreciated that a cardholder's existing ATM card (having the appropriate account information already encoded) could be used, e.g., in response to the cardholder receiving a promotional letter from the financial institution/card processing entity, informing the cardholders that his/her phone can be activated as a payment instrument and encouraging the cardholder to visit an ATM (with the existing ATM card) in order to activate the phone.

[0031] Figs. 4A and 4B illustrate in greater detail a process for activating a payment instrument using the system 200 described above in conjunction with Fig. 2, and so the described process will make reference to Fig. 2 as well as Figs. 4A and 4B. For purposes of describing the process, it is assumed (without limiting the scope of the invention) that the account to be associated with the activated presentation instrument is a credit card account, and that the processing of transactions using the account, and the issuance and activation of payment instruments, are all managed by a card processing entity. It is further assumed that the account is an existing account, and that the phone based-payment instrument will be activated only for that single account. However, it should be appreciated that a phone-based payment instrument may be used in connection with multiple and different kinds of financial accounts, including (but not limited to) credit card accounts, debit card accounts, stored value card accounts and the like. Also, a phone-based payment instrument may be activated for a new account for which an account holder has not previously had a physical card or other traditional payment instrument. In addition, there may be multiple cardholders (e.g., members of a family) using a single account, and while some cardholders may have wireless phones that may be activated as a payment instruments, others using that account may have traditional cards.

[0032] Turning to Fig. 4A, when the process is to be initiated, the card processing entity receives a file with cardholder data that is to be used in activating the payment instrument (step 410). The cardholder data may include many different kinds of cardholder information (such as cardholder name, address, account number, credit limits and so forth). Only certain kinds of data are required to identify the account for purposes of activation (e.g., an account ID and/or an account holder ID), and that data is extracted from the file in preparation for encoding an RFID tag 204 (step 412). The tag itself is then encoded by the card processing entity with the account identifying data (step 416). One of many encoding techniques can be used, such as asymmetric or Diffie-Hellman techniques. The RFID tag is then mailed to the cardholder (step 418). A PIN associated with the account is then created and separately mailed (via letter 206) by the card processing entity to the cardholder (step 422). This PIN may be a one-time PESf used only for purposes of activating the payment instrument, or if desired, it may be a PIN that will also subsequently be used by the cardholder for conducting transactions after the payment instrument has been authenticated. A record of the PEST is retained in the financial host 224 by the processing entity for subsequent verification, as will

be described shortly. In addition, for added security and as illustrated in Fig. 4A, a delay 421 (e.g., 3 days) may be created between mailing the RFID tag and then mailing the PIN.

[0033] After receiving the tag and PIN, the cardholder is ready to complete the activation process as illustrated in Fig. 4B. The cardholder first selects (from menu options displayed on the phone 102) a card activation option (step 432), and the phone display then prompts the cardholder to "waive" the phone over the tag (step 434). When the phone is brought into close proximity to the tag (step 436), the RFID device in the phone retrieves the cardholder data stored in the tag and loads it into the memory 124 of the phone, step 438. The programmed logic within the payment instrument module 110 does not permit access to the account data, however, until the user has been authenticated.

[0034] Fig. 6 illustrates a series of programming steps for the communications between the payment instrument module 110 and the RFID tag 204, in order for the payment instrument module 110 to receive the cardholder data (and data/instructions for communicating with the PIN authentication server at host 224). Such programming steps may be implemented using a contact-less communications application program interface at both the module 110 and tag 204 in accordance with NFC or other payment instrument communications standards. The programming can use Java-based code, implementing, as an example, JDSfI, a well known standard distributed networking technology that is Java-based and originally developed by Sun Microsystems, and described at www.jini.org.

[0035] The details of the programming steps seen in Fig. 6 will not be described further, since they are evident from such figure. However, it should be noted that in the case of the embodiment of Figs. 2, 4A and 4B, the RFH) tag may provide a service record to the payment instrument module that not only includes the account ID (to be loaded into the phone 102) but also instructions and data (PEST instructions) to enable the phone to contact the host 224 (e.g., dialing instructions for establishing a telecommunication path or connection in the wireless network 202, wireless host 220 and data network 222).

[0036] Returning to Fig. 4B, the phone display prompts the cardholder to enter the PIN at the phone keyboard (step 442). At step 444, the PIN is encrypted (e.g., either by security processor 122 or by the master control unit within the phone), and sent over the wireless telecommunications network 208 to the financial host 224, which includes a PIN authentication server for decrypting and then authenticating the PIN (step 450) by comparing the transmitted PDSf to the PDSf originally stored as a record at the host 224. A message from

the PESf authentication server (within host 224) is sent back to the cell phone through network 208 (step 452), and the security processor 122 (at step 454) either activates (enables) the cell phone as a payment instrument if a correct PESf has been entered or rejects the activation request (disables the payment instrument) if the entered PIN is not correct. If the cell phone is activated as a payment instrument, the security processor 122 thereafter permits the account data stored in memory 124 to be provided by the RFID device 120 (within the payment instrument module 110) to RFID proximity readers when a transaction is to be conducted.

[0037] It should be appreciated that the process illustrated in Figs. 4A and 4B may be implemented (e.g., as to data capture and display of information at the phone) by software elements or programming logic stored and executed in phone 102 (e.g., either in security processor 122 or in the phone's master control unit/processor). Also, the process may be implemented (e.g., as to PIN authentication) by software elements or programming logic stored and executed at the financial host 224.

[0038] Figs. 5A and 5B illustrate in greater detail a process for activating a payment instrument using the system 300 described above in conjunction with Fig. 3. However, rather than loading cardholder account identifying data into an RFID tag, data is loaded (encoded) onto the magnetic stripe of the card 302 (Fig. 3). Thus, in Fig. 5 A, the card processing entity receives the cardholder data file, prepares it for encoding onto the magnetic stripe, and then uses personalization equipment to encode the card (steps 502, 504, 506). The card is mailed to the cardholder (step 510), and after a three day delay (step 511), the processing entity separately mails the PIN (step 512). Of course, any length of delay in mailing the PBSf could be chosen (as appropriate to suit the needs of the processing entity).

[0039] When the cardholder is ready to complete activation (Fig. 5B), he/she visits an ATM (locations could be provided in the letter 306 along with the PIN). At step 532 the cardholder inserts the card into the card reader at the ATM 310 and also enters the provided PESf in order to authenticate himself/herself. It is contemplated that the card 302 has the PESf encoded thereon so that authentication occurs immediately at this point (by comparing the entered PESf with the PESf stored on the card), although it should be appreciated that the entered PESf could be sent to the financial host 340 for such purpose. Although not shown in Fig. 5B, if the cardholder does not enter the correct PESf, the cardholder is not permitted to proceed further in the process.

[0040] If authenticated, the cardholder then selects a payment instrument activation option provided at the display of the ATM (steps 534, 536).

[0041] The ATM display then instructs the cardholder to place the phone near the RFID reader 320 at the ATM (step 550). The RFID reader 320 then encodes the cardholder data into the payment instrument module 110 of the cell phone (step 552). After successful encoding, the cell phone displays a message to the cardholder that the phone has been activated and is now ready for use as a payment instrument (step 554)

[0042] While a detailed description of presently preferred embodiments of the invention have been given above, various alternatives, modifications, and equivalents will be apparent to those skilled in the art without varying from the spirit of the invention. For example, while the payment instrument is illustrated as a cell phone, any mobile device carried by the cardholder could be used (e.g., PDA, laptop computer, etc.). Furthermore, the PIN used for authenticating the user need not be a number, but rather could be a password or any string of characters that can be conveniently provided to the user for entry at the keyboard of the cell phone or ATM. In fact, the PIN might not even be a string of characters. Rather, among other things, the ATM 310 could be configured and programmed to use biometric measurements or vectors (signature or fingerprint recognition, retina scans, etc.) or any other form of personal user identification and authentication.

[0043] Also, while the illustrated embodiments use RFID device using NFC protocols and standards, many other forms of wireless signaling could be used to encode the payment instrument (bluetooth, infra red, longer range RFID signaling, etc.).

[0044] Therefore, the above description should not be taken as limiting the scope of the invention, but rather the scope is defined by the appended claims.