Patent classifications
G06K5/00
Payment card with budget display
Various examples are directed to payment cards with budget displays including systems and methods for using the same. A payment card may comprise a display and a control circuit. The control circuit may display, at the display of the payment card, a first display state indicating a first unused portion of a budget amount for a current budget period. The control circuit may access first budget status data generated in response to a transaction made with the payment card and modify the display to display a second display state indicating a second unused portion of the budget amount for the current budget period, wherein the second unused portion is based at least in part on the transaction.
Officially authorized virtual identification cards
A system that allows users to display valid identification via a mobile device. Authentic and valid IDs and secure folders are verified by a certificate authority. Statistical techniques are applied to automatically determine the consistency and reliability of user data. Context is automatically determined to display data according to the context.
Method and a device for denying or nullifying a specific online transaction carried out by an authorized user who is coached by a fraudster
A method for denying or nullifying a specific online transaction carried out by a specific user using a computing device associated with at least one input interface, while the specific user was coached by a fraudster. The method includes collecting a specific set of behavioral data relating to the behavior of the specific user during a specific online transaction, and using a multi-dimensional classification module to determine a probability that the specific user was coached during collection of the set of behavioral data. In response to the probability being greater than a predefined threshold, the specific transaction is denied or nullified.
Computer-implemented system and method for tracking and authenticating interactions
A computer-implemented system and method for tracking and authenticating interactions is disclosed. A tracking device is associated with an individual responsible for an entity. Information about the entity is recorded on the tracking device. The tracking device interfaces with at least one further tracking device during an interaction between the responsible individual and a further responsible individual. The information recorded by the tracking device is transferred to the further tracking device and further information is recorded on the further tracking device. The recorded information from each of the tracking devices is compiled as a record for the entity and displayed.
Hidden subject identification system
A method determines whether another party has information about a person without disclosing personal identification information of the person. The method includes receiving, at a third computer system, a first set of data comprising personal identification information of a first person and encrypting the first set of data to generate a third set of data. The method also includes transmitting, to a second computer system, the third set of data. The method further includes receiving, at the third computer system from the second computer system, a message indicating the third set of data matches a fourth set of data encrypted from a second set of data comprising personal identification information of a second person. The method still further includes transmitting, from the third computer system, a message indicating the second person matches the first person when the fourth and third set of data matches.
Game access device with time varying signal
Systems and methods for controlling access to wireless gaming devices and networks are provided. For example, access is controlled through one or more levels of security checks, such as a hard security check instead of or in addition to a soft security check. In a hard security check, the user employs an apparatus such as a card or other physical token that can be used to access the wireless gaming device. Such an apparatus may communicate information that identifies the user to the device or may simply be used to produce a signal without which the device is locked to users. The apparatus may further emit a time varying signal to enhance security.
Advanced loyalty applications for powered cards and devices
Advanced loyalty applications are provided to improve the functionality of cards and devices. For example, a user interface may be placed on a card (e.g., a physical button) or a telephonic device (e.g., a virtual button on a capacitive touch screen). Manual input provided to this user interface may, for example, cause a non-merchant product (e.g., insurance) to be purchased with a merchant purchase. The product can be paid for with debit, credit, gift card balance, or points. A code indicative of a user's desire to purchase the product may be communicated to a payment card reader (e.g., to a magnetic stripe reader via a magnetic stripe communications device). A display may be provided next to a button to allow a user to scroll, or toggle by pressing the button repeatedly, through different products (which may be merchant or non-merchant products).
Successive memory writes in an RFID interrogator
A high speed tabletop and industrial printer is disclosed with integrated high speed RFID encoding and verification at the same time. The industrial printer simultaneously prints on and electronically encodes/verifies RFID labels, tags, and/or stickers attached to a continuous web. The industrial printer comprises a lighted sensor array for indexing the printing to the RFID tags; and a cutter powered from the industrial printer for cutting the web that the RFID tags are disposed on. The industrial printer comprises two RFID reader/writers that are individually controlled. Specifically, one of the RFID reader/writers comprises the ability to electronically encode the RFID tags while the web is moving; and the second RFID reader/writer uses an additional RFID module and antenna on the printer for verifying the data encoded to the RFID tags. The printer provides for successive writes to various memory blocks and optimizes the communication sequence between the interrogator and tag.
Successive memory writes in an RFID interrogator
A high speed tabletop and industrial printer is disclosed with integrated high speed RFID encoding and verification at the same time. The industrial printer simultaneously prints on and electronically encodes/verifies RFID labels, tags, and/or stickers attached to a continuous web. The industrial printer comprises a lighted sensor array for indexing the printing to the RFID tags; and a cutter powered from the industrial printer for cutting the web that the RFID tags are disposed on. The industrial printer comprises two RFID reader/writers that are individually controlled. Specifically, one of the RFID reader/writers comprises the ability to electronically encode the RFID tags while the web is moving; and the second RFID reader/writer uses an additional RFID module and antenna on the printer for verifying the data encoded to the RFID tags. The printer provides for successive writes to various memory blocks and optimizes the communication sequence between the interrogator and tag.
Camera normalization
Methods, systems, and computer-readable media are provided for camera normalization. Images may be normalized after they are captured to conform to previously captured images. Images may also be preemptively adjusted (prior to capture) to conform to previously captured images.