G06K5/00

IMAGE FORMING DEVICE
20230032555 · 2023-02-02 ·

An image forming device capable of reducing resources related to destruction of a wireless tag is provided. The image forming device according to the present embodiment includes a reader and writer, a fixing unit, a determination unit, and a control unit. The reader and writer reads information from the wireless tag. The fixing unit heats and conveys a sheet having the wireless tag. The determination unit determines a defect of the wireless tag based on a reading result of the reader and writer. If the determination unit determines that the wireless tag is defective, the control unit controls the fixing unit to increase an amount of heat applied to the wireless tag such that information cannot be read from the wireless tag.

Officially authorized virtual identification cards
11610196 · 2023-03-21 ·

A system that allows users to display valid identification via a mobile device. Authentic and valid IDs and secure folders are verified by a certificate authority. Statistical techniques are applied to automatically determine the consistency and reliability of user data. Context is automatically determined to display data according to the context.

Method and system for implementing a virtual smart card service

A virtual smart card service corresponds to an execution of a smart card application. A key is stored at a server side. Application metadata is used to emulate a smart card application logic. The method comprises: processing, by a client, the smart card application logic; running the smart card application while retrieving smart card data from the smart card application logic; identifying key operation within the smart card application; generating a key operation request by using the identified key operation and data relating to the client; sending to the server the key operation request; processing, by the server, the key operation request by using the key and client data; getting a key operation result from the identified key operation on the client data; and sending to the client the key operation result.

System and computer-implemented method for using location data on a card network to detect and address billing fraud

A system and computer-implemented method for detecting and addressing billing fraud by an asserted provider of a good or service based on location data associated with card-based financial transactions by an asserted recipient and collected, stored, analyzed, and acted on by a payment card network to determine and respond to a likelihood of fraud. A computer stores locations of the recipient based on uses of a payment card over a time period, and determines a location of the provider based on location data associated with a card reader at a particular time at which the good or service was allegedly provided. The computer compares the two locations for the particular time and generates a fraud score based on a likelihood that the recipient was physically capable of being at the provider location at the particular time, and based on the score, may notify the recipient and decline the payment request.

Methods of inductive communication in a cellular telephone
11599734 · 2023-03-07 · ·

Various switchable devices including inductive antennas are disclosed. These switchable devices may include one or more RFID tags and one or more switches. Some of these one or more switches are optionally wireless and/or manual. In various embodiments, the switchable devices include are included within cellular phones, security devices, identity devices, financial devices, remote controls, and the like. The switchable devices are optionally configured to perform financial transactions.

Method and system for securely authenticating a user by an identity and access service using a pictorial code and a one-time code
11665156 · 2023-05-30 · ·

The present invention comprises scanning, by a mobile device of the user, a QR code generated by a server application when the user requests access to a secure web portal and generating, within a client application, a login code which is used to authenticate the user within an authentication service and then being redirected to the requested portal.

Computer-implemented system and method for entity tracking and identification

A computer-implemented system and method for entity tracking and identification is provided. A tracker associated with an entity is tracked. Communication is continuously attempted between the tracker and a tracking device associated with an individual in custody of the entity. During one of the attempted communications, an absence of the tracker is determined by identifying a time of the attempted communication and applying a time threshold to the time for the attempted communication. The absence of the tracker is identified when no communication has been established with the tracking device within the time threshold. The entity is classified as missing when the absence of the tracker is determined.

System to identify vulnerable card readers

Example embodiments relate to a network-based vulnerability detection system configured to access a database of customer transaction data corresponding to a set of card readers that includes transaction codes, receive an identification of a set of compromised card readers among the set of card readers, identify common transaction codes within the transaction data of the set of compromised card readers, and correlate the common transaction codes to one or more instances of fraud associated with the compromised set of card readers. In some example embodiments, the vulnerability detection system may be applied to monitor one or more card readers, receive transaction data corresponding to transaction conducted through the card readers, identify the common transaction codes correlated to the instances of fraud, and cause display of a notification that includes an indication of the instance of fraud at a client device.

Biometric reader in card
11620633 · 2023-04-04 · ·

Digital transaction apparatus including a Data Assistance Device (DAD), including a user interface that is operable to at least select data, and a DAD transmitter, a Digital Transaction Card (DTC), including a Digital Transaction Processing Unit (DTPU), and a DTC receiver, wherein the DAD and DTC are operable to transfer data from the DAD to the DTC and when subsequently using the DTC to effect a digital transaction, the DTC operates in accordance with the data selected and transferred from the DAD to the DTC, the DTC including a biometric reader operable to obtain biometric data of at least one physical characteristic of a user, wherein the biometric reader is connected to the processor for data transfer therebetween, wherein reference biometric data of an authorised user is stored on the processor, and wherein the DTC is operable to compare the obtained biometric data with at least a section of the reference biometric data, such that the authorisation of the user is determined.

Determining specific terms for contactless card activation

Systems, methods, articles of manufacture, and computer-readable media for determining specific terms to activate a contactless card. An application executing on a server may receive a request from a device specifying a uniform resource locator comprising encrypted data, the encrypted data based at least in part on a private key assigned to a contactless card. The application may decrypt the encrypted data and determine a type of the contactless card. The application may determine a plurality of terms associated with the type of the contactless card and transmit the terms to a web browser on the device. The application may receive, from the web browser, an indication specifying acceptance of the plurality of terms. The application may store, based on the decryption of the encrypted data and the received indication specifying acceptance of the terms, an indication in a database specifying the contactless card is activated for use.