Patent classifications
G06K5/00
POS terminal and comparison determination method of I/O card connected with the same
In accordance with one embodiment, a POS terminal comprises a connection section configured to connect with an I/O card; a card information acquisition section configured to acquire, when a first I/O card connected with a general-purpose component is connected with the connection section, hardware information of the I/O card containing a model number; a card information storage section configured to store a model number list of supportable I/O cards; and a card information comparison determination section configured to determine whether or not the model number of the first I/O card is recorded in the model number list.
Simulating I/O using multicomputer data processing
Methods, systems, and computer program products are included for simulating I/O. An exemplary method includes simulating I/O from a card that includes a magnetic stripe. The method includes receiving, at a first controller, a first token from a first terminal. The first token is communicated from the first controller to at least one backend computing device. The first controller receives, from the at least one backend computing device, a second token generated at the at least one backend computing device. The first controller injects the second token into a second controller. The second controller communicates the second token to the at least one backend system.
SYSTEM AND METHOD FOR USING UNIQUE DEVICE IDENTIFIERS TO ENHANCE SECURITY
A method for detection and use of device identifiers to enhance the security of data transfers between electronic devices. A first electronic device can transmit access data to a second electronic device. The access data can be associated with a first access code that can be generated based at least in part on data representing a device identifier of the first electronic device. A device identifier can uniquely identify the first electronic device from a plurality of electronic devices. Transferring the access data can involve transforming the first access code into a second access code that can include data representing a device identifier associated with the second electronic device. Transforming the first access code into the second access code can facilitate access to a resource associated with the access data for a second user, but not for a first user.
Information processing system, clients, server, programs and information processing method
An information processing system including an IC chip, a client driving the IC chip to carry out predetermined processing, a server connected to the client by a communication network, wherein the client has a processing-command requesting section configured to request for transmission of a processing command to the server; an ID-acquisition-command sender section configured to transmit an ID acquisition command; a chip-ID extraction section configured to extract the chip ID; and a processing-command sender section configured to embed the extracted chip ID into the processing command and transmit the command. The server has a command-group sender section configured to send the command. The IC chip has a chip-ID sender section configured to transmit data; a chip-ID determination section configured to determine whether the chip ID in the command is identical with the chip ID of the IC chip; and a processing execution section configured to carry out the predetermined processing.
SYSTEM AND METHOD FOR FACILITATING SECURE SELF PAYMENT TRANSACTIONS OF RETAIL GOODS
Disclosed herein are various embodiments for systems and methods for self-payment and verification of the purchase of retail goods and services. According to an embodiment of the invention, a method for verifying the purchase using a mobile electronic device in wireless communication with a payment verification system and a code generating system is provided, the method comprising the steps of: receiving from a consumer information identifying an item for purchase; receiving from a consumer information identifying payment means for purchasing the item for purchase; processing the information identifying the item for purchase and information identifying payment means and generating a unique QR code indicating a purchase of the item; sending the unique QR code to a mobile device for display by a consumer to the vendor of the item for purchase.
SYSTEM AND METHOD FOR FACILITATING SECURE SELF PAYMENT TRANSACTIONS OF RETAIL GOODS
Disclosed herein are various embodiments for systems and methods for self-payment and verification of the purchase of retail goods and services. According to an embodiment of the invention, a method for verifying the purchase using a mobile electronic device in wireless communication with a payment verification system and a code generating system is provided, the method comprising the steps of: receiving from a consumer information identifying an item for purchase; receiving from a consumer information identifying payment means for purchasing the item for purchase; processing the information identifying the item for purchase and information identifying payment means and generating a unique QR code indicating a purchase of the item; sending the unique QR code to a mobile device for display by a consumer to the vendor of the item for purchase.
Method for detecting misuse of identity in electronic transactions
The invention provides methods for determining whether a transaction has taken place in geographic proximity to a wireless device. Upon receiving a notification to authenticate the use of an identity at a transaction location, where the identity is associated with a wireless terminal, the method determines an approximate location of the wireless terminal based on cached position information, GPS location, cellular geo-location, and/or Wi-Fi geolocation, and determines whether one or more of these is in geographic proximity to the location of the transaction.
Prepaid, debit and credit card security code generation system
This invention is a comprehensive “Dynamic Security Code” (“DSC”) System (“DSC System”) that can change the security code of a prepaid, debit, or credit card (“Payment Card”). In an effort to thwart Card-Not-Present (“CNP”) fraud, the DSC System provides dynamic security code values (“DSC Values”) that have a limited use. The DSC Values provided by this DSC System can be calculated by various methodologies and can be used within existing standard payment card infrastructures. The DSC System can also be used with other form factors and in other environments not related to payments such as balance inquiries. The DSC Values can be calculated by a DSC Generator Server or on the card itself.
Payment cards and devices with gift card, global integration, and magnetic stripe reader communication functionality
A payment card (e.g., credit and/or debit card) or other device (e.g., mobile telephone) is provided with a magnetic emulator operable to communicate data to a magnetic stripe read-head. Gift cards may be inputted by a user into such a payment card or other device such that a user can combine gift cards. Similarly, a user be provided with a global payment account that can be utilized in multiple countries that have different standards for formatting data. A user may be provided with a default country (e.g., United States) but may have a way to select that the user is in a different country (e.g., Japan). Accordingly, a user may select that a Japanese data structure be transmitted through a magnetic stripe reader when the user is in Japan.
UNIQUE IDENTIFICATION INFORMATION FROM MARKED FEATURES
A system for verifying the authenticity of a printed mark includes an image acquisition device that acquires an image of a printed mark. In one implementation, the printed mark includes an identifier that identifies the group or class of an item to which the printed mark is to be (or has been) attached. The system may also include one or more processors that carry out actions such as receiving the image from the image acquisition device; analyzing the image to identify artifacts in the printed mark, retrieving a genuine mark signature from a data storage containing genuine mark signatures, comparing the identified artifacts with the genuine mark signature, and determining whether the unverified item is authentic based on the comparison.