G06K7/08

Systems and methods for safely storing an object

A system for storing an object includes a card reader configured to receive a card from a user and to determine an identity of the user based on information on the card. The system also includes a secure storage area configured to store a plurality of physical boxes. The plurality of physical boxes includes a first physical box that is assigned to the user. The first physical box is configured to be dispensed from the secure storage area to the user outside of the secure storage area in response to the user requesting to physically receive the first physical box. Dispensing the first physical box includes moving the first physical box along a predetermined path in the secure storage area and presenting the first physical box for removal from the secure storage area.

Card reader based payment transactions from a web browser

This disclosure relates to systems and methods for processing electronic payments for customer purchases. In some implementations, a system receives a payment request from a merchant, and transmits payment information to a mobile computing device associated with the merchant. The payment information includes a transaction ID to identify the purchase, a purchase amount, and instructions that cause the mobile computing device to activate a card reader, present a notification of the purchase amount to the customer, receive an acceptance of the purchase amount from the customer, and authorize the card reader to process an electronic payment for the purchase amount. The system receives payment confirmation from the mobile computing device, and provides the parameter confirmation to the merchant.

ELECTRONIC DEVICES INCLUDING CIRCUITS CONFIGURED TO ADJUST PEAK INTENSITY OF CURRENT
20220029661 · 2022-01-27 ·

An electronic device may include a transmission circuit and an inductive element. The inductive element may be configured to generate a wireless communication signal based on a current. The transmission circuit may be configured to output the current based on a supply voltage; to increase an intensity of the current, from zero to an increased intensity that is less than or equal to a target value, by alternately repeating a first increase and a first decrease of the intensity of the current, in a first time interval; to decrease the intensity of the current, from the increased intensity to zero, by alternately repeating a second increase and a second decrease of the intensity of the current, in a second time interval.

System and method for wireless sensing of health monitoring

An ultra-high frequency (UHF) wireless sensor includes an agent activated non-metal antenna formed of a conductive stimuli-responsive hydrogel material. A radio frequency identification (RFID) tag in electronic communication with the non-metal antenna includes a wireless data communication integrated circuit (IC). The non-metal antenna is configured to be inactive prior to an interaction with an activating agent and active upon the interaction with the activating agent.

Identification verification system
11232670 · 2022-01-25 · ·

A method and apparatus is provided for verifying the validity of ID cards. A card reading device reads an ID card and transmits a request to a database server. A database is queried and a reply is sent back to the card reading device indicating whether the ID is valid. If desired, the reply can include additional information, such as a description of the ID holder. The ID verification system can be used to help verify whether an ID belongs to the ID holder. The system can also log and timestamp events for future access.

Handheld electronic device capable of magnetic field communication and payment method using the same

Various embodiments provide a handheld electronic device capable of magnetic field communication. The handheld electronic device includes: a first cover, a second cover, a memory, a display, a processor, first and second antennas, and at least one sensor. The memory stores instructions that enable the processor to: store payment information in the memory; display at least one image or text related to the payment information on the display, in response to at least part of a user input; determine whether a payment process starts by using the electronic device; and transmit, according to the determination as to whether a payment process starts, a first signal related to the payment information via the first antenna, and allow an external device to read the payment information via the second antenna.

Payment processing method and electronic device supporting the same

An electronic device and method of processing a payment at the electronic device are provided. The electronic device includes a security memory configured to store payment information of a near field communication (NFC) method, payment information of a magnetic security transmit (MST) method, and fingerprint information, and a processor configured to control a multiple payment operation of the NFC method and the MST method when fingerprint information obtained through fingerprint detection is valid. The processor is further configured to control a signal processing information according to the NFC method operation and a signal processing information according to the MST method operation to be outputted as one screen interface.

Magnetic secure transmission (MST) device, MST system and controller including the same

A magnetic secure transmission system includes an inductor, a switching circuit connected to the inductor, and a control circuit. The control circuit controls the switching circuit to adjust a level of a current in the inductor by a first amount over a data transmission period, such that the inductor emits a magnetic pulse including a first magnitude during the data transmission period. The control circuit controls the switching circuit to adjust the level of the current in the inductor such that the level of the current is increased and decreased repeatedly by a second amount between two different levels during a data non-transmission period, and the inductor emits a magnetic pulse including a second magnitude during the data non-transmission period. The second amount is less than the first amount, the first magnitude is greater than a threshold value and the second magnitude is less than the threshold value.

Validating transactions using information transmitted through magnetic fields

The technology described in this document can be embodied in a method that includes receiving, at one or more servers from a first computing device, (i) authentication information identifying a user-account associated with (a) the first computing device or (b) an application executing on the first computing device, and (ii) a transaction identifier generated by a second computing device. The transaction identifier is obtained by the first computing device by detecting one or more parameters of a magnetic field generated by the second computing device. The method also includes determining, by the one or more servers, that the user-account is authorized to initiate a transaction identified by the transaction identifier, and in response to determining that the user-account is authorized to initiate the transaction, transmitting, from the one or more servers to the second computing device, confirmation information usable by the second computing device to proceed with the transaction.

SYSTEMS AND METHODS FOR CONTROLLING SECURED DATA TRANSFER VIA URLS
20220121828 · 2022-04-21 ·

An authenticated data sharing system may include a contactless card comprising a processor and a memory including one or more applets and an application comprising instructions for execution on a device. The application is configured to determine a capability associated with the contactless card after a first entry into a communication field. The application is configured to request additional information based on the determination. The one or more applets are configured to transmit, to the application, a generated tokenized link after a second entry into the communication field based on the requested additional information. The application is configured to transmit the link to obtain the requested additional information.