G06K19/005

Systems and methods for chip-based identity verification and transaction authentication

Example embodiments of systems, methods, and computer-accessible mediums for identity verification and transaction authentication are provided. An exemplary system can comprise an application, a user device, and a server. The application can prompt a removal of a card chip, prompt an insertion of the card chip into the user device, determine an orientation of the card chip after the insertion of the card chip into the user device, and transmit, to the card chip, a first message. The card chip can encrypt the first message via one or more authentication protocols to generate an encrypted first message, transmit, to the server, the encrypted first message. The server can decrypt the encrypted first message, verify the decrypted first message, and transmit a second message to the application, wherein the application is configured to display a verification notification in response to the second message.

Accessory for a tag device and a tag device using the same

An accessory for a tag device and a RFID tagging device using the accessory. The accessory includes a tag holder defining with a slot arranged to receive the tag device and to removably secure the tag device in a predetermined position; and an antenna provided on the tag holder, wherein the antenna has a radiator arranged to couple to a feeder of the tag device when the tag device is positioned in the predetermined position within the slot.

Mobile device case for secured access and improvements
11836280 · 2023-12-05 · ·

Mobile device cases are provided which, in a first embodiment, selectively limit a user's ability to control the user's own mobile electronic device. The case includes front and rear portions joined together and defining therein an opening for receiving a mobile electronic device, such as a mobile phone. A locking mechanism is provided for selectively securing the opening in a first locked position to prevent operational access to the mobile electronic device by the user until a predetermined condition is met. The case includes an indicia of time visible to the user during the period of time of prevented operational access. In a further embodiment, a case is provided with first and second polymeric shells each having an interior and an exterior surface thereon and connected together by at least one hinge portion. The first and second shell portions form a cavity of sufficient size to cover a mobile electronic device sufficiently to prevent access by its user. Tamper resistant and ultrasonic sensor defeating mobile device case embodiments are also contemplated by this invention.

CARD PACKAGING METHOD, CORRESPONDING PACKAGED CARD AND METHOD OF USE
20220067474 · 2022-03-03 ·

An exemplary package comprises a smart card having a first side and a second side, the first side comprising a first area having reproduced thereon first readable information and a second area having reproduced thereon second readable information. The first side having a laminar member applied so as to cover the first side, the laminar member comprising a light-impermeable material and a first light-permeable portion at the first side. The first readable information is visible through the first light-permeable portion and the second readable information is covered and made invisible by the light-impermeable material. A light-permeable film material is wrapped onto the smart card having the laminar member applied thereon.

PORTABLE ELECTRONIC DEVICE AND ELECTRONIC SYSTEM
20210334619 · 2021-10-28 · ·

A portable electronic device adapted for connecting to a base is provided. The base has a first connector and an RFID tag. The portable electronic device includes a casing, a second connector, a cover, a control module and an RFID sensor. The second connector is disposed on a lateral surface of the casing and is adapted for connecting to the first connector. The cover is movably disposed on the lateral surface of the casing and corresponds to the second connector, so as to cover or expose the second connector. The RFID sensor is disposed in the casing and is adjacent to the lateral surface. The RFID sensor detects the RFID tag to generate a signal. The control module is disposed in the casing and coupled to the RFID sensor and the cover. The control module controls the cover to move to expose the second connector according to the signal.

Devices and methods for contactless card alignment with a foldable mobile device

Example embodiments of systems, methods, and devices for transaction card alignment are provided. In one example embodiment, a mobile device may include a first component and a second component foldable with respect to one another between a first configuration and a second configuration. The mobile device may further include a screen interface on an interior side of the first component, and an alignment feature along the interior side, the alignment feature providing alignment for a contactless card with respect to the screen interface, wherein the contactless card is uncovered by the second component in the first configuration and covered by the second component in the second configuration.

Cardholder sleeve with selectable wireless communication capabilities

A cardholder sleeve with selectable wireless communication capabilities is described. The cardholder sleeve includes two or more slots each configured to hold an integrated chip card. Each of the slots is surrounded by shielding material to shield the communication features of the card from skimming and prevent interference with other cards in the sleeve. The cardholder sleeve includes an internal card reader for each of the cards and a selection mechanism that enables a user to select a card in the cardholder sleeve for use. The cardholder sleeve further includes at least one transceiver in communication with the internal card readers that operates as a repeater to wirelessly transmit information read from the chip of the selected card by the respective internal card reader to external card readers such that the selected card need not be removed from the sleeve to be used.

Method and system for securing a tracking device to a component

A carrier for securing a tracking component includes a housing. The housing includes a recess formed into a face of the housing that is adapted to secure the tracking component. The recess includes a wall that surrounds a periphery of the recess and a hole formed through a bottom surface of the recess.

MOBILE DEVICE CASE FOR SECURED ACCESS AND IMPROVEMENTS
20210124848 · 2021-04-29 ·

Mobile device cases are provided which, in a first embodiment, selectively limit a user's ability to control the user's own mobile electronic device. The case includes front and rear portions joined together and defining therein an opening for receiving a mobile electronic device, such as a mobile phone. A locking mechanism is provided for selectively securing the opening in a first locked position to prevent operational access to the mobile electronic device by the user until a predetermined condition is met. The case includes an indicia of time visible to the user during the period of time of prevented operational access. In a further embodiment, a case is provided with first and second polymeric shells each having an interior and an exterior surface thereon and connected together by at least one hinge portion. The first and second shell portions form a cavity of sufficient size to cover a mobile electronic device sufficiently to prevent access by its user. Tamper resistant and ultrasonic sensor defeating mobile device case embodiments are also contemplated by this invention.

SYSTEMS AND METHODS FOR CHIP-BASED IDENTITY VERIFICATION AND TRANSACTION AUTHENTICATION
20240005323 · 2024-01-04 ·

Example embodiments of systems, methods, and computer-accessible mediums for identity verification and transaction authentication are provided. An exemplary system can comprise an application, a user device, and a server. The application can prompt a removal of a card chip, prompt an insertion of the card chip into the user device, determine an orientation of the card chip after the insertion of the card chip into the user device, and transmit, to the card chip, a first message. The card chip can encrypt the first message via one or more authentication protocols to generate an encrypted first message, transmit, to the server, the encrypted first message. The server can decrypt the encrypted first message, verify the decrypted first message, and transmit a second message to the application, wherein the application is configured to display a verification notification in response to the second message.