G07F7/08

CARD-PERSONALIZATION SYSTEM

A personalized card may be generated using a card-personalization system accessible via multiple access points on a network. In some aspects, the personalized card may include a physical card having an image selected by a user in a card-personalization process. The user may be assigned a code that may both authenticate the user to access the card-personalization system and identify a position of the user in the card-personalization process. The card-personalization process may include a selection process for selecting an image, an approval process for approving the image, and a creation process for generating the personalized card including the image.

CARD-PERSONALIZATION SYSTEM

A personalized card may be generated using a card-personalization system accessible via multiple access points on a network. In some aspects, the personalized card may include a physical card having an image selected by a user in a card-personalization process. The user may be assigned a code that may both authenticate the user to access the card-personalization system and identify a position of the user in the card-personalization process. The card-personalization process may include a selection process for selecting an image, an approval process for approving the image, and a creation process for generating the personalized card including the image.

SYSTEM, PROGRAM PRODUCT, AND COMPUTER-IMPLEMENTED METHOD FOR LOADING A LOAN ON AN EXISTING PRE-PAID CARD
20220351159 · 2022-11-03 · ·

Embodiments of the present invention provide systems, program products, and methods of loading a loan on a pre-paid card. A bank receives authorization from a lender to credit loan proceeds from the lender to an approved borrower on an existing pre-paid card associated with the pre-paid card processor. Next, the bank credits the loan proceeds to the pre-paid card processor for the existing pre-paid card so that the loan proceeds are released to the approved borrower and are immediately available.

Security aspects of a self-authenticating credit card
11481774 · 2022-10-25 · ·

A self-authenticating credit card includes an input device for entering a PIN. The PIN is accepted by a micro-controller that uses the entered PIN as an encryption key for decrypting stored account information. A portion of the account information includes data, that when decrypted, contains an image that is rendered on an integral display, with account information sent to a transaction terminal. A timer is used to limit access to account data while in the unlocked state.

Fuel dispenser having selectively viewable secondary display

A fuel dispenser comprises a housing enclosing fluid handling components including a fluid flow meter. The housing has a user interface including a panel display. A control system is in electrical communication with the user interface and is operative to display money and volume information on the panel display during a fueling transaction. A secondary display having digit structure that registers fuel dispensing information is in electrical communication with the control system. The secondary display is configured to not be viewable by a customer during a fueling transaction.

LOW POWER MODE FOR PAYMENT TRANSACTIONS
20230127816 · 2023-04-27 ·

Systems, methods, and computer-readable media for managing near field communications during a low power management mode of an electronic device are provided that may make credentials of a near field communication (“NFC”) component appropriately secure and appropriately accessible while also limiting the power consumption of the NFC component and of other components of the electronic device.

SELF-CENTERING USER INTERFACE FOR INPUTTING INFORMATION

Techniques described herein are directed to, among other things, utilizing a self-centering user interface to receive information associated with a transaction. For instance, a computing device may receive a first input at a first location of a display. The computing device may then determine a positioning for the user interface, where the user interface may be substantially centered about the first location. In some instances, the computing device may display the user interface using the positioning. The computing device may then receive a second input corresponding to swipe from the first location of the display to a second location of the display. The computing device may then determine a symbol included in the user interface based at least in part on the second input. In some instances, the user interface includes a keypad for entering a personal identification number associated with a payment instrument.

Information security using velocity attack detection

A data attack detection system that includes a record host and an orchestration host. The record host stores account information for card holders. The orchestration host includes a switch interface configured to receive transaction information for a card from a network. The orchestration host further includes a velocity trap engine that stores received transaction information for the card in a cardholder file. The velocity trap engine creates entries in a velocity transaction timestamp record for the card when the number of transactions for the card in the cardholder record within a first predetermined time interval exceeds a first activity level threshold. The velocity trap engine discontinues a transaction flow between the orchestration host and the record host for the card when the number of transactions for the card in the velocity transaction timestamp record within a second predetermined time interval exceeds a second activity level threshold.

Client device authentication using contactless legacy magnetic stripe data
11638148 · 2023-04-25 · ·

A technique for generating a diversified encryption key for a contactless legacy magnetic stripe card is disclosed. The diversified key can be generated using a master key, a key diversification value and an encryption algorithm. In one example embodiment, the key diversification value can be provided by the user as a fingerprint, numeric code or photo. The user can provide the key diversification value to the card or a cellphone. The card can generate the diversified key using the user provided key diversification value. The card or the cellphone can transmit the user provided diversification value to the server and the server can regenerate the diversified key using the user provided diversification value.

Client device authentication using contactless legacy magnetic stripe data
11638148 · 2023-04-25 · ·

A technique for generating a diversified encryption key for a contactless legacy magnetic stripe card is disclosed. The diversified key can be generated using a master key, a key diversification value and an encryption algorithm. In one example embodiment, the key diversification value can be provided by the user as a fingerprint, numeric code or photo. The user can provide the key diversification value to the card or a cellphone. The card can generate the diversified key using the user provided key diversification value. The card or the cellphone can transmit the user provided diversification value to the server and the server can regenerate the diversified key using the user provided diversification value.