Patent classifications
G07C9/22
ELECTRONIC LOCK AND METHOD OF OPERATION
Disclosed is a system and method for more secure card transactions. The security is generated by the use of a dynamic transaction number which is valid for only a single predetermined time interval. The transaction number is generated through a two step process. In a first step, time is used as an input to a transaction number function. The transaction number function outputs more than 16 digits. The second step uses the more than 16 digits for input and uses a ruleset to strip at least one digit to determine the transaction number valid for the predetermined time interval.
ELECTRONIC LOCK AND METHOD OF OPERATION
Disclosed is a system and method for more secure card transactions. The security is generated by the use of a dynamic transaction number which is valid for only a single predetermined time interval. The transaction number is generated through a two step process. In a first step, time is used as an input to a transaction number function. The transaction number function outputs more than 16 digits. The second step uses the more than 16 digits for input and uses a ruleset to strip at least one digit to determine the transaction number valid for the predetermined time interval.
User authentication based on RFID-enabled identity document and gesture challenge-response protocol
A method of using a user terminal to provide secure authenticated registration between a user and a third party, the method comprising: reading a chip to receive chip data stored on the chip (S408); transmitting the chip data, via a network interface of the user terminal, over a network to an authentication server associated with said third party (S410) and in response receiving via said network interface a notification message from the authentication server (S412); determining whether the identification document is authentic based on the notification message from the authentication server (S414), wherein in response to determining that the identification document is authentic, the method further comprising: outputting, via at least one output device of the user terminal, an authentication challenge to the user (S418); receiving image data as a response to the authentication challenge (S420); and transmitting the image data, via the network interface, over the network to the authentication server for authenticating the user with the third party (S422).
Method of enrolling data to control an identity, and identity-control method
The present invention comprises an enrolment method comprising steps of: acquisition (100) of an image showing a photograph itself showing an individual, extraction (102), from the image of a characteristic of the image other than a biometric model, obtaining (104) personal data of the individual other than by the image-processing algorithm, generation (106) of a reference datum (W) from the characteristic of the image and the obtained personal data, calculation (108) of an encoded datum (s) by application of an encoding procedure to the reference datum (W) and to a random datum (c), calculation (110) of a hash (h(c) of the random datum, storage (112) in a database of the datum encoded (s) in association with the hash. The invention also comprises an identity-control method using such stored data.
Method of enrolling data to control an identity, and identity-control method
The present invention comprises an enrolment method comprising steps of: acquisition (100) of an image showing a photograph itself showing an individual, extraction (102), from the image of a characteristic of the image other than a biometric model, obtaining (104) personal data of the individual other than by the image-processing algorithm, generation (106) of a reference datum (W) from the characteristic of the image and the obtained personal data, calculation (108) of an encoded datum (s) by application of an encoding procedure to the reference datum (W) and to a random datum (c), calculation (110) of a hash (h(c) of the random datum, storage (112) in a database of the datum encoded (s) in association with the hash. The invention also comprises an identity-control method using such stored data.
Systems and methods for a night drop system
Systems and methods relating to a lockbox bank for currency drop-offs are provided. A lockbox bank includes one or more lockboxes, a safe coupled to the one or more lockboxes, and a terminal of a lockbox computing system. Each lockbox includes a receptacle configured to receive a currency drop-off and a locking mechanism. The terminal includes a network interface, a display device, one or more input/output devices, and a processing circuit including a processor and a memory. The memory is structured to store instructions that are executable by the processor and cause the processing circuit to receive a request from the customer to use a lockbox for a currency drop-off, receive access credentials, verify the access credentials, in response to successful verification, grant the customer access to a lockbox, and in response to determining that the drop-off has been completed, move the drop-off from the receptacle to the safe.
CONTACTLESS OPTICAL INTERNET OF THINGS USER IDENTIFICATION DEVICE AND SYSTEM
A contactless optical device is useable to identify a user, and allows an enterprise to authorize access by that user to enterprise facilities and/or cause presentation of user information of the user. The device is specifically adapted for secure usage within an enterprise network via a wired network interface. The device avoids storage of user-identifying data in persistent memory, to avoid compromise of user data if the device were lost or stolen, or otherwise removed from the enterprise network.
CONTACTLESS OPTICAL INTERNET OF THINGS USER IDENTIFICATION DEVICE AND SYSTEM
A contactless optical device is useable to identify a user, and allows an enterprise to authorize access by that user to enterprise facilities and/or cause presentation of user information of the user. The device is specifically adapted for secure usage within an enterprise network via a wired network interface. The device avoids storage of user-identifying data in persistent memory, to avoid compromise of user data if the device were lost or stolen, or otherwise removed from the enterprise network.
KEYLESS PATTERN-BASED MECHANISM FOR UNLOCKING VEHICLE
An approach for the unlocking a vehicle is disclosed. The approach determines a plurality of devices of one or more users and one or more unlocking protocols associated with one or more vehicles, requests a user unlock action command by at least one of the plurality of devices. The approach receives a user unlock action complete command from at least one of the plurality of devices and validates the user unlock action complete command against the one or more unlocking protocols. Finally, after successful authentication, the approach unlocks the one or more vehicles.
KEYLESS PATTERN-BASED MECHANISM FOR UNLOCKING VEHICLE
An approach for the unlocking a vehicle is disclosed. The approach determines a plurality of devices of one or more users and one or more unlocking protocols associated with one or more vehicles, requests a user unlock action command by at least one of the plurality of devices. The approach receives a user unlock action complete command from at least one of the plurality of devices and validates the user unlock action complete command against the one or more unlocking protocols. Finally, after successful authentication, the approach unlocks the one or more vehicles.