G07F7/10

Point of sale system having a customer terminal and a merchant terminal

A point of sale system includes a merchant terminal and a customer terminal. The merchant terminal is configured to display a user interface (UI) window on the merchant terminal. The UI window on the merchant terminal displays a merchant-specific version of a screen displayed on the customer terminal. The merchant terminal receives updates from the customer terminal regarding the status of the payment portion for a transaction. The merchant terminal can provide an input to the UI window which is sent as a message to the customer terminal. Control of state for the point of sale system is shared such that when the system is in a first state, the merchant terminal is the state control terminal, and when the point of sale system is in a second state, the customer terminal is the state control terminal and has control of state for the system.

LOCAL CACHE-BASED IDENTIFICATION SYSTEM
20220375296 · 2022-11-24 ·

An identification system uses a local cache for performing identifications. An identity system device may store identity information and identification information. An electronic device stores a cache of a portion of the identity information and a part of the identification information. The electronic device receives user input, determines an identity by comparing the user input to the cached identification information (such as by comparing a received digital representation of a biometric with cached biometric identification information), and performs an action using information in the cached identity information that is associated with the identity. The electronic device may update the identity information stored by the identity system device based on the action.

Method for generating at least one derived identity
09830442 · 2017-11-28 · ·

The invention provides a method of generating at least one derived identity of an individual 1, the method comprising the following steps: generating a first identifier id1 from biometric data of the individual; defining a serial number ns associated with the individual; generating first check data ctrl1 for verifying consistency between the first identifier id1 and the serial number ns; and concatenating the serial number ns, the first identifier id1, and the first check data ctrl1 in such a manner as to form a first derived identity ident1 of the individual.

Method for generating at least one derived identity
09830442 · 2017-11-28 · ·

The invention provides a method of generating at least one derived identity of an individual 1, the method comprising the following steps: generating a first identifier id1 from biometric data of the individual; defining a serial number ns associated with the individual; generating first check data ctrl1 for verifying consistency between the first identifier id1 and the serial number ns; and concatenating the serial number ns, the first identifier id1, and the first check data ctrl1 in such a manner as to form a first derived identity ident1 of the individual.

Tamper resistant rugged keypad

A tamper-resistant or tamper-evident keypad device for use in secure transactions. The keypad comprises multiple security mechanisms to prevent tampering to the device, and thus access to users' private information. The keypad is made of resilient materials and contains a tamper-resistant collar for housing the keypad's connector interface. The keypad comprises a multi-layered printed circuit board with at least two internal security-shield layers comprising switch trace protection, as well as additional security layers for tamper protection. The keypad comprises a silicon-rubber keypad actuator that engages tamper switches on the flexible security circuit. The keypad comprises metal discs mounted on the front or rear face of the flexible circuit and an optional dome layer.

Anonymized biometric data integration

Biometric features are derived from security data associated with a subject. The security data is obtained from a security device. A biometric value is calculated from the biometric features. The biometric value is anonymized to an identifier associated with the subject. The identifier is integrated with event data associated with a security system. In an embodiment, the security device is a Personal Identification Number (PIN) pad integrated into a transaction terminal, the security data is fingerprint data, which is read from a finger of the subject placed on a fingerprint reader integrated into the PIN pad, and the biometric value is a PIN calculated from fingerprint data during a transaction at the transaction terminal. In an embodiment, the security device is a security camera, the security data is a secure video stream, and the biometric features are facial features of the subject in the secure video stream.

Secure credit card with near field communications
11263619 · 2022-03-01 · ·

A near field communication device included in a secure transaction card provides an addition and/or transitional communication link for communicating secure transaction information. The near field communication device may be selectively engaged or disengaged and, when engaged, either active or passive modes of operation of the near field communication device can be selected. in the active mode, secure transaction information is transmitted upon establishment of a communication link with a complementary near field communication device. In the passive mode, secure transaction information is transmitted upon interrogation from a complementary near field communication device. Secure transaction information is generated and stored for transmission in a memory and at least a portion of the memory is erased or nulled upon transmission or upon expiration of a selected period of time.

MULTI-PROTOCOL SMART CARD PROGRAMMING
20170330404 · 2017-11-16 ·

A method and system for programming a smart card using multiple programming protocols in a single card programming station. The card can include at least two programmable chips, with each chip being programmed using a different programming protocol. Alternatively, the card can include a single programmable chip, and the chip is programmed using at least two programming protocols. The card can also include at least two programmable chips, with each chip being programmed using at least two programming protocols.

Cards and devices with magnetic emulators with zoning control and advanced interiors

A payment card (e.g., credit and/or debit card) is provided with a magnetic emulator operable to act as a magnetic stripe read-head detector and a data transmitter. A multiple layer flexible PCB may be fabricated to include multiple magnetic emulators. An emulator may include a coil that includes magnetic, ferromagnetic, or ferromagnetic, material in the coil's interior. Coils may be associated with zones. As a read-head is detected to move from zone-to-zone, coils may be activated to transmit information in those zones.

Transaction terminal device, information processing device and information processing method

A transaction terminal device includes an orientation detecting unit that detects the orientation of an information processing device with respect to the orientation of gravity, and an information processing unit that displays a work screen of work categories on a display unit based on display attributes for changing of the orientation of the information processing device configured for each of the work categories. When the display attributes are permitted for rotating the work screen based on the changing of the orientation of the information processing device, the information processing unit displays the respective elements constituting the work screen in the position/orientation based on the detected result by the orientation detecting unit. When the display attributes are prohibited from rotating the work screen, the information processing unit displays the respective elements constituting the work screen in the fixed position/orientation independent from the detected result by the orientation detecting unit.