G07F7/12

Delivery of information services to personal devices

A transaction processing system for sending user information data to a personal device, and an associated method are provided. The system comprises: a personal device, such as a balance display card; an interface device, such as a card reader for transmitting data to and from the card; a communications network connecting to the interface device; an issuer processor connected to the communications network; and a trusted network processor (TNP) processor connected to the communications network, interposed between the interface device and the issuer processor. The TNP processor is arranged to receive a transaction request message from a card user and to transmit a response message back to the personal device, the response message typically being a transaction authorization together with information for display on the card. The TNP processor is arranged to identify, dependent on properties of the transaction request message, whether the associated response message will require data to be sent to the user information device, and if so identified, to: route the transaction request message to the issuer processor using a standard message; receive the required data from the issuer processor using another standard message; match the received required data to the original request; generate an appropriate response message and script containing the required data; and transmit the response message back to the personal device thereby making the required information known to the user.

Secure electronic cash-less payment systems and methods
09727850 · 2017-08-08 · ·

Systems and methods to provide and maintain secure financial transaction conducted with a credit card or other cashless payment mechanism at a vending machine or other potentially unattended vending or point of sale device. Encapsulated card readers providing end-to-end encryption capabilities encrypt transaction data for secure transmission to a transaction host or server. Pre-authorization transaction data checking maintains account numbers in a secure encrypted format further enhancing security. Protection mechanisms that guard against, and provide warnings of equipment tampering, while also providing a visual indication to customers regarding the security of the system.

Displaying payment card account information
09760873 · 2017-09-12 · ·

A payment card information system according to one embodiment of the invention includes a card reader that scans a payment card and a display device that displays account information items. The payment card information system further includes an information terminal in communication with the card reader and the display device. The information terminal is configured to receive verification data from the card reader, verify the payment card using the verification data, receive an action code from the card reader, obtain one or more predetermined account information items corresponding to the action code, and display the one or more predetermined account information items on the display device.

SECURE, LOW-COST, PRIVACY-PRESERVING BIOMETRIC CARD
20220237623 · 2022-07-28 ·

One example method includes generating a biometric of a user, requesting, and receiving, biometric data from a card, comparing the biometric data with the biometric, and when the biometric data matches data of the biometric, authorizing a transaction requested by a user using the card. The request for biometric data may identify what particular type of biometric data is compatible with the device making the request, and the biometric data may be a subset of the data that makes up the biometric.

Method of controlling an electronic device and corresponding electronic device

Method of controlling an electronic device and corresponding electronic device. The method may be performed by an electronic device (20) and includes steps such as receiving an instruction command (CMD) that includes identifiers (ID) of instructions (IS) that are prerecorded in a memory (30) of the electronic device; using the identifiers to form a code (RC) defining a set of instructions, where the set of instructions combines prerecorded instructions (IS) to execute a security check; and storing the code (RC) in a memory (28) of the electronic device in order to configure the electronic device (20) to execute the security check.

Transaction token that exhibits indication-related detectable changes on the transaction token
11200475 · 2021-12-14 · ·

In certain embodiments, indication-related detectable changes on a transaction token may be facilitated. In some embodiments, a transaction card may determine a state of the transaction card (e.g., during an interaction with a transaction terminal). The transaction card may generate a signal related to a color based on the state of the transaction card and cause the signal to be transmitted to a change element of the transaction card. The change element may be configured such that the change element causes one or more edges or other portions of the transaction card to be (i) a first color in response to the signal being a first signal and (ii) a second color in response to the signal being a second signal. As an example, the portions of the transaction card may turn red when the signal is a first voltage and green when the signal is a second voltage.

Method and system for offline blockchain exchanges

A method for conducting an offline data exchange associated with a blockchain includes: storing a structured data set associated with a blockchain network, the data set including a network identifier, unspent output hash, output index, output value, and key pair; receiving the network identifier and a transaction amount from a point of sale; validating the structured data set as including the network identifier and an output value greater than or equal to the transaction amount; transmitting the unspent output hash and output index to the point of sale; receiving a destination address from the point of sale; generating transaction data including the destination address and a payment amount based on the transaction amount; and transmitting the transaction data to the point of sale.

VERIFIABLE ACCESS CREDENTIAL

The invention allows using a commodity hardware (e.g. a smartphone, a tablet, a computer . . . ) to automatically establish a high level of assurance authentication and identification of any government-issued identity document of a user (e.g. identity card, driving license, passport . . . ) and link that to digital identity counterpart. Moreover, the invention allows personalizing a material-based security feature provided of said government-issued identity document to create a link between the identity document and its data content that can be read by such a commodity hardware and serves as reliable credential for accessing a service once the material-based security feature has been authenticated via the commodity hardware and a signature of the identity data of the user has been authenticated by a server of an authority.

Method and device for end-user verification of an electronic transaction

The present invention provides methods and apparatuses for verifying that a transaction is legitimate. The methods and apparatuses use protected memory space, such as kernel space of an operating system, or a separate memory space, such as is available on a SIM card of a cellular phone. The method of the invention proceeds by creating a transaction identification string (TID) and associating the TID with a transaction. The TID contains data relevant to or associated with the transaction and is typically readable by an end-user. The transaction is then interrupted until a user responds in the affirmative to allow completion of the transaction. Methods and devices used in the invention are particularly well suited to M-commerce, where transactions originating from a device are typically recognized by a merchant as coming from the owner of the device without further authentication.

LINE-BASED CHIP CARD TAMPER DETECTION

A transaction device can implement a monitoring system to detect for tamper attempts at a chip card interface. The monitoring system can establish a baseline when no chip card is present in the chip card interface, or in some embodiments, when it is known that an authentic chip card is present in the slot. During subsequent evaluations of the chip card interface by the monitoring system, a response received by the monitoring system that deviates from the baseline can indicate that a tamper attempt at the chip card interface may have occurred. If a tamper attempt is determined by the monitoring system, a remedial or corrective action can be taken.