G06Q20/343

Techniques to control applets for contactless cards

Various embodiments are generally directed to techniques provide and control applets for transaction cards. More specifically, embodiments discussed here include permitting or denying applets of transaction cards based on whether they are enabled or disabled. Embodiments may also include enabling and disable applets for transaction cards.

Parking Meter Device
20210183167 · 2021-06-17 · ·

The invention provides a compact, coinless, ticketless parking meter device which includes a timer means; a payment facilitating arrangement operable in cooperation with a non-cash payment instrument for effecting payment of a monetary amount for a parking period; a display means for displaying a balance remaining of the parking period; and a power supply unit for supplying power to the timer means, the payment facilitating arrangement and the display means.

Bonus accumulation system, bonus accumulation method, and IoD-NFC terminal device therefor
11023916 · 2021-06-01 ·

The present invention provides a bonus accumulation system comprising: a payment terminal device which is installed in a business branch and transmits/receives, to/from a payment approval company, a commercial transaction approval request and commercial transaction approval confirmation; a near field communication (NFC) terminal device having an NFC function, which directly receives final payment approval data from the payment terminal device, using a serial communication module of the payment terminal device, and calculates bonus data; and a user terminal device for receiving the calculated bonus data from the NFC terminal device through NFC, and sending a request for an approval of the received bonus data to a bonus server and receiving the approval through a mobile communication network.

METHOD, DEVICE AND SYSTEM FOR VERIFYING VIRTUAL CODE BASED ON SPHERE
20210157931 · 2021-05-27 · ·

Provided is a method and system for verifying a virtual code based on a sphere. A method for verifying a virtual code based on a sphere includes: a virtual code reception operation of receiving, by a virtual code verifying means, a virtual code from a virtual code generating means, wherein the virtual code includes a fixed code and a plurality of detailed codes; a storage location search algorithm selection operation of determining, by the virtual code verifying means, a group, to which the virtual code generating means belongs, through the fixed code and selecting a storage location search algorithm for the group; a detailed code extraction operation of extracting, by the virtual code verifying means, the plurality of detailed codes included in the virtual code.

Information processing system and method, and information processing device and method
10977457 · 2021-04-13 · ·

The present technology relates to information processing system and method, and information processing device and method for realizing a system capable of increasing efficiency while reducing load concentration. Each of the information processing system and method and the information processing device and method according to an aspect of the present technology belongs to one or more center servers. One or more gate controllers different from each other are allocated. Acquired is user data that relates to data about a user corresponding to identification data, and is supplied on the basis of prediction data corresponding to the identification data. Acquired is the identification data that is read from a storage device storing the identification data, and is supplied from the gate controller allocated to the corresponding system, method or device. The acquired user data that corresponds to the acquired identification data is processed. For example, the present technology is applicable to an information processing device or an information processing system.

SYSTEMS AND METHODS FOR CRYPTOGRAPHIC AUTHENTICATION OF CONTACTLESS CARDS

Example embodiments of systems and methods for data transmission between a contactless card and a client device in support of a FIDO authentication are provided. In an embodiment, upon receipt of a challenge issued by a server in connection with a pending transaction, the contactless card may authorize the client device to utilize a FIDO private key to respond to the challenge. If the response to the challenge is successful, the FIDO authentication may proceed and the transaction may be completed.

Authenticating a payment card

An approach is provided for authenticating a payment card. Information is read from the payment card being used for a purchase. The information includes an identifier and data on a chip, in braille cells, and in markings in the payment card. A hash read from the chip, the identifier, and security codes derived from the braille cells and the markings are sent to a payment system. A hash of an (n+1)-th block of a blockchain is received and recorded in the chip in response to validations of the hash as matching a hash of an n-th block of the blockchain, the identifier, and the first and second security codes, and a generation of the hash of the (n+1)-th block. Data about the purchase and the hash of the (n+1)-th block are sent to the payment system.

Computer-based systems and methods involving biometric authentication aspects for handling exceptions, enabling deactivation and/or performing other functionality
10977538 · 2021-04-13 · ·

Systems and methods involving biometric authentication of transaction cards including aspects of exception handling, deactivation and other features are disclosed. In one embodiment, an exemplary computer-implemented method may comprise generating a first user interface having one or more interactive UI elements that enable a card owner to manage a plurality of features associated with a transaction card, and determining, if a biometric-activated control is enabled and the vendor is not excluded from the biometric-activated control, whether the transaction card is biometrically-active. Further, the interactive UI elements may include elements such as a first UI element that is configured to allow the card owner to enable a biometric-activated control of the transaction card, and/or a second UI element that is configured to allow the card owner to exclude one or more vendors from the biometric-activated control.

STORED-VALUE CARD MANAGEMENT METHOD AND SYSTEM
20210073789 · 2021-03-11 ·

A computerized system for activating, issuing and otherwise managing transactions and activities pertaining to stored-value cards over a communications network. A central information database is provided for storing stored-value cardholder and card purchaser information received directly from respective stored-value cardholders and card purchasers PCs through a universal central processor via respective communication gateways. The central processor is coupled for communication realtime to multiple unaffiliated stored-value card processing networks normally operated by respective hosts. Each network includes a stored-value card processor coupled to a stored-value card database and multiple respective merchant communication devices. The central processor is programmed for managing the activation and issuance of transactions and activities for the stored-value card through the respective unaffiliated networks. The universal central processor is programmed to issue the stored-value cards directly to the cardholder or card purchaser by download over respective communication gateways. The universal central processor is further programmed for reporting the card activations, issuances, transactions and activities to the cardholders and the merchants thereby providing a universal management system.

Method for monitoring usage patterns and electronic device capable of implementing such a method
10943230 · 2021-03-09 · ·

The invention relates to a method for controlling a transaction carried out between an electronic device comprising a secure memory and an external terminal by monitoring usage patterns of the electronic device, wherein a first and a second item of usage information are read when the transaction is carried out; a first list of data pairs is recorded on the secure memory, each of said pairs comprising the first and second (IU2) items of usage information; a second list of counters is recorded on the secure memory; an indicator for monitoring usage patterns of the electronic device is calculated on the basis of the first item of usage information, the second item of usage information, and/or a counter from the second list.