G06Q20/354

SECURITY FOR CONNECTED DEVICES

A method includes: receiving, by a computer device and from an automated teller machine, a personal identification number that is associated with an account; determining, by the computer device, that the personal identification number is a disablement personal identification number that is associated with the account, the account having an activation personal identification number, the disablement personal identification number and the activation personal identification number being different; determining, by the computer device and as a result of receiving the disablement personal identification number, at least one disablement action to be performed by a device other than the automated teller machine; and transmitting, by the computer device, a command to perform the disablement action.

STACKABLE INTEGRATED CIRCUIT CARDS
20230062108 · 2023-03-02 ·

Systems and methods allow for the integrated circuit cards (ICCs) to removably couple to each other and transmit information to an access device as a single device. One among the two or more ICCs coupled together may read data from the remaining ICCs and provide the data to an access device via contactless communication. The ICC may include a substrate; an integrated circuit embedded in the substrate; input ports exposed on a first surface of the substrate, and output ports exposed on a second surface of the substrate. The input ports and the output ports are electrically coupled to the integrated circuit. The output ports are configured to be removably coupled to the input ports of a second ICC.

USING QUICK RESPONSE CODE TO EXTEND ACCESS TO AN ACCOUNT

Systems as described herein may use computer-readable code to extend access to an account. A delegation server may receive a predetermined limit and an activity period associated with an account from a first user who is an account holder. A virtual number may be generated with a reference to the account. The delegation server may encrypt the virtual number and generate a computer-readable code based on the virtual number. The computer-readable may be provided to a digital wallet of a second user to delegate the second user to have temporary access to the underlying account. The second user may then use the temporary access to the underlying account to make one or more purchases in accordance with the restrictions put in place by the accountholder.

Card registry systems and methods

A card registry system is configured to automatically identify financial card information in one or more credit files associated with a consumer and populate a card registry account of the consumer with the identified financial card information. Once the financial card information has been obtained from the credit file(s), the card registry system may transmit cancellation and/or reissuance requests to the respective card issuers in the instance that one or more cards are compromised, so that the financial cards may be easily and efficiently cancelled and/or reissued at the request of the consumer.

Multi-Purpose Physical Smartcard
20220327518 · 2022-10-13 ·

A multi-purpose smartcard is disclosed. a computer-implemented method of controlling a smartcard. The smartcard can include a near-field communication (NFC) system. The NFC system can be configured to communicate with remote computing systems. The smartcard can include one or more computing chips embedded in the smartcard. The smartcard receives, from a provisioning computing system accessible to a user, a transaction type indicator and transaction data, the transaction type indicator indicating a particular transaction type from a plurality of potential transaction types. The smartcard stores, in the one or more computer-readable media of the one or more computing chips, the transaction data. The smartcard communicates, using the NFC communication system and in accordance with the transaction type, the transaction data to an authentication computing system.

System, Method, and Computer Program Product for Transaction Based Activation
20230068700 · 2023-03-02 ·

A system, method, and computer program product are provided for card activation. The method includes registering, during an enrollment process, an account for a user by associating the user with a communication channel outside of an electronic payment processing network; associating the user with an inactivated account identifier; receiving, via the electronic payment processing network, a transaction request message corresponding to a transaction initiated at a merchant system by the user with a payment device issued with the inactivated account identifier; in response to receiving the transaction request message, communicating a credential to the user; receiving the credential; authenticating the user based on comparing the credential received via the electronic payment processing network to the credential communicated to the user via the communication channel; in response to authenticating the user, activating the account identifier; and processing the transaction with the activated account identifier after the account identifier has been activated.

Using the NFC field from a phone to power card to phone bluetooth communications

A contactless card with power harvesting unit is described. The power harvesting unit is configured to harvest power from near field communication radio wave fields and supply power to a memory, processor, and communication circuit of the contactless card. In some embodiments, the contactless card may also include a capacitor for smoothing out power deliver or a rechargeable battery. The contactless card is configured to establish two-way communication with a secondary device and to store and execute applets. In some embodiments, the contactless card is a payment card which contains information associated with a primary profile and a secondary profile. The secondary profile may be activated using two-way communication if the primary profile is deactivated due to fraudulent activity.

Transaction token that stores and presents location-specific token identifiers

In certain embodiments, location-based activation of card identifiers may be facilitated. In some embodiments, an electrophoretic display card may store a set of location-specific card identifiers, where each card identifier of the set is associated with (i) an account of a user and (ii) creation location information indicating a device location of the user at a creation time of the card identifier. In response to being powered by a user device, the card may initiate wireless communication with the user device. The card may determine a device location of the user device, select a card identifier from the set of card identifiers that matches the device location, and switch a state of the card identifier to an active state to enable transaction processing for the card identifier. In some embodiments, the card may cause the active card identifier to be presented on an electrophoretic display of the card.

Apparatus and method for emulating transactional infrastructure with a digital transaction processing unit (DTPU)
11657384 · 2023-05-23 · ·

Digital transaction apparatus including a Data Assistance Device (DAD), including a user interface that is operable to at least select data, and a DAD transmitter, a Digital Transaction Card (DTC), including a Digital Transaction Processing Unit (DTPU), and a DTC receiver, wherein the DAD and DTC are operable to transfer data from the DAD to the DTC and when subsequently using the DTC to effect a digital transaction, the DTC operates in accordance with data selected and transferred from the DAD to the DTC, wherein the DTPU is configured to enable data communication with a digital transaction device during a digital transaction, the DTPU operable to receive and execute one or more commands that emulate commands received from the digital transaction device.

Expandable memory for use with solid state systems and devices

The present disclosure describes technologies and techniques for use by a data storage controller—such as a controller for use with a NAND or other non-volatile memory (NVM)—to provide a user-expandable memory space. In examples described herein, a customer may choose to purchase access to only a portion of the total available memory space of a consumer device, such as a smartphone. Later, the customer may expand the user-accessible memory space. In one example, the customer submits suitable payment via a communication network to a centralized authorization server, which returns an unlock key. Components within the data storage controller of the consumer device then use the key to unlock additional memory space within the device. In this manner, if the initial amount of memory the consumer paid for becomes full, the consumer may conveniently expand the amount of user-accessible memory.