Patent classifications
G06Q20/357
Tamper-evident verification of an article of manufacture
An instance of a physical product includes a verification code and a unique identifier disposed thereupon by which authenticity or condition of the instance may be determined. The combination may be uniquely associated with the instance and stored, by the issuer or manufacturer for each authentic instance, locally or within a decentralized computing system having an immutable data store. The verification code may be concealed by a tamper-evident component such that access of the verification code is evident upon visual inspection. Verification may require revealing of the verification code with tamper-evidence and submission of a request including the verification code and the unique identifier (or representation thereof) to receive a verification result. Each request to verify an instance may be recorded and returned with a next request for verification of the same instance of the product to indicate whether another entity has already performed a verification.
GENERATING BARCODES UTILIZING CRYPTOGRAPHIC TECHNIQUES
Various embodiments are generally directed to secure generation of barcodes using cryptographic techniques. A processor of a contactless card may generate a cryptogram based on a cryptographic algorithm and a diversified key stored in a memory of the contactless card. The processor may receive an encrypted authorization token based on verification of the cryptogram by a server. The processor may generate a barcode utilizing the encrypted authorization token.
GENERATING BARCODES UTILIZING CRYPTOGRAPHIC TECHNIQUES
Various embodiments are generally directed to secure generation of barcodes using cryptographic techniques. An application may receive a request to generate a barcode. The application may receive encrypted data from a communications interface of a contactless card associated with an account. The application may receive, from a server, verification of the encrypted data and an encrypted authorization token associated with the account. The application may generate the barcode utilizing the encrypted authorization token.
TOKEN MANAGEMENT AND HANDLING SYSTEM
Systems and methods for handling tokens. In one aspect, a token is intercepted by a data processor and a contact is made with a detokenization provider by the data processor. In another aspect, token service is aggregated. In another aspect, tokenization is extended to physical cards, to deter certain kinds of fraud.
Systems and methods for electronic presentation of financial instrument offers
Methods and systems described in this disclosure generally relate to presentation of electronic offers that are viewable on financial instruments (e.g., credit cards and debit cards) by users. More specifically, various embodiments of the present disclosure relate to methods and systems for embedding information pertaining to the electronic offers on a financial instrument of a user. The information can be displayed on a screen or using flashing lights included inside or on the surface of the financial instrument. These offers can be provided by merchants or by banks and financial institutions associated with the financial instrument. In some embodiments, the financial instrument communicates with a mobile application running on a user's mobile device via wireless communication methods to receive offer-related information provided by the mobile application.
Physical, tamper-evident cryptocurrency card
A physical currency card (in some cases without any on-board source of power or computing capabilities) is configured to maintain access information for digital bearer assets. Public access information, like a cryptographic hash address operable to receive digital bearer assets or a public key operable to derive a cryptographic hash address operable to receive digital bearer access, may be visible upon inspection of the card such digital bearer assets may be transferred to the card in one or more transactions on a decentralized computing platform, like a blockchain-based decentralized computing platform. Private access information, like a secret, private key that corresponds to the public key (e.g., a public-private key-pair) or a representation of the private key (like a ciphertext thereof) and corresponding encryption key, is physically concealed with tamper-evident components such that a user can readily determine whether the private access information was divulged.
Computer-based systems and methods involving biometric authentication aspects for handling exceptions, enabling deactivation and/or performing other functionality
Systems and methods involving biometric authentication of transaction cards including aspects of exception handling, deactivation and other features are disclosed. In one embodiment, an exemplary computer-implemented method may comprise generating a first user interface having one or more interactive UI elements that enable a card owner to manage a plurality of features associated with a transaction card, and determining, if a biometric-activated control is enabled and the vendor is not excluded from the biometric-activated control, whether the transaction card is biometrically-active. Further, the interactive UI elements may include elements such as a first UI element that is configured to allow the card owner to enable a biometric-activated control of the transaction card, and/or a second UI element that is configured to allow the card owner to exclude one or more vendors from the biometric-activated control.
SELF-AUTHENTICATING CHIPS
A self-authenticating chip includes first and second memory regions storing, respectively, first and second authentication codes. The second memory region is adapted to be unreadable and unmodifiable by the chip or a chip reader. The chip also includes a comparator for providing an indicator of whether given input matches the second authentication code. The chip also includes an authentication circuit that is operable to read the first authentication code from the first memory region, present the first authentication code to the comparator, and in response to receiving an indicator from the comparator indicating that the first and second authentication codes match, unlock at least one of (i) a communication interface of the chip to allow data to be transmitted therethrough to a chip reader and (ii) a third memory region of the chip to allow data to be read therefrom.
Systems and methods for processing electronic transactions based on consumer characteristics
Methods are disclosed for processing electronic transactions between a merchant and a consumer based on physical geography. A method includes receiving payment data associated with a consumer payment card; transmitting the payment data, over a network, to a third party; receiving, over the network, information for determining whether a geofence associated with the merchant matches a geofence associated with the consumer; and processing a transaction with the consumer based on whether the consumer geofence ID matches a geofence ID associated with the merchant. Systems for processing electronic transactions between a merchant and a consumer based on physical geography are also disclosed.
Color changing payment card
A method includes receiving, on an electronic payment device, a radio frequency signal from a mobile electronic device. The radio frequency signal is used to control an activation of an electric current to one or more color producing components on the electronic payment device. The electric current is transmitted to the one or more color producing components. The one or more color producing components display a color when the electric current is transmitted to the color producing components.