Patent classifications
G07F7/0833
LENS DEPICTION PROFILE TECHNOLOGY
A smart card with secure and efficient image capture and analysis is provided. The card may include a non-transitory memory embedded in the housing storing computer-executable instructions. The instructions, when run on the microprocessor, are configured to capture, via the camera, an image of a building (or other suitable image), process the image via an image processing module, determine, based at least in part on the processing of the image, a payment amount and a payment recipient associated with the building. The smart card may also display payment information on the display screen. The payment information may include the payment amount and/or the payment recipient. When authorization is received via a tactile sensor, the card may execute a payment or other communication, over a payment gateway from an account associated with a user of the platform to an account associated with the payment recipient.
IC card with fingerprint recognition function and working method thereof
A working method for an IC card having a fingerprint recognition function, comprising: an IC card receiving and determining an instruction type from a terminal, and when determined that the received instruction is an application selection instruction, the IC card selecting an application and returning a response to the terminal; when determined that the received instruction is a processing option acquisition instruction, the IC card acquiring a user fingerprint information verification state according to the content of the instruction, and if verification is successful, returning to the terminal a processing option instruction response containing an application file locator list for which a personal identification number does not need to be verified; if verification fails, returning to the terminal a processing option instruction response containing an application file locator list for which a personal identification number must be verified; when determined that the received instruction is a record reading instruction, the IC card returning a record reading response to the terminal according to the record reading instruction, wherein the record reading response contains a method for verifying a card holder. Thus, the risk of a personal identification number being leaked is avoided, thus enhancing the security of a transaction, while also improving user experience.
On card display of data from secured chip
A retrofitted credit card including a certified smart card chip, a display and retrofitted emulation circuitry operative to enable the certified smart card chip to communicate information to the display notwithstanding that the certified smart card chip is configured for communication only with an external read/write device.
Tap card to securely generate card data to copy to clipboard
A processor of a computing device may receive, from a contactless card, a uniform resource locator (URL) and a cryptogram. An operating system (OS) executing on the processor may open an application based on the URL. The application may transmit the cryptogram to an authentication server. The application may receive, based on the server verifying the cryptogram, an account number. The application may store the account number in a memory of the device.
USER DEVICE ENABLING ACCESS TO PAYMENT INFORMATION IN RESPONSE TO MECHANICAL INPUT DETECTION
In certain embodiments, an electronic device can include a secure element that detects a mechanical input. The mechanical input can correspond to an instruction to transmit securely stored payment information to another device and/or to release such information to an application on the device (e.g., for use in an in-app commerce transaction). This feature can inhibit or prevent unauthorized transmission of payment information. When the mechanical input is detected, payment information can be transmitted to a point of sale (POS) terminal (e.g., via near-field communication) or released to an app on the device. Further, a user can either use default payment information or interact with the device (before or after providing the mechanical input) to select appropriate payment information for a transaction. For example, the user can select between credit cards, debit cards and/or stored-value cards (e.g., transit card).
BIOMETRIC AUTHORISED SMARTCARD AND METHOD FOR CONTROLLING A BIOMETRIC AUTHORISED SMARTCARD
A biometric authorised smartcard 102 comprises: a biometric sensor 130; a control system 114, 128 for controlling operation of the smartcard 102; and a graphical user interface 18 for displaying alphanumeric information to a user of the smartcard 102. The smartcard 102 has one or more protected feature(s) that are accessible to a user identified via the biometric sensor 130 and the graphical user interface 18 displays information in response to interaction of the user with the biometric sensor 130. The information can be used to guide enrolment of a user via the biometric sensor 130 and/or to aid the interaction of the user with the biometric sensor 130 during biometric authorisation after enrolment.
PERSONAL CONTACTLESS-TIP-REGISTERING DEVICE
A personal contactless-tip-registering device 10 for registering a contactless tip via a contactless-payment device. The device includes a body 12, a user fastener 15, an on-board power source 20, an electronic wireless reader 22, a processor 24, a data storage device 26, a wireless transmitter 28, and an indicator 14 on the body 12. The data storage device 26 includes pre-set and non-adjustable tip data which specifies a pre-set and non-adjustable tip amount, and the indicator 14 indicates the pre-set tip amount
METHOD AND SYSTEM FOR PROVIDING FINANCIAL TRANSACTION USING EMPTY CARD
A method and a system for providing a financial transaction using an empty card are provided. The method for providing a financial transaction using an empty card includes receiving, by a server, a virtual card number generated by a program included in a user terminal, searching, by the server, for an empty card storage location at which the empty card is registered, in a storage location search algorithm based on the virtual card number, searching, by the server, for a real card number storage space linked to a user identification (UID) assigned to the found empty card storage location, extracting, by the server, a real card number stored in the real card number storage space, and performing, by the server, a financial transaction progress or a financial transaction progress request with the extracted real card number.
UTILIZING A TRANSACTION CARD TO PROVIDE SECONDARY AUTHENTICATION FOR ACCESSING A SECURE APPLICATION WITH A USER DEVICE
A transaction card includes a near-field communication (NFC) component, a security component, a wireless component, one or more memories, and one or more processors communicatively coupled to the one or more memories. The device receives a signal from a user device attempting to access a secure application, and energizes the NFC component based on the signal received from the user device. The device causes the security component to generate an encrypted code based on the NFC component being energized, and provides, via the security component, the encrypted code to the wireless component. The device provides, via the wireless component, the encrypted code to the user device to permit the user device to utilize the encrypted code as authentication for accessing the secure application.
Tapping a contactless card to a computing device to provision a virtual number
Systems, methods, articles of manufacture, and computer-readable media for tapping a contactless card to a computing device to provision a virtual number. At least one parameter for authorizing a virtual account number for a subaccount associated with a primary account may be received. An application executing on a processor circuit may receive authentication credentials for the primary account. A card reader may receive encrypted data from a communications interface of a contactless card. The application may transmit the encrypted data to an authentication server. The application may receive verification of the encrypted data from the authentication server. The application may provide the at least one parameter for authorizing the virtual account number and receive a virtual account number for the subaccount generated by a virtual card number server, the virtual account number restricted to a spending limit based on the amount parameter associated with the virtual account number.