G07F7/088

METHOD AND SYSTEM FOR TARGETING NFC SENSORS
20220188797 · 2022-06-16 ·

A computer system having a processor; at least one sensor for detecting and determining a location of a short-range communications attempt between a computing device and a short-range communications target; and a plurality of initiators for completing short-range communications attempts, wherein the processor is configured to enable one of the initiators to allow the computing device to complete the short-range communication transaction based on the determined location of the short-range communications attempt.

SKIMMER DETECTION WAND
20220180712 · 2022-06-09 ·

Embodiments provide a skimming detection device including a one or more sensors configured to detect characteristics that may be used to detect the presence of a skimming device. Sensor data generated by the sensor(s) may be compared to reference sensor data to detect the presence of a skimming device. An output that indicates whether a skimming device is not present, likely present (e.g., the consumer or user should assume the scanned device contains a skimmer or has otherwise been compromised), or confirmed to be present may be generated and presented to a user. Such capabilities may enable user to quickly scan a device (e.g., an ATM, a fuel pump, etc.) to determine whether a skimming device is present and take action to mitigate the use of any detected skimming devices.

O

Securing transaction messages based on a dynamic key selection

Systems and methods for securing transaction messages are described. In an example, a rule set may be accessed. The rule set may specify a selection of a key from a plurality of keys or an obfuscation process from a plurality of obfuscation processes. The selection may be based on a condition associated with securing transaction messages. The keys or the obfuscation processes may be stored at a card reader. An instruction about the selection may be provided to the card reader based on the rule set and a determination that the condition is satisfied. In turn, a secure transaction message may be received from the card reader. The secure transaction message may have been secured based on the key or the obfuscation process. The secure transaction message may be provided to a transaction system that includes a management system associated with the key or the obfuscation process.

METHOD AND APPARATUS FOR DISPLAYING IDENTIFICATION CODE OF APPLICATION
20220172193 · 2022-06-02 · ·

Embodiments of the present application provide a method and an apparatus for displaying an identification code of an application. The method includes: acquiring an identification code in a target application in a system user interface (UI), where the identification code is generated by the target application according to user information in the target application; and displaying the identification code in an icon-display region of the target application in the system UI.

CONTROLLING ACCESS TO OUTPUT DEVICE BETWEEN TWO PROCESSORS
20220164782 · 2022-05-26 ·

A point of sale (POS) device includes an output device such as a speaker, a display screen, or a network interface. The POS device also includes a secure enclosure housing a secure processor and tamper detection circuitry for detecting attempts to tamper with the secure enclosure. Use of the output device is shared between the secure processor and a main processor via a switch that is controlled by the secure processor. The secure processor can switch control of the output device from the main processor to itself and can output an output dataset via the output device in a number of scenarios. These scenarios include the secure processor detecting an attempt to tamper with the secure enclosure, the secure processor recognizing that the main processor is behaving suspiciously, or the secure processor wanting to output sensitive information. The output dataset may include visual data, audio data, or network data.

METHODS AND SYSTEMS FOR DUAL-TO-SINGLE MESSAGE CONVERSION IN ELECTRONIC TRANSACTIONS
20230267437 · 2023-08-24 ·

Systems and methods are disclosed for electronic transaction messaging conversion. One method comprises receiving an authorization request message from a point of sale (POS) device, the authorization request message comprising transaction data associated with a transaction. Upon validating the authorization request message, a provisional authorization response message may be generated and sent to the POS device. Subsequently, a capture message may be received from the POS device, requesting clearing and settlement of the transaction. The capture message may be validated and translated to a composite message that is single-message system (SMS)-compatible. The composite message may then be sent downstream for further processing.

SECURITY DEVICES, SYSTEMS, AND METHODS FOR DYNAMIC TRANSACTION CARDS
20230245115 · 2023-08-03 ·

A dynamic transaction card including: one or more light emitting elements; a transceiver; and an embedded microprocessor configured to: receive, from a transaction terminal, a location information corresponding to a current location of the transaction terminal; wirelessly transmit, via the transceiver and to a mobile device, the location information; receive an indication that a location-specific security concern exists; and in response to receiving the indication, control the one or more light emitting elements to display a visual indication corresponding to the location-specific security concern.

Device for determining a transactional device, corresponding method and computer program

A device and a method for determining a transactional device used for a transaction. More particularly, the device includes a data processor, a memory, an optical sensor, and a set of transactional interfaces. The method includes: obtaining at least one recording coming from the optical sensor), the recording being obtained when a user holds the transactional device in hand; determining at least one confidence score, the at least one confidence score being associated with at least one corresponding input of a structure of data for activating transactional interfaces present within the electronic device; and activating at least one transactional interface associated with the at least one input as a function of the at least one confidence score.

Methods and systems for dual-to-single message conversion in electronic transactions
11769130 · 2023-09-26 · ·

Systems and methods are disclosed for electronic transaction messaging conversion. One method comprises receiving an authorization request message from a point of sale (POS) device, the authorization request message comprising transaction data associated with a transaction. Upon validating the authorization request message, a provisional authorization response message may be generated and sent to the POS device. Subsequently, a capture message may be received from the POS device, requesting clearing and settlement of the transaction. The capture message may be validated and translated to a composite message that is single-message system (SMS)-compatible. The composite message may then be sent downstream for further processing.

SYSTEM FOR DISINFECTING A POINT-OF-SALE TERMINAL
20220023465 · 2022-01-27 ·

It is described herein a system for disinfecting a point-of-sale terminal. The system may comprise a housing and at least one light source. The housing may be configured to connect to a first exterior surface of the point-of-sale terminal with the at least one light source mounted within a hollow interior of the housing. The at least one light source may be configured to project light in the ultraviolet spectrum of between 100 nm and 400 nm at a first angle relative to a first plane of the point-of-sale terminal upon receiving an electrical signal from a switching mechanism. The first angle may be in the range of between 0° and 90°.