Patent classifications
G07F7/0893
Terminal transaction method, and terminal
In this application, a terminal transaction method and a terminal are provided and used to resolve a problem existing in the prior art that an NFC application does not match a type of a POS, and there is relatively poor user experience. The method includes: establishing, by a terminal, a near field communication NFC radio frequency connection to a point of sale POS, and starting up a first transaction; and selecting, by the terminal, a first NFC application corresponding to the POS, and performing the first transaction when a use condition of the first NFC application is already satisfied.
Data-securing chip card construction
A card may store data on integrated circuits housed within the card. The card includes two short-range antennas and one long-range antenna that are configured to transmit the data. Antennas of the card may be configured to transmit the data in different directions as a result of a signal-blocking layer embedded within the card that isolates respective antennas from electromagnetic signals originating from a direction on the opposing side of the blocking layer. The long-range antenna may be configured to transmit identification data of the user, while the short-range antennas may be configured to transmit financial data related to the user. A system may be configured to instantiate events for the user of the card with the long-range antenna. Events that are instantiated by the long-range antenna may then be executed using the short-range antennas.
Using a contactless card to securely share personal data stored in a blockchain
Systems, methods, and articles of manufacture to securely share data stored in a blockchain. A contactless card may receive a request to provide a data element from a device. An applet of the contactless card may encrypt the data element and a wallet address. The applet may generate a signature for the request, and transmit, to a mobile device, the signature and the encrypted data. The mobile device may transmit, to a verification service, the signature and encrypted data. The verification service may verify the signature based on a public key. A node in a blockchain may generate a block in the blockchain, the block comprising indications of the verification of the signature, the requested data element, and the wallet address. An encrypted data element corresponding to the data element may be decrypted using a public key. The device may receive the decrypted data element from the wallet address.
Contextual tapping engine
Various embodiments for contextual tapping engines. For example, an application executing on a computing device may authenticate credentials associated with an account and detect a tap of a contactless card to the computing device. The application may receive, from a communications interface of the contactless card, action data used to determine an action associated with the tap of the contactless card to the computing device. The application may determine a context of the application based on a current output of the application. The application may determine, based on the action data, the determined context, and data associated with the account, a first action associated with the tap of the contactless card to the computing device, the first action associated with at least one of the application and an operating system (OS). The application may initiate performance of the first action based on the tap of the contactless card.
Electronically actuated coin slider device
An electronically actuated coin slider provides an appearance and operation similar to a conventional coin-activated slider without the use of coins. A card reader activates the coin slider and allows a user to push the slide bar to actuate a game, machine, or device in a manner similar to that of a convention slider. A servo motor engages or disengages latching hooks to prevent or allow operation of the slide bar.
CARD READER
A card reader includes a camera mounted on card reader housing and a card input tray supported by the card reader housing. The card input tray provides automated alignment of a card by being at an inclined angle sufficiently steep so that when the card is placed into a front of the card input tray, the card will tend to slide to a back of the card input tray and rest against a back wall of the card input tray, the back wall aligning the card to minimize document skew when scanning. Diffused light is used to illuminate the card when the card is within the card input tray.
Displaceable reader circuitry
Aspects of the technology provide a multi-purpose card reader configured for use with a mobile electronic device (e.g., a mobile host), such as a smart phone or tablet computer. In certain aspects, the card reader is integrated into a case for enclosing the mobile electronic device and configured for reading financial information from a payment card to facilitate a financial transaction between a buyer and a merchant. To facilitate operability of the card reader, the case can include multiple card slots, such as a swipe-slot (e.g., for receiving a magnetic stripe payment card), and a dip-slot (e.g., for use in receiving an IC type payment card).
SECURE COVER WITH TAMPER RESISTANT LANDING AREA
Various aspects of the disclosure generally relate to security for a credit card processing reader. Part of security for a reader is a secure cover having a trace mesh to discourage drilling through the cover. The mesh may be connected to one or more landing areas on the cover. The landing area has electrical pads with trace routing that provides tamper protection for the landing area.
DETECTING UNAUTHORIZED DEVICES
A payment reader and a POS terminal may communicate over a wireless connection. The methods and systems include monitoring one or more parameters corresponding to a payment reader and another device in proximity to the payment reader. The first device, through a set of customized instructions, determines whether behavior of the second device substantially corresponds to the first device, in order to detect suspected hardware or software intrusion associated with the secure first device. On successful detection of a suspected intrusion, the first device generates an alert for a user of the first device if illegal intrusion is suspected by the processor.
System and methods to prevent unauthorized usage of card readers
A contactless card reader comprises a contactless card reader front-end coupled to a processor. A communications module is coupled to the processor and a set of sensors is coupled to the processor. The set of sensors determines parameters related to the location, orientation and motion of the card reader. The processor receives the parameters from the set of sensors and utilizes the parameters and scenario configuration data to evaluate a rule. The result of the evaluation of the rule results in a limitation on the operation of the card reader. The communications module is configured to intermittently receive the scenario configuration data from external sources.