G07F7/1008

Detecting a skimmer via a vibration sensor

Disclosed herein are system, method, and apparatus for detecting a skimmer via a vibration sensor on a transaction card. The method includes receiving, at a server, from a user equipment, vibration information recorded by a transaction card in response to an execution of a transaction at a point-of-service (POS) terminal of a plurality of POS terminals using the transaction card. The vibration information may be recorded by a microphone or an accelerometer on the transaction card while the transaction card is swiped through the POS terminal or inserted into or removed from the POS terminal. The method includes determining, at the server, a state of the POS terminal based on the received vibration information and in response to a determination of the state of the POS being compromised, sending to one or more stakeholders of the transaction a warning message containing the POS terminal information including the POS terminal's state.

Systems and methods for image capture signature data storage
11640612 · 2023-05-02 · ·

A transaction card construction and computer-implemented methods for a transaction card are described. The transaction card has vector formatted visible information lasered onto its surface. In some embodiments, systems and methods are disclosed for enabling the sourcing of visible information using a scalable vector format. The systems and methods may receive a request to add a first plurality of visible information to a transaction card and capture an image of the first plurality of visible information. The systems and methods may also map the image to a bounding box and convert the mapped image into vector format. In addition, the systems and methods may provide the converted image to a laser machine.

Lens depiction profile technology
11651350 · 2023-05-16 · ·

A smart card with secure and efficient image capture and analysis is provided. The card may include a non-transitory memory embedded in the housing storing computer-executable instructions. The instructions, when run on the microprocessor, are configured to capture, via the camera, an image of a building (or other suitable image), process the image via an image processing module, determine, based at least in part on the processing of the image, a payment amount and a payment recipient associated with the building. The smart card may also display payment information on the display screen. The payment information may include the payment amount and/or the payment recipient. When authorization is received via a tactile sensor, the card may execute a payment or other communication, over a payment gateway from an account associated with a user of the platform to an account associated with the payment recipient.

CONTACTLESS CARD PERSONAL IDENTIFICATION SYSTEM

A dual-factor PIN based authentication system and method uses a cryptogram provided by a contactless card associated with the client in association with a PIN stored by the contactless card to authenticate the client. In some embodiments, cryptogram authentication may be preconditioned upon a PIN match determination by the contactless card. In other embodiments, the cryptogram may be formed at least in part using the personal identification number (PIN) stored on the contactless card encoded using a dynamic key stored by the contactless card and uniquely associated with the client. Authentication may be achieved by comparing the cryptogram formed using the PIN against an expected cryptogram generated an expected PIN and an expected dynamic key.

Cryptographic token with leak-resistant key derivation
09852572 · 2017-12-26 · ·

Methods and apparatuses for increasing the leak-resistance of cryptographic systems are disclosed. A cryptographic token maintains secret key data based on a top-level key. The token can produce updated secret key data using an update process that makes partial information that might have previously leaked to attackers about the secret key data no longer usefully describe the new updated secret key data. By repeatedly applying the update process, information leaking during cryptographic operations that is collected by attackers rapidly becomes obsolete. Thus, such a system can remain secure against attacks involving analysis of measurements of the device's power consumption, electromagnetic characteristics, or other information leaked during transactions. Transactions with a server can be secured with the token.

Speaker recognition and denial of a transaction based on matching a known voice print

One-to-many comparisons of callers' voice prints with known voice prints to identify any matches between them. When a customer communicates with a particular entity, such as a customer service center, the system makes a recording of the real-time call including both the customer's and agent's voices. The system segments the recording to extract at least a portion of the customer's voice to create a customer voice print, and it formats the segmented voice print for network transmission to a server. The server compares the customer's voice print with multiple known voice prints to determine any matches, meaning that the customer's voice print and one of the known voice prints are likely from the same person. The identification of any matches can be used for a variety of purposes, such as determining whether to authorize a transaction requested by the customer.

METHOD AND AN ASSEMBLY FOR GENERATING A MAGNETIC FIELD AND A METHOD OF MANUFACTURING AN ASSEMBLY
20170364784 · 2017-12-21 · ·

A credit card shaped element with a dynamic stripe which may be activated or deactivated, where the stripe is formed by a plurality of coils provided along the curve thereof, where the plurality of coils are activated in a sequential manner, where a plurality of proximity sensing coils are provided in series along the curve thereof, where the plurality of coils are formed by one coil contacted at multiple positions along its length by contact pads and where the signals fed to the coils cause an output of a reader coil to output a signals with a minimum slope or where one signal fed to one track has no peaks when the other signal is close to zero.

Method of accessing applications in a secure mobile environment
09843933 · 2017-12-12 · ·

A method of accessing, in a mobile communication device, an application issued by a Service Provider from a trusted application, also known as a wallet. A secure element, such as a SmartMX device, comprises a service manager that manages the application and a link between the application and an application-codec issued by the Service Provider, wherein the application-codec is designed for interfacing between the service manager and the application, for processing an access request requesting access to the application received from the service manager and, triggered by the wallet, accessing the application via the service manager by means of the link between the application and the application-codec, such that the application-codec linked with the respective application performs accessing the application under control of the service manager.

Wearable payments using multiple mounted data elements

Provided is a wearable device, including a base configured to be worn by a user, at least one data element at least partially positioned on or within the base and programmed or configured to have account data stored thereon, and at least one antenna including an open circuit, the at least one antenna at least partially positioned on or within the base and configured to transmit at least a portion of the account data and receive at least a portion of transaction data from at least one target device when the open circuit of the antenna is closed and becomes powered by at least one power source. Other expressions are also disclosed.

LOCAL CACHE-BASED IDENTIFICATION SYSTEM
20220375296 · 2022-11-24 ·

An identification system uses a local cache for performing identifications. An identity system device may store identity information and identification information. An electronic device stores a cache of a portion of the identity information and a part of the identification information. The electronic device receives user input, determines an identity by comparing the user input to the cached identification information (such as by comparing a received digital representation of a biometric with cached biometric identification information), and performs an action using information in the cached identity information that is associated with the identity. The electronic device may update the identity information stored by the identity system device based on the action.