G07F7/1016

Bendable anti-skimming plate for a card reader

A card reader includes a user-card-insertion slot operatively connected to user-card path. A data-reader is located in an interior of the card reader. A plate is located in the interior of the card reader. The plate is adjacent to the data-reader and interior to the user-card-insertion slot. The plate is configured to block the insertion of a skimming or shimming device and to bend during an attempt to remove the plate from the interior of the card reader. The plate may be configured such that a power connection between the plate and a circuit supplying power to the card reader may be broken during an attempt to remove the plate from the interior of the card reader.

Ring type wearable terminal and method for manufacturing the ring type wearable terminal
10863802 · 2020-12-15 · ·

A ring type wearable terminal includes: a first ring that has a recessed portion formed on a side surface thereof; a second ring that is bonded to the first ring and that covers the recessed portion; and a communication unit that is housed in the recessed portion. The recessed portion is filled with an adhesive agent. The adhesive agent filling the recessed portion bonds the first ring and the second ring and also fixes the communication unit to the recessed portion so as to protect the communication unit. This allows the strength of the ring type wearable terminal to be improved.

Authentication and secure transmission of data between signature devices and host computers using transport layer security
10839382 · 2020-11-17 · ·

A transport layer security (TLS) connection is established between a signature device and the host computer via an interface (e.g., a universal serial bus (USB) interface). The signature device acts as a TLS server, and the host computer acts as a TLS client. Data such as pen data, control data, or image data may be received or transmitted via a USB bulk transfer mechanism. In one aspect, the host computer sends a command via the interface to the signature device to generate a new key pair, receives a certificate signing request (CSR) from the signature device via the interface, sends the CSR to a user certificate authority, receives a public key certificate from the user certificate authority, and sends the public key certificate to the signature device via the interface.

ENABLING CARD AND METHOD AND SYSTEM USING THE ENABLING CARD IN A POS

The invention relates to an enabling card as well as a system and method for completing a financial transaction in a P.O.S. terminal comprising: a processor carried by the enabling card for: establishing a connection with a mobile device; receiving secure information from a mobile device and generating a digital signal; a coil carried by the enabling card for generating a magnetic field in response to the digital signal to simulate the swipe of card in the P.O.S. terminal and complete the financial transaction.

System and method to protect privacy of personal-identification-number entry on consumer mobile device and computing apparatus
10832243 · 2020-11-10 · ·

A system for accepting the input of a PIN comprises a first device receiving a randomized PIN layout derived on a fourth device. The randomized PIN layout is displayed on a display of the first device. A second device comprises an input for accepting a series of key presses to produce a PIN token. The PIN token indicating each of the series of key presses. A third device is in communication with the second device. The third device derives the randomized PIN layout and receives the PIN token from the second device without the PIN token being present on the first device. The third device combines the PIN layout and the PIN token to produce a PIN. The PIN is used to authenticate a transaction. The fourth and third devices each store a shared secret used to independently derive the randomized PIN layout on the fourth and third devices.

Methods, Systems and Computer Program Products for Identity Authentication for Payment Card Based Payment Transactions
20200320537 · 2020-10-08 ·

The invention provides methods, systems and computer program products for identity authentication for payment card based payment transactions. A payment card may be configured for payor identity authentication for the purpose of an electronic payment transaction(s), and may comprise (i) sensors to measure card handling parameters, (ii) an authentication signature generator, configured to generate and store a biometric identity signature associated with an authorized cardholderwhich signature is based on a first set of card handling parameter data received from the sensors, (iii) a card handling data comparator configured to receive a second set of card handling parameter data from the sensors, retrieve the biometric identity signature associated with the authorized cardholder, and compare the second set of card handling parameter data with data extracted from the retrieved biometric identity signature, and (iv) an authentication decision generator configured to generate an identity authentication decision based on the comparison.

Pay at pump encryption device

Embodiments of the present invention are drawn to systems and methods for securing information using cryptographically keyed units. Specifically, in one embodiment of the present invention, a system is provided for securing information that uses two cryptographically keyed units to encrypt information flowing between a fuel pump device and a remote device. Thus, even if the information is intercepted, it could not be used to perpetrate fraud.

Homomorphic passcode encryption

A method of encrypting a passcode is disclosed. In one embodiment, the method includes: receiving an indication of a portion of the passcode; calculating a plaintext value based at least in part on the indication, wherein the plaintext value represents an encoded portion of the passcode; encrypting the plaintext value into ciphertext using a homomorphic encryption system; and updating a cumulative encryption string by executing a cumulative operation to aggregate the ciphertext corresponding to the encoded portion into the cumulative encryption string computed for a previous portion of the passcode, wherein the cumulative operation is dictated by a homomorphic property of the homomorphic encryption system.

DEVICE SECURITY WITH PHYSICALLY UNCLONABLE FUNCTIONS

An electronic device may include a printed circuit board having a physically unclonable function (PUF) source. The electronic device may also include an integrated circuit (IC) chip positioned on the printed circuit board, and the first PUF source may be embedded in or formed on the printed circuit board external to the IC chip. The IC chip has processing circuitry that is configured to determine PUF data based on the PUF source. The processing circuitry is further configured to determine a cryptographic key or authentication token based on the PUF data and to perform at least one secure operation using the cryptographic key or authentication token.

RING TYPE WEARABLE TERMINAL AND METHOD FOR MANUFACTURING THE RING TYPE WEARABLE TERMINAL
20200163422 · 2020-05-28 ·

A ring type wearable terminal includes: a first ring that has a recessed portion formed on a side surface thereof; a second ring that is bonded to the first ring and that covers the recessed portion; and a communication unit that is housed in the recessed portion. The recessed portion is filled with an adhesive agent. The adhesive agent filling the recessed portion bonds the first ring and the second ring and also fixes the communication unit to the recessed portion so as to protect the communication unit. This allows the strength of the ring type wearable terminal to be improved.