Patent classifications
G07F7/125
METHODS AND SYSTEMS FOR ENROLLMENT AND USE OF BIOMETRIC PAYMENT CARD
Methods and apparatus for enrolling a biometric payment card. In an embodiment, a biometric payment card processor receives fingerprint image data of a cardholder's finger during an initial purchase transaction, extracts digital information from the fingerprint image data and generates current fingerprint template data. The biometric payment card processor then compares the current fingerprint template data to data stored in a memory, determines that the current fingerprint template data did not match any data stored in the memory, transmits cardholder identification data and an authentication failure message to a payment card reader device, receives enrollment instructions from the payment card reader device, and then stores, in response to the instructions, the current fingerprint template data as enrollment fingerprint template data in the memory.
Computer-based systems having computing devices programmed to execute fraud detection routines based on feature sets associated with input from physical cards and methods of use thereof
Systems and methods for performing fraud detection at POS devices based on analysis of feature sets are disclosed. In one embodiment, an exemplary method may comprise: obtaining, by a POS device, upon initiation of a transaction involving a card or a card and mobile device associated with an individual initiating the transaction, one or more sensory inputs and an identifier; mapping, by the POS device, the one or more sensory inputs to a first cluster position of a plurality of clusters; determining whether the cluster position of the cluster mapped for the transaction corresponds to a second cluster position of the at least one expected cluster associated with the known owner of the card and/or mobile device; and initiating, by the POS device, at least one second factor authentication process to establish that the individual is the known owner of the card and/or mobile device being used in the transaction.
METHOD OF AUTHENTICATION, SERVER AND ELECTRONIC IDENTITY DEVICE
The invention proposes a method of authentication of an electronic identity device (1) presented by an individual, the method being characterized in that it comprises the implementation of steps of: (b) Reception by data processing means (21) of a server (2) of an acquired image of said electronic identity device (1), the image representing at least one personal visual element of the individual and a dynamic verification code that are visible on said electronic identity device (1), said dynamic verification code containing at least one item of reference information representative of an expected appearance of said visual element; (c) Extraction, by analysis of said acquired image by the data processing means (21) of the server (2), of: an item of candidate information representative of the appearance of said visual element as represented in the acquired image; the reference information representative of the expected appearance of said visual element contained in said dynamic verification code as represented in the acquired image; (d) Verification by the data processing means (21) of the server (2) that the extracted candidate information and reference information match.
The invention also relates to a server and an electronic identity device for that purpose.
SYSTEM AND METHOD FOR FACILITATING ENHANCED OFFLINE PAYMENT
Embodiments described herein provide a client system for facilitating enhanced offline payment. During operation, the system obtains a location indicator, which indicates the location of a service, from a charging system. The system then generates an offline code that allows access to the service and corresponds to the location indicator. The offline code can be readable by the charging system, and the client system and the charging system can both be offline. Subsequently, the system encodes the historical data associated with the service in a field of the offline code and sends a message comprising the offline code to the charging system.
Onion layer encryption scheme for secure multi-access with single card
A magnetic strip card includes a partial encrypted card payload encrypted with a long shared key to provide a final encrypted payload. A method for encoding the magnetic strip card includes encrypting a card payload with a code key of a access controls with a short key of the access control to generate a partial encrypted payload and encrypting the partial encrypted payload with a long shared key to provide a final encrypted payload.
Apparatus and method for emulating online user authentication process in offline operations
A payment-enabled mobile device is operable in a first operating mode and a second operating mode. The first mode is an online operating mode. The second mode is an offline operating mode. The payment-enabled mobile device operates in the second operating mode to replicate a screen display sequence presented by the payment-enabled mobile device in the first operating mode.
AUTOMATED TELLER MACHINES (ATMs) HAVING OFFLINE FUNCTIONALITY
A device may receive customer data, and store the customer data in a secure memory device of the device. The device may implement a backup mode in which the device utilizes the customer data to authorize requests based on determining that the device lacks a network connection. The device may receive, when the device is in the backup mode, a request for currency that includes authentication information. The device, while in the backup mode, may authorize the request for currency based on comparing the authentication information and the customer data. The device may dispense currency based on a result of comparing the authentication information and the customer data. The device may store transaction data associated with dispensing of the currency to permit the transaction data to be transmitted when the network connection is restored.
Multi-layer product with NFC/RFID tags and RF shielding
An NFC tag shielding system for a multi-layer product of printed and/or non-printed layered material(s) includes a plurality of layers of printed and/or non-printed materials. The system includes a first on-metal NFC tag applied to a first layer of material of the plurality of layers and a second on-metal NFC tag applied to a second layer of material of the plurality of layers. The first and second on-metal NFC tags are aligned along an axis perpendicular to planes of the first and second layers of material. The system also includes an RF shielding layer disposed between the first and second on-metal NFC tags. The RF shielding layer is positioned along the axis and extends parallel to the first and second layers of material a distance covering at least a projected area of the larger of the first or second on-metal NFC tag. The RF shielding layer provides signal shielding between the NFC tags so that a user wishing to read the first NFC tag on the first layer of material will not unintentionally read the aligned second NFC tag on the second layer of material.
Self-aware token
A token file is received from an e-Commerce platform having a veracity grade capability. An off-line transaction is made using the token which records events of the transaction. Subsequently, the token re-enters the e-Currency platform and transfers the recorded off-line events. The platform rebuilds the token's past state based upon the state of nearby tokens and the recorded events, so that additional transactions can be rated, including a veracity grade.
Automated teller machines (ATMs) having offline functionality
A device may receive customer data, and store the customer data in a secure memory device of the device. The device may implement a backup mode in which the device utilizes the customer data to authorize requests based on determining that the device lacks a network connection. The device may receive, when the device is in the backup mode, a request for currency that includes authentication information. The device, while in the backup mode, may authorize the request for currency based on comparing the authentication information and the customer data. The device may dispense currency based on a result of comparing the authentication information and the customer data. The device may store transaction data associated with dispensing of the currency to permit the transaction data to be transmitted when the network connection is restored.