G07F7/125

Computer-based systems having computing devices programmed to execute fraud detection routines based on feature sets associated with input from physical cards and methods of use thereof

Systems and methods for performing fraud detection at POA devices based on analysis of feature sets are disclosed. In one embodiment, an exemplary method may comprise: obtaining, by a POS device, upon initiation of a transaction involving a card or a card and mobile device associated with an individual initiating the transaction, one or more sensory inputs and an identifier; mapping, by the POS device, the one or more sensory inputs to a first cluster position of a plurality of clusters; determining whether the cluster position of the cluster mapped for the transaction corresponds to a second cluster position of the at least one expected cluster associated with the known owner of the card and/or mobile device; and initiating, by the POS device, at least one second factor authentication process to establish that the individual is the known owner of the card and/or mobile device being used in the transaction.

Method and device for end-user verification of an electronic transaction

The present invention provides methods and apparatuses for verifying that a transaction is legitimate. The methods and apparatuses use protected memory space, such as kernel space of an operating system, or a separate memory space, such as is available on a SIM card of a cellular phone. The method of the invention proceeds by creating a transaction identification string (TID) and associating the TID with a transaction. The TID contains data relevant to or associated with the transaction and is typically readable by an end-user. The transaction is then interrupted until a user responds in the affirmative to allow completion of the transaction. Methods and devices used in the invention are particularly well suited to M-commerce, where transactions originating from a device are typically recognized by a merchant as coming from the owner of the device without further authentication.

Self-authenticating credit card system
10223856 · 2019-03-05 · ·

A self-authenticating credit card method includes: inputting a unique identification to an input device on a credit card; comparing the input unique identification with a stored unique identification stored within the credit card; and providing an output from the credit card when the received unique identification matches the unique identification stored within the credit card.

ONION LAYER ENCRYPTION SCHEME FOR SECURE MULTI-ACCESS WITH SINGLE CARD

A magnetic strip card includes a partial encrypted card payload encrypted with a long shared key to provide a final encrypted payload. A method for encoding the magnetic strip card includes encrypting a card payload with a code key of a access controls with a short key of the access control to generate a partial encrypted payload and encrypting the partial encrypted payload with a long shared key to provide a final encrypted payload.

Onion layer encryption scheme for secure multi-access with single card

A magnetic strip card includes a partial encrypted card payload encrypted with a long shared key to provide a final encrypted payload. A method for encoding the magnetic strip card includes encrypting a card payload with a code key of a access controls with a short key of the access control to generate a partial encrypted payload and encrypting the partial encrypted payload with a long shared key to provide a final encrypted payload.

Card dispenser
10121308 · 2018-11-06 · ·

A card dispenser is provided comprising a capture chamber configured to receive a card dispensed from a read position by a card feed mechanism, the capture chamber comprising walls defining an exit aperture for dispensing a card to a user. A capture flap is moveable from a first orientation to a second orientation, wherein in the first orientation the capture flap is arranged to block the exit aperture so as to prevent a card from passing through said exit aperture, and in the second orientation the capture flap is arranged to guide a card through said exit aperture. If a first output is received from a communication module, the capture flap is held at the first orientation such that a card dispensed from a read position moves under the influence of gravity through the capture chamber into a card bin. If a second output is received, the capture flap is moved from the first orientation to the second orientation such that a card dispensed from the read position slides along the capture flap under the influence of gravity through the exit aperture.

Transaction card security device

An example transaction card may include a sensor to measure movement of the transaction card and one or more processors to monitor the movement of the transaction card via the sensor during a tracking period; determine measurements of a gait of a user during the tracking period from the movement of the transaction card during the tracking period; compare the measurements of the gait of the user during the tracking period and a gait signature associated with the transaction card; and/or perform an action associated with the transaction card based on a result of comparing the measurements of the gait of the user during the tracking period and the gait signature.

Multi-Layer Product with NFC Tags and RF Shielding
20180121780 · 2018-05-03 ·

An NFC tag shielding system for a multi-layer product of printed and/or non-printed layered material(s) includes a plurality of layers of printed and/or non-printed materials. The system includes a first on-metal NFC tag applied to a first layer of material of the plurality of layers and a second on-metal NFC tag applied to a second layer of material of the plurality of layers. The first and second on-metal NFC tags are aligned along an axis perpendicular to planes of the first and second layers of material. The system also includes an RF shielding layer disposed between the first and second on-metal NFC tags. The RF shielding layer is positioned along the axis and extends parallel to the first and second layers of material a distance covering at least a projected area of the larger of the first or second on-metal NFC tag. The RF shielding layer provides signal shielding between the NFC tags so that a user wishing to read the first NFC tag on the first layer of material will not unintentionally read the aligned second NFC tag on the second layer of material.

CARD DISPENSER
20180082512 · 2018-03-22 ·

A card dispenser is provided comprising a capture chamber configured to receive a card dispensed from a read position by a card feed mechanism, the capture chamber comprising walls defining an exit aperture for dispensing a card to a user. A capture flap is moveable from a first orientation to a second orientation, wherein in the first orientation the capture flap is arranged to block the exit aperture so as to prevent a card from passing through said exit aperture, and in the second orientation the capture flap is arranged to guide a card through said exit aperture. If a first output is received from a communication module, the capture flap is held at the first orientation such that a card dispensed from a read position moves under the influence of gravity through the capture chamber into a card bin. If a second output is received, the capture flap is moved from the first orientation to the second orientation such that a card dispensed from the read position slides along the capture flap under the influence of gravity through the exit aperture.

COMPUTER-BASED SYSTEMS HAVING COMPUTING DEVICES PROGRAMMED TO EXECUTE FRAUD DETECTION ROUTINES BASED ON FEATURE SETS ASSOCIATED WITH INPUT FROM PHYSICAL CARDS AND METHODS OF USE THEREOF
20240420148 · 2024-12-19 ·

Systems and methods for performing fraud detection at POA devices based on analysis of feature sets are disclosed. In one embodiment, an exemplary method may comprise: obtaining, by a POS device, upon initiation of a transaction involving a card or a card and mobile device associated with an individual initiating the transaction, one or more sensory inputs and an identifier; mapping, by the POS device, the one or more sensory inputs to a first cluster position of a plurality of clusters; determining whether the cluster position of the cluster mapped for the transaction corresponds to a second cluster position of the at least one expected cluster associated with the known owner of the card and/or mobile device; and initiating, by the POS device, at least one second factor authentication process to establish that the individual is the known owner of the card and/or mobile device being used in the transaction.