Patent classifications
G06Q20/3415
AUTOMATED, DYNAMIC DIGITAL FINANCIAL MANAGEMENT METHOD AND SYSTEM
An automated, dynamic digital financial management tool is described herein. The financial management tool enables a user to access all forms of payments, debt and transactions to be deducted automatically depending on which form of payment is chosen. The financial management tool documents every item/service purchased. The documentation enables a company/manufacturer/store to provide marketing and recall information to the user. The financial management tool is able to include any and/or all financial aspects of a user's life. The financial management tool is able to be implemented using a universal card. The financial management tool is able to include a pay station to receive payments. The financial management tool is able to include automated services.
Systems and methods for authenticating users
Systems and methods for verifying users in connection with transactions using biometric payment card devices are disclosed. One exemplary biometric payment card device generally includes a card body, a fingerprint sensor, a modem, and a processor coupled to the modem and the fingerprint sensor, where each of the fingerprint sensor, the modem, and the processor are disposed on the card body. The processor of the payment card device is configured to capture, via the fingerprint sensor, a fingerprint of a user associated with the payment account, compare the captured fingerprint to a reference fingerprint stored in memory in communication with the processor, and then compile and transmit, by the modem, an authentication result to an issuer of the payment account and/or a payment network associated with the payment account in response to the user being authenticated, or not, based on the comparison of the captured fingerprint and the reference fingerprint.
Identification verification system
A method and apparatus is provided for verifying the validity of ID cards. A card reading device reads an ID card and transmits a request to a database server. A database is queried and a reply is sent back to the card reading device indicating whether the ID is valid. If desired, the reply can include additional information, such as a description of the ID holder. The ID verification system can be used to help verify whether an ID belongs to the ID holder. The system can also log and timestamp events for future access.
Systems and methods for contactless card applet communication
Example embodiments of systems and methods for contactless card verification include a contactless card including a substrate, a processor, and a memory, wherein the memory contains a first applet and a second applet, and a recipient device in data communication with the contactless card, wherein the second applet is configured to retrieve one or more parameters from the first applet via an interface; and wherein the second applet is configured to transmit the one or more parameters to the recipient device for verification.
SMART-CARD WITH BUILT-IN OBJECT RESOLUTION AND DIRECT NETWORK INTERFACE
Systems and methods for secure and efficient transaction resolution and execution are provided. A method may include capturing, via a camera embedded in a smart card, an image of an object. The object may be associated with one of a plurality of service categories. The method may include processing the image and determining the service category, from the plurality of service categories, which is associated with the object. The method may also include determining a service provider that provides the service of the service category for a user associated with the smart card, and determining a monetary balance owed by the user to the service provider for the service. The method may also include executing a payment, via a wireless communication element that is embedded in the smart card, in the amount of the monetary balance, from an account associated with the user to the service provider.
SYSTEMS AND METHODS FOR CARD AUTHORIZATION
Example embodiments of systems, methods, and computer-accessible mediums for transaction authorization are provided. An exemplary system can comprise a card including an input device and a display device in data communication with a server. The server can generate an authorization passcode upon an initiation of a transaction session, and the card can receive an entered passcode through the input device, display the entered passcode on the display device, and transmit the entered passcode to the server for comparison to the authorization passcode. Upon a determination that the entered passcode is a match for the authorization passcode, the server can transmit a match notification indicating the transaction session is valid, and upon a determination that the entered passcode is a mismatch for the authorization passcode, the server can transmit a mismatch notification terminating the transaction session.
SYSTEMS AND METHODS FOR AUTHENTICATION OF ACCESS TOKENS
Systems and methods for authentication may include a first device including a memory, a communication interface, and one or more processors. The memory may include a counter value, transmission data, and at least one key. The one or more processors may be in communication with the memory and communication interface. The one or more processors may be configured to create a cryptogram using the at least one key and counter value, wherein the cryptogram includes the counter value and the transmission data; transmit the cryptogram via the communication interface; update the counter value after cryptogram transmission; receive an encrypted access token via the communication interface; decrypt the encrypted access token; store the decrypted access token in the memory; and transmit, after entry of the communication interface into a communication field, the access token via the communication interface for access to one or more resources, wherein the access token is encrypted.
COMMUNICATION DEVICE TO SENSE ONE OR MORE BIOMETRIC CHARACTERISTICS OF A USER
A communication device for sensing one or more biometric characteristics of a user. The device includes a cover structure, a layer of output pixel elements, a layer of biometric input pixel elements, and a processor. The cover structure includes an exterior surface. The layer of output pixel elements is positioned below the exterior surface and configured to provide an output through the exterior surface toward the user. The output pixel elements being at least one of light emitting pixel elements and piezoelectric-out pixel elements. The layer of biometric input pixel elements is positioned below the exterior surface to receive a reflected biometric input passing from the user through the exterior surface. The biometric input pixel elements being at least one of light detecting and piezoelectric-in pixel elements. The processor is connected to the biometric input pixel elements to process the reflected biometric input.
METHOD, DEVICE AND SYSTEM FOR THE TRANSFER OF DATA
A method and system for transferring encrypted data from a first electronic device to a second electronic device. The method includes the steps of displaying a first encrypted two-dimensional code at the output interface of the first electronic device, reading the first encrypted two-dimensional code with the input interface of the second electronic device, and decrypting the first two-dimensional code with the second electronic device, generating a second encrypted two-dimensional code with the second electronic device, and displaying the second encrypted two-dimensional code on the output interface of the second electronic device, reading the second two-dimensional code encrypted with the input interface of the first electronic device and decrypting the second two-dimensional code with the first electronic device and generating an action on the first electronic device based on the second decrypted two-dimensional code. The second two-dimensional code is a plurality of two-dimensional codes.
CONTACTLESS PAYMENT RELAY ATTACK PROTECTION
A method for contactless payment relay attack protection includes receiving an online authorization request including a cryptogram, a measured processing time, and a reference processing time from a terminal. The cryptogram is verified, and a determination is performed as to whether the measured processing time exceeds the reference processing time. An online authorization response authorizing or declining a monetary transaction is transmitted, based on the determination. An artificial intelligence transaction analysis can be performed based on past and current conditions (e.g., battery level, operating system, open applications) of a payment device such as a mobile phone, past and current conditions of a terminal, and/or a monetary amount. The online authorization response can be based on the artificial intelligence transaction analysis.