Patent classifications
G06Q20/3552
SECURING CRYPTOGRAPHIC DATA ONTO A PHYSICAL MEDIUM
The present invention relates to a method and a system for inscribing and securely storing cryptographic keys on a physical medium, and to a corresponding physical medium, comprising the following steps: from a first management entity (31), generating (1) a first pair of asymmetric cryptographic keys comprising a first user public key (pub1) and a first user private key (priv1), inscribing (2) the first user private key (priv1) onto a physical medium, and affixing (4) a first tamper-evident concealing element (hol1) to the physical medium in order to conceal the first user private key (priv1) and seal same, said first user private key (priv1) being accessible only by visibly breaking said first tamper-evident concealing element (hol1); from the second management entity (32), generating (6) a second pair of asymmetric cryptographic keys comprising a second user public key (pub2) and a second user private key (priv2), inscribing (7) the second user private key (priv2) onto the physical medium and affixing (9) a second tamper-evident concealing element (hol2) to the physical medium in order to conceal the second user private key (priv2) and seal same, said second user private key (priv2) being accessible only by visibly breaking said second tamper-evident concealing element (hol2); generating (10) at least one last user public key (pub0) and/or at least one cryptographic address (adr, adr-mult) from the first user public key (pub1) and the second user public key (pub2), inscribing (11) said at least one last public user key (pub0) and/or said at least one cryptographic address (adr, adr-mult) onto the physical medium, and verifying (12, 13) same, and finally recovering the private keys (priv1, priv2) comprising the generation of a last user private key (priv0) corresponding to the last user public key (pub0) and/or to said at least one cryptographic address (adr, adr-mult).
Method and system for providing financial transaction using empty card
A method and a system for providing a financial transaction using an empty card are provided. The method for providing a financial transaction using an empty card includes receiving, by a server, a virtual card number generated by a program included in a user terminal, searching, by the server, for an empty card storage location at which the empty card is registered, in a storage location search algorithm based on the virtual card number, searching, by the server, for a real card number storage space linked to a user identification (UID) assigned to the found empty card storage location, extracting, by the server, a real card number stored in the real card number storage space, and performing, by the server, a financial transaction progress or a financial transaction progress request with the extracted real card number.
APPARATUS AND METHOD FOR EMULATING TRANSACTIONAL INFRASTRUCTURE WITH A DIGITAL TRANSACTION PROCESSING UNIT (DTPU)
Digital transaction apparatus including a Data Assistance Device (DAD), including a user interface that is operable to at least select data, and a DAD transmitter, a Digital Transaction Card (DTC), including a Digital Transaction Processing Unit (DTPU), and a DTC receiver, wherein the DAD and DTC are operable to transfer data from the DAD to the DTC and when sub -sequently using the DTC to effect a digital transaction, the DTC operates in accordance with data selected and transferred from the DAD to the DTC, wherein the DTPU is configured to enable data communication with a digital transaction device during a digital transaction, the DTPU operable to receive and execute one or more commands that emulate commands received from the digital transaction device.
NFC enabled card for consumer accessibility
A contactless card useful for adjusting the operation, configuration, and/or performance of a secondary device is described. The contactless card is equipped with a communication interface which allows the contactless card to transmit information to the secondary device using NFC signals. The contactless card stores accommodation information related to a physical accommodation desired by the user and transmits that information in the form of an accommodation message to the secondary device after being placed in a NFC field generated by the secondary device. In some embodiments, the contactless card requests an authentication certificate in order to determine a degree of trust prior to sending an accommodation message. In some embodiments, the contactless card may adjust what accommodation information is included in the accommodation message based on the authentication certificate received from the secondary device.
Cardholder selected card validation code for card-not-present transactions
Systems and methods for managing a user-selected card verification code (CVC2) value for a payment card are disclosed. A sever is coupled to a payment card database and a hardware security module. The server is programmed to receive a request from a user to change the CVC2 value of the payment card to the user-selected CVC2 value. Based upon the request, the server retrieves from a payment card table stored on the database a payment card record associated with the payment card. The server transmits the user-selected CVC2 value, and, from the payment card record, a primary account number, a payment card expiry date, and a first service code to a hardware security module. The server subsequently receives from the hardware security module a second service code associated with the user-selected CVC2 value. The server updates the first service code in the payment card record to the second service code.
METHOD AND SYSTEM FOR PROVIDING FINANCIAL TRANSACTION USING EMPTY CARD
A method and a system for providing a financial transaction using an empty card are provided. The method for providing a financial transaction using an empty card includes receiving, by a server, a virtual card number generated by a program included in a user terminal, searching, by the server, for an empty card storage location at which the empty card is registered, in a storage location search algorithm based on the virtual card number, searching, by the server, for a real card number storage space linked to a user identification (UID) assigned to the found empty card storage location, extracting, by the server, a real card number stored in the real card number storage space, and performing, by the server, a financial transaction progress or a financial transaction progress request with the extracted real card number.
Method and system for securely registering cryptographic keys on a physical medium for cryptographic keys, and physical medium produced
The present invention relates to a method and a system for inscribing and securely storing cryptographic keys on a physical medium, and to a corresponding physical medium, comprising the following steps: from a first management entity (31), generating (1) a first pair of asymmetric cryptographic keys comprising a first user public key (pub1) and a first user private key (priv1), inscribing (2) the first user private key (priv1) onto a physical medium, and affixing (4) a first tamper-evident concealing element (hol1) to the physical medium in order to conceal the first user private key (priv1) and seal same, said first user private key (priv1) being accessible only by visibly breaking said first tamper-evident concealing element (hol1); from the second management entity (32), generating (6) a second pair of asymmetric cryptographic keys comprising a second user public key (pub2) and a second user private key (priv2), inscribing (7) the second user private key (priv2) onto the physical medium and affixing (9) a second tamper-evident concealing element (hol2) to the physical medium in order to conceal the second user private key (priv2) and seal same, said second user private key (priv2) being accessible only by visibly breaking said second tamper-evident concealing element (hol2); generating (10) at least one last user public key (pub0) and/or at least one cryptographic address (adr, adr-mult) from the first user public key (pub1) and the second user public key (pub2), inscribing (11) said at least one last public user key (pub0) and/or said at least one cryptographic address (adr, adr-mult) onto the physical medium, and verifying (12, 13) same, and finally recovering the private keys (priv1, priv2) comprising the generation of a last user private key (priv0) corresponding to the last user public key (pub0) and/or to said at least one cryptographic address (adr, adr-mult).
DEVICES AND METHODS FOR PROVIDING EMERGENCY INFORMATION USING A PAYMENT CARD
A card for storing both emergency information and payment information is disclosed. The card can be used by an emergency responder to retrieve emergency information for the user. The emergency information can enable the emergency responder to better render aid to the user. The card can have one or more processors, a sensor, and a memory in communication with the one or more processors and storing an application thereon. The application can cause the card to receive a request from a user device (e.g., from an emergency medical technician, or EMT) to access emergency information stored in the memory, transmit a security challenge to the user device, authenticate a received response to the security challenge from the user device, and transmit the emergency information to the user device.
Payment switching method and device
A payment switching method includes displaying a display interface of virtual cards after receiving an interface displaying instruction by a first terminal. The display interface of the virtual cards displays at least two payment modes, one of the at least two payment modes being a currently selected payment mode. The method also includes determining a target payment mode from the at least two payment modes according to a detected payment switching operation and switching from the currently selected payment mode to the target payment mode. The method further includes performing a payment based on the target payment mode.
Automated reissuance system for prepaid devices
Described herein is a system for automatically reissuing a prepaid device for an expired account upon detecting a funding event associated with the expired account. An account may be expired upon determining that one or more expiration conditions have been met. An event handler may be configured to receive events. Upon identifying a funding event associated with an expired account, the event handler may initiate a reissuance process for a prepaid device associated with the account.