G06Q20/3563

SYSTEMS AND METHODS FOR CRYPTOGRAPHIC AUTHENTICATION OF CONTACTLESS CARDS

Example embodiments of systems and methods for data transmission system between transmitting and receiving devices are provided. In an embodiment, each of the transmitting and receiving devices can contain a master key. The transmitting device can generate a diversified key using the master key, protect a counter value and encrypt data prior to transmitting to the receiving device, which can generate the diversified key based on the master key and can decrypt the data and validate the protected counter value using the diversified key.

Systems and methods for cryptographic authentication of contactless cards

Example embodiments of systems and methods for data transmission system between transmitting and receiving devices are provided. In an embodiment, each of the transmitting and receiving devices can contain a master key. The transmitting device can generate a diversified key using the master key, protect a counter value and encrypt data prior to transmitting to the receiving device, which can generate the diversified key based on the master key and can decrypt the data and validate the protected counter value using the diversified key.

Smart card with distributed payment channels and autonomous resolution thereof
11574297 · 2023-02-07 · ·

Systems and methods for autonomous payment routing are provided. A method may include storing in a smart card a database of contacts accessed from a digital contact directory. The method may include receiving a request to reroute a payment via an alternate payment channel, the payment including a recipient and an amount, and the alternate payment channel originating from an account associated with one of the contacts in the database. The method may also include resolving, via a wireless communication element that is embedded in the smart card, routing information for the account. The method may also include transmitting, to an administrator of the account, a request for authorization to reroute the payment, and, when authorization is received, executing the payment via the alternate payment channel.

Mobile commerce payment system

A mobile commerce system and components thereof are provided in which multiple wireless mobile communications devices (mobile devices) (1) each has a unique electronic identification and processing circuit (2) capable of encrypting data utilizing an encryption key and a first software application providing connectivity to commercial webpage servers (4) for purposes that include the conduct of selected transactions involving a payment for goods or services. Each mobile device is independently enabled to conduct financial transactions in real time by communication with a financial institution. Each mobile device further has a second software application termed mobile payment application adapted to interact with the first application to receive data as to a payment required to conclude a transaction conducted by way of a commercial webpage server. The mobile payment application initiates an instruction to the financial institution to make a payment to a payee designated by way of such data wherein the instruction is encrypted utilizing the unique electronic identification and processing circuit.

CONFIGURING A SET OF APPLETS ON A BATTERY-LESS TRANSACTION CARD
20230078500 · 2023-03-16 ·

A transaction card may power on the transaction card using electric current induced from an interaction of the transaction card with an electromagnetic field. The transaction card may establish a communication with a device. The communication may indicate that the transaction card has powered. The transaction card may receive, from the device, a set of instructions to configure a set of applets on the transaction card after notifying the device that the transaction card has powered on. The set of applets to be configured may be related to completing one or more different transactions. The set of applets to be configured may be different than another set of applets already configured on the transaction card. The transaction card may configure the set of applets on the transaction card according to the set of instructions after receiving the set of instructions.

SYSTEMS AND METHODS FOR VERIFYING USERS, IN CONNECTION WITH TRANSACTIONS USING PAYMENT DEVICES
20230119751 · 2023-04-20 ·

Systems and methods for verifying users in connection with transactions are disclosed. One exemplary method includes, based on the payment card device being presented at a terminal, initiating, by a security chip of the payment card device, a timer and then based on the timer being unexpired, capturing, by a biometric sensor of the payment card device, a biometric image and verifying, by the security chip, the captured biometric image against reference biometric data stored the payment card device. The method also includes, based on the captured biometric image being verified, cooperating, by the security chip, with the terminal, to initiate a transaction to an account using a first account number specific to a biometric application of the payment card device.

NFC ENABLED CARD FOR CONSUMER ACCESSIBILITY
20220327517 · 2022-10-13 ·

A contactless card useful for adjusting the operation, configuration, and/or performance of a secondary device is described. The contactless card is equipped with a communication interface which allows the contactless card to transmit information to the secondary device using NFC signals. The contactless card stores accommodation information related to a physical accommodation desired by the user and transmits that information in the form of an accommodation message to the secondary device after being placed in a NFC field generated by the secondary device. In some embodiments, the contactless card requests an authentication certificate in order to determine a degree of trust prior to sending an accommodation message. In some embodiments, the contactless card may adjust what accommodation information is included in the accommodation message based on the authentication certificate received from the secondary device.

Systems and methods for authentication of access tokens

Systems and methods for authentication may include a first device including a memory, a communication interface, and one or more processors. The memory may include a counter value, transmission data, and at least one key. The one or more processors may be in communication with the memory and communication interface. The one or more processors may be configured to create a cryptogram using the at least one key and counter value, wherein the cryptogram includes the counter value and the transmission data; transmit the cryptogram via the communication interface; update the counter value after cryptogram transmission; receive an encrypted access token via the communication interface; decrypt the encrypted access token; store the decrypted access token in the memory; and transmit, after entry of the communication interface into a communication field, the access token via the communication interface for access to one or more resources, wherein the access token is encrypted.

DEVICES AND SYSTEMS FOR DETECTING UNAUTHORIZED COMMUNICATION OF DATA FROM A MAGNETIC STRIPE DEVICE OR EMBEDDED SMART CHIP DEVICE
20170365134 · 2017-12-21 ·

Disclosed are devices, systems and the like for determining unauthorized communication of data from a card device equipped with a magnetic stripe and/or smart chip. The card device is able to count by recording the number of instances in which the card device has either been swiped at a magnetic card reader or communicated data via an embedded Integrated Circuit (IC). In specific embodiments, the device is further configured to differentiate between authorized swipes/data communications and unauthorized data communications.

Trusted internal interface

An interface and device architecture for a payment device. An interface between a payment application installed in a payment device and one or more value-add applications (such as loyalty programs, transit applications, etc.) that are also installed in the payment device. The API or interface design permits communications and data transfer between the payment application and one or more value-add applications. This reduces (and in some cases may prevent) the need for back-end server processing of data that may be relevant to both a payment transaction and to a function of the value-add application. Similarly, the same or another API or interface may enable communications and data transfer between a value-add application and the payment application.