Patent classifications
G06Q20/3567
Systems and methods for capturing visible information
A transaction card construction and computer-implemented methods for a transaction card are described. The transaction card has vector-formatted visible information applied by a laser machining system. In some embodiments, systems and methods are disclosed for enabling the sourcing of visible information using a scalable vector format The systems and methods may receive a request to add visible information to a transaction card and capture an image of the visible information. The systems and methods may capture data representing the image. The systems and methods may also determine an ambient color saturation of the image. Further, systems and methods may translate the image based on the ambient color saturation of the image. The systems and methods may also map the translated image to a bounding box and convert the mapped image into vector format. In addition, the systems and methods may provide the converted image to a laser machining system.
Card reader based payment transactions from a web browser
This disclosure relates to systems and methods for processing electronic payments for customer purchases. In some implementations, a system receives a payment request from a merchant, and transmits payment information to a mobile computing device associated with the merchant. The payment information includes a transaction ID to identify the purchase, a purchase amount, and instructions that cause the mobile computing device to activate a card reader, present a notification of the purchase amount to the customer, receive an acceptance of the purchase amount from the customer, and authorize the card reader to process an electronic payment for the purchase amount. The system receives payment confirmation from the mobile computing device, and provides the parameter confirmation to the merchant.
Systems and methods for point-to-point encryption compliance
Systems and methods for point-to-point encryption compliance are disclosed. In one embodiment, in a point of interaction device comprising at least one computer processor, a method for point-to-point encryption compliance may include: (1) receiving card data from a card reading device; (2) determining an error with the card data; (3) generating substitute data by replacing at least a portion of the card data with substitute data; and (4) communicating the substitute data to a payment server. The card data may be received from a magnetic stripe reader, from an EMV card reader, or from a contactless card reader. The error may include comprises the card data not being compliant with ISO-7813.
IC CARD WITH FINGERPRINT RECOGNITION FUNCTION AND WORKING METHOD THEREOF
A working method for an IC card having a fingerprint recognition function, comprising: an IC card receiving and determining an instruction type from a terminal, and when determined that the received instruction is an application selection instruction, the IC card selecting an application and returning a response to the terminal; when determined that the received instruction is a processing option acquisition instruction, the IC card acquiring a user fingerprint information verification state according to the content of the instruction, and if verification is successful, returning to the terminal a processing option instruction response containing an application file locator list for which a personal identification number does not need to be verified; if verification fails, returning to the terminal a processing option instruction response containing an application file locator list for which a personal identification number must be verified; when determined that the received instruction is a record reading instruction, the IC card returning a record reading response to the terminal according to the record reading instruction, wherein the record reading response contains a method for verifying a card holder. Thus, the risk of a personal identification number being leaked is avoided, thus enhancing the security of a transaction, while also improving user experience.
SYSTEMS AND METHODS FOR CAPTURING VISIBLE INFORMATION
A transaction card construction and computer-implemented methods for a transaction card are described. The transaction card has vector-formatted visible information applied by a laser machining system. In some embodiments, systems and methods are disclosed for enabling the sourcing of visible information using a scalable vector format The systems and methods may receive a request to add visible information to a transaction card and capture an image of the visible information. The systems and methods may capture data representing the image. The systems and methods may also determine an ambient color saturation of the image. Further, systems and methods may translate the image based on the ambient color saturation of the image. The systems and methods may also map the translated image to a bounding box and convert the mapped image into vector format. In addition, the systems and methods may provide the converted image to a laser machining system.
TAP TO AUTOFILL CARD DATA
Various embodiments are generally directed to autofilling card data from a contactless card to a form of a computing device. An application may determine that a payment field of a form has received focus. The application may then receive encrypted data from a communications interface of a contactless card associated with an account. The application may then receive, from a server, verification of the encrypted data. The application may then receive, from the server, an encrypted account number associated with the account, and decrypt the encrypted account number to yield the account number. An autofill service of an operating system (OS) executing on the processor circuit, may then autofill the account number to the payment field of the form.
Wireless devices for storing a financial account card and methods for storing card data in a wireless device
A non-transitory computer-readable medium stores instructions causing a processor to generate a menu displaying representations of a plurality of cards, the cards having associated card data; receive, from a user input device, a selection corresponding to a selected one of the cards; update the menu to display a representation of the selection; and authorize transmission of the card data associated with the selected card to complete a transaction.
Method for control of authenticity of a payment terminal and terminal thus secured
A method and a payment terminal enable verification of the authenticity of a payment terminal. More particularly, a method is provided for processing a piece of initial data, carried out within the payment terminal, the payment terminal being configured to authorize a verification of its authenticity by using the piece of initial data. The method includes: obtaining at least one piece of information external to the payment terminal, called a piece of initial data; cryptographic processing of the piece of initial data, delivering a piece of processed data; visual and/or sound rendering of the piece of processed data.
Systems and methods for programming a credential reader
A credential reader update system includes a server operable to provide a credential reader update via a cellular telephone interface, and a plurality of credential readers. Each credential reader communicates with a presented credential at a credential reader frequency, wherein each credential reader has a credential reader interface having a range. A portable update device is movable into and out of the range, and is operable to receive the credential reader update via the cellular telephone interface. A credential reader update application is included in the portable update device, and is operable to uniquely identify the particular credential reader to be updated. The portable update device transfers the credential reader update to the credential reader via the credential reader interface, and the credential reader update includes firmware instructions that cause the credential reader to perform communications with the presented credential at a second frequency different than the credential reader frequency.
Modularized and customizable transaction terminal architecture
Modular transaction terminal services are provided. The services are customized for specific features using configuration data maintained in files. The services communicate using a standardized data format and Application Programming Interface (API). An interface is provided for custom defining an instance of a processing environment for a target transaction terminal. Customizations are made to the files and process flow data structures that are processed by the services. The hardware requirements of the target transaction terminal are also obtained and an installation package is created for the target transaction terminal. The installation package is installed on hardware of the target transaction terminal and the processing environment initiated. The services, configuration data maintained in files, process flow data structures, and interface represent a modularized and customizable transaction terminal architecture.