G06Q20/4012

FINGERPRINT-BASED CREDENTIAL ENTRY
20230146678 · 2023-05-11 ·

In some implementations, a physical medium for fingerprint-based PIN entry may include a fingerprint scanner, one or more memories that store fingerprint data and a PIN, and one or more processors. The physical medium may receive power from a terminal that is in communication with the physical medium. The physical medium may scan a fingerprint using the fingerprint scanner and the power received from the terminal. The physical medium may compare scanned fingerprint data, determined based on scanning the fingerprint, and the stored fingerprint data using the power received from the terminal. The physical medium may determine that the scanned fingerprint data sufficiently matches the stored fingerprint data based on comparing the scanned fingerprint data and the stored fingerprint data. The physical medium may transmit the PIN to the terminal based on determining that the scanned fingerprint data sufficiently matches the stored fingerprint data.

Embedded card reader security

Techniques described herein are directed to embedded card reader security. In an example, personal account number data read from a payment instrument may be temporally and/or spatially separated from personal identification number data utilized to complete a payment for products. Temporal separation may include removing the personal account number data from a merchant device prior to request personal identification number data. Spatial separation may include utilization of trusted execution environments, separated embedded card reader applications, intermediary applications, and/or trust routines, for example to enable different components of a merchant device, and/or components of other devices and systems to handle personal account number data and personal identification number data.

Method and system for blocking and unblocking merchants for future transactions

A method for establishing account controls for a transaction account through specially configured personal identification numbers includes: storing, in an account profile, an account identifier, standard personal identification number (PIN), and blocking PIN; receiving a first authorization request for a first payment transaction including the account identifier, a merchant identifier, and the blocking PIN; inserting the merchant identifier into the account profile; receiving a second authorization request for a second payment transaction including the account identifier and the merchant identifier; and transmitting an authorization response in response to the second authorization request including a response code indicating decline of the second payment transaction.

Second factor for secure password authentication

At an authorization server, a shared secret electronic key may be shared with a second computer. A selection to use a system to complete a transaction may be received from a first computing device. An image may be communicated to the first computing device. A digital representation entered by the user representing the image and a PIN based on the copy of the shared electronic key may be received from the second computing device. The system and method may determine if the digital representation entered by the user on the second computing device matches the image communicated to the first computing device. The system and method may determine if the PIN based on the copy of the shared electronic key from the second computing device is as expected. In response to determining the digital representation entered by the user matches the image and the PIN the second computing device is as expected, the user may be authorized.

Method and apparatus for invoking radio frequency card function
11645481 · 2023-05-09 · ·

A method and an apparatus for invoking a radio frequency card function are provided. The method includes: monitoring a feature input event, and obtaining feature information of a user from the feature input event obtained through monitoring; determining, based on a mapping relationship between the feature information and a radio frequency card type, a target radio frequency card type corresponding to the feature information of the user; and invoking a radio frequency card function corresponding to the target radio frequency card type. According to the method, different radio frequency card types may be distinguished based on the feature information of the user, so that the radio frequency card function corresponding to the target radio frequency card type corresponding to the feature information of the user can be invoked based on the feature information of the user. This further improves a card swiping success rate and improves user experience.

Lens depiction profile technology
11651350 · 2023-05-16 · ·

A smart card with secure and efficient image capture and analysis is provided. The card may include a non-transitory memory embedded in the housing storing computer-executable instructions. The instructions, when run on the microprocessor, are configured to capture, via the camera, an image of a building (or other suitable image), process the image via an image processing module, determine, based at least in part on the processing of the image, a payment amount and a payment recipient associated with the building. The smart card may also display payment information on the display screen. The payment information may include the payment amount and/or the payment recipient. When authorization is received via a tactile sensor, the card may execute a payment or other communication, over a payment gateway from an account associated with a user of the platform to an account associated with the payment recipient.

MULTIMODE RETAIL SYSTEM

A multimode system for receiving data in a retail environment includes: a secure input module for receiving high security input and low security input from a customer, the high security input to be communicated by the secure input module in cipher text, and the low security input to be communicated by the secure input module in plaintext. The multimode system is adapted to operate in a high security mode and a low security mode. The multimode system is adapted to enter the low security mode upon detection by the multimode system of a security breach condition. In the high security mode, the secure input module accepts low security input and high security input. In the low security mode, the secure input module accepts the low security input and does not accept the high security input.

System for harnessing a connected network to securely verify a transaction

A method for harnessing a connected network to securely verify and execute a transaction is provided. The method may include requesting a PIN from a mobile device. The request may be transmitted via a USSD message. The method may also include receiving the PIN from the mobile device. The PIN may be received via a response to the USSD message. The method may also include authenticating the mobile device. The method may also include accessing a third-party network to verify an authentication status of the mobile device. The third-party network may include a plurality of IoT endpoints. Each IoT endpoint may include a stored verification usage process. The stored verification usage process may relate to a user associated with the mobile device. The method may also include executing the transaction upon receipt of an authentication signal from the third-party network.

METHOD FOR MANAGING A BIOMETRIC SMART CARD

Provided is a method for managing a biometric sensor configured to collect a captured biometric data and a secure element able to communicate with the biometric sensor through a communication channel. The method comprises receiving a specific data by the biometric smart card, and checking the specific data by using a control data pre-stored in the biometric smart card. Only if said checking is successful, it then executes an erasing command for removing said reference biometric data from the biometric smart card and a disabling command for permanently deactivating the communication channel.

METHOD AND SYSTEM FOR PROVIDING AUTOMATED PAYMENT
20170372309 · 2017-12-28 ·

An automated payment method performed by an automated payment system include: receiving a payment request for a home shopping order from a user of a home shopping server associated with a home shopping broadcast; performing, in an authentication processor, authentication processing on the user based on a user information included in the payment request; and performing, in a payment processor, payment processing corresponding to the payment request based on the user information in response to successful authentication of the user.