G07F7/0826

Secure card not present transactions using chip-enabled cards
10657535 · 2020-05-19 · ·

Techniques are described for performing secure card not present (CNP) transactions using integrated circuit chip-enabled cards. The techniques include continually or periodically tracking a location of a user's card by a user computing device, e.g., a smart phone, and storing a log of datasets relating to the location of the user's card at a server device. Based on the tracking, the user computing device may alert the user via a push notification or other message when the user's card is not within a preset range of the user computing device. In addition, an authentication server determines a location of a purchaser computing device attempting to perform a CNP transaction using the user's card information, and compares the location of the purchaser computing device with a most recent location of the user's card retrieved from the log of datasets to determine whether to approve the CNP transaction.

TAMPER RESISTANT DEVICE FOR AN INTEGRATED CIRCUIT CARD
20200137034 · 2020-04-30 ·

A tamper resistant device can be used for an integrated circuit card. The device includes memory storing a first security domain that includes a telecommunication profile and a second security domain that includes an application profile. A first physical interface is configured to be coupled to a baseband processor configured to operate with a mobile telecommunications network. A second physical interface configured to be coupled to an application processor. The first physical interface configured to allow the baseband processor to access the telecommunication profile and the second physical interface is configured to allow the application processor to access the application profile. The tamper resistant device is configured to enable accessibility to the application profile if corresponding commands are received at the first interface and to enable accessibility to the telecommunication profile if corresponding commands are received at the second interface.

SPECIALIZED SECONDARY COMPARTMENT IN A MOBILE DEVICE
20200106890 · 2020-04-02 ·

A computer-implemented method includes identifying critical data on a primary storage of a mobile device, where the primary storage is powered by a primary battery component. The critical data is backed up from the primary storage to a secondary storage. A charge level of the primary battery component is detected. It is determined that the charge level of the primary battery component is less than a minimum threshold. The mobile device is switched from a primary mode to a secondary mode, based on the charge level being less than the minimum threshold. A secondary battery component powers the secondary storage in the secondary mode, and the critical data is accessible on the secondary storage in the secondary mode.

SECURE ELEMENT MANAGEMENT METHOD AND ELECTRONIC DEVICE PERFORMING SAME

An electronic device includes a secure element in which at least one application package is installed and a processor for communicating with the secure element. The secure element further stores a list with which a part or all of identification information of the at least one application package is registered. The processor controls the secure element such that an application package indicated by the identification information registered with the list is uninstalled, in response to a specified event. Various other embodiments recognized from the specification are also possible.

ACQUIRING A BIOMETRIC PRINT BY MEANS OF A SMARTCARD

Described is a system (SY) comprising a card (DV1) and a peripheral device (DV2) configured to cooperate together to enable a biometric print to be acquired. The smartcard (DV1) includes a biometric print sensor (10) and a control module for transmitting control signals (SG) to the peripheral device (DV2), each control signal (SG) being defined by a respective single level of an electrical characteristic. Apart from a possible internal power supply, the peripheral device (DV2) may include passive components only, including a user interface (20) configured to put itself into a predetermined state in response to each received control signal (SG), so as to guide a user in acquiring a biometric print by means of the biometric print sensor (10).

ARCHITECTURE FOR ACCESS MANAGEMENT

Disclosed are techniques that render a graphical user interface on a display device for performing transactions with a security system. The techniques include listening by a user device for a beacon from the security system, the beacon including a message and imitating by the user device the transaction with the security system in response to the message, with the message causing the user device to render a graphical user interface that has fields for entering an email address and a password to register the user device with a security server, with the graphical user interface rendering on the display a public key stored in a user digital wallet and a user digital wallet identification and sending in response to the message, a user's public key that is stored in the user's wallet and which is embedded in a code.

Smart card multi-factor authentication device
10535068 · 2020-01-14 · ·

A dynamic transaction card may be paired with a user application executed on a user device card to facilitate multi-factor authentication of a user by utilizing the dynamic transaction card as a physical token. Various communication technologies may be utilized to create a connection between the dynamic transaction card and the user device application which may include wireless connections and physical connections. Validation information stored in a passive tag on the dynamic transaction card may be received by the user device application, which may evaluate the connection between the dynamic transaction card and the user device, log in credentials of the user, and user information stored in a digital security delivery storage to authenticate the user. This unique pairing of the dynamic transaction card and user device application may automatically facilitate a secure multi-factor authentication by utilizing the dynamic transaction card as a physical token.

Extra security element on cards to protect against fraud

Authenticating a secure element payment card includes transmitting a cold reset signal to the payment card and receiving an answer-to-reset message therefrom. The answer-to-reset message includes governing rules for performing a transaction, including a rule indicating that a secure data element is to be used to authenticate the payment card. The process also includes receiving payment account details for a payment account associated with the payment card. A payment authorization request message is transmitted to an interchange network and a card authentication request message is then received from the interchange network. The card authentication request message includes an encrypted instruction, which is transmitted to the secure element payment card. The secure data element is received from the payment card and a card authentication request response message is then transmitted to the interchange network. A payment authorization request response message is then received from the interchange network.

Deploying physical diamond tokens on a blockchain
11928674 · 2024-03-12 · ·

A diamond asset comprising one or more diamonds and an encryption chip is used to asset-back a cryptographic token that can be used to conduct transactions. The cryptographic token is written to a blockchain using a smart contract that is configured to enable a transaction associated with the token in response to two or more of: a signature by the encryption chip, a signature by the owner of the diamond asset, and a validation of a visual layout of the diamond asset.

Systems and methods for cryptographic authentication of contactless cards

Example embodiments of systems and methods for data transmission system between transmitting and receiving devices are provided. In an embodiment, each of the transmitting and receiving devices can contain a master key. The transmitting device can generate a diversified key using the master key, protect a counter value and encrypt data prior to transmitting to the receiving device, which can generate the diversified key based on the master key and can decrypt the data and validate the protected counter value using the diversified key. Example embodiments of systems and methods can be used to provide further authentication and added levels of security for transactions.