G07F7/084

URL-BASED AUTHENTICATION FOR PAYMENT CARDS
20220247741 · 2022-08-04 · ·

Systems, methods, articles of manufacture for authentication of payment cards. A server may assign, in a database, an expected card identifier to a contactless card, the contactless card associated with an account. The server may receive, from a client device, a request comprising a uniform resource locator (URL), a parameter of the URL comprising a card identifier, wherein the URL is transmitted by the contactless card to the client device. The server may extract the card identifier from the URL and compare the extracted card identifier to the expected card identifier in the database. The server may determine, based on the comparison, that the extracted card identifier matches the expected card identifier. The server may authenticate the request based on the extracted card identifier matching the expected card identifier, and transmit, to the client device, an indication specifying that the request was authenticated.

Methods and systems for displaying health status of a payment card

Embodiments provide methods and systems for determining and displaying health status of a payment card. The payment card includes a planar body, an interconnection circuit, and a display section. The planar body houses a payment card processing section. The interconnection circuit is configured within the planar body. The interconnection circuit is configured to generate a damage signal in response to a physical damage of at least a portion of the planar body or the payment card processing section. The display section is positioned in the planar body for displaying a visual information indicating health status of the payment card in response to the damage signal for a cardholder.

SYSTEMS AND METHODS FOR USE IN PROMOTING HASH KEY ACCOUNT ACCESS

Systems and methods are provided for identifying an account via a hash key specific to the account and presented to a third party, in connection with a network interaction. One example method includes receiving, by a computing device, from the third party, the hash key in connection with the network interaction, determining a primary account number (PAN) for the account based on the hash key, and identifying an issuer of the account based on the determined PAN. The method also includes transmitting a verification request to the issuer, to verify details of the account, and receiving a code from the issuer indicative of the verification. The method further includes intercepting an authorization request for the network interaction based on the authorization request including the hash key and, in response to the authorization request further including said code, directing the authorization request to the issuer.

Enabling card and method and system using the enabling card in a POS

The invention relates to an enabling card as well as a system and method for completing a financial transaction in a P.O.S. terminal comprising: a processor carried by the enabling card for: establishing a connection with a mobile device; receiving secure information from a mobile device and generating a digital signal; a coil carried by the enabling card for generating a magnetic field in response to the digital signal to simulate the swipe of card in the P.O.S. terminal and complete the financial transaction.

TAP TO COPY DATA TO CLIPBOARD VIA NFC

Various embodiments are generally directed to copying data to a clipboard of a mobile device from a contactless card using NFC. A mobile device may issue a request to read data from the contactless card. The contactless card may generate encrypted data in response to the request. The mobile device may receive the encrypted data via NFC and transmit the encrypted data to a server for verification. The server may verify the encrypted data and transmit an indication of an account number for the contactless card to the mobile device. The mobile device may then copy the account number to a clipboard of the mobile device.

ENABLING CARD AND METHOD AND SYSTEM USING THE ENABLING CARD IN A POS

The invention relates to an enabling card as well as a system and method for completing a financial transaction in a P.O.S. terminal comprising: a processor carried by the enabling card for: establishing a connection with a mobile device; receiving secure information from a mobile device and generating a digital signal; a coil carried by the enabling card for generating a magnetic field in response to the digital signal to simulate the swipe of card in the P.O.S. terminal and complete the financial transaction.

Smart card NFC secure money transfer

A secure method of real time money transferring between account holders utilizes Near Field Communication (NFC) technologies, dynamic transaction cards, and a mobile application to facilitate a seamless mobile transfer of funds. The dynamic transaction card of the customer requesting to make the transfer of funds may be placed in contact with the second recipient dynamic transaction card of the customer receiving the funds transfer to establish an NFC connection. The dynamic transaction card requesting the transfer may receive, via the NFC antenna on the card, the recipient customer account information stored on a passive NFC tag. The dynamic transaction card requesting the transfer may transmit the recipient account information to a mobile application, which may transmit the recipient account information to an account provider system for facilitating the funds transfer.

Tap to copy data to clipboard via NFC

Various embodiments are generally directed to copying data to a clipboard of a mobile device from a contactless card using NFC. A mobile device may issue a request to read data from the contactless card. The contactless card may generate encrypted data in response to the request. The mobile device may receive the encrypted data via NFC and transmit the encrypted data to a server for verification. The server may verify the encrypted data and transmit an indication of an account number for the contactless card to the mobile device. The mobile device may then copy the account number to a clipboard of the mobile device.

Systems and methods for securing contactless cards from unauthorized payments

An embodiment of the present invention is directed to systems and methods for securing contactless cards from unauthorized payments, including card cloning attacks. An embodiment of the present invention provides a password at the time of usage of the card to decrypt the data contained in the card at the time when the user is initiating a transaction. In this exemplary illustration, card data may be encrypted at rest, and decrypted at the time of use. Other variations may include a switchable antenna that is disabled at rest and enabled during a transaction.

Pre-staging technology for self-service kiosks
11068768 · 2021-07-20 · ·

Wait times at self-service kiosks may undermine the utility of these self-service machines. Self-service kiosks are configured to provide faster self-service kiosks that allow users to quickly perform common financial transactions. However, it has been increasing common for users to have to wait on a line to access a kiosk. Apparatus and methods are provided for a smart card that stages transactions by capturing the amount, pin and other necessary information on the smart card itself, before the user begins interacting with the kiosk. Information captured by the smart card may be transferred to the kiosk when the smart card is inserted into the kiosk. The user does not provide the kiosk with any additional information after inserted the smart card into the kiosk, thereby improving the transaction processing efficiency of the kiosk and enhancing user satisfaction.