G07F7/084

Method for securing an electronic device, and corresponding electronic device
10672214 · 2020-06-02 · ·

A method and corresponding electronic device for securing the device. The device and method may include operations for: receiving a command requesting a modification of an operating parameter of the electronic device (C2); detecting whether the operating parameter is a parameter that is predefined as a sensitive parameter; and if so, determining whether the modification requested by the command, if applied, would lead to a degradation of the security of the electronic device. The determining may be done by comparing the initial state of the parameter on receiving the command with a new state for giving to the operating parameter in response to the command. And, in the event of the security of the electronic device being degraded, triggering an operation of securing the electronic device in response to the first command.

CHIP CARD

A chip card is provided. The chip card can have a metal layer in which an opening is formed and a slot that extends from one edge of the opening to the outer edge of the metal layer, a booster antenna structure, arranged in the opening, having an antenna section for electromagnetically coupling to the metal layer and having a coupling region for electromagnetically coupling to an antenna structure of a chip module, and the chip module, which is arranged in the coupling region, having the antenna structure arranged on the chip module.

Contextual tapping engine

Various embodiments for contextual tapping engines. For example, an application executing on a computing device may authenticate credentials associated with an account and detect a tap of a contactless card to the computing device. The application may receive, from a communications interface of the contactless card, action data used to determine an action associated with the tap of the contactless card to the computing device. The application may determine a context of the application based on a current output of the application. The application may determine, based on the action data, the determined context, and data associated with the account, a first action associated with the tap of the contactless card to the computing device, the first action associated with at least one of the application and an operating system (OS). The application may initiate performance of the first action based on the tap of the contactless card.

Contextual tapping engine

Various embodiments for contextual tapping engines. For example, an application executing on a computing device may authenticate credentials associated with an account and detect a tap of a contactless card to the computing device. The application may receive, from a communications interface of the contactless card, action data used to determine an action associated with the tap of the contactless card to the computing device. The application may determine a context of the application based on a current output of the application. The application may determine, based on the action data, the determined context, and data associated with the account, a first action associated with the tap of the contactless card to the computing device, the first action associated with at least one of the application and an operating system (OS). The application may initiate performance of the first action based on the tap of the contactless card.

SYSTEMS AND METHODS FOR CRYPTOGRAPHIC AUTHENTICATION OF CONTACTLESS CARDS
20200104844 · 2020-04-02 ·

Example embodiments of systems and methods for data transmission in a contactless card and client application are provided. The contactless card comprises a visual display, processor, and a memory which includes a first applet, unique identifier, and value. A client application comprises instructions for execution on a client device, and is in data communication with the contactless card via one or more communication fields. The contactless card may display the value, the unique identifier, and a first status on the visual display. The first applet may transmit data to the client application in response to one or more gestures by the contactless card within at least one of the fields. The client application may authenticate the received data. The contactless card may update the display via the one or more fields based on the authenticated data, and change the first status to a second status based on the updated display.

SMART CARD NFC SECURE MONEY TRANSFER
20240029043 · 2024-01-25 ·

A secure method of real time money transferring between account holders utilizes Near Field Communication (NFC) technologies, dynamic transaction cards, and a mobile application to facilitate a seamless mobile transfer of funds. The dynamic transaction card of the customer requesting to make the transfer of funds may be placed in contact with the second recipient dynamic transaction card of the customer receiving the funds transfer to establish an NFC connection. The dynamic transaction card requesting the transfer may receive, via the NFC antenna on the card, the recipient customer account information stored on a passive NFC tag. The dynamic transaction card requesting the transfer may transmit the recipient account information to a mobile application, which may transmit the recipient account information to an account provider system for facilitating the funds transfer.

Dynamic transaction card optimization
10579990 · 2020-03-03 · ·

The present disclosure relates to devices and methods relating to an optimized electronic transaction card where various data inputs associated with a dynamic transaction card optimize operational configurations and/or a user experience of the dynamic transaction card to extend an energy storage life of the dynamic transaction card, promote various behaviors, and/or detect system and/or device defects. A dynamic transaction card may include a dynamic transaction card with various configuration and/or functionality that use the power components (e.g., printed circuit board (PCB), energy storage component, battery, and/or the like) of the dynamic transaction card. The configuration and/or functionality data may include, for example, sensor input, connection data, transaction data, display data, and/or the like. The configuration and/or functionality data may then be used to determine optimal configuration settings.

Secured device manufacturing self-test
10581855 · 2020-03-03 · ·

A payment terminal can have a secured test mode. Interfaces of the payment terminal may be secured via various techniques. Self-test input touch inputs may be provided at a user interface to initiate device self-tests. The payment terminal may perform the self-tests, and generate a machine-readable output including device information and results from the self-tests. The payment terminal may display the machine-readable output for scanning by test equipment.

Color changing payment card
10565583 · 2020-02-18 · ·

A method includes receiving, on an electronic payment device, a radio frequency signal from a mobile electronic device. The radio frequency signal is used to control an activation of an electric current to one or more color producing components on the electronic payment device. The electric current is transmitted to the one or more color producing components. The one or more color producing components display a color when the electric current is transmitted to the color producing components.

RADIO FREQUENCY-BASED SELF-ENROLMENT AND DATA EXCHANGE METHODS FOR BIOMETRIC SMART CARDS AND NON-SELF-POWERED AUTHENTICATION DEVICES
20200051061 · 2020-02-13 ·

The present invention relates to transfer methods of wireless power to non-self-powered biometric authentication devices through far-field radio waves coming from a nearby self-powered radio frequency device. By default, the non-self-powered biometric authentication device of the invention is made of a far-field radio microwave antenna, an antenna tuner, a RF-to-DC power rectifier and power converter functions. The transfer methods of wireless power to non-self-powered biometric authentication devices of the invention are particularly well-suited for self-enrolment of one user's identity on biometric smart cards but can also be applied for subsequent data exchange such as peer-to-peer money transfer.