G07F7/1083

Electronic device and authentication method thereof

An electronic device is provided. The electronic device includes a camera, a memory configured to store a model learned to determine whether a user performing authentication for a financial service is in a threat situation, and a processor configured to perform authentication for the financial service based on biometrics information of the user performing authentication for the financial service. The processor may acquire an image by photographing the user performing authentication through the camera, acquire information on whether the user performing authentication is in a threat situation from the learned model, with information acquired from the image as input of the learned model, and perform authentication for the financial service according to the acquired information. At least a part of the learned model is an artificial intelligent algorithm, which may be performed according to at least one of machine learning, neural network, or deep learning algorithm.

Securing a transaction by means of a smart card and smart card
11151338 · 2021-10-19 · ·

Disclosed is a method of managing a smart card configured for securing a transaction with an external device via a card reader, the method including the following steps: incrementing at least one command counter of commands received by the smart card during a transaction; and depending on the current value of the at least one counter and a command profile, implementation of a smart card management command.

TECHNICAL FALLBACK INFRASTRUCTURE

Examples, methods and systems described herein may include determining, by a payment processing system, whether a second payment mechanism may be used to perform a payment transaction when a first payment mechanism is preferred and/or when the first payment mechanism has failed. Determining to use the second payment mechanism can be based on (i) an analysis of a communication status indicator received from a point-of-sale (POS) terminal that indicates which payment mechanisms are capable of communicating with the POS terminal, (ii) data received from the POS terminal that is associated with a read of a payment object, and/or (iii) an allowance criterion.

Technical fallback infrastructure

Examples, methods and systems described herein may include determining, by a payment processing system, whether a second payment mechanism may be used to perform a payment transaction when a first payment mechanism is preferred and/or when the first payment mechanism has failed. Determining to use the second payment mechanism can be based on (i) an analysis of a communication status indicator received from a point-of-sale (POS) terminal that indicates which payment mechanisms are capable of communicating with the POS terminal, (ii) data received from the POS terminal that is associated with a read of a payment object, and/or (iii) an allowance criterion.

Technical fallback infrastructure

Examples, methods and systems described herein may include determining, by a payment processing system, whether a second payment mechanism may be used to perform a payment transaction when a first payment mechanism is preferred and/or when the first payment mechanism has failed. Determining to use the second payment mechanism can be based on (i) an analysis of a communication status indicator received from a point-of-sale (POS) terminal that indicates which payment mechanisms are capable of communicating with the POS terminal, (ii) data received from the POS terminal that is associated with a read of a payment object, and/or (iii) an allowance criterion.

Monitoring and recovery for a USB interface

A first device and a second device enter a USB monitoring mode. The second device transmits monitoring messages on a periodic basis, while the first device has a monitoring timer that it resets each time a monitoring message is received. If a monitoring message is not received before the monitoring timer expires, the first device starts a reconnect timer. After a certain number of failed attempts to receive monitoring messages, the first device takes corrective action to restore USB communications.

SECURING A TRANSACTION BY MEANS OF A SMART CARD AND SMART CARD
20200193101 · 2020-06-18 ·

Disclosed is a method of managing a smart card configured for securing a transaction with an external device via a card reader, the method including the following steps: incrementing at least one command counter of commands received by the smart card during a transaction; and depending on the current value of the at least one counter and a command profile, implementation of a smart card management command.

ELECTRONIC DEVICE AND AUTHENTICATION METHOD THEREOF
20190295203 · 2019-09-26 ·

An electronic device is provided. The electronic device includes a camera, a memory configured to store a model learned to determine whether a user performing authentication for a financial service is in a threat situation, and a processor configured to perform authentication for the financial service based on biometrics information of the user performing authentication for the financial service. The processor may acquire an image by photographing the user performing authentication through the camera, acquire information on whether the user performing authentication is in a threat situation from the learned model, with information acquired from the image as input of the learned model, and perform authentication for the financial service according to the acquired information. At least a part of the learned model is an artificial intelligent algorithm, which may be performed according to at least one of machine learning, neural network, or deep learning algorithm.

TECHNICAL FALLBACK INFRASTRUCTURE

Examples, methods and systems described herein may include determining, by a payment processing system, whether a second payment mechanism may be used to perform a payment transaction when a first payment mechanism is preferred and/or when the first payment mechanism has failed. Determining to use the second payment mechanism can be based on (i) an analysis of a communication status indicator received from a point-of-sale (POS) terminal that indicates which payment mechanisms are capable of communicating with the POS terminal, (ii) data received from the POS terminal that is associated with a read of a payment object, and/or (iii) an allowance criterion.

Self-authenticating credit card system
10223856 · 2019-03-05 · ·

A self-authenticating credit card method includes: inputting a unique identification to an input device on a credit card; comparing the input unique identification with a stored unique identification stored within the credit card; and providing an output from the credit card when the received unique identification matches the unique identification stored within the credit card.