G07F7/1091

AUTHENTICATION METHOD AND SYSTEM
20220156350 · 2022-05-19 · ·

The invention provides a computer-implemented authentication method comprising the step of enabling a user to input an identifier (e.g. a PIN) into an electronic device having a screen and a keypad operable within a keypad zone of the screen; by operating at least one key of the keypad via an image of at least part of a scrambled keypad which is displayed at least partially within the keypad zone. The user's operation of the keypad key via the image generates an encoded version of the user's intended input. In one sense the invention can be perceived as superimposing a non-functional image of a scrambled keyboard over an underlying, functional keypad. The image may be any type of electronic image, and may include a video image. The invention is particularly suited for use with, but not limited to, mobile phones, tablet computer, PCs etc. It can be implemented in any system wherein a user's identity must be verified before access is granted to a controlled resource.

DATA PROTECTION WITH TRANSLATION

Systems and methods are disclosed in which data associated with a transaction are protected with encryption. At an access device, a PIN associated with a payment account may be encrypted with a first key derived from an initial key of the access device and sensitive data associated with the payment account may be encrypted with a second key derived from the initial key. At a secure module associated with a host server encrypted sensitive data of an authorization request message may be decrypted. The secure module associated with the host server can re-encrypt the sensitive data using a zone encryption key associated with a payment processing network. A translated authorization request message including the re-encrypted sensitive data can be transmitted by the merchant server to the payment processing network.

Method, system, and computer program product for network bound proxy re-encryption and PIN translation

A method, system, and computer program product generate, with a payment network, a first value (a) and a second value (ga), the second value (ga) based on the first value (a) and a generator value (g); generate, with the payment network, a plurality of random merchant numbers (mi) for a respective plurality of merchant banks; determine, with the payment network, a merchant product (M) based on a product of the plurality of random merchant numbers (mi); generate, with the payment network, a public key (pki) based on the second value (ga), the merchant product (M), and the random merchant number (mi) and a random key (rki) based on the merchant product (M) and the random merchant number (mi) for each respective merchant bank; and communicate, with the payment network, the public key (pki) and the random key (rki) to at least one respective merchant bank.

DUAL-CORE ATM

Disclosed herein are system, method, and computer program product embodiments a dual-core automated teller machine (ATM). The dual core ATM system and method includes two physical central processing units (“computing devices” or “cores”) that are configured to perform operations in coordination with peripheral devices. Peripheral devices of the dual-core ATM system can include a peripheral screen, such as a touch screen, a card reader, a PIN pad (e.g., an encrypted pin pad or “EPP”), a cash dispenser, and a cash deposit module. A peripheral switch can isolate one of the computing devices from the one or more peripheral devices and that can permit the other of the computing devices to control the one or more peripheral devices. By maintaining redundant hardware sets within the ATM enclosure, the system can avoid a necessary reboot or powering-off in the event of, for example, a software failure.

PAYMENT METHOD USING BIOMETRIC AUTHENTICATION AND ELECTRONIC DEVICE THEREFOR
20220005046 · 2022-01-06 ·

Various embodiments of the disclosure relate to a payment method using biometric authentication, and an electronic device thereof. The electronic device includes a communication module configured to provide communication with a server, a processor operatively coupled to the communication module, and a memory operatively coupled to the processor and configured to store biometric information. The memory may store instructions, when executed, causing the processor to, when registered for a first time use, generate a parameter for biometric authentication verification and an encrypted password for password authentication verification and transmit the generated parameter and password to the server, in order to register, with the server, biometric authentication information for biometric authentication verification and a password for password authentication, when a payment is made, use at least one of the biometric authentication and the password authentication to authenticate a user, and when it is necessary to change the biometric authentication information registered with the server, register new biometric authentication information with the server in the process of the payment.

Method, System, and Computer Program Product for Network Bound Proxy Re-Encryption and Pin Translation

A method, system, and computer program product generate, with a payment network, a first value (a) and a second value (g.sup.a), the second value (g.sup.a) generated based on the first value (a) and a generator value (g); generate, with the payment network, a plurality of random merchant numbers (m.sub.i) for a respective plurality of merchant banks; determine, with the payment network, a merchant product (M) based on a product of the plurality of random merchant numbers (m.sub.i); generate, with the payment network, a public key (pk.sub.i) based on the second value (g.sup.a), the merchant product (M), and the random merchant number (m.sub.i) and a random key (rk.sub.i) based on the merchant product (M) and the random merchant number (m.sub.i) for each respective merchant bank; and communicate, with the payment network, the public key (pk.sub.i) and the random key (rk.sub.i) to at least one respective merchant bank.

Method, system, and computer program product for network bound proxy re-encryption and PIN translation

A method, system, and computer program product generate, with a payment network, a first value (a) and a second value (g.sup.a), the second value (g.sup.a) generated based on the first value (a) and a generator value (g); generate, with the payment network, a plurality of random merchant numbers (m.sub.i) for a respective plurality of merchant banks; determine, with the payment network, a merchant product (M) based on a product of the plurality of random merchant numbers (m.sub.i); generate, with the payment network, a public key (pk.sub.i) based on the second value (g.sup.a), the merchant product (M), and the random merchant number (m.sub.i) and a random key (rk.sub.i) based on the merchant product (M) and the random merchant number (m.sub.i) for each respective merchant bank; and communicate, with the payment network, the public key (pk.sub.i) and the random key (rk.sub.i) to at least one respective merchant bank.

FINANCIAL TRANSACTION SYSTEM AND METHOD
20230281595 · 2023-09-07 ·

A financial transaction method can include creating a token correlated to a financial account. The method can also include storing the correlation between the token and the financial account in a token database. The method can also include transmitting the token to a mobile computing device operating an application. The method can also include displaying the token on a display of the mobile computing device. The method can also include receiving, over a public network, the token and data associated with a first financial transaction. The method can also include confirming identity between the token transmitted to the mobile computing device and the token received from the secondary computing device. The method can also include transmitting over the public network, approval of the first financial transaction to the secondary computing device in response to the confirming.

Smart card dependent transfer technology
11640599 · 2023-05-02 · ·

Apparatus and methods are provided for a smart card which enables users to securely complete online transfers without entering sensitive transaction information into a third-party system. The smart card may include a touch-sensitive screen configured to display selectable transfer options. The smart card may include a microprocessor and wireless interface. The wireless interface may provide wireless communication capabilities and the ability to initiate online transfers based on information captured by the touch-sensitive screen. The smart card may be a parent smart card associated with a parent account. The parent account may be linked to a dependent account. The parent smart card may receive a communication related to the dependent account. Selectable transfer options displayed on the touch-sensitive screen may enable a transfer from the parent account to the dependent account.

Dual-core ATM

Disclosed herein are system, method, and computer program product embodiments a dual-core automated teller machine (ATM). The dual core ATM system and method includes two physical central processing units (“computing devices” or “cores”) that are configured to perform operations in coordination with peripheral devices. Peripheral devices of the dual-core ATM system can include a peripheral screen, such as a touch screen, a card reader, a PIN pad (e.g., an encrypted pin pad or “EPP”), a cash dispenser, and a cash deposit module. A peripheral switch can isolate one of the computing devices from the one or more peripheral devices and that can permit the other of the computing devices to control the one or more peripheral devices. By maintaining redundant hardware sets within the ATM enclosure, the system can avoid a necessary reboot or powering-off in the event of, for example, a software failure.