G07F7/1091

Secure wireless card reader
11823186 · 2023-11-21 · ·

In some examples, a wireless card reader detects insertion of a chip card at a chip card reader interface that includes electrical contacts positioned in the wireless card reader to contact contacts of the chip card when inserted into the wireless card reader. The wireless card reader may send, to a mobile computing device, a wireless communication request to send a PIN to the card reader. The card reader may receive, from the mobile computing device, a wireless communication including the PIN entered by a user on the mobile computing device. The card reader may send the PIN for authentication of the PIN. The card reader may receive a confirmation that the PIN has been authenticated. The card reader may send, to the mobile computing device, via the communication component, an indication of the confirmation that the PIN has been authenticated.

Multi-touch key entry interface
11551217 · 2023-01-10 · ·

An initial multi-digit contact (multi-touch) is detected on a surface of a touchscreen display during initiation of a key entry session on a transaction terminal. A reference row for a logically maintained keypad is set for the key entry session based on the multi-touch. Active rows for the key entry session are changed by swipes up or down. A given key within an active row is selected based on pressure applied by or removed from one of the digits relative to other digits in the multi-touch or based on one of the digits swiped up or down while other digits remain stationary. The key entry session terminates when the multi-digit contact is lifted off the surface without further touching for a preconfigured period of elapsed time. In an embodiment, the session terminates when a multi-touch swipe to the left and then the right is detected (or right and then left).

Data protection with translation

Systems and methods are disclosed in which data associated with a transaction are protected with encryption. At an access device, a PIN associated with a payment account may be encrypted with a first key derived from an initial key of the access device and sensitive data associated with the payment account may be encrypted with a second key derived from the initial key. At a secure module associated with a host server encrypted sensitive data of an authorization request message may be decrypted. The secure module associated with the host server can re-encrypt the sensitive data using a zone encryption key associated with a payment processing network. A translated authorization request message including the re-encrypted sensitive data can be transmitted by the merchant server to the payment processing network.

Method for securing data input, communications terminal and corresponding program

A method for securing entry of sensitive data, the method being implemented by a communications terminal having a processor, an entry touchpad screen on which the entry of sensitive data is carried out. Such a method includes: displaying a random keypad for the entry of a confidential code; receiving, by the processor, a reference pad display signal; and displaying the reference keypad, the reference keypad being inactive.

SYSTEM AND METHOD FOR TOUCHLESS PIN ENTRY
20220092598 · 2022-03-24 ·

A system and method is described for the touchless entry of a personal identification number (PIN) at a self-service terminal such as an automated teller machine (ATM). A mobile device includes a PIN entry application. The self-service terminal includes a wireless interface for communicating wirelessly with the PIN entry application in the mobile device. A communication channel is established between a particular customer's mobile device and the self-service terminal. The PIN entry application verifies a public key for the self-service terminal at the mobile device. The customer's PIN is encrypted by the PIN entry application at the mobile device using either an ephemeral symmetric encryption key or a one-time RSA PIN transport public key. The encrypted PIN is transmitted to an encryption processor at the self-service terminal. The encryption processor decrypts the PIN using the appropriate encryption key.

SMART CARD DEPENDENT TRANSFER TECHNOLOGY
20220108299 · 2022-04-07 ·

Apparatus and methods are provided for a smart card which enables users to securely complete online transfers without entering sensitive transaction information into a third-party system. The smart card may include a touch-sensitive screen configured to display selectable transfer options. The smart card may include a microprocessor and wireless interface. The wireless interface may provide wireless communication capabilities and the ability to initiate online transfers based on information captured by the touch-sensitive screen. The smart card may be a parent smart card associated with a parent account. The parent account may be linked to a dependent account. The parent smart card may receive a communication related to the dependent account. Selectable transfer options displayed on the touch-sensitive screen may enable a transfer from the parent account to the dependent account.

MULTI-TOUCH KEY ENTRY INTERFACE
20220084029 · 2022-03-17 ·

An initial multi-digit contact (multi-touch) is detected on a surface of a touchscreen display during initiation of a key entry session on a transaction terminal. A reference row for a logically maintained keypad is set for the key entry session based on the multi-touch. Active rows for the key entry session are changed by swipes up or down. A given key within an active row is selected based on pressure applied by or removed from one of the digits relative to other digits in the multi-touch or based on one of the digits swiped up or down while other digits remain stationary. The key entry session terminates when the multi-digit contact is lifted off the surface without further touching for a preconfigured period of elapsed time. In an embodiment, the session terminates when a multi-touch swipe to the left and then the right is detected (or right and then left).

METHOD, SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR NETWORK BOUND PROXY RE-ENCRYPTION AND PIN TRANSLATION

A method, system, and computer program product generate, with a payment network, a first value (a) and a second value (g.sup.a), the second value (g.sup.a) based on the first value (a) and a generator value (g); generate, with the payment network, a plurality of random merchant numbers (m.sub.i) for a respective plurality of merchant banks; determine, with the payment network, a merchant product (M) based on a product of the plurality of random merchant numbers (m.sub.i); generate, with the payment network, a public key (pk.sub.i) based on the second value (g.sup.a), the merchant product (M), and the random merchant number (m.sub.i) and a random key (rk.sub.i) based on the merchant product (M) and the random merchant number (m.sub.i) for each respective merchant bank; and communicate, with the payment network, the public key (pk.sub.i) and the random key (rk.sub.i) to at least one respective merchant bank.

Device and method for secure identification of a user

A portable payment or retail terminal with jack connector and a method for secure identification of a cardholder. The terminal comprises a set of devices and arrangement for implementing the method, which comprises at least detecting if the cardholder has a mobile device, configuring the terminal for launching an accessibility mode on the mobile device of the cardholder, and transmitting a request to the mobile device for sending a PIN to the terminal. When receiving a communication from the mobile device including information, the method includes deciphering the information to obtain the PIN code and validating the transaction.

Securing personal identification number (PIN) entry on a transaction terminal
11182789 · 2021-11-23 · ·

A Personal Identification Number (PIN) pad includes a secure processor and is operated in two modes: 1) a secure mode during which key data associated with depressed keys are encrypted by the secure processor and provided to a transaction manager that executes on a processor of a transaction terminal in encrypted format, and 2) a non-secure mode during which key data associated with depressed keys are not encrypted and are received by the transaction manager in a clear format. The transaction manager activates the secure mode based on transaction processing for a transaction at the terminal. When secure mode is activated, the secure processor causes one or more integrated lights/speakers of the PIN pad and/or of other integrated peripherals of the terminal to illuminate or play a sound, providing an indication to a user that key entry is secure and safe for entry on the PIN pad during the transaction.