Patent classifications
G07F7/1091
DEVICE AND METHOD OF STORING A SEED PHRASE
A physical device for safely and securely storing a seed phrase of a crypto wallet or like cryptographic services. The device having cover plates that can sandwich several grid plates, wherein the cover plates and the grid plates are swively bind together using a fastener. Each grid plate is having a grid of columns and rows. Each column is having several sub-columns. Each sub-column having ten rows for the numeral sequence 0-9. Each word of the seed phrase in its corresponding numerical code can be encoded on the grid.
Dual-core ATM
Disclosed herein are system, method, and computer program product embodiments a dual-core automated teller machine (ATM). The dual-core ATM system and method includes two physical central processing units (“computing devices” or “cores”) that are configured to perform operations in coordination with peripheral devices. Peripheral devices of the dual-core ATM system can include a peripheral screen, such as a touch screen, a card reader, a PIN pad (e.g., an encrypted pin pad or “EPP”), a cash dispenser, and a cash deposit module. A peripheral switch can isolate one of the computing devices from the one or more peripheral devices and that can permit the other of the computing devices to control the one or more peripheral devices. By maintaining redundant hardware sets within the ATM enclosure, the system can avoid a necessary reboot or powering-off in the event of, for example, a software failure.
Point of Sale Device with Cradle for Computing Device
A point of sale (POS) device includes a nest portion and a cradle portion. The nest portion includes one or more payment card or near field communication (NFC) readers. The cradle portion couples to differently-sized interchangeable frames, which in turn help secure a mobile computing device to the cradle portion of the POS device. The mobile computing device is connected via a connector to the rest of the POS device. Payment card information read by the readers is conveyed to the mobile computing device over the connector for processing. The POS device may also include tamper detection circuitry.
SYSTEMS AND METHODS FOR AUTHENTICATION USING A DYNAMIC PERSONAL IDENTIFICATION NUMBER
Methods and systems are provided herein for authenticating account holders using dynamic PINs. The methods may include receiving a transaction request from a vendor with the transaction request including a security number. The security number may be associated with an account holder. A dynamic PIN may be generated based at least in part on the time. The method may match the dynamic PIN to the security number associated with the account holder. The method may also include approving the transaction request from the vendor in response to the dynamic PIN matching the security number associated with the account holder. The method may further include the steps of generating a block including transaction information in response to the transaction request, broadcasting the block to a network for approval, adding the block to a blockchain in response to the approval, and generating the dynamic PIN.
Smart card with verification means
The present invention is directed to a smartcard that enables a one-time pin code offline security authentication with a card reader. This is achieved by generating a one-time pin code when the user inputs their pin code. The inputted pin code is encrypted and matched with the encrypted user correct pin code. If there is a match the one-time pin code is stored in memory and the transaction can proceed.
Operation of mathematical constant PI to authenticate website and computer network users
A computer-implemented user authentication method to provide users of computer devices interconnecting with computer information systems with a frequently changing numeric passcode generated via a time-synchronized mathematical operation of the mathematical constant Pi () without the need for a Two Factor Authentication process. The method operates the mathematical constant Pi, wherein an application software performs the mathematical operation of Pi to select a segment of Pi. The selected Pi segment becomes the user's passcode, referred in this invention as the PI ID Value (PIV). The method is dynamic, creating a new PIV for the computer user each time the user operates his/her computer device to gain access into a network or website. To attain the same Pi segment in real-time and authenticate the user, the network or website administrator utilizes in its computer server the same parameters and mathematical operation used by the user's computing device.
Operation of Mathematical Constant PI to Authenticate Website and Computer Network Users
A computer-implemented user authentication method to provide users of computer devices interconnecting with computer information systems with a frequently changing numeric passcode generated via a time-synchronized mathematical operation of the mathematical constant Pi () without the need for a Two Factor Authentication process. The method operates the mathematical constant Pi, wherein an application software performs the mathematical operation of Pi to select a segment of Pi. The selected Pi segment becomes the user's passcode, referred in this invention as the PI ID Value (PIV). The method is dynamic, creating a new PIV for the computer user each time the user operates his/her computer device to gain access into a network or website. To attain the same Pi segment in real-time and authenticate the user, the network or website administrator utilizes in its computer server the same parameters and mathematical operation used by the user's computing device.
VOICE-ACTIVATED INTERACTIVE CARD DEVICE
A smart card that is equipped with one or more sensory-perceptible devices that are capable of being activated in response to predetermined voice commands. Specifically, the smart card may be equipped with a light source, speaker, vibration motor, mechanical mechanism and/or the like, such that the card lights up, provides an audible sound, vibrates or the like in response to receiving a predetermined voice command. As a result of providing the voice command and activating the sensory-perceptible device, the user is readily able to distinguish and locate the card from amongst various cards stored in a purse, wallet or the like.
Voice-activated interactive card device
A smart card that is equipped with one or more sensory-perceptible devices that are capable of being activated in response to predetermined voice commands. Specifically, the smart card may be equipped with a light source, speaker, vibration motor, mechanical mechanism and/or the like, such that the card lights up, provides an audible sound, vibrates or the like in response to receiving a predetermined voice command. As a result of providing the voice command and activating the sensory-perceptible device, the user is readily able to distinguish and locate the card from amongst various cards stored in a purse, wallet or the like.
Authentication Methods and Systems
The invention provides a solution for secure authentication of an individual. The invention comprises methods and apparatus for secure input of a user's identifier e.g. PIN. An image of a keypad is superimposed over a scrambled, operable keypad within a display zone of a screen associated with an electronic device. The keypad image depicts a non-scrambled keypad, in that the keys depicted in the image are in an expected or standardised formal or order. The difference in positions of the keys depicted in the image, and those in the operable keypad, provides a mapping which enables an encoded form of the identifier to be generated, such that the un-encoded version is never stored in the device's memory. Preferably, the image depicts a keypad which is standard for the device which it is being shown on. The device may be a mobile phone, a tablet computer, laptop, PC, payment terminal or any other electronic computing device with a screen. The underlying keypad, which is at least partially obscured from the user's view by the image, may be generated at run time by a procedure call. Preferably, this procedure is native to the device ie part of a library which is provided as standard with the device.