Patent classifications
G06K19/07309
MEMORY CARD LOCKING DEVICE
A memory card locking device is provided. The memory card locking device includes an external card reader having a card slot in which a memory card is allowed to be inserted. The external card reader includes a main controller. The main controller is configured to receive a locking instruction from an application, and execute a locking program on the memory card to lock the memory card according to the locking instruction. When the memory card is locked, any device other than the external card reader cannot read and identify the memory card, and thus cannot look up and access data stored in the memory card.
Digital identities for physical items
RFID technology may be used to provide digital identities for physical items. An RFID IC attached to or integrated into a physical item contains an identifier for the physical item. Digital identity information associated with the item, such as ownership information, history, properties, and the like, may be located on one or more networks. An entity, after authenticating itself and/or the item, may use the identifier to locate, retrieve, and/or update the item's digital identity information on the network.
CONTACTLESS CARD EMULATION SYSTEM AND METHOD
A system and method are described that enables mobile devices (e.g. including but not limited to a mobile phone or the like), to intercept and respond to contactless card authentication requests, allowing mobile devices to be used in place of contactless cards. Enabling mobile phone devices to emulate contactless cards decreases issues related to lost or damaged cards, enabling a single device to be used to provide tokens related to multiple different contactless cards, and leverages functionality of the mobile device to provide dual-factor authentication.
IC card, portable electronic device, IC card processing method and program
According to an embodiment, an IC card comprises a sensor, a storage, and a processor. The sensor obtains information for authentication. The storage stores an authentication list showing one or more authentication methods which use information from the sensor. The processor determines whether if there is an abnormality exists in the sensor. If it determines that the sensor is indeed abnormal, it updates the authentication list accordingly.
System and method for using dynamic tag content
A method is disclosed. The method includes a user device storing a message data template comprising a plurality of data fields. A multi-record message may be generated using the message data template in response to an interaction between the user device and an access device. To generate the multi-record message, the user device may increment a counter stored on the user device to produce a counter value, and generate a dynamic cryptogram. The user device may additionally retrieve a credential. The counter value, the dynamic cryptogram, and the credential may then be incorporated into the plurality of data fields of the message data template to form the multi-record message. The multi-record message may be transmitted to the access device, where the access device forwards the multi-record message to an authorization computer to authorize or deny the interaction.
Electronic marking
An electronic marking for verifying the authenticity of an object, including an antenna, an analogue transceiver circuit, a microcontroller, and at least one secure cryptoprocessor, in which the antenna is connected to the analogue transceiver circuit; the microcontroller is connected both to the analogue transceiver circuit and the at least one secure cryptoprocessor; the at least one secure cryptoprocessor is designed to securely generate a digital signature; the electronic marking has one or more electrical sensor conductors; the at least one secure cryptoprocessor is connected to at least one of the sensor conductors and designed to determine at least one electrical property of the connected at least one sensor conductor; and the one or more electrical sensor conductor(s) are distinct from the antenna and are positioned to overlap, at least partly, with said antenna.
SYSTEM AND METHOD FOR USING DYNAMIC TAG CONTENT
A method is disclosed. The method includes a user device storing a message data template comprising a plurality of data fields. A multi-record message may be generated using the message data template in response to an interaction between the user device and an access device. To generate the multi-record message, the user device may increment a counter stored on the user device to produce a counter value, and generate a dynamic cryptogram. The user device may additionally retrieve a credential. The counter value, the dynamic cryptogram, and the credential may then be incorporated into the plurality of data fields of the message data template to form the multi-record message. The multi-record message may be transmitted to the access device, where the access device forwards the multi-record message to an authorization computer to authorize or deny the interaction.
Cards having dynamic regions for selectively limiting visibility of content on card surfaces
A physical card has a body with dynamic region(s) configured to appear opaque for human viewing in a first phase and translucent for human viewing in a second phase. The card also has a computer readable chip, a power supply configured to power the one or more dynamic regions, a communication device, one or more processors, and memory storing instructions that, when executed, are configured to cause the card to perform a method. The card may receive an authorization signal from a recognized user device associated with a cardholder, direct dynamic region(s) to transition from being opaque in the first phase to being translucent in the second phase, and direct the dynamic region(s) to transition from being translucent in the second phase to being opaque in the first phase upon hitting a predetermined time threshold in the second phase.
PROTECTION OF PERSONAL DATA CONTAINED ON AN RFID-ENABLED DEVICE
A system for protecting personal data contained on an RFID-enabled device, suitable for use with an RFID system including an RFID reader configured to extract information from an RFID chip associated with the RFID-enabled device, includes a personal data protection system including a personal data protection device configured to prevent reading of the RFID chip associated with an RFID-enabled personal item.
CARDS HAVING DYNAMIC REGIONS FOR SELECTIVELY LIMITING VISIBILITY OF CONTENT ON CARD SURFACES
A physical card has a body with dynamic region(s) configured to appear opaque for human viewing in a first phase and translucent for human viewing in a second phase. The card also has a computer readable chip, a power supply configured to power the one or more dynamic regions, a communication device, one or more processors, and memory storing instructions that, when executed, are configured to cause the card to perform a method. The card may receive an authorization signal from a recognized user device associated with a cardholder, direct dynamic region(s) to transition from being opaque in the first phase to being translucent in the second phase, and direct the dynamic region(s) to transition from being translucent in the second phase to being opaque in the first phase upon hitting a predetermined time threshold in the second phase.