G07F7/1041

IN-VEHICLE PAYMENT SYSTEM AND METHOD FOR GENERATING AUTHORIZATION INFORMATION USING THE SAME

An in-vehicle payment system and a method for generating authorization information using the same are provided. The in-vehicle payment system includes an authentication number input device including an interface of a vehicle configured to receive an input from a user, and generate and output input signals corresponding to a manipulation pattern of the interface, a code display device configured to display a code table in an array form including a plurality of code values based on received code information on a screen, and an authorization information generator configured to generate the code information and transmit the code information to the code display device, and recognize an authentication number input by the user using the code information and preset matching information to generate authorization information corresponding to the authentication number when the input signals are received from an authentication number input device.

PAID INTERACTION METHOD AND SYSTEM FOR PRECISE SEARCH, TERMINAL AND STORAGE MEDIUM
20210141849 · 2021-05-13 ·

Disclosed are a paid interaction method and system for precise search, a terminal, and a storage medium. The method includes: receiving demand information released by a first user terminal; sending the demand information to all user terminals that customize the keyword; receiving response information from at least one second user terminal, where the response information is reply information sent by the second user terminal to the first user terminal; receiving request information of the first user terminal for granting medals to the second user terminal; adding the medals to the selected second user terminal according to the request information for granting the medals; and deleting the demand information and the response information. The embodiments of the present invention can reduce redundant information, improve search efficiency, and implement precise release of demand information, so that demands of users match each other, thereby improving interaction efficiency.

SYSTEM AND METHOD TO PROTECT PRIVACY OF PERSONAL-IDENTIFICATION-NUMBER ENTRY ON CONSUMER MOBILE DEVICE AND COMPUTING APPARATUS
20210049605 · 2021-02-18 ·

A system for accepting the input of a PIN comprises a first device receiving a randomized PIN layout derived on a fourth device. The randomized PIN layout is displayed on a display of the first device. A second device comprises an input for accepting a series of key presses to produce a PIN token. The PIN token indicating each of the series of key presses. A third device is in communication with the second device. The third device derives the randomized PIN layout and receives the PIN token from the second device without the PIN token being present on the first device. The third device combines the PIN layout and the PIN token to produce a PIN. The PIN is used to authenticate a transaction. The fourth and third devices each store a shared secret used to independently derive the randomized PIN layout on the fourth and third devices.

System and method for providing automated teller service using mobile terminal
10957166 · 2021-03-23 · ·

To achieve the above-mentioned objective, an automated teller machine service system according to one aspect of the present disclosure includes an automated teller machine (ATM) including a near-field communication (NFC) tag, a mobile terminal including a NFC chip and an input/output device for processing a deposit or withdrawal, and a server configured to receive transaction information for processing the deposit or withdrawal from the mobile terminal and, in a case in which the transaction information is identical to previously-saved information as a result of comparing the two pieces of information, transmit deposit/withdrawal authorization information to the ATM, wherein, when the NFC chip is brought into contact with the NFC tag, the ATM transmits a deposit/withdrawal application running command to the mobile terminal, and the mobile terminal receives the command and then runs the application to transmit the transaction information to the ATM or the server.

DEVICE AND METHOD FOR SECURE IDENTIFICATION OF A USER
20210209599 · 2021-07-08 ·

A portable payment or retail terminal with jack connector and a method for secure identification of a cardholder, the terminal including a set of devices and arrangement for implementing the method, which has at least: detecting the presence of a jack plugged in the connector of the terminal for connecting a cardholder's headset, triggering the execution of an accessibility mode allowing the cardholder to identify, the method being wherein it includes at least: scrambling and maintaining the screen in black during the sequence of the accessibility mode, generating a chain of keys comprising a set of keys for PIN/SNL entry, attributing a value of key corresponding to the length d of the finger's displacement; selecting among pre-registered audio signals corresponding to each key of the chain of keys, the sound corresponding to the key attributed to the displacement and emit it through the jack connector towards the cardholder's headset.

Authentication Methods and Systems
20210004449 · 2021-01-07 · ·

The invention provides a solution for secure authentication of an individual. The invention comprises methods and apparatus for secure input of a user's identifier e.g. PIN. An image of a keypad is superimposed over a scrambled, operable keypad within a display zone of a screen associated with an electronic device. The keypad image depicts a non-scrambled keypad, in that the keys depicted in the image are in an expected or standardised formal or order. The difference in positions of the keys depicted in the image, and those in the operable keypad, provides a mapping which enables an encoded form of the identifier to be generated, such that the un-encoded version is never stored in the device's memory. Preferably, the image depicts a keypad which is standard for the device which it is being shown on. The device may be a mobile phone, a tablet computer, laptop, PC, payment terminal or any other electronic computing device with a screen. The underlying keypad, which is at least partially obscured from the user's view by the image, may be generated at run time by a procedure call. Preferably, this procedure is native to the device ie part of a library which is provided as standard with the device.

Authentication and secure transmission of data between signature devices and host computers using transport layer security
10839382 · 2020-11-17 · ·

A transport layer security (TLS) connection is established between a signature device and the host computer via an interface (e.g., a universal serial bus (USB) interface). The signature device acts as a TLS server, and the host computer acts as a TLS client. Data such as pen data, control data, or image data may be received or transmitted via a USB bulk transfer mechanism. In one aspect, the host computer sends a command via the interface to the signature device to generate a new key pair, receives a certificate signing request (CSR) from the signature device via the interface, sends the CSR to a user certificate authority, receives a public key certificate from the user certificate authority, and sends the public key certificate to the signature device via the interface.

System and method to protect privacy of personal-identification-number entry on consumer mobile device and computing apparatus
10832243 · 2020-11-10 · ·

A system for accepting the input of a PIN comprises a first device receiving a randomized PIN layout derived on a fourth device. The randomized PIN layout is displayed on a display of the first device. A second device comprises an input for accepting a series of key presses to produce a PIN token. The PIN token indicating each of the series of key presses. A third device is in communication with the second device. The third device derives the randomized PIN layout and receives the PIN token from the second device without the PIN token being present on the first device. The third device combines the PIN layout and the PIN token to produce a PIN. The PIN is used to authenticate a transaction. The fourth and third devices each store a shared secret used to independently derive the randomized PIN layout on the fourth and third devices.

Authentication methods and systems
10740449 · 2020-08-11 · ·

The invention provides a solution for secure authentication of an individual. The invention comprises methods and apparatus for secure input of a user's identifier e.g. PIN. An image of a keypad is superimposed over a scrambled, operable keypad within a display zone of a screen associated with an electronic device. The keypad image depicts a non-scrambled keypad, in that the keys depicted in the image are in an expected or standardised format or order. The difference in positions of the keys depicted in the image, and those in the operable keypad, provides a mapping which enables an encoded form of the identifier to be generated, such that the un-encoded version is never stored in the device's memory. Preferably, the image depicts a keypad which is standard for the device which it is being shown on. The device may be a mobile phone, a tablet computer, laptop, PC, payment terminal or any other electronic computing device with a screen. The underlying keypad, which is at least partially obscured from the user's view by the image, may be generated at run time by a procedure call. Preferably, this procedure is native to the device ie part of a library which is provided as standard with the device.

AUTHENTICATION METHOD AND SYSTEM
20200226235 · 2020-07-16 · ·

The invention provides a computer-implemented authentication method comprising the step of enabling a user to input an identifier (e.g. a PIN) into an electronic device having a screen and a keypad operable within a keypad zone of the screen; by operating at least one key of the keypad via an image of at least part of a scrambled keypad which is displayed at least partially within the keypad zone. The user's operation of the keypad key via the image generates an encoded version of the user's intended input. In one sense the invention can be perceived as superimposing a non-functional image of a scrambled keyboard over an underlying, functional keypad. The image may be any type of electronic image, and may include a video image. The invention is particularly suited for use with, but not limited to, mobile phones, tablet computer, PCs etc. It can be implemented in any system wherein a user's identity must be verified before access is granted to a controlled resource.