G07F7/1041

AUTHENTICATION METHOD AND SYSTEM
20200210557 · 2020-07-02 · ·

The invention provides a computer-implemented authentication method comprising the step of enabling a user to input an identifier (e.g. a PIN) into an electronic device having a screen and a keypad operable within a keypad zone of the screen; by operating at least one key of the keypad via an image of at least part of a scrambled keypad which is displayed at least partially within the keypad zone. The user's operation of the keypad key via the image generates an encoded version of the user's intended input. In one sense the invention can be perceived as superimposing a non-functional image of a scrambled keyboard over an underlying, functional keypad. The image may be any type of electronic image, and may include a video image. The invention is particularly suited for use with, but not limited to, mobile phones, tablet computer, PCs etc. It can be implemented in any system wherein a user's identity must be verified before access is granted to a controlled resource.

AUTHENTICATION METHOD AND SYSTEM
20200201960 · 2020-06-25 · ·

The invention provides a computer-implemented authentication method comprising the step of enabling a user to input an identifier (e.g. a PIN) into an electronic device having a screen and a keypad operable within a keypad zone of the screen; by operating at least one key of the keypad via an image of at least part of a scrambled keypad which is displayed at least partially within the keypad zone. The user's operation of the keypad key via the image generates an encoded version of the user's intended input. In one sense the invention can be perceived as superimposing a non-functional image of a scrambled keyboard over an underlying, functional keypad. The image may be any type of electronic image, and may include a video image. The invention is particularly suited for use with, but not limited to, mobile phones, tablet computer, PCs etc. It can be implemented in any system wherein a user's identity must be verified before access is granted to a controlled resource.

Secure transactions using a personal device
10643210 · 2020-05-05 · ·

Various systems and methods for secure transactions using a personal device are described herein. A system to secure transactions using a personal device, the system comprises a randomization module to randomize an initial keypad representation to produce a randomized keypad representation; a communication module to: receive from the personal device, an indication to begin a secure transaction to access a resource with an access code; and transmit the randomized keypad representation to the personal device for presentation by the personal device to a user of the personal device; a keypad to receive a series of key presses from the user, the key presses corresponding to the access code based on the randomized keypad representation; and a security module to verify that the series of key presses correspond to the access code.

SYSTEM AND METHOD TO PROTECT PRIVACY OF PERSONAL-IDENTIFICATION-NUMBER ENTRY ON CONSUMER MOBILE DEVICE AND COMPUTING APPARATUS
20200126081 · 2020-04-23 ·

A system for accepting the input of a PIN comprises a first device receiving a randomized PIN layout derived on a fourth device. The randomized PIN layout is displayed on a display of the first device. A second device comprises an input for accepting a series of key presses to produce a PIN token. The PIN token indicating each of the series of key presses. A third device is in communication with the second device. The third device derives the randomized PIN layout and receives the PIN token from the second device without the PIN token being present on the first device. The third device combines the PIN layout and the PIN token to produce a PIN. The PIN is used to authenticate a transaction. The fourth and third devices each store a shared secret used to independently derive the randomized PIN layout on the fourth and third devices.

AUTOMATED DEVICE FOR EXCHANGE OF DATA

Methods and systems for providing physical input at an automated device are described. An automated device provides a sequence of interfaces. The automated device communicates with a server to exchange data, which is used to dynamically populate one or more of the interfaces in the sequence. The interface sequences includes: a physical input type selection interface providing option to provide physical input; a physical input request interface requesting physical input; a physical input processing interface indicating processing; a fourth interface showing determined value for the physical input; a data update processing interface indicating further processing; an acknowledgement interface indicating the account was updated to reflect the physical input; and a record preview interface providing a preview of a session record.

AUTOMATED DEVICE FOR DATA TRANSFER

Methods and systems for providing physical input at an automated device are described. An automated device provides a sequence of interfaces. The automated device communicates with a server to exchange data, which is used to dynamically populate one or more of the interfaces in the sequence. The interface sequences includes: a home interface providing options for performing an action using the automated device; a destination selection interface for selecting a destination account for a data transfer; a source selection interface for selecting a source account for the data transfer; a data value selection interface for receiving a data value for the data transfer; a data transfer processing interface indicating processing of the data transfer; an acknowledgement interface indicating completion of the data transfer; and a record preview interface providing a preview of a session record.

Encoding methods and systems
10592653 · 2020-03-17 · ·

The invention provides a solution for secure input of a user's input into an electronic device. The invention comprises methods and apparatus for secure input of a user's identifier e.g. password or other code. An image of a keyboard is superimposed over a scrambled, operable keyboard within a display zone of a screen associated with an electronic device. The keyboard image depicts a non-scrambled keyboard, in that the keys depicted in the image are in an expected or standardised format or order eg QWERTY keyboard arrangement. The difference in positions of the keys depicted in the image, and those in the operable keyboard, provides a mapping which enables an encoded form of the identifier to be generated, such that the un-encoded version is never stored in the device's memory. Preferably, the image depicts a keyboard which is standard for the device which it is being displayed on. The device may be a mobile phone, a tablet computer, laptop, PC, payment terminal or any other electronic computing device with a screen. The underlying keyboard, which is at least partially obscured from the user's view by the image, may be generated at run time by a procedure call. Preferably, this procedure is native to the device ie part of a library which is provided as standard with the device.

SECURE WIRELESS CARD READER
20200074469 · 2020-03-05 ·

In some examples, a wireless card reader detects insertion of a chip card at a chip card reader interface that includes electrical contacts positioned in the wireless card reader to contact contacts of the chip card when inserted into the wireless card reader. The wireless card reader may send, to a mobile computing device, a wireless communication request to send a PIN to the card reader. The card reader may receive, from the mobile computing device, a wireless communication including the PIN entered by a user on the mobile computing device. The card reader may send the PIN for authentication of the PIN. The card reader may receive a confirmation that the PIN has been authenticated. The card reader may send, to the mobile computing device, via the communication component, an indication of the confirmation that the PIN has been authenticated.

METHOD FOR SECURING DATA INPUT, COMMUNICATIONS TERMINAL AND CORRESPONDING PROGRAM
20200065529 · 2020-02-27 ·

A method for securing entry of sensitive data, the method being implemented by a communications terminal having a processor, an entry touchpad screen on which the entry of sensitive data is carried out. Such a method includes: displaying a random keypad for the entry of a confidential code; receiving, by the processor, a reference pad display signal; and displaying the reference keypad, the reference keypad being inactive.

KEYBOARD APPLICATION WITH THIRD PARTY ENGAGEMENT SELECTABLE ITEMS

Embodiments of the invention are directed to an embodiment of a keyboard application in which a plurality of selectable items (representing keys) are associated with transactions. The keyboard application may be imported into any application that utilizes text input, and replaces a default keyboard used to provide the text input. Upon selection of one of the plurality of selectable items, a transaction is initiated by a service provider computer. In some embodiments, the transaction may result in the engagement of a third party entity. Once completed, an access credential associated with the completion of the transaction is generated. The access credential may be entered into the text input field of the application that utilizes text input.