G06K19/07381

Transaction card mode related to locating a transaction card

A transaction card may determine to initiate a mode associated with the transaction card. The mode may be related to locating the transaction card. The mode may be associated with outputting a first signal. The transaction card may determine a manner in which to configure the mode based on a set of parameters. The set of parameters may include a power level of the transaction card, or a strength of a second signal associated with a connection between the transaction card and a device associated with the transaction card. The transaction card may initiate the mode after configuring the mode. The transaction card may determine to terminate the mode based on an indication that the transaction card has been located.

Sealing device for securing packaging material
10569917 · 2020-02-25 ·

Disclosed is a sealing device for securing a packaging material. The sealing device for securing the packaging material comprises: a tape supply reel for supplying a sealing tape to which an RFID tag has been coupled; and a sealing part for sealing, with the sealing tape, an opening of a plastic packaging material holding a product, wherein the sealing part adheres the RFID tag, which is coupled to one end of the sealing tape having the length for one use, to an adhesive positioned on the other end portion of the sealing tape having the length for one use, wherein the RFID tag is broken by the adhesive strength with respect to the other end portion when the sealing tape sealing the plastic packaging material is torn.

RFID tag with anti-tamper assembly

A radio frequency identification (RFID) transponder may include a substrate and a device. The substrate may be in communication with a controller and an antenna, and the antenna is arranged to receive radio frequency signals. A first side surface of the substrate may include a capacitor. The device may be detachably coupled with the substrate via a conductive member positioned between the structure and the capacitor of the substrate, and the conductive member may be within a desired proximity of the capacitor. The structure may be attached to an attachment surface so that an attachment strength between the structure and the attachment surface may be greater than a force required to decouple the structure from the substrate. When the structure is decoupled from the substrate, the conductive member separates from the capacitor, disabling the transponder.

SYSTEM AND METHODS FOR SECURE FIRMWRE VALIDATION
20200034542 · 2020-01-30 ·

An electronic device, such as a dynamic transaction card having an EMV chip, that acts as a TPM having a memory, an applet, and a cryptographic coprocessor performs secure firmware and/or software updates, and performs firmware and/or software validation for firmware and/or software that is stored on the electronic device. Validation may compare a calculated checksum with a checksum stored in EMV chip memory. If a checksum calculated for firmware and/or a software application matches a checksum stored in EMV chip memory of the transaction card, the transaction card may operate normally. If a checksum calculated for firmware and/or a software application does not match a checksum stored in EMV chip memory of the transaction card, the transaction card may freeze all capabilities, erase the memory of the transaction card, display data indicative of a fraudulent or inactive transaction card, and/or the like.

METHOD FOR PROTECTING AN INTEGRATED CIRCUIT MODULE AND CORRESPONDING DEVICE

An integrated circuit includes a circuit module storing sensitive data. An electrically conductive body at a floating potential is located in the integrated circuit and holds an initial amount of electric charge. In response to an attack attempting to access the sensitive data, electric charge is collected on the electrically conductive body. A protection circuit is configured to ground an output of the circuit module, and thus preclude access to the sensitive data, in response to collected amount of electric charge on the electrically conductive body differing from the initial amount and exceeding a threshold.

TAMPER-RESISTANT TRANSACTION CARD AND METHOD OF PROVIDING A TAMPER-RESISTANT TRANSACTION CARD

A dynamic transaction card that is manufactured using conductive plastic jumpers that will dissolve when in contact with a solvent used to tamper with the dynamic transaction card. Internal components of a dynamic transaction card may be manufactured using a synthetic or semi-synthetic organic material, such as, for example, plastics. These materials may be conductive to provide functionality to a dynamic transaction card, such as a connection between an integrated circuit and other card components such that when the materials dissolve, the connections are broken and the dynamic transaction card may be inactive due to the loss of various connections.

TRANSACTION CARD MODE RELATED TO LOCATING A TRANSACTION CARD
20190385147 · 2019-12-19 ·

A transaction card may determine to initiate a mode associated with the transaction card. The mode may be related to locating the transaction card. The mode may be associated with outputting a first signal. The transaction card may determine a manner in which to configure the mode based on a set of parameters. The set of parameters may include a power level of the transaction card, or a strength of a second signal associated with a connection between the transaction card and a device associated with the transaction card. The transaction card may initiate the mode after configuring the mode. The transaction card may determine to terminate the mode based on an indication that the transaction card has been located.

System and methods for secure firmware validation

An electronic device, such as a dynamic transaction card having an EMV chip, that acts as a TPM having a memory, an applet, and a cryptographic coprocessor performs secure firmware and/or software updates, and performs firmware and/or software validation for firmware and/or software that is stored on the electronic device. Validation may compare a calculated checksum with a checksum stored in EMV chip memory. If a checksum calculated for firmware and/or a software application matches a checksum stored in EMV chip memory of the transaction card, the transaction card may operate normally. If a checksum calculated for firmware and/or a software application does not match a checksum stored in EMV chip memory of the transaction card, the transaction card may freeze all capabilities, erase the memory of the transaction card, display data indicative of a fraudulent or inactive transaction card, and/or the like.

Techniques for access control using wearable devices
10504310 · 2019-12-10 · ·

Various embodiments are generally directed to techniques for using little or no electric power to monitor whether a wearable device continues to be worn by a person such that it may continue to be used to access a secured item. An apparatus may include a processor component; a storage to store an access credential; a presentation component to wirelessly transmit the access credential to an access device to enable a grant of access to a secured item; a power source; and a clasp coupled to a wearable portion to prevent removal of the wearable portion unless the clasp is operated to change state from a clasped state to an unclasped state, the clasp to cause loss of electric power from the power source to the processor component and the storage when in the unclasped state to nullify the access credential. Other embodiments are described and claimed.

HIERARCHICAL COMBINATION OF DISTRIBUTED STATISTICS IN A MONITORING NETWORK
20190362215 · 2019-11-28 ·

Methods, systems, and computer program products for creating a monitoring network are described. A server associates a master wireless node with a package in a first set of associated packages. The server and the master wireless node communicate with one another over first type of wireless communications interface. The server also associates a peripheral wireless node with another package in the set and with the master node. The peripheral wireless node and the master wireless node communicate with one another over a second type of wireless communications interface. The peripheral node includes a sensor operative to generate sensor data by sensing an environmental condition. The master wireless node processes the sensor data to generate one or more package-level statistics of the processed sensor data.