H04M2250/14

MOBILE ELECTRONIC DEVICE
20210377373 · 2021-12-02 ·

A mobile electronic device includes a main framework, back cover, expansion box, card reading module and battery module. The main framework has a motherboard. The back cover is disposed on the main framework and has an expansion window. The expansion box covers and closes the expansion window. The expansion box has therein an expansion chamber, a power chamber, and a communication opening whereby the expansion chamber and the power chamber communicate with each other. The expansion box has a wire connection opening in communication with the power chamber and with the expansion window. The card reading module and battery module are disposed in the expansion chamber and power chamber, respectively. The card reading module is connected to the motherboard by a signal wire via the communication opening and the wire connection opening. The battery module is connected to the motherboard by a power wire via the wire connection opening.

CALL CENTER WEB-BASED AUTHENTICATION USING A CONTACTLESS CARD
20220141024 · 2022-05-05 · ·

Systems, methods, articles of manufacture, and computer-readable media. A server may receive a phone call and generate a uniform resource locator (URL) comprising a session identifier for an account. The server may transmit the URL to a client device. The server may receive, from a web browser, a request comprising the URL. The server may determine that the session identifier in the URL of the request matches the session identifier for the account, and transmit, to the web browser, a web page at the URL. The server may receive, from the web browser, a cryptogram read by the web page via a card reader of the client device and decrypt the cryptogram. The server may authenticate the identity of the caller for the call based on decrypting the cryptogram and the session identifier of the URL matching the session identifier of the account.

TECHNIQUES FOR CALL AUTHENTICATION

Various embodiments described herein are directed towards authenticating calls by using one or more keys associated with a specific user. In examples, the user is the sender of a call. In various embodiments, when a call is made, an identifying payload is encrypted using a private key associated with the user. The encrypted identifying payload is appended to the call data stream. The identifying payload may be decrypted with a public key. In embodiments, the identifying payload may be verified. In various embodiments, further authentication methods may be performed by using an object such as a contactless card to provide one or more components of the identifying payload and/or keys. In embodiments, a connection may be made between the sender and the intended recipient of a call based on the verification of the identifying payload.

Techniques for call authentication

Various embodiments described herein are directed towards authenticating calls by using one or more keys associated with a specific user. In examples, the user is the sender of a call. In various embodiments, when a call is made, an identifying payload is encrypted using a private key associated with the user. The encrypted identifying payload is appended to the call data stream. The identifying payload may be decrypted with a public key. In embodiments, the identifying payload may be verified. In various embodiments, further authentication methods may be performed by using an object such as a contactless card to provide one or more components of the identifying payload and/or keys. In embodiments, a connection may be made between the sender and the intended recipient of a call based on the verification of the identifying payload.

Call center web-based authentication using a contactless card
11165586 · 2021-11-02 · ·

Systems, methods, articles of manufacture, and computer-readable media. A server may receive a phone call and generate a uniform resource locator (URL) comprising a session identifier for an account. The server may transmit the URL to a client device. The server may receive, from a web browser, a request comprising the URL. The server may determine that the session identifier in the URL of the request matches the session identifier for the account, and transmit, to the web browser, a web page at the URL. The server may receive, from the web browser, a cryptogram read by the web page via a card reader of the client device and decrypt the cryptogram. The server may authenticate the identity of the caller for the call based on decrypting the cryptogram and the session identifier of the URL matching the session identifier of the account.

Techniques for call authentication

Various embodiments described herein are directed towards authenticating calls by using one or more keys associated with a specific user. In examples, the user is the sender of a call. In various embodiments, when a call is made, an identifying payload is encrypted using a private key associated with the user. The encrypted identifying payload is appended to the call data stream. The identifying payload may be decrypted with a public key. In embodiments, the identifying payload may be verified. In various embodiments, further authentication methods may be performed by using an object such as a contactless card to provide one or more components of the identifying payload and/or keys. In embodiments, a connection may be made between the sender and the intended recipient of a call based on the verification of the identifying payload.

Keypad

A keypad is provided in the present invention. The keypad includes a keypad shell and a keypad circuit board provided within the keypad shell. The keypad shell is provided with at least two subscriber identity module (SIM) card sockets and a first communication module connected to the SIM card sockets and configured to access the Internet. A SIM card switch is provided between the first communication module and the SIM card sockets. Compared to the prior art, the present invention enables, by means of providing the keypad with the at least two SIM card sockets and the first communication module supporting all major operators, the keypad to access the Internet when connected to a mobile terminal, and ensures uninterrupted Internet data access by switching to a SIM card of a different operator when the SIM card of the current operator has weak reception.

Ejectable component assemblies in electronic devices

Electronic devices are provided with ejectable component assemblies that can be substantially flush with the external surfaces of the housings of the devices, despite variations in their manufacture. The ejectable component assemblies may include connectors coupled to circuit boards of the devices, and trays that can be loaded with removable modules, inserted through openings in the housings of the devices, and into the connectors for functionally aligning the removable modules with the circuit boards. The ejectable component assemblies may also include ejectors coupled to the housings of the devices for ejecting the trays from the connectors and, thus, from the devices themselves.

TECHNIQUES TO PROVIDE PHYSICAL TRANSACTION CARD CAPABILITIES FOR A DEVICE
20210182821 · 2021-06-17 · ·

Various embodiments are generally directed to techniques to enable use of a transaction card of a user device to perform transactions. Embodiments may include method, techniques, and circuitry to cause a transaction card to extend from a user device to be used to perform the transactions. Further, the transaction card may retract into the housing the user device when not in use.

Circuit, method and apparatus for performing near-field communication

A circuit for performing a near-field communication having a contactless circuit which is configured for the contactless exchange of data signals with an external contactless reading device, a security circuit which has a memory in which application identifiers are stored and which is configured to execute security-related applications, and a control circuit which is configured to execute non-security-related applications, wherein the contactless circuit, the security circuit and the control circuit are coupled with one another in such a way and, using at least one of the application identifiers, are configured in such a way that the data signals are supplied from the contactless circuit to the control circuit and vice versa exclusively by means of the security circuit. The security circuit can furthermore store bonding and authentication keys for applications in the control circuit in order to set up a secure data exchange channel for these applications.