Patent classifications
G06K19/07309
Systems and methods for preventing fraudulent credit card and debit card transactions
A system and method for preventing fraudulent credit card or debit card transactions by coupling a smart phone to the credit card or the debit card, and transmitting identification information from the smart phone to the card. The card is normally disabled such that no transaction may take place unless the card is enabled. The card receives the transmitted identification information and compares that information to corresponding information stored on the card. If the received information matches the stored information, the card is enabled thus allowing the transaction to take place.
Systems and methods for overmolding a card to prevent chip fraud
Systems and methods for overmolding a card are provided. A chip fraud prevention system include a device including a chip and a substrate. The chip may be at least partially encompassed in a chip pocket, and the substrate may be at least partially encompassed by the overmold.
Secured document and associated system and method for securing documents
For protecting confidential information in a printed document, the invention provides a system and method for, on one hand, encrypting the confidential content of the document and then printing the part or parts of the document with confidential information in an encrypted form and the rest of the document in a non-encrypted form, and, on the other hand, decrypting the encrypted document content for display and use or for printing. In addition, for preventing unauthorized copying and tampering of a printed document, the invention provides a system and method for managing a unique tag, which is attached to the document and which authenticates the document.
Trustable product delivery with RFID and smart chip
Trustable delivery of a product uses a package with a printed label having a unique product ID, an RFID marker applied to the product that contains the ID, and a smart chip inside the product that contains the ID and a digital key. The ID from the RFID marker is compared to the label for initial validation of the package. The smart chip is further interrogated to generate an encoded value of the ID, such as a hash value, using the digital key. The hash value is then used to authenticate the ID, thereby verifying that the product as delivered is the original, untampered product. The product ID and the hash value are recorded in a blockchain ledger associated with the product. In this manner, the packaged product can be validated by any party in the delivery chain, e.g., manufacturer, seller, distributor, delivery service, and final recipient.
SYSTEMS AND METHODS FOR CRYPTOGRAPHIC AUTHENTICATION OF CONTACTLESS CARDS
Example embodiments of systems and methods for data transmission system between transmitting and receiving devices are provided. In an embodiment, each of the transmitting and receiving devices can contain a master key. The transmitting device can generate a diversified key using the master key, protect a counter value and encrypt data prior to transmitting to the receiving device, which can generate the diversified key based on the master key and can decrypt the data and validate the protected counter value using the diversified key.
Systems and methods for cryptographic authentication of contactless cards
Example embodiments of systems and methods for data transmission system between transmitting and receiving devices are provided. In an embodiment, each of the transmitting and receiving devices can contain a master key. The transmitting device can generate a diversified key using the master key, protect a counter value and encrypt data prior to transmitting to the receiving device, which can generate the diversified key based on the master key and can decrypt the data and validate the protected counter value using the diversified key.
RFID ICS WITH PRIVACY MODES
RFID tag ICs may be configured with privacy modes. When a tag IC is in a privacy mode, it will not respond to commands unless a previous command includes correct verification information or specifies a recycling indicator of the tag IC. If the previous command includes correct verification information, then the tag IC will respond to one or more subsequent commands as normal, for example by responding with one or more identifiers. If the previous command does not include correct verification information but specifies a recycling indicator and the privacy mode is recycling-enabled, the tag IC may respond to one or more subsequent commands with recycling information. The recycling information identifies whether or how an item associated with the RFID IC can be recycled or disposed but does not otherwise identify the RFID IC or item. Otherwise, the tag IC may remain silent.
RFID tags with public and private inventory states
RFID tags capable of transitioning between a private state and one or more public states are provided. In the private state, tags may participate in an inventory round without restriction. In a public state, tags may be prevented from participating in an inventory round, allowed to participate without providing actual identifying information, or allowed to participate providing an alternate identifier. Whether and how the tag responds in a public state may depend on certain conditions including if one or more of the tag's flags are asserted or deasserted. A reader may select a public tag for inventorying by verifying itself, and the tag then asserting or deasserting one or more of its flags accordingly. The asserted or deasserted flag(s) may be used to determine whether and how a tag in a public state participates in an inventory round.
Apparel to be Associated with a Digital Asset with Associated Methods
A method for associating a digital asset to apparel and said apparel to a user, where the apparel includes an embedded chip that is assigned a blockchain ID. The user utilizes a mobile device to create an account for linking the asset to the user and scans the apparel with the mobile device. During the scan by the mobile device the mobile device detects the presence of the embedded chip and further detects the chip ID. This chip ID is transmitted to a server, where the server validates the chip ID and transmits a confirmation of the authenticity of the chip ID to the mobile device. Upon receipt of the confirmation by the mobile device the apparel is determined to be authentic. Authenticated apparel can be logged to a user account.
Reading apparatus
According to one embodiment, a reading apparatus includes a shielding body, an antenna, and a reader and writer. The shielding body is formed in a box shape with an upper opening, to place an accommodating body and to shield radio waves. The antenna is provided in the shielding body to receive information from an RFID tag attached to a product that is passing through the opening. The reader and writer is connected to the antenna to read information of the product from the information received by the antenna.