Patent classifications
G06Q20/357
Device with built-in bill capture, analysis, and execution
Systems and methods for secure and efficient bill capture, analysis, and execution are provided. A method may include capturing, via a camera embedded in a smart card, an image of a bill. The bill may include a plurality of text fields. The method may include processing the text fields via a microprocessor embedded in the smart card. The method may include determining, based at least in part on the processing of the text fields, a balance amount and a payment recipient associated with the bill. The method may also include executing a payment for the balance amount from an account associated with a user of the smart card to an account associated with the payment recipient. The executing may be performed via a wireless communication element embedded in the smart card which may be configured to provide wireless communication between the smart card and a payment gateway.
Battery life estimation
Digital transaction apparatus including a Data Assistance Device (DAD), including a user interface that is operable to at least select data, and a DAD transmitter, a Digital Transaction Card (DTC), including a Digital Transaction Processing Unit (DTPU), and a DTC receiver, wherein the DAD and DTC are operable to transfer data from the DAD to the DTC and when subsequently using the DTC to effect a digital transaction, the DTC operates in accordance with the data selected and transferred from the DAD to the DTC, wherein the digital transaction apparatus further includes a remaining battery life estimation system operable to detect an occurrence of at least one electrical event and to measure the duration of the at least one electrical event, each electrical event having an associated power usage amount, and, subsequent to detection of an occurrence of an at least one electrical event, the remaining battery life estimation system calculates the total energy usage using the associated power usage amount in respect of the at least one electrical event and the duration of the at least one electrical event.
Reflective, transmissive, and transflective static programmable exhibits and methods for using same
According to one embodiment, a color changing display includes a housing, a cover cooperatively coupled to the housing, a light panel, and a color display panel. The light panel and the color display panel are positioned between the housing and the cover. The light panel and the colored display panel are each selectively activated to operate in at least one of: a reflective mode, a transmissive mode, and a transflective mode.
INFORMATION PROCESSING APPARATUS AND METHOD, RECORDING MEDIUM, AND PROGRAM
Information processing apparatus and method, recording medium, and program are provided. An information processing apparatus includes the following elements. A receiver receives a command requesting for the execution of predetermined processing. A storage unit stores data and first information indicating, among a plurality of stages in a lifecycle of the information processing apparatus, the current stage determined by the stored data and second information indicating an executable command in the current stage, the executable command being determined for each of the plurality of stages. A determining unit determines on the basis of the first information and the second information whether the command received by the receiver is an executable command in the current stage.
System and method for card control
A system and method for card control includes a card control computing system configured to enforce a card control rule based upon transactions made with a payment card. The card control computing system includes a memory unit configured to store information associated with a card control dashboard, and a processing unit configured to cause presentation of the card control dashboard via a display associated with a remote computing device, such that the card control dashboard is associated with the payment card and the card control rule. The card control dashboard includes a user interface. The processing unit is further configured to receive an input via the user interface to activate or deactivate one or more features associated with the card control rule, and trigger the card control rule based upon the one or more features that are activated or deactivated.
PAYMENT CARD SECURITY
Disclosed is a system and method for more secure card transactions. The security is generated by the use of a dynamic transaction number which is valid for only a single predetermined time interval. The transaction number is generated through a two step process. In a first step, time is used as an input to a transaction number function. The transaction number function outputs a plurality of digits. The second step uses the plurality digits for input and uses a ruleset to strip at least one digit to determine the transaction number valid for the predetermined time interval.
Generating barcodes utilizing cryptographic techniques
Various embodiments are generally directed to secure generation of barcodes using cryptographic techniques. An application may receive a request to generate a barcode. The application may receive encrypted data from a communications interface of a contactless card associated with an account. The application may receive, from a server, verification of the encrypted data and an encrypted authorization token associated with the account. The application may generate the barcode utilizing the encrypted authorization token.
IC CARD ASYMMETRIC LABELLING SYSTEM AND IC CARD BUILT-IN PASSWORD INPUT SYSTEM
Disclosed are an IC card asymmetric labelling system, an IC card built-in password input system and an IC card built-in password input method. The IC card asymmetric labelling system includes: an IC card, a payment terminal and a cloud end sever. The IC card includes a crypto-key unit and a communication module. The crypto-key unit stores a first private key which is used to sign a message transmitted from the IC card. The communication module establishes a communication connection with a cloud end through the payment terminal, or directly establishes a communication connection with the cloud end. The cloud end stores an open ID of the IC card and associated user information. The open ID is a hash value of a first public key of the IC card and is open to the public.
SELF-AUTHENTICATING CHIPS
A self-authenticating chip includes first and second memory regions storing, respectively, first and second authentication codes. The second memory region is adapted to be unreadable and unmodifiable by the chip or a chip reader. The chip also includes a comparator for providing an indicator of whether given input matches the second authentication code. The chip also includes an authentication circuit that is operable to read the first authentication code from the first memory region, present the first authentication code to the comparator, and in response to receiving an indicator from the comparator indicating that the first and second authentication codes match, unlock at least one of (i) a communication interface of the chip to allow data to be transmitted therethrough to a chip reader and (ii) a third memory region of the chip to allow data to be read therefrom.
CUSTOMIZABLE CRYPTOCURRENCY CARD
A physical card (in some cases without any on-board source of power or computing capabilities) is configured to maintain access information for digital bearer assets. A unique identifier visible on the card may be transmitted to a server-system to utilize functionalities corresponding to the card (e.g., based on information associated with the unique identifier) on a decentralized computing platform, like a blockchain-based decentralized computing platform. Private access information, like a secret, private key that corresponds to a public key (e.g., a public-private key-pair) or a representation of the private key (like a ciphertext thereof) and corresponding encryption key, may be physically concealed with tamper-evident components such that a user can readily determine whether the private access information was divulged. In some examples, a user is required to activate one or more tamper-evident features, thereby altering a visible state of the card, to utilize functionalities corresponding to the card.