G07F7/1025

Modular mobile point of sale device having separable units for configurable data processing

There are provided systems and methods for a modular mobile point of sale device having separable units for configurable data processing. A modular device may include a main unit that includes data processing features to allow for a mobile point of sale, including a data entry unit for payment data, a communication component to secure communicate that data to a centralized transaction processor, and a processing unit to receive the data and instruct the centralized to process the data with an online service provider. The module device may also be physically and communicatively coupled to additional modules that may increase the on-device functionality of the main unit, include a module to allow user input and additional modules to accept other types of transaction input. On detection of a connected unit, the main unit may secure connect to and authenticate each attached module.

SYSTEMS AND METHODS FOR TRANSFERRING RESOURCE ACCESS
20180005493 · 2018-01-04 ·

Systems and methods for transferring resource access from a sender to a recipient are disclosed that can allow a sender to specify an amount of a resource to provide access to (e.g., an amount of money or an amount of access rights), while still providing security for the sender's sensitive credential information (e.g., PAN and/or PIN). These systems and methods can allow a sender to transfer resource access from any location and at any time of the day. In the case of money transfers, the recipient can quickly and directly obtain the money from any ATM location associated with any bank and at any time of the day, even without a bank account.

SYSTEM AND METHOD FOR PROVIDING LIMITED ACCESS TO DATA
20180013749 · 2018-01-11 ·

A system and computer-implemented method for providing access to data of a first party including receiving information for identifying the first party, authenticating the first party using the received information for identifying the first party and generating a first read-only personal identification number (PIN). The first read-only PIN is associated with a first set of access rights for the data of the first party and provided to a second party. The first read-only PIN is stored with the first set of access rights in a computer database. A third party receives the first read-only PIN from the second party, authenticates the received first read-only PIN using the stored first read-only PIN and provides the second party with access to at least a portion of the data of the first party using the first set of access rights associated with the first read-only PIN if the received first read-only PIN is authenticated.

Hardware device for entering a pin via tapping on a touch screen display
11710126 · 2023-07-25 · ·

A device and associated methods for entering a PIN via tapping are disclosed. The device can be configured to determine a number of taps provided by a PIN holder on a touch sensor in representation of a PIN digit and to store the number of taps as a digit in a sequence that represents the PIN. Indications for interaction with the device can be provided to PIN holders in the form of auditory cues. A visually impaired PIN holder may be able to complete a PIN entry process by following the indications for interaction, tapping on a touch sensor a number of times equal to the value of the digit of the PIN to be entered, and performing gestures mapped to commands for the device.

Method for processing transaction data, corresponding communications terminal, card reader and program

A method for processing transaction data, implemented by a communications terminal having a touch screen. The method includes: detecting a necessity of entering a piece of personal identification data; transmitting to a card reader connected to the communications terminal a request for supporting a display of a virtual keypad, the request comprising a piece of data representing a passage of the communications terminal from a “master” mode to a “slave” mode of operation, the slave mode leading to implementation of the method for processing transaction data under the exclusive control of the card reader; of entry, by the user on the virtual keypad, of the piece of personal identification data; and receiving, from the card reader, the piece of personal identification data.

Bridge application for user pin selection

Systems and methods related to a bridge application that facilitates interoperability between a remotely-served application and locally connected peripheral devices. The bridge application may execute on a local machine and be addressable at the loop-back address of the local machine. Requests issued to the bridge application may be verified as originating from a trusted source. In turn, requests from a locally performed and remotely-served application may be issued to local hardware resources such as peripheral devices or the like.

MEDIUM PROCESSING APPARATUS

The present disclosure provides a medium processing apparatus, including: a housing provided with a surface facing a customer operating the medium processing apparatus; and a rolled coin device housed in the housing and configured to process rolled coins formed by bundling a plurality of loose coins. The surface of the housing includes a designated area located in a height range conforming to Americans with Disabilities Act (ADA) standard with respect to a height direction of the medium processing apparatus, and a rolled coin dispensing port of the rolled coin device for dispensing the rolled coins is arranged in the designated area.

System and method for indicating entry of personal identification number
11663584 · 2023-05-30 · ·

A system to indicate to a user to enter a personal identification number (PIN) on a commercial off the shelf (COTS) device, the system comprising: a secure card reader communicatively coupled to the COTS device, and wherein the secure card reader receives a payment card; a payment application installed on the COTS device; and one or more devices other than the COTS device. The payment application installed on the COTS device transmits one or more prompts to the one or more devices other than the COTS device based on a set of signals received from the secure card reader. The secure card reader transmits the set of signals after the payment card is received at the secure card reader, and the one or more prompts comprise at least one indication to the user to enter the PIN on a display of the COTS device.

CONTACTLESS CARD PERSONAL IDENTIFICATION SYSTEM

A dual-factor PIN based authentication system and method uses a cryptogram provided by a contactless card associated with the client in association with a PIN stored by the contactless card to authenticate the client. In some embodiments, cryptogram authentication may be preconditioned upon a PIN match determination by the contactless card. In other embodiments, the cryptogram may be formed at least in part using the personal identification number (PIN) stored on the contactless card encoded using a dynamic key stored by the contactless card and uniquely associated with the client. Authentication may be achieved by comparing the cryptogram formed using the PIN against an expected cryptogram generated an expected PIN and an expected dynamic key.

Payment methods and systems based on a deceptive pin of a payment card

A method of facilitating a transaction with a payment card of a cardholder. The method includes receiving a deceptive PIN comprising a set of characters in which one character is a deceptive character. The deceptive character is different than each of a set of actual characters of an actual PIN of the payment card. The method includes identifying the deceptive character and a position of the deceptive character among the set of characters of the deceptive PIN. The method includes determining a reconstructed PIN by replacing the deceptive character with a corresponding actual character at the position in the deceptive PIN. The actual character is determined based on a predefined mathematical expression and a predefined value for the predefined mathematical expression. The method includes authenticating the reconstructed PIN by matching the reconstructed PIN with the actual PIN. The method further includes facilitating the transaction upon successful authentication.