G07F7/1058

Method of using a user device for remote payment of a shopping basket on a merchant server, and an associated system

A user device configured to connect to a mobile telephony network and associated with an identification number in the mobile telephony network. The user device selects a method of paying for the shopping basket on a first page of the merchant server; upon selection, the user device sends a payment request to a payment validation module, which is enriched with identification data of the user device; the user device receives a local authentication request message from the payment validation module over the mobile telephony network; on receiving the local authentication request message, the user device triggers execution of an operation of locally authenticating a user of the user device; the user device sends a local authentication response message to the payment validation module; and the user device is redirected by the payment validation module to a second page of the merchant server giving the result of the payment transaction.

BINARY PERSONAL IDENTIFICATION NUMBER AUTHENTICATION FOR CONTACTLESS CARD
20220245984 · 2022-08-04 ·

A contactless PIN card includes an orientation reference feature, a plurality of tactile sensors, an arrangement of a plurality of tactile sensors along the edge, an arrangement of a plurality of tactile sensors on the surface or surfaces, an arrangement of a plurality tactile of sensors along the edge and on the surface or surfaces. A plurality of tactile sensors allowed the user to input a binary PIN according to the way how the finger is interacting with the tactile sensors. In addition to the validation of the identifying information embedded within the memory of any existing contactless credit card, debit cards, prepaid electronic cash card, loyalty card and access card, the user's identification is also validated through the binary PIN. An irreversible mathematical equation can be used to compute the identifying information and user's binary PIN to generate the validation Radio Frequency Identification signal.

Localized pin management with reader verification and no disclosure
10726160 · 2020-07-28 · ·

Mechanisms are provided to manage personal identification numbers and data objects residing in a communication system. In particular, solutions are described which allow a PIN associated with a data object to be stored with the data object for later authentication and verification purposes without disclosing the pin. In at least one embodiment, an operation is performed wherein a signature or digest of a data object is altered utilizing a user's entered pin. The altered signature is then stored. Upon verification and authentication, an operation is performed on the stored altered signature and the result is compared to a signature of the data object. If both signatures match, then the PIN can be used to authenticate and verify the data object.

Binary personal identification number authentication for contactless card
11875653 · 2024-01-16 ·

A contactless card includes an arrangement of a plurality of tactile sensors along the edge, an arrangement of a plurality of tactile sensors on the surface or surfaces, an arrangement of a plurality tactile of sensors along the edge and on the surface or surfaces. The arrangement of a plurality of tactile sensors captures the interaction of the user's hand and the contactless card to generate a unique binary string. In addition to the validation of the identifying information embedded within the memory of any existing contactless credit card, debit cards, prepaid electronic cash card, loyalty card and access card, the user's identification is also validated through the binary string. An irreversible mathematical equation can be used to compute the identifying information and binary string to generate the validation Radio Frequency Identification signal.

System and method of authorizing off-line electric vehicle charging station
10406930 · 2019-09-10 · ·

A charging system for charging an electric vehicle includes a charging station and a charging network server, with the charging network server in network communication with the charging station and a mobile device application. The charging station and the charging network server include computing devices programmed to: store an authorization code at each of the network server and the charging station for authorizing charging of the electric vehicle when the charging station is off-line from the charging network server, process a charging authorization request at the charging network server sent from the mobile device application, transmit the authorization code from the network server to the mobile device application responsive to the charging authorization request and when the charging station is off-line, and authorize or deny charging of the electric vehicle based on whether an authorization code input to the charging station matches the authorization code stored on the charging station.

SYSTEM AND METHOD OF AUTHORIZING OFF-LINE ELECTRIC VEHICLE CHARGING STATION
20190160957 · 2019-05-30 ·

A charging system for charging an electric vehicle includes a charging station and a charging network server, with the charging network server in network communication with the charging station and a mobile device application. The charging station and the charging network server include computing devices programmed to: store an authorization code at each of the network server and the charging station for authorizing charging of the electric vehicle when the charging station is off-line from the charging network server, process a charging authorization request at the charging network server sent from the mobile device application, transmit the authorization code from the network server to the mobile device application responsive to the charging authorization request and when the charging station is off-line, and authorize or deny charging of the electric vehicle based on whether an authorization code input to the charging station matches the authorization code stored on the charging station.

Security token and authentication system
09898695 · 2018-02-20 · ·

Techniques are provided for entering a secret into a security token using an embedded tactile sensing user interface with the purpose of verifying the secret against a stored representation of the same secret. In particular, an embodiment of the security token according to the invention comprises a tactile sensing user interface being arranged to receive a user-encoded secret, a decoding unit being arranged to generate a decoded secret by decoding the user-encoded secret, a comparison unit being arranged to compare the decoded secret with a copy of the secret stored in the token in order to verify the authenticity of a user. Thereby, the security token provides on-card matching functionality.