Patent application number | Description | Published |
20080197533 | PAYMENT CARD MANUFACTURING TECHNOLOGY - A payment card manufacturing process glues a thin battery and an autonomously reprogrammable magnetic device to the inside surface of one of two outer front and rear laminate sheets. The magnetic device is pressed through a precisely cut rectangular hole provided for it in the rear laminate sheet, and is sealed with a gasket bead. Such magnetic device is critically placed flush in a magnetic stripe area, and the end gaps are such that they will minimize adverse magnetic transitions seen by a reader between the magnetic stripe field and the autonomously reprogrammable magnetic device. The surfaces of the battery, electronics, and laminate sheets, are plasma treated to promote adhesion. These are then all sandwiched together inside a heated mold that is tilted or vibrated just before a two-part polyurethane is injected. Each of the two polyurethane parts is temperature adjusted to match viscosities and thus improve mixing. The liquid polyurethane is injected through a nozzle and manifold to fill all the voids between the laminate sheets, and air escapes or is vacuumed out the top edge of the mold. The polyurethane sets quickly and sheets of sixteen or more payment cards can then be de-molded and singulated. | 08-21-2008 |
20080201264 | PAYMENT CARD FINANCIAL TRANSACTION AUTHENTICATOR - A payment card financial transaction authenticates for providing overall financial network security computes a number of results from a cryptographic key that match values that were selectively used to personalize individual payment cards with their individual user identification and account access codes. An account access code is later presented daring a financial transaction involving at least one of those individual payment cards. A dynamic portion is included in a merchant's magnetic reading of the payment card. Then authenication can proceed by matching it with values computed from the cryptographic key. | 08-21-2008 |
20080319901 | PAYMENT CARD FINANCIAL VALIDATION PROCESSING CENTER - A method for validating a payment card financial transaction includes receiving a financial transaction approval request message derived from a payment card that is able to change its magnetic card data as elicited by a card reader. Out-of-sequence transactions encoded in a dynamic number included in said magnetic card data are detected. The dynamic number is compared with a last valid number that was previously stored in a database. An approval message is issued to enable the completion of a financial transaction with the payment card. | 12-25-2008 |
20090006262 | FINANCIAL TRANSACTION PAYMENT PROCESSOR - A financial transaction payment processor includes an account access request processor for receiving dynamic swipe data from a payment card through a merchant infrastructure. A fraud detection processor is connected to analyze a dynamic data obtained by the account access request processor that should agree with values pre-loaded in a Crypto-Table by a card manufacturer. A payment authorization processor is connected to receive a message from the fraud detection processor and to then forward a response to the merchant infrastructure. | 01-01-2009 |
20090164380 | FINANCIAL TRANSACTION NETWORK - The manufacture and control of payment cards used in consumer financial transactions circulates a population of payments cards with user identification and account access codes. Each use of an individual card produces a variation of its user access code according to an encryption program seeded with encryption keys or initialization vectors. A portion of the magnetic stripe is made dynamic with a Q-Chip magnetic MEMS device. The job of personalizing payment cards with the user identification and account access codes is outsourced to a personalization company. The encryption keys and initialization vectors are kept private from the personalization company by using the encryption program to generate tables of computed results. Respective ones of the tables of computed results are sent for loading by the personalization company into new members of the population of payments cards. New payment cards are manufactured and distributed that include and operate with the tables of computed results. | 06-25-2009 |
20090164381 | METHOD OF MAKING SECURE PAYMENT CARDS - A method of making secure payment cards for financial transactions over networks includes building payment card blanks by integrating plastic, circuit, battery, semiconductor chips, magnetic stripe, magnetic MEMS device, and other components into a debit/credit card format conforming to ISO industry standards, all in response to an order from an issuing bank. Then personalizing each payment card blank with a personal account number (PAN) of which a portion is variable according to an encryption processor and secret encryption key kept by said issuing bank, and only computed results are loaded in embedded crypto-tables for presentation during financial transactions by said magnetic MEMS device. A population of secure payment cards is produced which can be circulated for use in the commercial markets. | 06-25-2009 |
20090187507 | SECURE FINANCIAL TRANSACTION NETWORK - A secure financial transaction network works with payment cards that includes a magnetic device readable by a legacy card reader that presents dynamic magnetic data such that each use of an individual card produces a cryptographic series of variations of a respective user access code according to an encryption program seeded with secret encryption keys or initialization vectors. Data processing generates a cryptographic series of variations of respective user access codes for each and all of the plurality of payment cards, to transmit to third parties for payment card manufacturing only tables of said cryptographic series of variations of respective user access code and not said secret encryption keys or initialization vectors, and to authorize financial transaction requests from a payments processor if a user access code it receives in a transaction request is a member of said cryptographic series of variations of respective user access codes for the particular one of the plurality of payment cards. | 07-23-2009 |
20090248581 | DISPLAY PAYMENT CARD WITH FRAUD AND LOCATION DETECTION - A payment card comprises a display to support card-not-present transactions where no card reader is available to automate the transaction, and an account number retrieval method for dynamic, one-time use virtual account numbers whose use can assist authorities in rapid fraud and location detection. The account number generator is able to produce a sequence of virtual account numbers over its life that are predictable by the issuing bank and useful in authenticating transactions. A server for the issuing bank logs the merchant locations associated with each use or attempted use, and provides real-time detection of fraudulent attempts to use a virtual account number outside the predicted set. Fraud identification efforts can then be directed in a timely and useful way. | 10-01-2009 |
20090255996 | THREE-LEGACY MODE PAYMENT CARD WITH PARAMETRIC AUTHENTICATION AND DATA INPUT ELEMENTS - A payment card comprises a plastic card and operates with three different legacy payment systems. A magnetic stripe with user account data allows card use in traditional point-of-sale magnetic card readers. A dual-input crypto-processor embedded in the card provides for contact/contactless smart card operation. A user input provides for user authentication by the crypto-processor. Internal to the plastic card, and behind the magnetic stripe, a magnetic array includes a number of fixed-position magnetic write heads that allow the user account data to be automatically modified by the crypto-processor. | 10-15-2009 |
20100127083 | Auto-sequencing financial payment display card - A payment card comprises a store of issuer-defined pre-generated cryptograms that are loaded only once into the Card by a perso-bureau or issuer. An on-board and autonomous electronic display of the personal account number (PAN), card verification value (CVV), or expiration date (EXP) is auto-sequenced through the stored cryptograms. Each value displayed to the user is unique, and useful in a financial transaction only once. The Card thus requires no changes in behavior on the part of the User, because the existing merchant infrastructure is already equipped to collect PAN+CVV+EXP data for user verification and transaction authorization. | 05-27-2010 |
20110161232 | VIRTUALIZATION OF AUTHENTICATION TOKEN FOR SECURE APPLICATIONS - Data and financial transactions are secured on a mobile electronics device, with three downloadable modules. A first module provides for the mobile electronics device and a network server to interactively register a cryptographic abstract of an object usually carried by the user. These objects represent physical passwords from which processing can derive characterizing information. A second module is invoked by a transaction and signals the mobile electronics device to collect a new sample of the physical password. A cryptographic abstract of it is distilled and compared to preregistered cryptographic abstracts. A third module is a key recovery process for use when the preregistered physical password sound or object is no longer available to the user. | 06-30-2011 |
20110240745 | MAGNETIC EMISSIVE USE OF PRELOADED SECRET-KEY ENCRYPTED USE-ONCE PAYMENT CARD ACCOUNT NUMBERS - A thin-client access card has a card body with partial or fully emissive magnetic data tracks. An emissive element is disposed in the card body under the location of the legacy magnetic data tracks. An electronic signal conditioner converts audio signals from a mobile device into magnetic data applied to the emissive element. A swipe sensor detects when the thin-client access card is being swiped by a legacy card reader, and triggers an output of magnetic data from the emissive element while proximal to the POS reader head. A cable attaches the thin-client access card as a peripheral to the mobile device with an audio output jack. | 10-06-2011 |
20110320314 | OPTICAL CONTACT LOADED MAGNETIC CARD - A magnetic interface card appears to be a payment card conventionally provided with an electromagnetic stripe and magnetic data tracks. A magnetic emissive element is disposed in the magnetic interface card body under the magnetic data tracks that can emit a variety of ISO-7813 track- | 12-29-2011 |
20120171997 | ENCODED COLORGRAM FOR MOBILE DEVICE SECURITY - A security system includes a software application running in a user's smartphone and a separately carried visual key that the user can image at will with the smartphone's camera. An effective visual key would typically comprise digital data encoded in a series of colored cells arranged in a colorgram. Such digital data is treated as a what-you-have security factor, and is concatenated with other security factors so users can authenticate themselves to websites, internet services, and even within the smartphone device itself or its applications. In one aspect, when users authenticate themselves to a server, the server returns a short-term supply of one-time-passwords or account numbers for use in secure access and financial transactions on other systems. | 07-05-2012 |
20120278241 | TRACEABLE AND NON-REPUTABLE TRANSACTION DEVICES AND METHODS - Data and financial transactions are secured on a mobile electronics device for traceability and non-repudiation. A mobile personal trusted device (PTD) is needed to communicate over a network to a transaction server. Characteristic abstracts of objects carried by users have distinctive features that can be associated with and registered to a particular user and are recorded. An abstract contemporaneously obtained during a secure transaction is sent to a server for use as an authenticator for comparison to an abstract previously obtained and registered to said user. A traceable transaction record is rendered that is highly identifiable and substantially indisputable. | 11-01-2012 |
20120311320 | Mobile Transaction Methods and Devices With Three-Dimensional Colorgram Tokens - A transaction security process includes authentication and identification parts for pushing an encrypted colorgram for user authentication and persona descriptors for user identification from a transaction server to a first personal trusted device. A decryption of the colorgram is displayed on the first personal trusted device. An image is captured by a second personal trusted device. An encryption of the image captured from the second personal trusted device is uploaded to the transaction server. The persona descriptors are used to build a composite rendering for identification of the first user to the second user. The second user clicks “OK” if they recognize the composite drawing as a reasonable persona of the first user. | 12-06-2012 |
20140100973 | SMARTPHONE VIRTUAL PAYMENT CARD - A payment device presents a matrix barcode on a smartphone display screen for scanning by a merchant at a point-of-sale terminal. The consumer authenticates with their payment processor by logging in with their smartphone through a back channel. A successful log-in is rewarded with a matrix barcode the consumer can allow the merchant to scan if the particulars and price of the proposed transaction are acceptable. A transaction summary and request for approval arrive back at the consumer's smartphone through the back channel. Approval can be indicated by the entry of a user PIN code, and the transaction is complete. | 04-10-2014 |
20150019441 | MOBILE-TO-MOBILE TRANSACTIONS - A mobile-to-mobile transaction method allows two mobile smartphones to engage in a private transaction between themselves. The two share the same transaction server using prearranged individual enrollments. These build a dynamic digital image of a colorgram with a selected shape that defines a colorgram matrix boundary. Authentication codes, merchant coupons, product advertisements, and browser uniform resource locator (URL) links for product information and ordering, one-time-password (OTP) seeds, initialization vectors, individual enrollment passwords, or password seeds are embedded and encrypted in each colorgram. The colorgram is sent to a first one of the mobile smartphones for its display to a collocated second one of the mobile smartphones. A transaction is authenticated between users based on a calculated expectation of what should be returned when it provides its own digital image of the colorgram displayed by the first mobile smartphone. | 01-15-2015 |