WO2002086810A1 - Method and apparatus of secure credit card transaction - Google Patents

Method and apparatus of secure credit card transaction Download PDF

Info

Publication number
WO2002086810A1
WO2002086810A1 PCT/US2002/007363 US0207363W WO02086810A1 WO 2002086810 A1 WO2002086810 A1 WO 2002086810A1 US 0207363 W US0207363 W US 0207363W WO 02086810 A1 WO02086810 A1 WO 02086810A1
Authority
WO
WIPO (PCT)
Prior art keywords
transaction
electronic card
card
controller unit
credit card
Prior art date
Application number
PCT/US2002/007363
Other languages
French (fr)
Inventor
Chuan Li
Original Assignee
Chuan Li
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chuan Li filed Critical Chuan Li
Publication of WO2002086810A1 publication Critical patent/WO2002086810A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/0701Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips at least one of the integrated circuit chips comprising an arrangement for power management
    • G06K19/0702Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips at least one of the integrated circuit chips comprising an arrangement for power management the arrangement including a battery
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06187Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with magnetically detectable marking
    • G06K19/06206Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with magnetically detectable marking the magnetic marking being emulated
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/0723Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips the record carrier comprising an arrangement for non-contact communication, e.g. wireless communication circuits on transponder cards, non-contact smart cards or RFIDs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/077Constructional details, e.g. mounting of circuits in the carrier
    • G06K19/07701Constructional details, e.g. mounting of circuits in the carrier the record carrier comprising an interface suitable for human interaction
    • G06K19/07703Constructional details, e.g. mounting of circuits in the carrier the record carrier comprising an interface suitable for human interaction the interface being visual

Definitions

  • This invention relates to secure credit card transactions and providing personal identification on the Internet. It is specifically characterized by a plastic body in regular credit card dimension implanted with a complete microcomputer system (hereafter called SecuAII Card) and an associated authentication server, implementing dynamic digital certificate authentication technology in order to prevent personal privacy from being breached in e- commerce transactions.
  • SecuAII Card complete microcomputer system
  • an associated authentication server implementing dynamic digital certificate authentication technology in order to prevent personal privacy from being breached in e- commerce transactions.
  • a cardholder who has lost her credit card may subsequently cancel the credit card, to prevent further unauthorized use.
  • a great damage has already been done, not all of which may be undone by the credit company or the merchants involved.
  • the credit cardholder may then be forced to bear the cost of the unauthorized purchases.
  • the holder In addition to personal financial liability that may be incurred due to loss of a conventional credit card, the holder also suffers from compromised security regarding his or her personal credit and account information such as the account number, expiration date, the cardholder's name, and the cardholder's signature, which may also be misused to conduct unauthorized transactions.
  • a dishonest or tempted merchant who gains access to a cardholder's personal credit and account information, may easily decide to use such information to conduct an unauthorized transaction without the actual credit card physically leaving the possession of the cardholder. This leads to a greater chance that the unauthorized credit card transaction will not be prevented.
  • the present invention provides an effective instrument to authenticate credit cared transactions, and to protect personal privacy online, thereby reducing the opportunity for credit card fraud.
  • This invention is a novel apparatus-SecuAII card implementing a dynamic digital certification and a symmetric encryption authentication system for securing authorized financial transaction using a credit card and for personal online account access.
  • the smart security system comprises a secure transaction electronic card (SecuAII card).
  • the card mainly consists of a conventional plastic body in the dimension of a conventional credit card, a magnetic strip simulator, a micro controller unit, a membrane keypad, a coin cell battery, two micro switches, an ultra-thin liquid crystal display (LCD) panel, and other electronic components.
  • the simulator emulates a magnetic flux, as does a regular magnetic strip when the card passes through a conventional credit card read device.
  • the electronic card employs a personal identification number (PIN) in the form of a combination of digits for the low-end model of the electronic card, or uses fingerprint recognition for the high-end model of the electronic card.
  • PIN personal identification number
  • the card usually in standby mode, is to be activated only after the micro controller unit verifies the PIN input from the membrane keypad (typically having 10 digits) or the captured fingerprint. If an incorrect PIN or fingerprint is detected, the micro controller unit will not generate the magnetic flux on the magnetic strip simulator and return immediately to the standby mode. Therefore, none of the transaction data nor the digital certificate would be transmitted to the card read device, and nothing would be displayed on the liquid crystal display panel.
  • the traditional transaction data (account number, cardholder's name, and expiration date) would not be private, however, the financial transaction would fail or access to a personal account would be denied without the electronic card being physically presented.
  • the request could not pass the authentication stage without the correct instant digital certificate, because the identity verification of the electronic card user is based on the authentication of the digital certificate, rather than conventional card data, such as a signature.
  • each certificate is valid only once.
  • the dynamic digital certificate in form of a combination of 6 or more digits, is uniquely issued for each transaction, and then expires.
  • the digital certificate is authenticated for each unique transaction, and therefore provides no value to any individual who subsequently attempts to use the date to effectuate further transactions outside the presence of the cardholder.
  • the certificate generated by an algorithm within the card, is a function of variables which include: the 16- digit credit card account number, the card issuing date (year, month, and date in Greenwich Mean Time (GMT) and time (hours and minutes in GMT), and the instant date and time at which a transaction is being processed.
  • GTT Greenwich Mean Time
  • GMT Greenwich Mean Time
  • GMT Greenwich Mean Time
  • the authentication server would approve the transaction request upon verifying the identity between the certificate and the confirmation code.
  • the digital certificate displayed on the electronic card's liquid crystal displaypanel would replace the current use of static passwords.
  • the digital certificate would first need to be entered from a computer or Personal Digital Assistant keyboard or the keypad on a mobile or a regular phone. It would then be transmitted to the transaction processor for verification through the network, in the same manner as the financial transaction process described above.
  • SecuAII electronic card cardholders Another benefit to SecuAII electronic card cardholders is that one electronic card can be used as multiple plastic credit cards. In other words, it is able to function as a VISA, MasterCard, Discover, or American Express card, depending on the cardholder's selection before use. Furthermore, the authentication system enables SecuAII electronic card cardholders to have their privacy protected regardless of whether a transaction is carried out through e-commerce, wireless or wired telephone, mail order, or brick & mortar retail without any change in the basic infrastructure or the third party involved. The present invention satisfies the long felt need of having an effective and secure credit card transaction method by implementing SecuAII electronic card and associated symmetric-encryption authentication technology into the credit card transaction system. In addition, the invented system is able to provide the protection of personal privacy online. Therefore, the invention will greatly promote consumers (SecuAII cardholders) to freely embrace e-commerce and emerging technologies.
  • FIG. 1 depicts a typical credit card transaction process.
  • FIG.2 demonstrates the authentication process.
  • FIG.3 is an isometric view of the SecuAII electronic card of the present invention.
  • FIG.4 shows the top surface of the electronic card of the present invention.
  • FIG.5 illustrates main electronic parts and components situated inside the electronic card of the present invention.
  • FIG.6 is ⁇ bottom view of the electronic card of this invention.
  • FIG.7 portrays logic linking of electronic components inside the electronic card of the present invention.
  • One goal of the present invention is to provide an authentication system based on an electronic card 1 and an authentication server 220 with a dynamic digital certificate verification to prevent the breaching of personal privacy on either credit card transactions or in online personal identification.
  • This solution results in one card to secure all personal privacy in e-commerce.
  • an entire microcomputer system as disclosed in the present invention can be implanted in a conventional plastic credit card without requiring the alteration of its dimensions or modification of current credit card transaction instruments.
  • a user of a credit card implementing the smart security system must key in a pre-assigned personal identification number (PIN) through a multiple digit membrane keypad 5 mounted on the card surface, which is verified by a micro controller unit 10 embedded inside the electronic card 1.
  • PIN personal identification number
  • a character value of a particular cardholder's fingerprint can also be pre-stored in the high-end version of the electronic card 1 as an alternative to the PIN.
  • the micro controller unit 10 captures the fingerprint through an integrated fingerprint sensor, implements an Analog-to-Digital (A/D) conversion, and then calculates out a character value which it compares to the pre-stored one for confirmation. Only after the verification of the PIN or the fingerprint can the electronic card 1 be activated to transmit the transaction data of the particular electronic card 1 to the authentication server 220 through a card read device or other instrument.
  • the server 220 a financial transaction or an online service request is instantly cleared only if a confirmation code from the symmetric encryption algorithm is identical to the dynamic digital certificate code received from the card.
  • the electronic card 1 is 100% compatible with any kind of transaction instrument, including those commonly used worldwide and emerging financial transaction technologies like cellular or regular telephones, PDAs, or 2-way pagers.
  • any kind of transaction instrument including those commonly used worldwide and emerging financial transaction technologies like cellular or regular telephones, PDAs, or 2-way pagers.
  • PDAs personal digital assistants
  • 2-way pagers For the personal identification for the online service request, no special read device or software driver is required. Because the request is approved in terms of the certificate confirmation instead of traditional credit card data or personal data, online merchants do not need to worry about the security of personal financial data, which is stored on their databases, against crackers or hackers who wish to steal that information. The replacement of the traditional handwritten signature with the digital certificate will significantly expedite the present checkout process for credit card purchases.
  • Figure 1 depicts generally a typical system used to process and settle data card transactions.
  • a merchant collects the transaction data such as the account number, the name of the cardholder, and the expiration date and then transfers them to a transaction processor 210 for transaction clearing and settlement through a network or in the form of paper sales drafts.
  • the data are typically transferred from the transaction processor 210 to the credit card issuer electronically. Once the card issuer receives the data, the transactions are immediately posted or stored for subsequent posting to the appropriate cardholder's account. Settlement occurs as funds are transferred from the issuing institution to the merchant.
  • the known transaction processing system provides for authorization of transactions and has served the business community well, but the system does not include adequate authentication instruments to prevent fraud. As a matter of fact, as long as a person acquires the transaction data by whatever means, he is readily able to break into this transaction processing system. This is the greatest shortcoming in electronic commerce.
  • the preferred electronic card 1 utilizing the authentication server 220, and implementing symmetric encryption technology, provides a perfect solution to this problem. Without additional cost or devices, the traditional authentication infrastructure offers additional benefit to electronic card 1 cardholders: the privacy protection for personal identification in Business to Consumer (B2C) e- commerce.
  • the authentication server 220 is to be located between the merchant and the transaction processor 210 as shown in Figure 2. Once a transaction request is received by the processor 210, it passes corresponding transaction data to the authentication server 220 located between the
  • the authentication server 220 works like a filter, which screens out all unauthorized transactions or server requests to protect the customers' privacy. Otherwise, the request is blocked and brief information regarding the reason why it was denied provided to the merchant.
  • an online service provider issues an authentication request to the authentication server 220, it transmits an instant dynamic certificate (so-called "dynamic password") input by the electronic card 1 cardholder from the keyboard on a personal computer (PC) or other devices and relates the personal data to the authentication server 220.
  • PC personal computer
  • the authentication server 220 Upon receiving all data, the authentication server 220 performs the same functions as with the credit card transaction request verification: it checks the digital certificate and sends back the result to the provider's server. Since the password continually changes and used only once, it will tremendously reduce the possibility of cracking the password. Therefore, the personal privacy is securely protected.
  • the authentication method introduces two technologies: electronic card 1 ( integrated with a complete microcomputer system and a magnetic simulator) and a symmetric encryption algorithm being run by both the card and the authentication server.
  • the card consists of a micro controller unit 10, a multi-digit wakeup membrane keypad 5, one magnetic strip simulator 20 (simulating Track I and Track II typically), an ultra-thin coil cell or battery 14, two micro switches 80, and an ultra thin liquid crystal display panel 15 as in Figure 3. All these parts are implanted into a conventional plastic card to keep the same dimension as the traditional plastic credit card.
  • the micro controller unit 10 includes a central processing unit (CPU), a random access memory (RAM), a clock timer, a read only memory (ROM), and some peripherals.
  • the micro controller unit 10 can be in a standby mode for power saving when not in service, during which time no data is displayed on the liquid crystal display panel 15. Pressing a concave keypad called “wakeup” will wake up the micro controller unit 10 from the standby mode.
  • the system employs a PIN in the form of a combination of digits, or alternatively fingerprint recognition technology, to prevent the card from unauthorized activation. This means that only after the PIN or the fingerprint is verified by the micro controller unit 10, will it be ready to transfer the card information to the magnetic strip simulators 20 and generate the instant certificate code which is then displayed on the liquid crystal display panel 15. Only one of the two micro-switches 80 mounted beside the simulators 20 needs to be pressed.
  • the simulator 20 emulates the magnetic strip data Track I, Track II, or Track III in IS0781 1 format.
  • the simulator 20 is a multi-turn conductive winding 60 that is particularly designed to emulate the magnetic flux generated by a regular magnetic strip as it passes through the read head on a read device.
  • the simulator 20 also attaches a digital certificate code to the data. This digital certificate code is instantly generated by a cryptographic algorithm at the moment a transaction is in process.
  • the account number is to be input into the card using a special input device by the card issuer prior to shipping the card to a cardholder, but the algorithm is stored in the card in on-chip read only memory (ROM).
  • ROM read only memory
  • the certificate code is a function of the account number, expiration date, card issuing date and time, and transaction date and time.
  • the micro controller unit 10 employs a built-in clock timer to form a calendar and a clock by micro-code, a low-level assembly language used for programming micro controller 10.
  • the date and the time used in the algorithm are in GMT at the card and the authentication server 220.
  • the two micro-switches 80 in Figure 5 are used to trigger the micro controller unit 10 to fetch the date and the time as input variables to the algorithm at the instant transaction moment, and to start the magnetic flux emulation of the transaction data on the simulator 20.
  • the first switch 80 is used for activation of swiping from one side, and the second switch 80 for swiping from the other side.
  • the authentication server Upon receiving the data and the certificate code, the authentication server executes the same algorithm in terms of the received transaction data and the prompt transaction date and time to create a confirmation code. Then, the authentication server 220 compares it to the certificate code received from the card for finalizing the verification, In order to prevent ⁇ shift of the verification code into minutes earlier or later due to time deviation between the server 220 and the micro controller unit 10, some error tolerance should be encompassed. A self-adoptive and an error compensation method are employed to achieve this. With this method, each time a transaction is being processed, the server 220 checks the time difference between the card and the server 220. If the difference exists for a specific card, the server 220 will mark the difference or called error and compensate the error during the next time transaction.
  • the electronic card 1 is compatible with all credit card transaction instruments either online or offline, even emerging technologies like PDA and cell phone transactions. Multiple of conventional credit card data are implanted into one electronic card 1 for cardholder's convenience. For a transaction using a regular credit card read device at the Point of Sale (POS), the cardholder must type in the PIN from the keypads on the card surface (or for the high-end electronic card 1 , the fingerprint recognition replaces the PIN) and hand the card to a cashier as usual. No handwritten signature is required for the purchase. For a transaction on the Internet, the cardholder types the certificate code, which is instantly displayed on the liquid crystal display panel 15 from the keyboard on a PC or keypad on any electronic device prior to clicking the "SEND" icon on the screen.
  • POS Point of Sale
  • the merchants simply need to write down the account number, the digital certificate, and the transaction date and time, for follow-up authentication by the authentication server 220.
  • electronic card 1 cardholders and merchants will no longer have to worry about the credit card data being revealed.
  • the present method and apparatus can be easily migrated to all other verification of the electronic card 1 cardholder identity.
  • Modern electronics and micro-assembly technologies will allow this card to have similar dimensions (length, width, and thickness) as standard credit cards with little or no need to modify current read devices and the transaction data transit network system.
  • the micro controller unit 10 will notify the cardholder to change the battery 14 in the coin cell when it is nearly empty.

Abstract

A method and apparatus for conducting secure credit card transaction and providing personal identification on the Internet. It has a plastic body (1) in regular credit card dimension implanted with a complete microcomputer system (10) and an associated server (220), implementing dynamic digital certificate authentication technology in order to prevent personal privacy from being breached in e-commerce transactions.

Description

METHOD AND APPARATUS OF SECURE CREDIT CARD TRANSACTION by Chuαn Li
CROSS-REFERENCES
This application is derived and claims priority from two of the applicant's earlier invention disclosures, which are hereby incorporated by reference for all purposes. The first was filed with the United States Patent and Trademark Office on Dec 8, 1999, entitled, "Smart Security Credit Card System" with a Serial No.466207. The second was filed on Feb 8, 2000, entitled "System, Method, and Apparatus of Dynamic Digital Certificate Authentication for Credit Card Transaction" with a Serial No.468831.
BACKGROUND
This invention relates to secure credit card transactions and providing personal identification on the Internet. It is specifically characterized by a plastic body in regular credit card dimension implanted with a complete microcomputer system (hereafter called SecuAII Card) and an associated authentication server, implementing dynamic digital certificate authentication technology in order to prevent personal privacy from being breached in e- commerce transactions.
Credit card fraud has been a problem around the world from the inception of the credit card transaction system nearly half a century ago. Each year credit card related fraud and theft causes billions of dollars of loss to the merchants, credit card issuing companies, and cardholders. The primary problem with a transaction using a conventional credit card is the relative ease in which an unauthorized transaction can be processed. This fraud is facilitated by the direct access to the account information, which is shown on the front of the credit card and the cardholder signature, which is written on the back. Once an unauthorized user gains access to a cardholder's account information and signature, either by gaining physical possession of the card or by any other means, the unauthorized user can simply forge the cardholder's signature as shown on the back of the card to authorize any purchase. A cardholder who has lost her credit card may subsequently cancel the credit card, to prevent further unauthorized use. However, typically by the time the cardholder realizes her loss, a great damage has already been done, not all of which may be undone by the credit company or the merchants involved. The credit cardholder may then be forced to bear the cost of the unauthorized purchases. In addition to personal financial liability that may be incurred due to loss of a conventional credit card, the holder also suffers from compromised security regarding his or her personal credit and account information such as the account number, expiration date, the cardholder's name, and the cardholder's signature, which may also be misused to conduct unauthorized transactions. A dishonest or tempted merchant, who gains access to a cardholder's personal credit and account information, may easily decide to use such information to conduct an unauthorized transaction without the actual credit card physically leaving the possession of the cardholder. This leads to a greater chance that the unauthorized credit card transaction will not be prevented.
With emerging technologies for e-commerce (like mobile banking, online stock transaction, online bill payment, etc.,) personal account access using a static password is easily breached, resulting in the violation of the personal privacy.
Therefore it is desirable to have new, alternative and effective instruments to authenticate credit card transaction requests, to protect online personal privacy, and to minimize the chance of fraud in credit card transactions. SUMMARY
The present invention provides an effective instrument to authenticate credit cared transactions, and to protect personal privacy online, thereby reducing the opportunity for credit card fraud. This invention is a novel apparatus-SecuAII card implementing a dynamic digital certification and a symmetric encryption authentication system for securing authorized financial transaction using a credit card and for personal online account access.
In the preferred embodiment, the smart security system comprises a secure transaction electronic card (SecuAII card). The card mainly consists of a conventional plastic body in the dimension of a conventional credit card, a magnetic strip simulator, a micro controller unit, a membrane keypad, a coin cell battery, two micro switches, an ultra-thin liquid crystal display (LCD) panel, and other electronic components. The simulator emulates a magnetic flux, as does a regular magnetic strip when the card passes through a conventional credit card read device. In order to prevent the electronic card from unauthorized activation, the electronic card employs a personal identification number (PIN) in the form of a combination of digits for the low-end model of the electronic card, or uses fingerprint recognition for the high-end model of the electronic card. The card, usually in standby mode, is to be activated only after the micro controller unit verifies the PIN input from the membrane keypad (typically having 10 digits) or the captured fingerprint. If an incorrect PIN or fingerprint is detected, the micro controller unit will not generate the magnetic flux on the magnetic strip simulator and return immediately to the standby mode. Therefore, none of the transaction data nor the digital certificate would be transmitted to the card read device, and nothing would be displayed on the liquid crystal display panel.
In an alternative embodiment, the traditional transaction data (account number, cardholder's name, and expiration date) would not be private, however, the financial transaction would fail or access to a personal account would be denied without the electronic card being physically presented. Despite the potential availability of the transaction data, the request could not pass the authentication stage without the correct instant digital certificate, because the identity verification of the electronic card user is based on the authentication of the digital certificate, rather than conventional card data, such as a signature. Additionally, each certificate is valid only once. The dynamic digital certificate, in form of a combination of 6 or more digits, is uniquely issued for each transaction, and then expires. The digital certificate is authenticated for each unique transaction, and therefore provides no value to any individual who subsequently attempts to use the date to effectuate further transactions outside the presence of the cardholder. The certificate, generated by an algorithm within the card, is a function of variables which include: the 16- digit credit card account number, the card issuing date (year, month, and date in Greenwich Mean Time (GMT) and time (hours and minutes in GMT), and the instant date and time at which a transaction is being processed. Upon receiving a transaction request, a transaction authentication server would then calculate a unique confirmation code by executing the same algorithm with the received traditional data (account number, cardholder's name, and expiration date), the pre-stored card issuing date and time, and the instant transaction time in GMT. The authentication server would approve the transaction request upon verifying the identity between the certificate and the confirmation code.
For personal privacy protection in online transactions, the digital certificate displayed on the electronic card's liquid crystal displaypanel would replace the current use of static passwords. The digital certificate would first need to be entered from a computer or Personal Digital Assistant keyboard or the keypad on a mobile or a regular phone. It would then be transmitted to the transaction processor for verification through the network, in the same manner as the financial transaction process described above.
Another benefit to SecuAII electronic card cardholders is that one electronic card can be used as multiple plastic credit cards. In other words, it is able to function as a VISA, MasterCard, Discover, or American Express card, depending on the cardholder's selection before use. Furthermore, the authentication system enables SecuAII electronic card cardholders to have their privacy protected regardless of whether a transaction is carried out through e-commerce, wireless or wired telephone, mail order, or brick & mortar retail without any change in the basic infrastructure or the third party involved. The present invention satisfies the long felt need of having an effective and secure credit card transaction method by implementing SecuAII electronic card and associated symmetric-encryption authentication technology into the credit card transaction system. In addition, the invented system is able to provide the protection of personal privacy online. Therefore, the invention will greatly promote consumers (SecuAII cardholders) to freely embrace e-commerce and emerging technologies.
DETAILED DESCRIPTION OF THE DRAWINGS
FIG. 1 depicts a typical credit card transaction process.
FIG.2 demonstrates the authentication process. FIG.3 is an isometric view of the SecuAII electronic card of the present invention.
FIG.4 shows the top surface of the electronic card of the present invention.
FIG.5 illustrates main electronic parts and components situated inside the electronic card of the present invention. FIG.6 is α bottom view of the electronic card of this invention. FIG.7 portrays logic linking of electronic components inside the electronic card of the present invention.
DETAILED DESCRIPTION OF THE INVENTION
One goal of the present invention is to provide an authentication system based on an electronic card 1 and an authentication server 220 with a dynamic digital certificate verification to prevent the breaching of personal privacy on either credit card transactions or in online personal identification. This solution results in one card to secure all personal privacy in e-commerce. With today's advanced technology, an entire microcomputer system as disclosed in the present invention can be implanted in a conventional plastic credit card without requiring the alteration of its dimensions or modification of current credit card transaction instruments. In lieu of a handwritten signature, a user of a credit card implementing the smart security system must key in a pre-assigned personal identification number (PIN) through a multiple digit membrane keypad 5 mounted on the card surface, which is verified by a micro controller unit 10 embedded inside the electronic card 1. A character value of a particular cardholder's fingerprint can also be pre-stored in the high-end version of the electronic card 1 as an alternative to the PIN. The micro controller unit 10 captures the fingerprint through an integrated fingerprint sensor, implements an Analog-to-Digital (A/D) conversion, and then calculates out a character value which it compares to the pre-stored one for confirmation. Only after the verification of the PIN or the fingerprint can the electronic card 1 be activated to transmit the transaction data of the particular electronic card 1 to the authentication server 220 through a card read device or other instrument. At the server 220, a financial transaction or an online service request is instantly cleared only if a confirmation code from the symmetric encryption algorithm is identical to the dynamic digital certificate code received from the card. Unlike the smart card, the electronic card 1 is 100% compatible with any kind of transaction instrument, including those commonly used worldwide and emerging financial transaction technologies like cellular or regular telephones, PDAs, or 2-way pagers. For the personal identification for the online service request, no special read device or software driver is required. Because the request is approved in terms of the certificate confirmation instead of traditional credit card data or personal data, online merchants do not need to worry about the security of personal financial data, which is stored on their databases, against crackers or hackers who wish to steal that information. The replacement of the traditional handwritten signature with the digital certificate will significantly expedite the present checkout process for credit card purchases.
Figure 1 depicts generally a typical system used to process and settle data card transactions. A merchant collects the transaction data such as the account number, the name of the cardholder, and the expiration date and then transfers them to a transaction processor 210 for transaction clearing and settlement through a network or in the form of paper sales drafts. The data are typically transferred from the transaction processor 210 to the credit card issuer electronically. Once the card issuer receives the data, the transactions are immediately posted or stored for subsequent posting to the appropriate cardholder's account. Settlement occurs as funds are transferred from the issuing institution to the merchant.
The known transaction processing system provides for authorization of transactions and has served the business community well, but the system does not include adequate authentication instruments to prevent fraud. As a matter of fact, as long as a person acquires the transaction data by whatever means, he is readily able to break into this transaction processing system. This is the greatest shortcoming in electronic commerce. The preferred electronic card 1 , utilizing the authentication server 220, and implementing symmetric encryption technology, provides a perfect solution to this problem. Without additional cost or devices, the traditional authentication infrastructure offers additional benefit to electronic card 1 cardholders: the privacy protection for personal identification in Business to Consumer (B2C) e- commerce.
The authentication server 220 is to be located between the merchant and the transaction processor 210 as shown in Figure 2. Once a transaction request is received by the processor 210, it passes corresponding transaction data to the authentication server 220 located between the
π merchants and the transaction processors 210 for identification. If the verification is authenticated, the server transmits traditional transaction data to the transaction processor 210. The authentication server 220 works like a filter, which screens out all unauthorized transactions or server requests to protect the customers' privacy. Otherwise, the request is blocked and brief information regarding the reason why it was denied provided to the merchant. For the online service request, when an online service provider issues an authentication request to the authentication server 220, it transmits an instant dynamic certificate (so-called "dynamic password") input by the electronic card 1 cardholder from the keyboard on a personal computer (PC) or other devices and relates the personal data to the authentication server 220. Upon receiving all data, the authentication server 220 performs the same functions as with the credit card transaction request verification: it checks the digital certificate and sends back the result to the provider's server. Since the password continually changes and used only once, it will tremendously reduce the possibility of cracking the password. Therefore, the personal privacy is securely protected.
The authentication method introduces two technologies: electronic card 1 ( integrated with a complete microcomputer system and a magnetic simulator) and a symmetric encryption algorithm being run by both the card and the authentication server. The card consists of a micro controller unit 10, a multi-digit wakeup membrane keypad 5, one magnetic strip simulator 20 (simulating Track I and Track II typically), an ultra-thin coil cell or battery 14, two micro switches 80, and an ultra thin liquid crystal display panel 15 as in Figure 3. All these parts are implanted into a conventional plastic card to keep the same dimension as the traditional plastic credit card. The micro controller unit 10 includes a central processing unit (CPU), a random access memory (RAM), a clock timer, a read only memory (ROM), and some peripherals. The micro controller unit 10 can be in a standby mode for power saving when not in service, during which time no data is displayed on the liquid crystal display panel 15. Pressing a concave keypad called "wakeup" will wake up the micro controller unit 10 from the standby mode. The system employs a PIN in the form of a combination of digits, or alternatively fingerprint recognition technology, to prevent the card from unauthorized activation. This means that only after the PIN or the fingerprint is verified by the micro controller unit 10, will it be ready to transfer the card information to the magnetic strip simulators 20 and generate the instant certificate code which is then displayed on the liquid crystal display panel 15. Only one of the two micro-switches 80 mounted beside the simulators 20 needs to be pressed. The simulator 20 emulates the magnetic strip data Track I, Track II, or Track III in IS0781 1 format. The simulator 20 is a multi-turn conductive winding 60 that is particularly designed to emulate the magnetic flux generated by a regular magnetic strip as it passes through the read head on a read device. In Addition to the transmission of the traditional credit card data to the read device, the simulator 20 also attaches a digital certificate code to the data. This digital certificate code is instantly generated by a cryptographic algorithm at the moment a transaction is in process. The account number is to be input into the card using a special input device by the card issuer prior to shipping the card to a cardholder, but the algorithm is stored in the card in on-chip read only memory (ROM). The certificate code is a function of the account number, expiration date, card issuing date and time, and transaction date and time. The micro controller unit 10 employs a built-in clock timer to form a calendar and a clock by micro-code, a low-level assembly language used for programming micro controller 10. The date and the time used in the algorithm are in GMT at the card and the authentication server 220. The two micro-switches 80 in Figure 5 are used to trigger the micro controller unit 10 to fetch the date and the time as input variables to the algorithm at the instant transaction moment, and to start the magnetic flux emulation of the transaction data on the simulator 20. The first switch 80 is used for activation of swiping from one side, and the second switch 80 for swiping from the other side. Upon receiving the data and the certificate code, the authentication server executes the same algorithm in terms of the received transaction data and the prompt transaction date and time to create a confirmation code. Then, the authentication server 220 compares it to the certificate code received from the card for finalizing the verification, In order to prevent α shift of the verification code into minutes earlier or later due to time deviation between the server 220 and the micro controller unit 10, some error tolerance should be encompassed. A self-adoptive and an error compensation method are employed to achieve this. With this method, each time a transaction is being processed, the server 220 checks the time difference between the card and the server 220. If the difference exists for a specific card, the server 220 will mark the difference or called error and compensate the error during the next time transaction.
The electronic card 1 is compatible with all credit card transaction instruments either online or offline, even emerging technologies like PDA and cell phone transactions. Multiple of conventional credit card data are implanted into one electronic card 1 for cardholder's convenience. For a transaction using a regular credit card read device at the Point of Sale (POS), the cardholder must type in the PIN from the keypads on the card surface (or for the high-end electronic card 1 , the fingerprint recognition replaces the PIN) and hand the card to a cashier as usual. No handwritten signature is required for the purchase. For a transaction on the Internet, the cardholder types the certificate code, which is instantly displayed on the liquid crystal display panel 15 from the keyboard on a PC or keypad on any electronic device prior to clicking the "SEND" icon on the screen. For all other offline transactions, the merchants simply need to write down the account number, the digital certificate, and the transaction date and time, for follow-up authentication by the authentication server 220. With this invention, electronic card 1 cardholders and merchants will no longer have to worry about the credit card data being revealed. The present method and apparatus can be easily migrated to all other verification of the electronic card 1 cardholder identity. Modern electronics and micro-assembly technologies will allow this card to have similar dimensions (length, width, and thickness) as standard credit cards with little or no need to modify current read devices and the transaction data transit network system. The micro controller unit 10 will notify the cardholder to change the battery 14 in the coin cell when it is nearly empty. Changing the battery 14 will not lead to loss of the credit card data in the random access memory (RAM), nor will it stop the clock timer because a capacitor whose capacity is large enough to keep the micro controller unit 10 running in a standby mode operates while changing the battery 14. The cost of the card would be approximately a few dollars, therefore the implementation of this invention will be readily accepted by customers and merchants. By replacing all conventional credit cards worldwide, the electronic card 1 cardholders and the card issuing institutions will be able to save billions of dollars each year due to loss from credit card fraud and the invention will significantly facilitate B2C e- commerce.

Claims

CLAIMS I claim:
1. An electronic card being made of a substantially rigid material, having a substantially flat surface and a dimension substantially similar to that of a conventional credit card, the electronic card being capable of securing an authorized financial transaction and a personal online account access by a user, comprising: a. a micro controller unit for verifying a pre-assigned user input information, the micro controller unit comprising: i. a central processor unit, ii. a memory being capable of storing the pre-assigned user input information, and iii. a clock timer to generate a date and time by a micro- code; b. a membrane keypad having a plurality of digits, the membrane keypad being mounted on the surface of the electronic card, for entering the pre-assigned user input information; c. a magnetic strip simulator designed to: i. emulate a magnetic flux to be generated while the electronic card passes through a read head on a read device; ii. emulate a traditional credit card transaction data; iii. generate a dynamic digital certificate code to the transaction data; iv. transmit the transaction data to the read device; and d. a battery embedded within the electronic card; and e. a liquid crystal display panel located on the flat surface for displaying the certificate code.
2. The electronic card of claim 1 , wherein the magnetic strip simulator further comprises a conductive winding to simulate a track.
3. The electronic card of claim 2, wherein the track is Track I magnetic strip in IS0781 1 format.
4. The electronic card of claim 2, wherein the track is Track II magnetic strip in IS0781 1 format.
5. The electronic card of claim 2, wherein the track is Track III magnetic strip in IS0781 1 format.
6. The electronic card of claim 1 further comprising a cryptographic algorithm stored in the memory for generating the dynamic digital certificate code prior to transmitting the transaction data.
7. The electronic card of claim 6, wherein the dynamic digital certificate code is calculated based on the cryptographic algorithm containing the following variables: a. a credit card account number of the user, b. an expiration date of the user's credit card, c. a card issuing date in Greenwich Mean Time (GMT), d. a card issuing time in GMT, e. an instant transaction date in GMT, and f. an instant transaction time in GMT.
8. The electronic card of claim 1 further comprising two micro switches for triggering the micro controller unit to obtain a transaction date and a transaction time as input variables to the cryptographic algorithm at an instant transaction moment, and for starting the magnetic flux emulation of the transaction data on the simulator.
9. The electronic card of claim 1 , wherein the membrane keypad has ten digits.
10. The electronic card of claim 1 , wherein the pre-assigned user input information is a personal identification number consisting of a plurality of numerals.
1 1. The electronic card of claim 1 , further comprising an integrated fingerprint sensor on the surface of the electronic card for authenticating the user, wherein the pre-stored user's fingerprint template is verified by the micro controller unit through implementation of a digital signal processing of a fingerprint data of the user, the fingerprint data being obtained by the integrated fingerprint sensor when the user presses one of his fingers on the integrated fingerprint sensor.
2. The electronic card of claim 1 , which is capable of functioning as a major brand credit card.
3. A method of conducting α secured transaction using an electronic card, said method comprising the steps of: a. providing the electronic card having a micro controller unit being capable of storing a pre-assigned user input information and producing a dynamic digital certificate code; b. inputting by a user of the pre-assigned user input information for verification by the micro controller unit; c. verifying by the micro controller unit of the pre-assigned user input information; d. producing of the dynamic digital certificate code by the micro controller unit only when the pre-assigned user input information agrees with the pre-assigned user input information stored in the micro controller unit; e. providing a transaction processor being capable of transmitting and receiving back a transaction request; f. providing an authentication server being capable of receiving and transmitting the transaction request, the authentication server being capable of producing a dynamic confirmation code and comparing the dynamic digital certificate code and the dynamic confirmation code; g. producing by the authentication server of the dynamic confirmation code upon receiving the transaction request from the transaction server; h. comparing by the authentication server of the dynamic digital certificate code and the dynamic confirmation code; and i. transmitting by the authentication server of the transaction request back to the transaction processor only when the dynamic digital certificate code agrees with the dynamic confirmation code.
4. The method of claim 13, wherein the electronic card in the providing step is made of a substantially rigid material, has a substantially flat surface, and has a dimension substantially similar to that of a conventional credit card, the electronic card further comprises: a. a user input information receiving device on the surface of the electronic card; b. a magnetic strip simulator designed to: i. emulate a magnetic flux to be generated while the electronic card passes through a read head on a read device; ii. emulate a traditional credit card transaction data; iii. generate a dynamic digital certificate code to the transaction data; and iv. transmit the transaction data to a read device; and c. a battery embedded within the electronic card; and d. a liquid crystal display panel located on the surface of the electronic card for displaying the dynamic digital certificate code, and e. wherein the micro controller unit further comprises: i. a central processor unit, ii. a memory, and iii. α clock timer to generate a date and time by a microcode.
15. The method of claim 14, wherein the user input information receiving device is a membrane keypad having a plurality of digits, wherein the pre-assigned user input information is a personal identification number consisting of a plurality of numerals.
16. The method of claim 14, wherein the user input information receiving device is an integrated fingerprint sensor on the surface of the electronic card for authenticating the user, wherein the pre-stored user's fingerprint template is verified by the micro controller unit through implementation of a digital signal processing of a fingerprint data of the user, the fingerprint data being obtained by the integrated fingerprint sensor when the user presses one of his fingers on the integrated fingerprint sensor.
17. The method of claim 13, wherein the dynamic digital certificate code is calculated based on the cryptographic algorithm containing the following variables: a. a credit card account number of the user, b. an expiration date of the user's credit card, c. a card issuing date in Greenwich Mean Time (GMT), d. a card issuing time in GMT, e. an instant transaction date in GMT, and f. an instant transaction time in GMT.
18. The method of claim 13, wherein the dynamic confirmation code is calculated based on the cryptographic algorithm containing the following variables: a. a credit card account number of the user, b. an expiration date of the user's credit card, c. a card issuing date in Greenwich Mean Time (GMT), d. a card issuing time in GMT, e. an instant transaction date in GMT, and f. an instant transaction time in GMT.
19. The method of claim 13, wherein the electronic card in the providing step a. further performing a symmetric encryption algorithm, and wherein the authentication server in the providing step b. further performing another symmetric encryption algorithm.
20. The method of claim 13, wherein the transmitting step further comprises an error compensation, whereby each time a transaction is being processed by the method, the authentication server checks a difference between a transaction time transmitted by the micro controller unit and another transaction time measured by the transaction server, and the transaction request is transmitted to the transaction processor when the difference in two transaction times deviate within the preset tolerance, and when the difference exists, the server records the difference and deducts such difference at the next authentication processing from the transaction time transmitted by the micro controller unit.
21. The method of claim 14 further comprising a step of displaying a transaction data necessary to perform the secured transaction on the liquid crystal display panel.
PCT/US2002/007363 2001-04-19 2002-03-08 Method and apparatus of secure credit card transaction WO2002086810A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US09/838,954 US20020153424A1 (en) 2001-04-19 2001-04-19 Method and apparatus of secure credit card transaction
US09/838,954 2001-04-19

Publications (1)

Publication Number Publication Date
WO2002086810A1 true WO2002086810A1 (en) 2002-10-31

Family

ID=25278477

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2002/007363 WO2002086810A1 (en) 2001-04-19 2002-03-08 Method and apparatus of secure credit card transaction

Country Status (2)

Country Link
US (1) US20020153424A1 (en)
WO (1) WO2002086810A1 (en)

Families Citing this family (215)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7343351B1 (en) 1999-08-31 2008-03-11 American Express Travel Related Services Company, Inc. Methods and apparatus for conducting electronic transactions
US7953671B2 (en) 1999-08-31 2011-05-31 American Express Travel Related Services Company, Inc. Methods and apparatus for conducting electronic transactions
US7889052B2 (en) 2001-07-10 2011-02-15 Xatra Fund Mx, Llc Authorizing payment subsequent to RF transactions
US7588180B1 (en) * 2000-01-28 2009-09-15 International Apparel Group, Llc Multi-application smart card with currency exchange, location tracking, and personal identification capabilities
US6816058B2 (en) * 2001-04-26 2004-11-09 Mcgregor Christopher M Bio-metric smart card, bio-metric smart card reader and method of use
US7725427B2 (en) 2001-05-25 2010-05-25 Fred Bishop Recurrent billing maintenance with radio frequency payment devices
US7668750B2 (en) 2001-07-10 2010-02-23 David S Bonalle Securing RF transactions using a transactions counter
US8294552B2 (en) 2001-07-10 2012-10-23 Xatra Fund Mx, Llc Facial scan biometrics on a payment device
US7249112B2 (en) 2002-07-09 2007-07-24 American Express Travel Related Services Company, Inc. System and method for assigning a funding source for a radio frequency identification device
US20040236699A1 (en) 2001-07-10 2004-11-25 American Express Travel Related Services Company, Inc. Method and system for hand geometry recognition biometrics on a fob
US8279042B2 (en) 2001-07-10 2012-10-02 Xatra Fund Mx, Llc Iris scan biometrics on a payment device
US8001054B1 (en) 2001-07-10 2011-08-16 American Express Travel Related Services Company, Inc. System and method for generating an unpredictable number using a seeded algorithm
US7705732B2 (en) 2001-07-10 2010-04-27 Fred Bishop Authenticating an RF transaction using a transaction counter
US8548927B2 (en) 2001-07-10 2013-10-01 Xatra Fund Mx, Llc Biometric registration for facilitating an RF transaction
US7303120B2 (en) * 2001-07-10 2007-12-04 American Express Travel Related Services Company, Inc. System for biometric security using a FOB
US7360689B2 (en) * 2001-07-10 2008-04-22 American Express Travel Related Services Company, Inc. Method and system for proffering multiple biometrics for use with a FOB
US9031880B2 (en) 2001-07-10 2015-05-12 Iii Holdings 1, Llc Systems and methods for non-traditional payment using biometric data
US9024719B1 (en) 2001-07-10 2015-05-05 Xatra Fund Mx, Llc RF transaction system and method for storing user personal data
US7735725B1 (en) 2001-07-10 2010-06-15 Fred Bishop Processing an RF transaction using a routing number
US9454752B2 (en) 2001-07-10 2016-09-27 Chartoleaux Kg Limited Liability Company Reload protocol at a transaction processing entity
ATE268926T1 (en) * 2002-02-13 2004-06-15 Swisscom Ag ACCESS CONTROL SYSTEM, ACCESS CONTROL METHOD AND DEVICES SUITABLE THEREOF
US6805287B2 (en) 2002-09-12 2004-10-19 American Express Travel Related Services Company, Inc. System and method for converting a stored value card to a credit card
FR2849248B1 (en) * 2002-12-20 2005-06-24 Oberthur Card Syst Sa SECURE ELECTRONIC ENTITY PERMITTING A CERTIFICATION OF TIME
US20040179224A1 (en) * 2003-03-12 2004-09-16 Toshiba Tec Kabushiki Kaisha Image processing apparatus and image processing method
DK200300384A (en) * 2003-03-13 2004-09-14 Quard Technology I S Self-Approving Biometric Device with Dynamic PIN Code Creation
TWI226588B (en) * 2003-04-23 2005-01-11 Winbond Electronics Corp Contactless radio frequency magnetic field data transmission card and associated application system
US6983882B2 (en) * 2003-03-31 2006-01-10 Kepler, Ltd. Personal biometric authentication and authorization device
JP2004302921A (en) * 2003-03-31 2004-10-28 Toshiba Corp Device authenticating apparatus using off-line information and device authenticating method
US6936377B2 (en) * 2003-05-13 2005-08-30 C. Glen Wensley Card with embedded IC and electrochemical cell
US20040229127A1 (en) 2003-05-13 2004-11-18 Wensley C. Glen Polyimide matrix electrolyte
US20040253520A1 (en) 2003-05-13 2004-12-16 Wensley C. Glen Polyimide matrix electrolyte and improved batteries therefrom
US9412123B2 (en) 2003-07-01 2016-08-09 The 41St Parameter, Inc. Keystroke analysis
US7390336B2 (en) * 2003-07-29 2008-06-24 Solicore, Inc. Polyimide-based lithium metal battery
US7740168B2 (en) 2003-08-18 2010-06-22 Visa U.S.A. Inc. Method and system for generating a dynamic verification value
US7761374B2 (en) 2003-08-18 2010-07-20 Visa International Service Association Method and system for generating a dynamic verification value
US10999298B2 (en) 2004-03-02 2021-05-04 The 41St Parameter, Inc. Method and system for identifying users and detecting fraud by use of the internet
US20060010072A1 (en) * 2004-03-02 2006-01-12 Ori Eisen Method and system for identifying users and detecting fraud by use of the Internet
WO2005105786A1 (en) * 2004-04-28 2005-11-10 Hetero Drugs Limited A process for preparing pyridinylmethyl-1h- benzimidazole compounds in enantiomerically enriched form or as single enantiomers
US20050269401A1 (en) * 2004-06-03 2005-12-08 Tyfone, Inc. System and method for securing financial transactions
US7318550B2 (en) 2004-07-01 2008-01-15 American Express Travel Related Services Company, Inc. Biometric safeguard method for use with a smartcard
US7341181B2 (en) * 2004-07-01 2008-03-11 American Express Travel Related Services Company, Inc. Method for biometric security using a smartcard
US20060147792A1 (en) * 2004-07-22 2006-07-06 Solicore, Inc. Machining electrical power supply device for wire electrical discharge machining apparatus
US20060146651A1 (en) * 2004-12-30 2006-07-06 Park Chan J Method for encoding a date for universal recognition
US7581678B2 (en) 2005-02-22 2009-09-01 Tyfone, Inc. Electronic transaction card
US20060265736A1 (en) * 2005-05-19 2006-11-23 Gilbarco Inc. Encryption system and method for legacy devices in a retail environment
JP2008545186A (en) * 2005-07-01 2008-12-11 ボラーチ,ファブリジオ General-purpose smart card
US7953968B2 (en) 2005-08-04 2011-05-31 Gilbarco Inc. System and method for selective encryption of input data during a retail transaction
US7494067B1 (en) * 2005-09-07 2009-02-24 Sprint Communications Company L.P. Alternate authorization for proximity card
ES2354835T3 (en) 2005-09-08 2011-03-18 Cardlab Aps DYNAMIC TRANSACTIONS CARD AND PROCEDURE FOR WRITING INFORMATION IN THE SAME.
US11301585B2 (en) 2005-12-16 2022-04-12 The 41St Parameter, Inc. Methods and apparatus for securely displaying digital images
US8938671B2 (en) 2005-12-16 2015-01-20 The 41St Parameter, Inc. Methods and apparatus for securely displaying digital images
AU2007223334B2 (en) 2006-03-02 2012-07-12 Visa International Service Association Method and system for performing two factor authentication in mail order and telephone order transactions
US8151327B2 (en) 2006-03-31 2012-04-03 The 41St Parameter, Inc. Systems and methods for detection of session tampering and fraud prevention
US9065643B2 (en) 2006-04-05 2015-06-23 Visa U.S.A. Inc. System and method for account identifier obfuscation
US7818264B2 (en) * 2006-06-19 2010-10-19 Visa U.S.A. Inc. Track data encryption
WO2007149830A2 (en) * 2006-06-19 2007-12-27 Visa U.S.A. Inc. Portable consumer device configured to generate dynamic authentication data
KR100828119B1 (en) * 2006-08-09 2008-05-08 박정웅 Card having password input key
US8009032B2 (en) * 2006-11-21 2011-08-30 Gilbarco Inc. Remote display tamper detection using data integrity operations
US7991158B2 (en) * 2006-12-13 2011-08-02 Tyfone, Inc. Secure messaging
US7967214B2 (en) 2006-12-29 2011-06-28 Solicore, Inc. Card configured to receive separate battery
US8181879B2 (en) 2006-12-29 2012-05-22 Solicore, Inc. Mailing apparatus for powered cards
US20080164307A1 (en) * 2007-01-05 2008-07-10 Microsoft Corporation Performing transactions with universal transaction card
US9280776B2 (en) * 2007-01-05 2016-03-08 Microsoft Technology Licensing, Llc Delivering content based on physical object characteristics
US7866551B2 (en) * 2007-02-15 2011-01-11 Visa U.S.A. Inc. Dynamic payment device characteristics
US20080217399A1 (en) * 2007-03-07 2008-09-11 Eric Leblanc System and method for controlling usage of a payment card
US7849014B2 (en) * 2007-08-29 2010-12-07 American Express Travel Related Services Company, Inc. System and method for facilitating a financial transaction with a dynamically generated identifier
WO2009042819A2 (en) * 2007-09-26 2009-04-02 Clevx, Llc Self-authenticating credit card system
US9060012B2 (en) * 2007-09-26 2015-06-16 The 41St Parameter, Inc. Methods and apparatus for detecting fraud with time based computer tags
US10614462B2 (en) 2007-09-26 2020-04-07 Clevx, Llc Security aspects of a self-authenticating credit card
US9747598B2 (en) 2007-10-02 2017-08-29 Iii Holdings 1, Llc Dynamic security code push
US20090145972A1 (en) * 2007-12-11 2009-06-11 James Douglas Evans Biometric authorization transaction
US8694793B2 (en) 2007-12-11 2014-04-08 Visa U.S.A. Inc. Biometric access control transactions
US9741027B2 (en) 2007-12-14 2017-08-22 Tyfone, Inc. Memory card based contactless devices
US9684861B2 (en) * 2007-12-24 2017-06-20 Dynamics Inc. Payment cards and devices with displays, chips, RFIDs, magnetic emulators, magnetic decoders, and other components
WO2010005681A1 (en) 2008-06-16 2010-01-14 Visa U.S.A. Inc. System and method for authorizing financial transactions with online merchants
US8898089B2 (en) * 2008-06-24 2014-11-25 Visa U.S.A. Inc. Dynamic verification value system and method
US9390384B2 (en) * 2008-07-01 2016-07-12 The 41 St Parameter, Inc. Systems and methods of sharing information through a tagless device consortium
US7961101B2 (en) 2008-08-08 2011-06-14 Tyfone, Inc. Small RFID card with integrated inductive element
US8451122B2 (en) 2008-08-08 2013-05-28 Tyfone, Inc. Smartcard performance enhancement circuits and systems
EP2401708A4 (en) 2009-02-24 2012-08-15 Tyfone Inc Contactless device with miniaturized antenna
US9112850B1 (en) 2009-03-25 2015-08-18 The 41St Parameter, Inc. Systems and methods of sharing information through a tag-based consortium
US8320962B2 (en) * 2009-06-05 2012-11-27 Visa International Service Association Contactless disablement
US8167201B2 (en) * 2009-10-07 2012-05-01 Castles Technology Co., Ltd. Composite chip card with a security protection interface and a method for controlling the same
WO2012054646A2 (en) 2010-10-19 2012-04-26 The 41St Parameter, Inc. Variable risk engine
US20120181333A1 (en) * 2010-12-17 2012-07-19 Mark Stanley Krawczewicz Secure ID Credential With Bi-State Display For Unlocking Devices
US20120257426A1 (en) * 2011-04-11 2012-10-11 Ever Win International Corporation AC Adapter With Automatic Built-In Power Switch
CN102143482B (en) * 2011-04-13 2013-11-13 中国工商银行股份有限公司 Method and system for authenticating mobile banking client information, and mobile terminal
US10102401B2 (en) 2011-10-20 2018-10-16 Gilbarco Inc. Fuel dispenser user interface system architecture
US10754913B2 (en) 2011-11-15 2020-08-25 Tapad, Inc. System and method for analyzing user device information
IL217834A (en) * 2012-01-30 2017-06-29 Rahamim Karakop System and method for securing credit cards
US9633201B1 (en) 2012-03-01 2017-04-25 The 41St Parameter, Inc. Methods and systems for fraud containment
US9521551B2 (en) 2012-03-22 2016-12-13 The 41St Parameter, Inc. Methods and systems for persistent cross-application mobile device identification
US10515359B2 (en) * 2012-04-02 2019-12-24 Mastercard International Incorporated Systems and methods for processing mobile payments by provisioning credentials to mobile devices without secure elements
EP2880619A1 (en) 2012-08-02 2015-06-10 The 41st Parameter, Inc. Systems and methods for accessing records via derivative locators
CN102930645A (en) * 2012-11-04 2013-02-13 张仁平 System for maintaining bank card account safety by using dynamic password card
WO2014078569A1 (en) 2012-11-14 2014-05-22 The 41St Parameter, Inc. Systems and methods of global identification
US9268930B2 (en) 2012-11-29 2016-02-23 Gilbarco Inc. Fuel dispenser user interface system architecture
US9022286B2 (en) 2013-03-15 2015-05-05 Virtual Electric, Inc. Multi-functional credit card type portable electronic device
US11055710B2 (en) * 2013-05-02 2021-07-06 Visa International Service Association Systems and methods for verifying and processing transactions using virtual currency
US10902327B1 (en) 2013-08-30 2021-01-26 The 41St Parameter, Inc. System and method for device identification and uniqueness
CA2929458C (en) 2013-10-30 2021-07-13 Gilbarco Inc. Cryptographic watermarking of content in fuel dispensing environments
CN106164938A (en) * 2014-03-19 2016-11-23 深圳市汇顶科技股份有限公司 Based on the financial transaction of communication between device
DE102014110694A1 (en) * 2014-07-29 2016-02-04 Bundesdruckerei Gmbh Document with sensor means
US10091312B1 (en) 2014-10-14 2018-10-02 The 41St Parameter, Inc. Data structures for intelligently resolving deterministic and probabilistic device identifiers to device profiles and/or groups
AU2015366215A1 (en) 2014-12-19 2017-07-20 Cardlab Aps A method and an assembly for generating a magnetic field and a method of manufacturing an assembly
EP3035230A1 (en) 2014-12-19 2016-06-22 Cardlab ApS A method and an assembly for generating a magnetic field
US10395227B2 (en) 2015-01-14 2019-08-27 Tactilis Pte. Limited System and method for reconciling electronic transaction records for enhanced security
US10037528B2 (en) 2015-01-14 2018-07-31 Tactilis Sdn Bhd Biometric device utilizing finger sequence for authentication
US9607189B2 (en) 2015-01-14 2017-03-28 Tactilis Sdn Bhd Smart card system comprising a card and a carrier
EP3082071A1 (en) 2015-04-17 2016-10-19 Cardlab ApS Device for and method of outputting a magnetic field
US10546444B2 (en) 2018-06-21 2020-01-28 Capital One Services, Llc Systems and methods for secure read-only authentication
US10769299B2 (en) 2018-07-12 2020-09-08 Capital One Services, Llc System and method for dynamic generation of URL by smart card
KR20210069643A (en) 2018-10-02 2021-06-11 캐피탈 원 서비시즈, 엘엘씨 System and method for cryptographic authentication of contactless card
US10542036B1 (en) 2018-10-02 2020-01-21 Capital One Services, Llc Systems and methods for signaling an attack on contactless cards
US10592710B1 (en) 2018-10-02 2020-03-17 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10771253B2 (en) 2018-10-02 2020-09-08 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10579998B1 (en) 2018-10-02 2020-03-03 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10771254B2 (en) 2018-10-02 2020-09-08 Capital One Services, Llc Systems and methods for email-based card activation
US10733645B2 (en) 2018-10-02 2020-08-04 Capital One Services, Llc Systems and methods for establishing identity for order pick up
US10685350B2 (en) 2018-10-02 2020-06-16 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
CA3108399A1 (en) 2018-10-02 2020-04-09 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10680824B2 (en) 2018-10-02 2020-06-09 Capital One Services, Llc Systems and methods for inventory management using cryptographic authentication of contactless cards
US10511443B1 (en) 2018-10-02 2019-12-17 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
SG11202103249VA (en) 2018-10-02 2021-04-29 Capital One Services Llc Systems and methods for cryptographic authentication of contactless cards
US10607214B1 (en) 2018-10-02 2020-03-31 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
KR20210065109A (en) 2018-10-02 2021-06-03 캐피탈 원 서비시즈, 엘엘씨 System and method for cryptographic authentication of contactless card
CA3115084A1 (en) 2018-10-02 2020-04-09 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
CA3115252A1 (en) 2018-10-02 2020-04-09 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10909527B2 (en) 2018-10-02 2021-02-02 Capital One Services, Llc Systems and methods for performing a reissue of a contactless card
WO2020072670A1 (en) 2018-10-02 2020-04-09 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10949520B2 (en) 2018-10-02 2021-03-16 Capital One Services, Llc Systems and methods for cross coupling risk analytics and one-time-passcodes
US10489781B1 (en) 2018-10-02 2019-11-26 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10582386B1 (en) 2018-10-02 2020-03-03 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10841091B2 (en) 2018-10-02 2020-11-17 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US11210664B2 (en) 2018-10-02 2021-12-28 Capital One Services, Llc Systems and methods for amplifying the strength of cryptographic algorithms
KR20210066798A (en) 2018-10-02 2021-06-07 캐피탈 원 서비시즈, 엘엘씨 System and method for cryptographic authentication of contactless card
WO2020072694A1 (en) 2018-10-02 2020-04-09 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10505738B1 (en) 2018-10-02 2019-12-10 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10554411B1 (en) 2018-10-02 2020-02-04 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
BR112021005174A2 (en) 2018-10-02 2021-06-15 Capital One Services, Llc counter resynchronization system, method of resynchronizing a counter on a contactless card, and contactless card
US10581611B1 (en) 2018-10-02 2020-03-03 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10565587B1 (en) 2018-10-02 2020-02-18 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US11164206B2 (en) * 2018-11-16 2021-11-02 Comenity Llc Automatically aggregating, evaluating, and providing a contextually relevant offer
US20200226581A1 (en) 2019-01-11 2020-07-16 Capital One Services, Llc Systems and methods for touch screen interface interaction using a card overlay
US11037136B2 (en) 2019-01-24 2021-06-15 Capital One Services, Llc Tap to autofill card data
US11120453B2 (en) 2019-02-01 2021-09-14 Capital One Services, Llc Tap card to securely generate card data to copy to clipboard
US10467622B1 (en) 2019-02-01 2019-11-05 Capital One Services, Llc Using on-demand applications to generate virtual numbers for a contactless card to securely autofill forms
US10510074B1 (en) 2019-02-01 2019-12-17 Capital One Services, Llc One-tap payment using a contactless card
US10425129B1 (en) 2019-02-27 2019-09-24 Capital One Services, Llc Techniques to reduce power consumption in near field communication systems
US10523708B1 (en) 2019-03-18 2019-12-31 Capital One Services, Llc System and method for second factor authentication of customer support calls
US10438437B1 (en) 2019-03-20 2019-10-08 Capital One Services, Llc Tap to copy data to clipboard via NFC
US10643420B1 (en) 2019-03-20 2020-05-05 Capital One Services, Llc Contextual tapping engine
US10984416B2 (en) 2019-03-20 2021-04-20 Capital One Services, Llc NFC mobile currency transfer
US10535062B1 (en) 2019-03-20 2020-01-14 Capital One Services, Llc Using a contactless card to securely share personal data stored in a blockchain
US10970712B2 (en) 2019-03-21 2021-04-06 Capital One Services, Llc Delegated administration of permissions using a contactless card
US10467445B1 (en) 2019-03-28 2019-11-05 Capital One Services, Llc Devices and methods for contactless card alignment with a foldable mobile device
US11521262B2 (en) 2019-05-28 2022-12-06 Capital One Services, Llc NFC enhanced augmented reality information overlays
US10516447B1 (en) 2019-06-17 2019-12-24 Capital One Services, Llc Dynamic power levels in NFC card communications
US11694187B2 (en) 2019-07-03 2023-07-04 Capital One Services, Llc Constraining transactional capabilities for contactless cards
US11392933B2 (en) 2019-07-03 2022-07-19 Capital One Services, Llc Systems and methods for providing online and hybridcard interactions
US10871958B1 (en) 2019-07-03 2020-12-22 Capital One Services, Llc Techniques to perform applet programming
US10713649B1 (en) 2019-07-09 2020-07-14 Capital One Services, Llc System and method enabling mobile near-field communication to update display on a payment card
US10885514B1 (en) 2019-07-15 2021-01-05 Capital One Services, Llc System and method for using image data to trigger contactless card transactions
US10498401B1 (en) 2019-07-15 2019-12-03 Capital One Services, Llc System and method for guiding card positioning using phone sensors
US10832271B1 (en) 2019-07-17 2020-11-10 Capital One Services, Llc Verified reviews using a contactless card
US11182771B2 (en) 2019-07-17 2021-11-23 Capital One Services, Llc System for value loading onto in-vehicle device
US10733601B1 (en) 2019-07-17 2020-08-04 Capital One Services, Llc Body area network facilitated authentication or payment authorization
US11521213B2 (en) 2019-07-18 2022-12-06 Capital One Services, Llc Continuous authentication for digital services based on contactless card positioning
US10506426B1 (en) 2019-07-19 2019-12-10 Capital One Services, Llc Techniques for call authentication
US10541995B1 (en) 2019-07-23 2020-01-21 Capital One Services, Llc First factor contactless card authentication system and method
JP2023503795A (en) 2019-10-02 2023-02-01 キャピタル・ワン・サービシーズ・リミテッド・ライアビリティ・カンパニー Client Device Authentication Using Contactless Legacy Magnetic Stripe Data
US11651361B2 (en) 2019-12-23 2023-05-16 Capital One Services, Llc Secure authentication based on passport data stored in a contactless card
US10657754B1 (en) 2019-12-23 2020-05-19 Capital One Services, Llc Contactless card and personal identification system
US11113685B2 (en) 2019-12-23 2021-09-07 Capital One Services, Llc Card issuing with restricted virtual numbers
US10885410B1 (en) 2019-12-23 2021-01-05 Capital One Services, Llc Generating barcodes utilizing cryptographic techniques
US10733283B1 (en) 2019-12-23 2020-08-04 Capital One Services, Llc Secure password generation and management using NFC and contactless smart cards
US11615395B2 (en) 2019-12-23 2023-03-28 Capital One Services, Llc Authentication for third party digital wallet provisioning
US10862540B1 (en) 2019-12-23 2020-12-08 Capital One Services, Llc Method for mapping NFC field strength and location on mobile devices
US10853795B1 (en) 2019-12-24 2020-12-01 Capital One Services, Llc Secure authentication based on identity data stored in a contactless card
US11200563B2 (en) 2019-12-24 2021-12-14 Capital One Services, Llc Account registration using a contactless card
US10664941B1 (en) 2019-12-24 2020-05-26 Capital One Services, Llc Steganographic image encoding of biometric template information on a card
US10909544B1 (en) 2019-12-26 2021-02-02 Capital One Services, Llc Accessing and utilizing multiple loyalty point accounts
US10757574B1 (en) 2019-12-26 2020-08-25 Capital One Services, Llc Multi-factor authentication providing a credential via a contactless card for secure messaging
US11038688B1 (en) 2019-12-30 2021-06-15 Capital One Services, Llc Techniques to control applets for contactless cards
US10860914B1 (en) 2019-12-31 2020-12-08 Capital One Services, Llc Contactless card and method of assembly
US11455620B2 (en) 2019-12-31 2022-09-27 Capital One Services, Llc Tapping a contactless card to a computing device to provision a virtual number
US11210656B2 (en) 2020-04-13 2021-12-28 Capital One Services, Llc Determining specific terms for contactless card activation
US10915888B1 (en) 2020-04-30 2021-02-09 Capital One Services, Llc Contactless card with multiple rotating security keys
US11030339B1 (en) 2020-04-30 2021-06-08 Capital One Services, Llc Systems and methods for data access control of personal user data using a short-range transceiver
US11823175B2 (en) 2020-04-30 2023-11-21 Capital One Services, Llc Intelligent card unlock
US10861006B1 (en) 2020-04-30 2020-12-08 Capital One Services, Llc Systems and methods for data access control using a short-range transceiver
US11222342B2 (en) 2020-04-30 2022-01-11 Capital One Services, Llc Accurate images in graphical user interfaces to enable data transfer
US10963865B1 (en) 2020-05-12 2021-03-30 Capital One Services, Llc Augmented reality card activation experience
US11063979B1 (en) 2020-05-18 2021-07-13 Capital One Services, Llc Enabling communications between applications in a mobile operating system
US11100511B1 (en) 2020-05-18 2021-08-24 Capital One Services, Llc Application-based point of sale system in mobile operating systems
US11068768B1 (en) * 2020-05-22 2021-07-20 Bank Of America Corporation Pre-staging technology for self-service kiosks
US11216623B1 (en) 2020-08-05 2022-01-04 Capital One Services, Llc Systems and methods for controlling secured data transfer via URLs
US11062098B1 (en) 2020-08-11 2021-07-13 Capital One Services, Llc Augmented reality information display and interaction via NFC based authentication
US11683325B2 (en) 2020-08-11 2023-06-20 Capital One Services, Llc Systems and methods for verified messaging via short-range transceiver
US11165586B1 (en) 2020-10-30 2021-11-02 Capital One Services, Llc Call center web-based authentication using a contactless card
US11482312B2 (en) 2020-10-30 2022-10-25 Capital One Services, Llc Secure verification of medical status using a contactless card
US11373169B2 (en) 2020-11-03 2022-06-28 Capital One Services, Llc Web-based activation of contactless cards
US11216799B1 (en) 2021-01-04 2022-01-04 Capital One Services, Llc Secure generation of one-time passcodes using a contactless card
US11682012B2 (en) 2021-01-27 2023-06-20 Capital One Services, Llc Contactless delivery systems and methods
US11792001B2 (en) 2021-01-28 2023-10-17 Capital One Services, Llc Systems and methods for secure reprovisioning
US11687930B2 (en) 2021-01-28 2023-06-27 Capital One Services, Llc Systems and methods for authentication of access tokens
US11562358B2 (en) 2021-01-28 2023-01-24 Capital One Services, Llc Systems and methods for near field contactless card communication and cryptographic authentication
US11438329B2 (en) 2021-01-29 2022-09-06 Capital One Services, Llc Systems and methods for authenticated peer-to-peer data transfer using resource locators
US11777933B2 (en) 2021-02-03 2023-10-03 Capital One Services, Llc URL-based authentication for payment cards
US11637826B2 (en) 2021-02-24 2023-04-25 Capital One Services, Llc Establishing authentication persistence
US11245438B1 (en) 2021-03-26 2022-02-08 Capital One Services, Llc Network-enabled smart apparatus and systems and methods for activating and provisioning same
US11961089B2 (en) 2021-04-20 2024-04-16 Capital One Services, Llc On-demand applications to extend web services
US11935035B2 (en) 2021-04-20 2024-03-19 Capital One Services, Llc Techniques to utilize resource locators by a contactless card to perform a sequence of operations
US11902442B2 (en) 2021-04-22 2024-02-13 Capital One Services, Llc Secure management of accounts on display devices using a contactless card
US11354555B1 (en) 2021-05-04 2022-06-07 Capital One Services, Llc Methods, mediums, and systems for applying a display to a transaction card

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4614861A (en) * 1984-11-15 1986-09-30 Intellicard International, Inc. Unitary, self-contained card verification and validation system and method
US5524072A (en) * 1991-12-04 1996-06-04 Enco-Tone Ltd. Methods and apparatus for data encryption and transmission
US6257486B1 (en) * 1998-11-23 2001-07-10 Cardis Research & Development Ltd. Smart card pin system, card, and reader
US6325285B1 (en) * 1999-11-12 2001-12-04 At&T Corp. Smart card with integrated fingerprint reader

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4614861A (en) * 1984-11-15 1986-09-30 Intellicard International, Inc. Unitary, self-contained card verification and validation system and method
US5524072A (en) * 1991-12-04 1996-06-04 Enco-Tone Ltd. Methods and apparatus for data encryption and transmission
US6257486B1 (en) * 1998-11-23 2001-07-10 Cardis Research & Development Ltd. Smart card pin system, card, and reader
US6325285B1 (en) * 1999-11-12 2001-12-04 At&T Corp. Smart card with integrated fingerprint reader

Also Published As

Publication number Publication date
US20020153424A1 (en) 2002-10-24

Similar Documents

Publication Publication Date Title
US20020153424A1 (en) Method and apparatus of secure credit card transaction
US10891619B2 (en) Dynamic transaction card protected by gesture and voice recognition
US9129280B2 (en) Secure smart card system
US7204412B2 (en) Family stored value card program
US8157164B1 (en) Systems and methods for providing financial card via automated teller machine
US20130268443A1 (en) System and method for a secure transaction module
US7996325B2 (en) Microbilling using a trust management system
US20180039987A1 (en) Multi-function transaction card
US20010034717A1 (en) Fraud resistant credit card using encryption, encrypted cards on computing devices
JPH11328295A (en) System for executing financial transaction by using smart card
KR20010025234A (en) A certification method of credit of a financing card based on fingerprint and a certification system thereof
JPH09245108A (en) Electronic money system
CA2534987A1 (en) Systems and methods for facilitating transactions
JP6989118B2 (en) Payment systems, user terminals and methods executed by them, payment devices and methods executed by them, and programs.
CN109804398A (en) Prepaid card, debit card and credit card security code generate system
US20020095580A1 (en) Secure transactions using cryptographic processes
US20120091199A1 (en) Multi-account card system
US11481766B2 (en) Method for payment authorization on offline mobile devices with irreversibility assurance
JP2020515994A (en) Electronic payment device
US20020073315A1 (en) Placing a cryptogram on the magnetic stripe of a personal transaction card
KR20100033904A (en) Novel electric cash card system and managing method thereof
KR100671800B1 (en) Device Comprising Virtual Electronic Credit Card Data
JP2000172798A (en) Component for electronic money system
KR20020061084A (en) System and Method of Settlement Using Wireless Telephone
CN101573909A (en) Adaptive authentication options

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP