WO2008147457A1 - Point0f sale transaction device with magnetic stripe emulator and biometric authentication - Google Patents
Point0f sale transaction device with magnetic stripe emulator and biometric authentication Download PDFInfo
- Publication number
- WO2008147457A1 WO2008147457A1 PCT/US2007/085460 US2007085460W WO2008147457A1 WO 2008147457 A1 WO2008147457 A1 WO 2008147457A1 US 2007085460 W US2007085460 W US 2007085460W WO 2008147457 A1 WO2008147457 A1 WO 2008147457A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- point
- sale
- interface
- information
- account
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/0723—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips the record carrier comprising an arrangement for non-contact communication, e.g. wireless communication circuits on transponder cards, non-contact smart cards or RFIDs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06187—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with magnetically detectable marking
- G06K19/06206—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with magnetically detectable marking the magnetic marking being emulated
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/10009—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
- G06K7/10237—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves the reader and the record carrier being capable of selectively switching between reader and record carrier appearance, e.g. in near field communication [NFC] devices where the NFC device may function as an RFID reader or as an RFID tag
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/342—Cards defining paid or billed services or quantities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/356—Aspects of software for card payments
- G06Q20/3563—Software being resident on card
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/356—Aspects of software for card payments
- G06Q20/3567—Software being in the reader
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/357—Cards having a plurality of specified features
- G06Q20/3574—Multiple applications on card
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
- G06Q20/40145—Biometric identity checks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/02—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by keys or other credit registering devices
- G07F7/025—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by keys or other credit registering devices by means, e.g. cards, providing billing information at the time of purchase, e.g. identification of seller or purchaser, quantity of goods delivered or to be delivered
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/0873—Details of the card reader
- G07F7/088—Details of the card reader the card reader being part of the point of sale [POS] terminal or electronic cash register [ECR] itself
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/0873—Details of the card reader
- G07F7/088—Details of the card reader the card reader being part of the point of sale [POS] terminal or electronic cash register [ECR] itself
- G07F7/0886—Details of the card reader the card reader being part of the point of sale [POS] terminal or electronic cash register [ECR] itself the card reader being portable for interacting with a POS or ECR in realizing a payment transaction
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
Definitions
- Plastic credit card issuers lose billions of dollars worldwide each year to credit card fraud. These losses are often offset to some degree by passing off to consumers and merchants in the form of higher transaction fees and interest rates. However, the losses to the credit card issuers are still substantial.
- Credit card information can be obtained for fraudulent use in a number of different ways. Recent cases have shown employees or hackers obtaining unauthorized access to merchant or card processor databases, compromising millions of credit and debit card accounts. Frequently, the credit cards themselves are lost or stolen, making it possible for the thief to make unauthorized charges on the account until the account can be cancelled. Account information can also be illegally obtained through identity theft, wherein a thief poses as an individual, or by what is know as "skimming” or "cloning”, which are high-tech methods used by thieves to capture personal information or account information from the magnetic stripe on a credit card.
- Radio frequency identification devices are well known in the art.
- a typical RFID device includes an antenna and a chip that is activated by RF energy emitted by a reading device.
- the antenna on the reading device induces a signal into an RFID chip which is in close proximity to the reading device, causing the RFID device it to transmit a small amount of data back to the reading device.
- An RFID tag can be thought of as similar in usefulness to a bar code.
- RFID has found its way into many applications, including inventory control and tracking, as substitutes for traditional magnetic strip cards for electronic payments at point of sale (POS) locations, devices for automatically paying tolls on highways, passports and personal identification cards.
- RFID devices have even been used as embedded devices within living beings such as domesticated pets and children.
- a "smartcard” is a card that is embedded with either a microprocessor and a memory chip or a memory chip with non-programmable logic.
- the microprocessor can add, delete, and otherwise manipulate information on the card, while a memory-chip card can only undertake a pre-defined operation.
- smartcards utilize radio frequency (RP) to transmit and receive data, they are unlike traditional RFID tags or magnetic strip cards in that all necessary functions and information necessary for the completion of a transaction can be carried on the card. Therefore, they do not require access to remote databases at the time of the transaction.
- Smartcards are governed by many standards, in particular, ISO/IEC standards 7816 and 14443. The previously mentioned "chip and pin" program in the UK utilizes this type of card.
- the smartcard is quickly replacing the traditional method of 'swiping' credit cards with data contained on magnetic stripes.
- the smart card is activated by a contactless reader attached to an external device required for the application, for example, an RFID reader attached to a cash register.
- the reader's RF antenna induces a signal into the card's RF antenna, thereby activating the smart card.
- the application can then communicate with the smart card via the reader unit to transmit the cardholder's account data back to the point of sale application, utilizing a command set specified by the ISO 7816 standard.
- DPA Differential Power Analysis
- SPA Simple Power Analysis
- smartcards are subject to certain types of attacks, known as "relay” attacks, in which a smartcard not in close proximity to a POS-based reader can be used by "relaying" its information through another reader and smartcard pair.
- the present invention is a cost effective device capable of storing the information from multiple smartcards and data from multiple conventional magnetic stripe cards for use either through a magnetic stripe emulator or as a 'virtual' contactless smartcard, and preventing both unauthorized use of the device and outright theft of the information on the device via a biometric recognition technology, such as, for example, fingerprint verification or voice recognition.
- a biometric recognition technology such as, for example, fingerprint verification or voice recognition.
- the present invention is comprised of two components, a software application running on a personal computer and a handheld portable data storage and transmission device.
- a software application running on a personal computer
- a handheld portable data storage and transmission device e.g., a personal computer
- an associated base unit may also be provided.
- the handheld device in the preferred embodiment, is the size of a credit card, and conforms to the ISO 7813 standard of .76 mm in thickness. It contains a display and a keypad, as well as several navigation buttons to navigate through the accounts and applications and to make appropriate selections. Optionally, a portion of the device also contains a programmable magnetic stripe.
- the device is equipped with a main processor capable of executing simple applications, as well as a smartcard chip set and related antenna.
- the device may also incorporate a near field communications (NFC) capability which is compatible with the ISO 14443 standard.
- NFC is a peer-to-peer connection that allows the transfer of larger amounts of data than a simple query and reply smartcard.
- the NFC capability can therefore emulate a smartcard.
- the NFC capability may also be used for downloading various data to device, such as electronic receipts, coupons, advertising content, electronic tickets, etc.
- the device is capable of communicating with NFC-enabled POS terminals, for purposes of transmitting account information, coupon information, and other types of information to the POS terminal, and can also receive information, such as an electronic receipts, from the POS terminal.
- the device will be able to communicate with other NFC-enabled devices, such as kiosks, where discount coupons may be available, and ticketing agents, where event tickets may be purchased and stored electronically until their use.
- the device incorporates a biometric sensor for performing fingerprint or other biometric identification to positively identify the user as the owner of the device. This provides the means to ensure that only the authorized card owner is actually performing the transaction.
- fingerprint verification is used to biometrically identify the authorized user, however, other means of identifying the users, both biometric and non-biometric may also be used.
- Authentication is required for each transaction, and the identity of the authorized user must be verified before the device's programmable magnetic stripe, smartcard circuitry or NFC circuitry is activated, and its signal transmitted to an RFID reader or NFC-enabled POS terminal. Authentication may not be required for all functions of device. For example, it may not be desirable to require authentication for the downloading of coupons.
- one embodiment of the device will have standard smartcard contacts.
- the optional base unit will contain mating connectors which will allow data transfer between the device and an application program running on a standard personal computer, and which will also allow charging of the device's rechargeable batteries through the smartcard contacts.
- the base unit may optionally contain an NFC or smartcard reader, such that the base can act as a POS terminal for on-line purchases.
- the handheld device will communicate with an application running on a personal computer, and will preferably be connected to the personal computer via a base unit, or, alternatively, directly via a wireless connection, such as Bluetooth.
- the personal computer application allows the downloading of account information from multiple credit or other type cards into the device, and can be synchronized with the handheld device when they are connected, such that the data on the personal computer mirrors the data on the handheld device.
- the personal computer application will also provide other functionality which will be discussed in detail herein.
- the device contains ample memory to store account information from multiple conventional magnetic stripe cards and smartcards.
- the handheld device can also emulate a magnetic stripe card by utilizing a programmable magnetic stripe which can be re-programmed on the fly and which can be erased after a pre-determined period of time or number of uses for security purposes.
- Account information from cards having a magnetic stripe may also be transmitted via an RF signal, in the event that an RF reader is available at the POS terminal. In this fashion, conventional magnetic stripe card owners will be able to perform transactions at venues utilizing the more desirable contactless, RF technology.
- the handheld device must be initialized prior to the downloading of account information.
- the initialization process begins with a user enrollment step, in which the user is prompted to place one or more fingertips on the biometric sensor.
- the fingerprints are then scanned, converted into digital templates, and stored in the memory of the handheld device.
- the fingerprint templates can then be used for the authentication and activation process prior to the programming of the magnetic stripe or any RF signal transmission.
- multiple users may be enrolled to use the various accounts stored on the card.
- the RF antenna in the device is disabled after a single use. Without an enabled antenna, an interrogating RF signal will not be received and the device will not be able to transmit a response signal.
- the antenna is re-enabled for a time sufficient to complete the transaction, then automatically disabled.
- the device could be enabled for a single transmission of the account data.
- the programmable magnetic stripe on the device is erased after a predetermined period of time to prevent re-use.
- the device may also contain circuitry to record and time-stamp all attempts at retrieving data, including both authenticated attempts and attempts to use the device without authentication.
- the device may optionally be equipped with a camera of the type frequently found on cellular telephones.
- the camera may be used to capture information from coupons by taking a photo of the coupon's barcode.
- the device is also equipped with barcode reading software which is able to read the bar code from the captured photograph and display the information to the user in plain-text.
- biometric methods used with the device for authentication, including but not limited to, voice recognition, skin resistance and skin capacitance, and any other type of biometric verification now known or later invented.
- Figures Ia through Id show front, back, side and bottom views of the device of a first embodiment of the device.
- Figure 2 shows the optional base unit of the invention to be used with the first embodiment.
- Figure 3 shows the front face of a preferred embodiment of the device having a credit card or smartcard form factor.
- Figure 4 shows the back face of the preferred embodiment of the device, showing the magnetic stripe emulator.
- Figure 5 is an internal view of the preferred embodiment of the device, showing components in schematic form.
- Figure 6 is a system diagram of the preferred embodiment of the device, showing the interconnection of the various components.
- Figure 7 is a schematic of an exemplary configuration of the hardware architecture of the preferred embodiment of the device.
- Figure 8 is an exemplary configuration of the high level software architecture of the device.
- Figure 9 is a flow chart showing the enrollment of a user on the device.
- Figure 10 is a flow chart showing the biometric authentication of a user.
- Figure 11 is a flow chart showing the device provisioning process wherein electronic account records are downloaded from account issuers.
- Figure 12a is a first embodiment of a flow chart showing the selection and activation process of an account.
- Figure 12b is a flow chart showing an alternative embodiment of the process by which accounts are selected and activated.
- Figure 13 is a functional diagram of the menu structure of the software application which may optionally be present on the handheld device.
- Figure 14 is a functional diagram of the supporting application running on the personal computer.
- Figure 15 is a first example of a device and reader application utilizing a magnetic swipe or a contactless smartcard model as a communications medium.
- Figure 16 is a second example of a device and reader application utilizing NFC as the communications medium.
- Figure 17 is a flow chart of a transaction using the device of the present invention wherein a dynamic security code is generated on a per-transaction basis.
- Figure 18 is a diagram showing the general structure of a data record for an account downloaded into the device.
- the device of the present invention is contemplated to be produced in one of two embodiments.
- the device has two portions having different thicknesses.
- One portion of the device is the thickness of a typical credit card, while a second portion is thicker, allowing more room for physical components.
- the entire device is the thickness of a typical credit card, and is able to be used in all places that a credit card is able to be used, including those, such at ATMs and gas pumps, that require full insertion of the card.
- Figure Ia - Ic shows front, back and side views respectively of the exterior of the first embodiment of device 100, which contains two portions, thinner portion 100a and thicker portion 100b.
- Thicker portion 100b preferably is about 10 mm or less in thickness and may be composed of any material commonly used for housing electronic devices, but is preferably composed of a material that will not interfere with the transmission or reception of RF signals.
- the front of device 100 contains display 101, which may be an LCD display, as well as menu selection keys 102 and numeric keypad 103.
- Menu selection keys 102 facilitate navigation through a series of menus displayed on display 101.
- Menu selection leys 102 consist of directional keys, which may be used move a cursor up, down, left or right, while a central ENTER key may be used to select menu items.
- the directional keys and ENTER key may be of any configuration.
- Thinner portion 100a of device 100 contains a programmable magnetic stripe 107 of the rear side thereof and is preferably approximately .76 mm in thickness, in accordance with ISO standard 7813.
- the thickness of portion 100a of device 100 is such that it can be passed through a typical magnetic stripe card reader. Between sections 100a and 100b is a beveled area 104 which makes the transition from the thin portion of device 100 to the thick portion.
- the thinner portion 100a of device 100 and magnetic stripe 107 are optional. It is envisioned that future versions of the device will be made without the programmable magnetic stripe 107, as magnetic stripe credit cards and readers are phased out in favor of contactless transaction devices. In such cases, thinner portion 100a of device 100 may be absent.
- biometric input sensor 105 which, in the preferred embodiment, consists of a fingerprint scanner.
- biometric authentication devices may also be used, such as voice recognition, skin pH analysis, or any other means of identifying the user, now known or later invented.
- the biometric authentication may be replaced an alphanumeric password or PIN that the user may enter into device 100 using numeric keypad 103.
- the rear of the device contains programmable magnetic stripe 107 situated on the thin portion 100a of device 100. Also located on the back of the device is optional camera 106, which is used primarily in the preferred embodiment for taking photographs of barcodes which can be read through barcode recognition software, however, any images may be captured and stored on the device for display or transmission. In addition, NFC chip 108 and Bluetooth chip 109 are shown on the rear of device 100, however, these chips are actually internal to the device. Also located on the back of device 100 may be system reset button 110. [0049] The side view of device 100 in Figure Ic shows device soft key 109, which is used by the user to interact with the software application programmed into the device.
- Figure Id shows the bottom of device 100 showing thin area 100a having the magnetic stripe 107 disposed thereon, thicker area 100b and the beveled transition 104 therebetween. Also present on the bottom of device 100 is connector 201 which may be used to transfer data to and from PC application 1002, shown in Figure 15, via a direct cable connection or via base unit 200, shown in Figure 3.
- Optional base unit 200 contains connector 202 which mates with connector 201 on the bottom of device 100 to provide the aforementioned functions.
- Base unit 205 may also contain an NFC chip 205, or other wireless means of communication, which will allow base unit 200 to act as an contactless point-of-sale (POS) terminal for purchases made on-line.
- PC interface 204 which allows device 100 to communicate with PC application 1002.
- the means for allowing device 100 to communicate with PC application 1002 may also be any one of a number of wireless transfer protocols well known in the art, such as Bluetooth or may be a wired connection, such as a serial line or a USB connection.
- Connector 201 may be used to charge rechargeable battery 405 within device 100, either via a connection to base unit 200 or via a direct cable connection to a PC.
- AC adapter 203 for base unit 200 may provide power for re-charging battery 405.
- battery 405 may be inductively charged via voltages induced on the RF antenna of the device through interaction with an electromagnetic field.
- Figures 3 through 5 show the physical configuration of the preferred embodiment of the invention.
- device 150 has the dimensions and thickness of a typical credit card.
- the face of device 150 is shown in Figure 3 and includes display area 152 for displaying the active account information, which can be selected using buttons 153 and 154.
- buttons 153 and 154 are shown in the exemplar preferred embodiment, it is obvious that any number of buttons could be used for the user interface of the device.
- display area 152 is not meant to be limited to the size and shape shown, but may be of any convenient size and shape.
- display 152 is an LCD display, but may be of any type well known in the art, including specifically electrophoretic displays capable of retaining an image after device 150 is powered down.
- the device may be capable of displaying color pictures as well as video, in anticipation of uses of device 150 for other than financial transactions.
- display 152 will be used primarily for the display of the currently active account and for prompts for the user.
- the account information displayed may include a graphic, preferably representing a logo or trademark of the account issuer, as well as any other information necessary to complete the transaction, such as CCV codes or dynamically generated PIN numbers.
- the account information which is displayed on display 152 will be the "active" account.
- the information required for transactions using the active account will be programmed into programmable magnetic stripe 161, shown in Figure 4, or transmitted via an RF capability, after the user has authenticated himself utilizing biometric sensor 151.
- biometric sensor 151 is a fingerprint scanning device capable of scanning the fingerprints of one or more fingers of a typical user and matching them against stored templates, however, any other biometric senor, now known or later develop, may be used. Additionally, a PIN number may be utilized.
- Area 156 on the front of device 150 is a printable area which allows logos or other information to be printed on the card.
- the card will not be embossed and, for added security, will not show account information on the face of the card unless displayed on display 152.
- Contacts 155 are those typical to a smartcard and conform to the ISO standards for smartcards. These contacts will allow the transfer of data between the device and an application running on a PC via base unit 700, and will also allowing charging of the rechargeable battery of the card through the smartcard contacts.
- Figure 4 shows the configuration of the rear of device 150.
- Area 160 is an optional area which would allow printed information to appear on the card.
- Area 162 is an optional signature area conforming to the standard signature area of a typical credit card.
- Programmable magnetic stripe 161 is shown at the top of the card in the typical place of the magnetic stripe of a conventional credit card.
- FIG. 5 shows the internal components of the card in schematic form.
- Battery 171 is a rechargeable battery, preferably composed of a thin film lithium polymer which can recharge via smartcard contacts 155, shown in Figure 3, when device 150 is placed in the base unit 700. It is also contemplated that the battery may be recharged inductively though current induced in RF antenna 173 by contact with an electromagnetic field or an RF wave.
- Component 172 is the system board of the device, which contains a central processing unit and related memory, as well as other components which will be discussed in more detail later.
- Component 173 is an RF antenna enabling the device to handle contactless transactions at POS terminals The device will allow the transmission of account information when interrogated by a typical smartcard reader via antenna 173. Typical smartcard readers provide power to a smartcard and communications through induction through the antenna. However, this device, being self-powered, may not require that feature, although it is contemplated that the device may be able to achieve an "emergency charge" suitable for at least one transaction using inductive transfer of power through the RF antenna. Preferably, however, this device will use the antenna only to communicate with the contactless smartcard reader.
- Component 176 is the smartcard circuitry which supports the smartcard contacts and the contactless smartcard interface and communications, and would include memory holding the active account information which must be transmitted to a POS device to conclude a transaction.
- Component 174 is the control for the magnetic stripe emulation, which is a custom chipset which will control the storage and transmission of track 1 and track 2 data necessary to conclude a transaction at a POS terminal.
- Component 175 is the transmitter for track 1 and track 2 of the programmable magnetic stripe. It is also contemplated that a POS device may write data onto any one of the tracks of the magnetic stripe, and that the magnetic stripe emulation control 174 would be able to read such information and store it in memory 403 of device 150 in an area associated with the currently active account information.
- Figure 6 shows a system diagram for the preferred embodiment of the current invention.
- Base unit 700 provides a connection point between device 150 and a typical personal computer (PC) 704.
- PC personal computer
- the connection between base unit 700 and PC 704 may be any conventional means well known in the art such as a cable to connection typically a serial line or a USB connection or a wireless connection such as Bluetooth. However, any well known communications protocol now known or later conceived can be used.
- Base unit 700 contains a removable battery 701 which may be used to charge the internal battery 171 of device 150.
- Removable battery 701 may be any type of consumer grade battery, such as a 9v battery or a plurality of "AA" or "AAA” batteries.
- AC adapter 702 may be used for the same purpose. Insertion of device 150 in base unit 700 allows both the transfer of data between PC 704 and device 150 and in addition, charging of the internal battery 171 of device 150.
- Both data transfer and charging of the battery occur through smartcard contacts 155.
- contact 705 within base unit 700 make electrical contact with the smartcard contacts 155 on the front face of the device 150. This allows the transfer of data between the base unit 150 and the PC application 1002 running on PC 704 which will be discussed in more detail later.
- the rechargeable battery 171 may be recharged through smartcard contacts 155.
- rechargeable battery 171 could be recharged with a portable charger in the form of a shaped clip or soft envelope which fits over device 150.
- This charger (not shown) would be powered by a single battery, possibly a wafer battery.
- Such a charger could be built into a wallet or purse and provide a convenient place to store device 150 between uses, while keeping battery 171 in device 150 charged.
- device 150 could be coupled with a cellular telephone for recharging purposes, with the cellular telephone having a slot to accommodate device 150. Inserting device 150 into the slot will cause smartcard contacts 155 to come into electrical contact with charge points on the cellular phone for purposes of charging rechargeable battery 171.
- a data transfer capability exist between device 150 and the cellular phone for purposes of data transfer over the cellular telephone network. For example, data regarding transactions could be encrypted and sent over the cellular telephone network to credit card processors of to a central cite for other processing.
- device 150 could at some point be integrated into a cellular telephone. In such cases, transactions would be completed via the RF or NFC capability with similarly-enabled POS terminals. Because of thickness concerns, such implementations may not have programmable magnetic stripe 161, or would have a retractable programmable magnetic stripe 161 which would be housed in a slot on the phone when not in use and which would be extended from the housing of the phone when in use.
- a solar assist option could be used to charge battery
- device 150 is preferably flexible in construction as would be a prior art credit card. Device 150 may also be waterproof.
- Figure 7 is a schematic architectural diagram of the system board 401 of device
- System board 401 contains most of the components for control and use of the device.
- CPU 408 is the main processor for device 150 and provides for the overall control of device 150, and will run the main operating system software and applications.
- Memory 402 is memory which is necessary for the operation of the device and may contain control software and application programs. Flash memory 403 is used for the secure, long term storage of application data and electronic account records.
- Smartcard control 404 contains software and hardware which controls the interaction of the CPU 408 with smartcard circuitry 176.
- Contact smartcard read/write 405 controls the input and output of data and power delivery through the standard smartcard contacts 155, located on the front face of device 150.
- Power management component 406 controls the status of rechargeable battery 171 and the delivery and conditioning of power for recharging battery 171 when the device is connected to base 700.
- Magnetic stripe control 407 is the interface with magnetic stripe control circuitry 174 and provides the account data which is to be programmed into programmable magnetic stripe 161. In addition, Magnetic stripe control 407 may determine when programmable magnetic stripe 161 should be erased or otherwise disabled.
- Display control 409 is responsible for images and information being displayed on display 152 located on the front face of the card.
- Biometric sensor control 410 collects input from biometric sensor 151 located on the front face of device 150 and passes it to the biometric enrollment and authentication software, which is part of the main system software. Alternatively, this function could be provided by biometric sensor control component 410.
- Programmable soft key control 411 controls the input of scroll keys 153 and 154, as well as any other inputs which may be present on the card.
- additional circuitry may be included on main system board 401 of the device or may be included as separate components within the device. These include but are not limited to an onboard camera, a Bluetooth interface and a near field communications capability. Note that the architecture shown in Figure 7 is only provided as an exemplar, and that an engineer of skill in the art could provide many alternative designs which are functional and which would still be considered to be within the scope of this invention.
- Figure 16 shows the software architecture of the device, including all software components.
- Device application 501 is the primary software application controlling device 150 and running on CPU 408. This provides a basic input output processing and provides the main functionality and control of device 150.
- Device application 501 will run on device operating system 503, which may be any operating system now know or later developed that may be used in portable devices, such as, for example, LINUX or the Java Card Open Platform (JCOP), however, any appropriate operating system can be used.
- device operating system 503 will perform all of the basic tasks to control the internal components of the device and provides a software platform on which device application 501 can be run.
- Biometric enrollment and authentication component 502 is the software component which allows both the initial capture of the biometric templates and the storage of the templates necessary for later use in biometric authentication.
- biometric enrollment and authentication component 502 is responsible for reading scans for the biometric sensor 151 and comparing them to stored templates to verify the identity of the user. If the authentication process is not successful, the device is not activated.
- Software component 504 is the smartcard operating system which manages the smartcard command and reply systems Smartcard operating system 504 may be part of device operating system 503.
- Figure 9 is a flow chart showing the process by which users are enrolled on device 150.
- the "Initialize Device” process is begun and in box 902, the portion of the memory containing the stored account information and all other user data, such as previously-stored biometric templates, is cleared, to prevent an unauthorized person in physical possession of the unit from adding an authorized user to already existing accounts stored in device 150.
- it is determined how many scans are required for authentication preferably by asking the user.
- a counter is reset in box 906.
- the biometric capture procedure which includes the capture, encoding and storage of the biometric template(s), is performed in box 908.
- this functionality will be available as part of an off the shelf component which includes the biometric scanner.
- the counter is incremented and in box 912, it is determined if the required number of biometric samples has been collected. If additional templates are required, box 912 sends control back to box 908, where another template is captured, encoded and stored. If, in box 912 it is determined that the required number of templates has been collected, control is passed to box 914, where it is determined if additional users should be enrolled. If so, control is sent to box 904 to start the enrollment of an additional user. If no additional users are required, the enrollment process is complete in box 916.
- FIG. 10 shows the process to activate the device for use at a POS terminal.
- the device activation process is a process by which a user is authenticated, thereby unlocking the various accounts associated with that user.
- the process begins in box 1000 when biometric sensor 151 or either of scroll keys 153 or 154 are touched. In other embodiments of the device, any user input component may start the authentication process. If either of scroll keys 153 or 154 are touched, thereby scrolling the account information, the account currently being displayed on display 152 is the one which will be activated. If biometric sensor 151 is touched, then the currently displayed, or last displayed account will be activated. In box 1002, a message is displayed to prompt the user to complete the authentication process.
- the user places the appropriate finger (or sequence of fingers) on the scanner.
- the biometric information is collected in box 1003 and encoded in preparation for matching with stored templates of valid biometric scans.
- the captured biometric is analyzed by comparing it to the stored biometric template which was gathered during the user enrollment process shown in Figure 9.
- box 1014 If any scan fails to match in box 1003, control is sent to box 1014 where an error message is displayed on display 152.
- box 1016 it is determined if the number of failed attempts has reached a pre-defined limit, and, if so, control is passed to box 1018, where a FALSE value is returned to biometric sensor control 410, indicating that the device should not be activated. If the retry limit has not been reached, box 1016 returns control to box 1003 where an additional biometric capture is performed.
- Figure 11 shows the provisioning process in which account data 800 in electronic form necessary to complete transactions, is downloaded from the account issuer to device 150.
- This information is shown in Figure 18, and includes account properties 802, account issuer logos or other graphics 804, track 1 and track 2 data 806 and 808 respectively (required for the programming of programmable magnetic stripe 161), a smartcard file system 810, which may be executable code, and any other data 812 which may or may not be required for completion of the transaction, such as advertising content and/or coupons.
- Smartcard file system 810 may include executable code to support anti-theft measures, such as the calculation of a rotating account number or a dynamically generated password or verification code.
- the account issuer is typically a bank or other credit card issuer, and will provide a structured data file 800, containing the information just discussed, with respect to a particular account.
- structured data file 800 will be available for download from the issuer's web site 1104 via secured channel 1103, or will be available for electronic transfer via any other means well known in the art.
- Figure 11 shows the process by which structured data file 800 is provided to the user.
- the user inserts device 150 into base unit 700, which is preferably connected to a typical personal computer via any know communications channel, as previously discussed. It is contemplated that, in future embodiments of device 150, it may be possible to establish a wireless connection directly from device 150 to the personal computer, thereby eliminating the need for base unit 700 for communication purposes.
- the user logs onto account issuer's web site 1104 using any authentication procedure required thereby, and establishes a secure communication channel 1103 with the account issuer.
- the secure communication channel would be an HTTPS connection, which uses the HTTP protocol over an encrypted SSL or TLS transport protocol to insure secured communications with a web server.
- any encrypted secure communications channel may be utilized.
- the account issuer generates structured data file 800 in box 1106, specific to the user's account with the account issuer. Structured data file 800 is downloaded over the secured communication channel 1103 to PC 704, where it is stored in box 1108, preferably in some form of permanent storage on PC 704.
- the user uses PC application 1400 to facilitate the transfer of structured data file 800 to device 150.
- structured data file 800 is encrypted such that it can be read only by device 150 or PC application 1400.
- Figure 12a shows the upper level flow of control for the preferred embodiment of device 150 after the user has been authenticated.
- the device activation process of Figure 10 is performed. If successful (i.e., the process shown in Figure 10 returns a "TRUE" result), control proceeds to box 1202, where the currently active account is displayed.
- the currently active account may be the first account is a list of accounts, or may be the last activated account. Note that if the activation process of Figure 10 had returned a "FALSE" result, the device would remain locked and awaiting a request to perform another device activation.
- the number of unsuccessful device activation requests that may be performed may be limited, requiring that device 150 be connected to PC application 1400 before another attempt at authentication is made.
- the currently active account is enabled for use.
- the account information is programmed into programmable magnetic stripe 161 and/or loaded into the memory which contains the information to be transmitted via RF antenna 173, in the case of a wireless transaction.
- any auxiliary information necessary to complete the transaction may be shown on display 151, such as dynamically generated passwords, security codes or CCV codes.
- box 1206 it is determined if the currently active account has been timed-out, and, if so, the device becomes deactivated in box 1208 and the authentication process of Figure 10 will have to be repeated to reactivate the accounts. If the device is not timed-out, control proceeds to box 1210 where it is determined if one of keys 153 or 154 has been pressed, indicating that the user wishes to scroll to the next or previous account in the list, and to make that account active. The scrolling occurs in box 1212, after which control is passed back to box 1202 to display the new account information. If no key has been pressed in box 1210, the currently active account information is used, and device 150 awaits a time-out in box 1208. Alternatively, it can be determined if the account information has been transmitted, either wirelessly or via a physical swipe wherein programmable magnetic stripe 161 is read, and, if so, the device can be turned off prior to reaching the end of the time-out period.
- a key press is detected in box 1210, it is determined in box 1211 if the pressed key is a soft key. If so, control proceeds to box 1213, where the top level of the onboard application menu 1300, shown in Figure 13 is displayed. Keys 153 and 154 can also be used to navigate this menu. Onboard application menu 1300 provides access to various auxiliary functions of the device. Note that a modification of device 150 may be required to add the soft key to utilize the alternate embodiment of flow control shown in Figure 12b. Alternatively, the primary embodiment of device 150 may be used if another method of detecting the soft key press, such as detecting the simultaneous pressing of buttons 153 and 154, is utilized.
- Figure 13 shows the top level of the onboard application menu 1300.
- the top level of application menu 1300 allows users to select from several functions.
- the user is able to activate the NFC circuitry to download content into device 150 or from device 150 to PC 704 or other near field communications devices.
- the NFC content download 1302 can be used to move data regarding new accounts from PC 704 to device 150.
- data regarding account usage can be downloaded from device 150 to PC application 1400, such as the number of times the account has been used, the amount charged to various accounts, etc.
- the NFC feature of the device may also be used to communicate with properly- equipped POS terminals or kiosks for other purposes, such as downloading coupons from advertising kiosks, uploading coupons to POS terminals, downloading electronic receipts from POS terminals, downloading product (such as electronic tickets) and content, etc.
- camera 106 may be used to capture images, including images of barcodes from coupons or other advertising materials, such as posters.
- To capture the barcode the user takes a picture of the barcode from wherever it is displayed.
- the barcode is then interpreted in box 1305 by software which acts similar to optical character recognition software to interpret the contents of the barcode into plain-text.
- the details of the coupon are then able to be displayed on LCD display 151.
- the coupon data is stored in on board memory 402 and can be uploaded to application 1400 when the device is connected to the personal computer.
- the user may choose to review stored coupons, product or content in box 1310 to determine if they may be used or deleted. Similarly, in box 1312, the user is able to review stored receipts which have been downloaded via the NFC circuitry to memory 402 of device 150. These receipts may eventually be downloaded to PC application 1400 for permanent storage and/or review and printing on the personal computer. Box 1014 is reserved for future expansion of device 150. Future expansion may occur via software updates, which will be applied by via PC application 1400.
- PC application 1400 preferably runs on PC 704 to which device 150 is connected via base unit 700.
- the computer on which PC application 1400 executes will have a connection to the internet for the downloading of account information from account issuers and the downloading of other content.
- PC application 1400 can be of any conventional design for an application of this type as long as all or a subset of the functions as laid out in Figure 14 are provided.
- PC application 1400 allows account records to be maintained in box 1404. This includes defining new account records in 1405, modifying existing account records in box 1406 and deleting existing account records in box 1407. Defining new account records includes the downloading of account information from account issuers in the form of structured data files 800, as previously discussed with respect to Figure 11.
- the account information downloaded from the account issuer to PC application 1400 may include advertising material or graphics which are to be displayed on display 151 when the account is activated.
- PC application 1400 can synchronize the account data stored thereon and any other content with device 150.
- PC application 1400 and the permanent storage devices on PC 704 act as a backup for the information stored on device 150 and may retain historical records retrieved from device 150 as well as synchronizing all account record data between device 150 and PC application 1400.
- An additional level of protection for account data may be utilized during the synchronization process by personalizing the account data to one specific device 150.
- all new account records moved to device 150 will preferably undergo an encryption process unique to device 150.
- the encryption process will be conducted by software on device 150 and the newly encrypted account data will be moved back to PC 704 for storage, thereby overwriting the un-encrypted version of the account data This will ensure that the account data created will only function on a single device 150 and no other similar device.
- each of device 150 will be programmed with a unique serial number or encryption key that is used to encrypt the data for that specific device 150.
- PC application 1400 is also capable of acting as a payment agent for purchases made online, with base unit 700 acting as the POS and able to use NFC or wirelsss smartcard transmission of account data to complete the transaction from device 150.
- the account information may be transmitted through the smartcard contacts 155 on device 150.
- base unit 700 is not present, then payment may be made directly through the personal computer from device 150 using a wireless connection capability.
- device 150 is activated and the appropriate account is selected.
- the account information from device 150 is read via smartcard contacts 155 and the relevant fields on the webpage are populated to render payment for the online purchase.
- device 150 may also be used as an authentication device for logging onto web sites frequented by the user, for which username / password combinations are required for access. When a user logs onto the web site, device 150 will detect the web site and will automatically provide the appropriate username / password combination to allow access to the web site.
- Other uses contemplated by the inventors include use as a student ID, as an electronic driver's license, as a passport, and for access control to restricted areas of buildings. Generally, anywhere that requires the association of a number or account with a specific person could be aided through the use of device 150 to provide a more secure, means of verification that is less prone to theft and fraud.
- PC application 1400 also aids in the management of receipt records by selecting menu item 1412. Receipt records can be downloaded from the device during synchronization process 1409 and records of the receipts are kept for local storage by PC application 1402 on the permanent storage of PC 704.
- receipts can be exported as image documents in any well know image formats, such as, for example, JPEG, TIFF, PDF or as a text file. Additionally, records of multiple receipts may be exported in a format suitable for reading by a spreadsheet program such as EXCEL.
- records may be purged from the local storage when they are no longer needed.
- Menu item 1416 enables the coupon management feature of PC application 1400.
- coupons that the user no longer wants to retain can be purged or, alternatively, coupons which have reached their expiration dates may be purged automatically.
- Menu item 1420 enables various configuration options for PC application
- device 150 can be used for transactions utilized with POS terminals utilizing a magnetic stripe or RF transmission capability. After the user successfully activates the device, the account record data is used to encode the magnetic stripe emulator on the device. The magnetic stripe emulator can then be swiped through a magnetic stripe reader commonly found at POS terminals. This provides the necessary information to complete the transaction in a manner that works with existing equipment. Existing contactless POS terminals interfaces would also support the device as the means to communicate the required transactional data by utilizing the RF capability.
- Figure 16 shows a transaction between device 150 and an NFC enabled POS device.
- the NFC circuitry on device 150 is able to establish a two-way communication with the NFC-enabled POS terminal to exchange key information regarding the transaction, such as the selected account information, any applicable coupons or special offers, etc.
- information is able to be downloaded to device 150 from the POS terminal, such as electronic receipt data, information regarding loyalty points, key points for future purchases, advertising content, product (such as electronic tickets) and messages directed to the users.
- This capability is not present in the transaction shown in Figure 15 because there is no channel for data to flow from the POS terminal device back to device 150 via magnetic stripe or smartcard interface.
- the NFC circuitry may be used to emulate a smartcard RF transaction.
- the device be compliant with ISO standards 7810, 7811, 7812 and 7813 for magnetic stripe cards, it is also contemplated that alternative embodiments may not have the magnetic stripe portion and may only communicate with other devices which utilize smartcard technology or which are NFC-enabled.
- Figure 17 provides a solution whereby fraud can be eliminated from the credit card process by requiring a dynamically generated one-time password to be included with transaction. This feature is not available with traditional credit cards as there is no computational component with which to calculate a dynamic password.
- an encrypting algorithm for generating the dynamic password may be downloaded as part of an electronic account record 800 as shown in Figure 18, as part of the smartcard file system 810.
- the dynamic password generated by device 150 may be transmitted electronically with the rest of the account information to a POS device, and ultimately to the financial institution for authorization of the charge, or may be displayed on display 152 such that a user of the device could read the password and provide it verbally to a merchant or type it into a keypad at the POS device.
- a non-dynamic alphanumeric security code such as a CCV code, which does not require calculation, may also be displayed for use by the user in the same manner.
- the password is generated when the user activates the account or when queried by the POS device, and displayed to the user on display 152 or, alternatively is provided as part of the electronic transfer of the account number either via programmable magnetic stripe 161 or via a wireless RF transaction via antenna 173.
- FIG. 17 This process is shown in Figure 17.
- the user provides the account number and dynamic password to the merchant during the normal course of conducting a transaction at a POS terminal.
- the merchant includes the dynamic password in its transmission to payment processor 1703 as part of the normal payment authorization transmission.
- the information is then sent to an acquiring bank in box 1704.
- the merchant may communicate directly with acquiring bank 1704, in set-ups where there is no payment processing service provider.
- the acquiring bank then transmits the account number and dynamic password to payment card association 1705.
- Payment card association 1705 transmits the information to the payment processing service in 1706 which verifies the one-time password as being authentic for that particular account, and authorizes the charge.
- the financial card issuer also verifies the dynamic password and authorizes the charge.
- the authorization is then returned to acquiring bank 1704
- the payment processor or gateway server 1703 then transmits the authorization to the merchant and the transaction is completed. Note that one or more of the entities in Figure 17 may be the same entity.
- the user of a password which is dynamically generated based upon a unique identification of device 150 eliminates the type of fraud wherein credit numbers are stolen and then used to purchase goods either in person, by embossing the number on another card or over the internet by simply conducting internet transactions wherein the card number is provided.
- This method also eliminates having the security code or CCV code printed on the signature panel of the card. As such, the theft of the dynamically generated security code is virtually impossible.
- the embodiments shown are provided as exemplars only and the invention is not meant to be limited thereby. For example, actual physical configuration of device 150 may change depending on the needs of the applications which are run thereon.
- certain applications may require larger or smaller displays or certain embodiments in the invention may include, for example, speakers and/or microphones.
- the layout of the keys 153 and 154, and, in addition, the number and placement of additional keys may be of any configuration that is convenient for the user.
- Biometric sensor 151 may be located in any convenient place on or within the housing of device 150.
- the system architecture shown in Figure 7 is only one possible embodiment. The system architecture may be configured in any manner which provides the functionality necessary for the emulation of magnetic stripes, smartcards and/or NFC in the manner described herein.
Abstract
Description
Claims
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2007354267A AU2007354267A1 (en) | 2006-11-22 | 2007-11-21 | Point0f sale transaction device with magnetic stripe emulator and biometric authentication |
EP07873625A EP2095343A1 (en) | 2006-11-22 | 2007-11-21 | Point0f sale transaction device with magnetic stripe emulator and biometric authentication |
CN200780049652A CN101730907A (en) | 2006-11-22 | 2007-11-21 | Point0f sale transaction device with magnetic stripe emulator and biometric authentication |
CA002667306A CA2667306A1 (en) | 2006-11-22 | 2007-11-21 | Point 0f sale transaction device with magnetic stripe emulator and biometric authentication |
JP2009538523A JP2010510609A (en) | 2006-11-22 | 2007-11-21 | Point-of-sale transaction equipment with magnetic band emulator and biometric authentication |
Applications Claiming Priority (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US86692206P | 2006-11-22 | 2006-11-22 | |
US86690906P | 2006-11-22 | 2006-11-22 | |
US60/866,909 | 2006-11-22 | ||
US60/866,922 | 2006-11-22 | ||
US94272907P | 2007-06-08 | 2007-06-08 | |
US60/942,729 | 2007-06-08 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2008147457A1 true WO2008147457A1 (en) | 2008-12-04 |
Family
ID=39811591
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2007/085460 WO2008147457A1 (en) | 2006-11-22 | 2007-11-21 | Point0f sale transaction device with magnetic stripe emulator and biometric authentication |
Country Status (6)
Country | Link |
---|---|
EP (1) | EP2095343A1 (en) |
JP (1) | JP2010510609A (en) |
CN (1) | CN101730907A (en) |
AU (1) | AU2007354267A1 (en) |
CA (1) | CA2667306A1 (en) |
WO (1) | WO2008147457A1 (en) |
Cited By (49)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101930640A (en) * | 2009-06-26 | 2010-12-29 | 海南新生信息技术有限公司 | One-card multi-account transaction method and system thereof |
US8068011B1 (en) | 2010-08-27 | 2011-11-29 | Q Street, LLC | System and method for interactive user-directed interfacing between handheld devices and RFID media |
DE102010035312A1 (en) * | 2010-08-25 | 2012-03-01 | Giesecke & Devrient Gmbh | Portable data carrier medium i.e. smart card, has oscillating circuit whose detuning is caused by magnet read head when reading magnetic strip, where number of detuning of oscillating circuit is realized and processed by evaluation unit |
US20130191279A1 (en) * | 2012-01-20 | 2013-07-25 | Bank Of America Corporation | Mobile device with rewritable general purpose card |
WO2013158779A2 (en) * | 2012-04-18 | 2013-10-24 | Square, Inc. | Point-of-sale system |
EP2889809A1 (en) * | 2013-12-30 | 2015-07-01 | Gemalto SA | Device for converting an electromagnetic field |
WO2015183412A1 (en) * | 2014-05-29 | 2015-12-03 | Apple Inc. | User device enabling access to payment information in response to mechanical input detection |
US9299072B2 (en) | 2014-05-29 | 2016-03-29 | Apple Inc. | Apparatuses and methods for operating a portable electronic device to conduct mobile payment transactions |
EP2875495B1 (en) | 2012-07-18 | 2016-06-15 | Gemalto SA | Method for authenticating a user of a contactless chip card |
WO2017008013A1 (en) * | 2015-07-09 | 2017-01-12 | Mastercard International Incorporated | Systems and methods for use in authenticating individuals, in connection with providing access to the individuals |
US9775038B2 (en) | 2012-04-08 | 2017-09-26 | Samsung Electronics Co., Ltd. | Management server and method for controlling device, user terminal apparatus and method for controlling device, and user terminal apparatus and control method thereof |
EP3282396A4 (en) * | 2015-04-07 | 2018-04-04 | Aps S.A. | Card and application program |
WO2018151647A1 (en) * | 2017-02-20 | 2018-08-23 | Fingerprint Cards Ab | Method and smart card adapted for progressive fingerprint enrollment |
US10395128B2 (en) | 2017-09-09 | 2019-08-27 | Apple Inc. | Implementation of biometric authentication |
US10419933B2 (en) | 2011-09-29 | 2019-09-17 | Apple Inc. | Authentication with secondary approver |
US10424007B2 (en) | 2015-12-07 | 2019-09-24 | Mastercard International Incorporated | Systems and methods for utilizing vehicle connectivity in association with payment transactions |
US10438205B2 (en) | 2014-05-29 | 2019-10-08 | Apple Inc. | User interface for payments |
US10484384B2 (en) | 2011-09-29 | 2019-11-19 | Apple Inc. | Indirect authentication |
US10496808B2 (en) | 2016-10-25 | 2019-12-03 | Apple Inc. | User interface for managing access to credentials for use in an operation |
US10521579B2 (en) | 2017-09-09 | 2019-12-31 | Apple Inc. | Implementation of biometric authentication |
US10600068B2 (en) | 2015-06-05 | 2020-03-24 | Apple Inc. | User interface for loyalty accounts and private label accounts |
US10621581B2 (en) | 2016-06-11 | 2020-04-14 | Apple Inc. | User interface for transactions |
US10650443B2 (en) | 2014-03-31 | 2020-05-12 | Monticello Enterprises LLC | System and method for providing data to a merchant device from a user device over a wireless link |
US10749967B2 (en) | 2016-05-19 | 2020-08-18 | Apple Inc. | User interface for remote authorization |
US10783576B1 (en) | 2019-03-24 | 2020-09-22 | Apple Inc. | User interfaces for managing an account |
US10803281B2 (en) | 2013-09-09 | 2020-10-13 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs |
US10860096B2 (en) | 2018-09-28 | 2020-12-08 | Apple Inc. | Device control using gaze information |
US10860199B2 (en) | 2016-09-23 | 2020-12-08 | Apple Inc. | Dynamically adjusting touch hysteresis based on contextual data |
US10914606B2 (en) | 2014-09-02 | 2021-02-09 | Apple Inc. | User interactions for a mapping application |
US10956550B2 (en) | 2007-09-24 | 2021-03-23 | Apple Inc. | Embedded authentication systems in an electronic device |
US10972600B2 (en) | 2013-10-30 | 2021-04-06 | Apple Inc. | Displaying relevant user interface objects |
US10977716B2 (en) | 2014-03-31 | 2021-04-13 | Monticello Enterprises LLC | System and method for providing multiple application programming interfaces for a browser to manage payments from a payment service |
US10990934B2 (en) | 2015-06-05 | 2021-04-27 | Apple Inc. | User interface for loyalty accounts and private label accounts for a wearable device |
US11017384B2 (en) | 2014-05-29 | 2021-05-25 | Apple Inc. | Apparatuses and methods for using a primary user device to provision credentials onto a secondary user device |
US11037150B2 (en) | 2016-06-12 | 2021-06-15 | Apple Inc. | User interfaces for transactions |
US11074572B2 (en) | 2016-09-06 | 2021-07-27 | Apple Inc. | User interfaces for stored-value accounts |
US11100349B2 (en) | 2018-09-28 | 2021-08-24 | Apple Inc. | Audio assisted enrollment |
US11170085B2 (en) | 2018-06-03 | 2021-11-09 | Apple Inc. | Implementation of biometric authentication |
US11169830B2 (en) | 2019-09-29 | 2021-11-09 | Apple Inc. | Account management user interfaces |
US11282131B2 (en) | 2014-03-31 | 2022-03-22 | Monticello Enterprises LLC | User device enabling access to payment information in response to user input |
US11343370B1 (en) | 2012-11-02 | 2022-05-24 | Majen Tech, LLC | Screen interface for a mobile device apparatus |
US11431834B1 (en) | 2013-01-10 | 2022-08-30 | Majen Tech, LLC | Screen interface for a mobile device apparatus |
US11477609B2 (en) | 2019-06-01 | 2022-10-18 | Apple Inc. | User interfaces for location-related communications |
US11481094B2 (en) | 2019-06-01 | 2022-10-25 | Apple Inc. | User interfaces for location-related communications |
US11676373B2 (en) | 2008-01-03 | 2023-06-13 | Apple Inc. | Personal computing device control using face detection and recognition |
US11681537B2 (en) | 2019-09-29 | 2023-06-20 | Apple Inc. | Account management user interfaces |
US11782573B2 (en) | 2020-04-10 | 2023-10-10 | Apple Inc. | User interfaces for enabling an activity |
US11816194B2 (en) | 2020-06-21 | 2023-11-14 | Apple Inc. | User interfaces for managing secure operations |
US11836784B2 (en) | 2014-03-31 | 2023-12-05 | Monticello Enterprises LLC | System and method for providing a search entity-based payment process |
Families Citing this family (34)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102013035A (en) * | 2010-09-27 | 2011-04-13 | 钱袋网(北京)信息技术有限公司 | Card storing multi-account information |
US8373540B2 (en) * | 2011-02-04 | 2013-02-12 | Worthwhile Products | Anti-identity theft and information security system process |
CN102192778A (en) * | 2011-03-02 | 2011-09-21 | 陈晓明 | Electronic scale and control method thereof |
CN103475658B (en) * | 2011-04-06 | 2017-01-11 | 天地融科技股份有限公司 | Dynamic password generating method and device and authentication method and system |
US8925826B2 (en) * | 2011-05-03 | 2015-01-06 | Microsoft Corporation | Magnetic stripe-based transactions using mobile communication devices |
TWI560616B (en) * | 2011-08-02 | 2016-12-01 | Corning Inc | Biometric-enabled smart card |
KR101960485B1 (en) * | 2012-04-08 | 2019-03-20 | 삼성전자주식회사 | Management server and method for control device, user terminal apparatus and method for control device, user terminal apparatus and control method therof |
CN102664735B (en) * | 2012-04-13 | 2016-01-06 | 江苏新彩软件有限公司 | A kind of cell phone lottery system safety session implementation method based on public keys |
CN102819757A (en) * | 2012-07-05 | 2012-12-12 | 中联创(福建)物联信息科技有限公司 | Intelligent commodity experiencing and purchasing terminal |
US8820649B2 (en) * | 2012-11-20 | 2014-09-02 | Omne Mobile Payments, Inc. | Electronic card with a programmable magnetic stripe |
US9092690B2 (en) * | 2013-03-12 | 2015-07-28 | Google Inc. | Extraction of financial account information from a digital image of a card |
EP3028228A4 (en) * | 2013-07-16 | 2016-12-07 | Intel Corp | Mobile wallet detection at a contactless point of sale terminal |
CN103700180B (en) * | 2013-12-10 | 2016-06-29 | 深圳怡化电脑股份有限公司 | Holder is carried out the system and method for identification by a kind of ATM |
CN103914724A (en) * | 2014-03-03 | 2014-07-09 | 许刚 | ATM card and operating method thereof |
CN205158436U (en) * | 2014-05-29 | 2016-04-13 | 苹果公司 | Electronic equipment |
TWI539411B (en) * | 2014-06-25 | 2016-06-21 | Cong-Xiang Mi | Personalized Family Situation Control System and Method |
US10339293B2 (en) | 2014-08-15 | 2019-07-02 | Apple Inc. | Authenticated device used to unlock another device |
WO2016036603A1 (en) | 2014-09-02 | 2016-03-10 | Apple Inc. | Reduced size configuration interface |
US11157893B2 (en) | 2014-11-08 | 2021-10-26 | Samsung Electronics Co., Ltd. | Electronic device including a plurality of payment modules |
KR102424286B1 (en) * | 2014-11-08 | 2022-07-25 | 삼성전자주식회사 | Electronic Device Including a Plurality of Payment Modules |
US20160203492A1 (en) * | 2015-01-14 | 2016-07-14 | Tactilis Sdn Bhd | System and method for requesting reconciliation of electronic transaction records for enhanced security |
US20160224973A1 (en) | 2015-02-01 | 2016-08-04 | Apple Inc. | User interface for payments |
US10254911B2 (en) | 2015-03-08 | 2019-04-09 | Apple Inc. | Device configuration user interface |
US20160267486A1 (en) * | 2015-03-13 | 2016-09-15 | Radiius Corp | Smartcard Payment System and Method |
US20160379207A1 (en) * | 2015-06-25 | 2016-12-29 | Intel Corporation | Secured credential aggregator |
CN105023038A (en) * | 2015-08-14 | 2015-11-04 | 武汉天喻信息产业股份有限公司 | Dual-interface financial IC card having safe input function and using method thereof |
CN105023039A (en) * | 2015-08-14 | 2015-11-04 | 武汉天喻信息产业股份有限公司 | Dual-interface financial IC card with safety input and using method thereof |
CN105096454A (en) * | 2015-08-26 | 2015-11-25 | 广西小草信息产业有限责任公司 | Unauthorized bank card swiping prevention system and method for preventing unauthorized bank card swiping on POS machine |
KR101755858B1 (en) * | 2015-10-13 | 2017-07-07 | 주식회사 케이비국민카드 | Payment system and method of representive card connected with an app type card |
JP6705290B2 (en) * | 2016-06-01 | 2020-06-03 | 大日本印刷株式会社 | Multi-payment card issuing system, terminal device and computer program |
CN106845953A (en) * | 2017-01-23 | 2017-06-13 | 上海讯联数据服务有限公司 | Mobile payment information processor and method of mobile payment and system |
CN107844823A (en) * | 2017-10-31 | 2018-03-27 | 上海东方磁卡信息股份有限公司 | active smart card |
WO2020249997A1 (en) * | 2019-06-12 | 2020-12-17 | Linxens Holding | Communication device and method of using such a communication device |
JP2021096725A (en) * | 2019-12-19 | 2021-06-24 | 株式会社デンソーウェーブ | Portable terminal and authentication system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5955961A (en) * | 1991-12-09 | 1999-09-21 | Wallerstein; Robert S. | Programmable transaction card |
US6012636A (en) * | 1997-04-22 | 2000-01-11 | Smith; Frank E. | Multiple card data system having first and second memory elements including magnetic strip and fingerprints scanning means |
WO2004095169A2 (en) * | 2003-04-21 | 2004-11-04 | Josef Osterweil | Method and system for data writing/reading onto/from and emulating a magnetic stripe |
WO2006116772A2 (en) * | 2005-04-27 | 2006-11-02 | Privasys, Inc. | Electronic cards and methods for making same |
US20070131759A1 (en) * | 2005-12-14 | 2007-06-14 | Cox Mark A | Smartcard and magnetic stripe emulator with biometric authentication |
-
2007
- 2007-11-21 AU AU2007354267A patent/AU2007354267A1/en not_active Abandoned
- 2007-11-21 EP EP07873625A patent/EP2095343A1/en not_active Withdrawn
- 2007-11-21 JP JP2009538523A patent/JP2010510609A/en active Pending
- 2007-11-21 WO PCT/US2007/085460 patent/WO2008147457A1/en active Application Filing
- 2007-11-21 CN CN200780049652A patent/CN101730907A/en active Pending
- 2007-11-21 CA CA002667306A patent/CA2667306A1/en not_active Abandoned
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5955961A (en) * | 1991-12-09 | 1999-09-21 | Wallerstein; Robert S. | Programmable transaction card |
US6012636A (en) * | 1997-04-22 | 2000-01-11 | Smith; Frank E. | Multiple card data system having first and second memory elements including magnetic strip and fingerprints scanning means |
WO2004095169A2 (en) * | 2003-04-21 | 2004-11-04 | Josef Osterweil | Method and system for data writing/reading onto/from and emulating a magnetic stripe |
WO2006116772A2 (en) * | 2005-04-27 | 2006-11-02 | Privasys, Inc. | Electronic cards and methods for making same |
US20070131759A1 (en) * | 2005-12-14 | 2007-06-14 | Cox Mark A | Smartcard and magnetic stripe emulator with biometric authentication |
Cited By (118)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11468155B2 (en) | 2007-09-24 | 2022-10-11 | Apple Inc. | Embedded authentication systems in an electronic device |
US10956550B2 (en) | 2007-09-24 | 2021-03-23 | Apple Inc. | Embedded authentication systems in an electronic device |
US11676373B2 (en) | 2008-01-03 | 2023-06-13 | Apple Inc. | Personal computing device control using face detection and recognition |
CN101930640A (en) * | 2009-06-26 | 2010-12-29 | 海南新生信息技术有限公司 | One-card multi-account transaction method and system thereof |
DE102010035312A1 (en) * | 2010-08-25 | 2012-03-01 | Giesecke & Devrient Gmbh | Portable data carrier medium i.e. smart card, has oscillating circuit whose detuning is caused by magnet read head when reading magnetic strip, where number of detuning of oscillating circuit is realized and processed by evaluation unit |
US9858455B2 (en) | 2010-08-27 | 2018-01-02 | Q Street, LLC | System and method for interactive user-directed interfacing between handheld devices and RFID media |
US8395486B2 (en) | 2010-08-27 | 2013-03-12 | Q Street, LLC | System and method for interactive user-directed interfacing between handheld devices and RFID media |
US8068011B1 (en) | 2010-08-27 | 2011-11-29 | Q Street, LLC | System and method for interactive user-directed interfacing between handheld devices and RFID media |
US10516997B2 (en) | 2011-09-29 | 2019-12-24 | Apple Inc. | Authentication with secondary approver |
US10484384B2 (en) | 2011-09-29 | 2019-11-19 | Apple Inc. | Indirect authentication |
US11200309B2 (en) | 2011-09-29 | 2021-12-14 | Apple Inc. | Authentication with secondary approver |
US10419933B2 (en) | 2011-09-29 | 2019-09-17 | Apple Inc. | Authentication with secondary approver |
US11755712B2 (en) | 2011-09-29 | 2023-09-12 | Apple Inc. | Authentication with secondary approver |
US20130191279A1 (en) * | 2012-01-20 | 2013-07-25 | Bank Of America Corporation | Mobile device with rewritable general purpose card |
US10028146B2 (en) | 2012-04-08 | 2018-07-17 | Samsung Electronics Co., Ltd. | Management server and method for controlling device, user terminal apparatus and method for controlling device, and user terminal apparatus and control method thereof |
US9775038B2 (en) | 2012-04-08 | 2017-09-26 | Samsung Electronics Co., Ltd. | Management server and method for controlling device, user terminal apparatus and method for controlling device, and user terminal apparatus and control method thereof |
US9424721B2 (en) | 2012-04-18 | 2016-08-23 | Square, Inc. | Point-of-sale system |
US9589428B2 (en) | 2012-04-18 | 2017-03-07 | Square, Inc. | Point-of-sale system |
US10089615B2 (en) | 2012-04-18 | 2018-10-02 | Square, Inc. | Point-of-sale system |
US9881290B2 (en) | 2012-04-18 | 2018-01-30 | Square, Inc. | Point-of-sale system |
US9257018B2 (en) | 2012-04-18 | 2016-02-09 | Square, Inc. | Point-of-sale system |
US9916570B2 (en) | 2012-04-18 | 2018-03-13 | Square, Inc. | Point-of-sale system |
WO2013158779A3 (en) * | 2012-04-18 | 2014-01-23 | Square, Inc. | Point-of-sale system |
WO2013158779A2 (en) * | 2012-04-18 | 2013-10-24 | Square, Inc. | Point-of-sale system |
EP2875495B1 (en) | 2012-07-18 | 2016-06-15 | Gemalto SA | Method for authenticating a user of a contactless chip card |
US11652916B1 (en) | 2012-11-02 | 2023-05-16 | W74 Technology, Llc | Screen interface for a mobile device apparatus |
US11343370B1 (en) | 2012-11-02 | 2022-05-24 | Majen Tech, LLC | Screen interface for a mobile device apparatus |
US11431834B1 (en) | 2013-01-10 | 2022-08-30 | Majen Tech, LLC | Screen interface for a mobile device apparatus |
US11494046B2 (en) | 2013-09-09 | 2022-11-08 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on unlock inputs |
US11768575B2 (en) | 2013-09-09 | 2023-09-26 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on unlock inputs |
US10803281B2 (en) | 2013-09-09 | 2020-10-13 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs |
US11287942B2 (en) | 2013-09-09 | 2022-03-29 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces |
US10972600B2 (en) | 2013-10-30 | 2021-04-06 | Apple Inc. | Displaying relevant user interface objects |
US11316968B2 (en) | 2013-10-30 | 2022-04-26 | Apple Inc. | Displaying relevant user interface objects |
WO2015101453A1 (en) * | 2013-12-30 | 2015-07-09 | Gemalto Sa | Device for transforming an electromagnetic field |
EP2889809A1 (en) * | 2013-12-30 | 2015-07-01 | Gemalto SA | Device for converting an electromagnetic field |
US11282131B2 (en) | 2014-03-31 | 2022-03-22 | Monticello Enterprises LLC | User device enabling access to payment information in response to user input |
US11669884B2 (en) | 2014-03-31 | 2023-06-06 | Monticello Enterprises LLC | System and method for providing data to a merchant device from a user device over a wireless link |
US11074640B2 (en) | 2014-03-31 | 2021-07-27 | Monticello Enterprises LLC | System and method for providing a universal shopping cart across multiple search platforms |
US11836784B2 (en) | 2014-03-31 | 2023-12-05 | Monticello Enterprises LLC | System and method for providing a search entity-based payment process |
US10977716B2 (en) | 2014-03-31 | 2021-04-13 | Monticello Enterprises LLC | System and method for providing multiple application programming interfaces for a browser to manage payments from a payment service |
US10650443B2 (en) | 2014-03-31 | 2020-05-12 | Monticello Enterprises LLC | System and method for providing data to a merchant device from a user device over a wireless link |
US11461828B2 (en) | 2014-03-31 | 2022-10-04 | Monticello Enterprises LLC | System and method for receiving data at a merchant device from a user device over a wireless link |
US10825079B2 (en) | 2014-03-31 | 2020-11-03 | Monticello Enterprises LLC | System and method for providing data to a merchant device from a user device over a wireless link |
US11468497B2 (en) | 2014-03-31 | 2022-10-11 | Monticello Enterprises LLC | System and method for receiving data at a merchant device from a user device over a wireless link |
US10769717B2 (en) | 2014-03-31 | 2020-09-08 | Monticello Enterprises LLC | System and method for providing data to a merchant device from a user device over a wireless link |
KR20190021487A (en) * | 2014-05-29 | 2019-03-05 | 애플 인크. | User device enabling access to payment information in response to mechanical input detection |
KR20180021223A (en) * | 2014-05-29 | 2018-02-28 | 애플 인크. | User device enabling access to payment information in response to mechanical input detection |
US10699262B2 (en) | 2014-05-29 | 2020-06-30 | Apple Inc. | User device enabling access to payment information in response to mechanical input detection |
US11922408B2 (en) | 2014-05-29 | 2024-03-05 | Apple Inc. | Apparatuses and methods for using a primary user device to provision credentials onto a secondary user device |
US10748153B2 (en) | 2014-05-29 | 2020-08-18 | Apple Inc. | User interface for payments |
US11836725B2 (en) | 2014-05-29 | 2023-12-05 | Apple Inc. | User interface for payments |
WO2015183412A1 (en) * | 2014-05-29 | 2015-12-03 | Apple Inc. | User device enabling access to payment information in response to mechanical input detection |
US9299072B2 (en) | 2014-05-29 | 2016-03-29 | Apple Inc. | Apparatuses and methods for operating a portable electronic device to conduct mobile payment transactions |
US10796309B2 (en) | 2014-05-29 | 2020-10-06 | Apple Inc. | User interface for payments |
US9400977B2 (en) | 2014-05-29 | 2016-07-26 | Apple Inc. | User device enabling access to payment information in response to mechanical input detection |
KR101952334B1 (en) * | 2014-05-29 | 2019-06-11 | 애플 인크. | User device enabling access to payment information in response to mechanical input detection |
US9864984B2 (en) | 2014-05-29 | 2018-01-09 | Apple Inc. | Apparatuses and methods for operating a portable electronic device to conduct mobile payment transactions |
KR101831351B1 (en) * | 2014-05-29 | 2018-02-22 | 애플 인크. | User device enabling access to payment information in response to mechanical input detection |
US10438205B2 (en) | 2014-05-29 | 2019-10-08 | Apple Inc. | User interface for payments |
US10902424B2 (en) | 2014-05-29 | 2021-01-26 | Apple Inc. | User interface for payments |
KR102104218B1 (en) * | 2014-05-29 | 2020-04-23 | 애플 인크. | User device enabling access to payment information in response to mechanical input detection |
US10289996B2 (en) | 2014-05-29 | 2019-05-14 | Apple Inc. | Apparatuses and methods for operating a portable electronic device to conduct mobile payment transactions |
US10489769B2 (en) | 2014-05-29 | 2019-11-26 | Apple Inc. | User device enabling access to payment information in response to mechanical input detection |
US10977651B2 (en) | 2014-05-29 | 2021-04-13 | Apple Inc. | User interface for payments |
US10482461B2 (en) | 2014-05-29 | 2019-11-19 | Apple Inc. | User interface for payments |
US10977642B2 (en) | 2014-05-29 | 2021-04-13 | Apple Inc. | Apparatuses and methods for operating a portable electronic device to conduct mobile payment transactions |
US10223682B2 (en) | 2014-05-29 | 2019-03-05 | Apple Inc. | User device enabling access to payment information in response to mechanical input detection |
US11017384B2 (en) | 2014-05-29 | 2021-05-25 | Apple Inc. | Apparatuses and methods for using a primary user device to provision credentials onto a secondary user device |
US10914606B2 (en) | 2014-09-02 | 2021-02-09 | Apple Inc. | User interactions for a mapping application |
US11733055B2 (en) | 2014-09-02 | 2023-08-22 | Apple Inc. | User interactions for a mapping application |
EP3282396A4 (en) * | 2015-04-07 | 2018-04-04 | Aps S.A. | Card and application program |
US11321731B2 (en) | 2015-06-05 | 2022-05-03 | Apple Inc. | User interface for loyalty accounts and private label accounts |
US11734708B2 (en) | 2015-06-05 | 2023-08-22 | Apple Inc. | User interface for loyalty accounts and private label accounts |
US10990934B2 (en) | 2015-06-05 | 2021-04-27 | Apple Inc. | User interface for loyalty accounts and private label accounts for a wearable device |
US10600068B2 (en) | 2015-06-05 | 2020-03-24 | Apple Inc. | User interface for loyalty accounts and private label accounts |
US11783305B2 (en) | 2015-06-05 | 2023-10-10 | Apple Inc. | User interface for loyalty accounts and private label accounts for a wearable device |
WO2017008013A1 (en) * | 2015-07-09 | 2017-01-12 | Mastercard International Incorporated | Systems and methods for use in authenticating individuals, in connection with providing access to the individuals |
US9775044B2 (en) | 2015-07-09 | 2017-09-26 | Mastercard International Incorporated | Systems and methods for use in authenticating individuals, in connection with providing access to the individuals |
US10424007B2 (en) | 2015-12-07 | 2019-09-24 | Mastercard International Incorporated | Systems and methods for utilizing vehicle connectivity in association with payment transactions |
US11093997B2 (en) | 2015-12-07 | 2021-08-17 | Mastercard International Incorporated | Systems and methods for utilizing vehicle connectivity in association with payment transactions |
US10467682B2 (en) | 2015-12-07 | 2019-11-05 | Mastercard International Incorporated | Systems and methods for utilizing vehicle connectivity in association with payment transactions |
US11206309B2 (en) | 2016-05-19 | 2021-12-21 | Apple Inc. | User interface for remote authorization |
US10749967B2 (en) | 2016-05-19 | 2020-08-18 | Apple Inc. | User interface for remote authorization |
US10621581B2 (en) | 2016-06-11 | 2020-04-14 | Apple Inc. | User interface for transactions |
US11481769B2 (en) | 2016-06-11 | 2022-10-25 | Apple Inc. | User interface for transactions |
US11037150B2 (en) | 2016-06-12 | 2021-06-15 | Apple Inc. | User interfaces for transactions |
US11900372B2 (en) | 2016-06-12 | 2024-02-13 | Apple Inc. | User interfaces for transactions |
US11074572B2 (en) | 2016-09-06 | 2021-07-27 | Apple Inc. | User interfaces for stored-value accounts |
US10860199B2 (en) | 2016-09-23 | 2020-12-08 | Apple Inc. | Dynamically adjusting touch hysteresis based on contextual data |
US10496808B2 (en) | 2016-10-25 | 2019-12-03 | Apple Inc. | User interface for managing access to credentials for use in an operation |
US11574041B2 (en) | 2016-10-25 | 2023-02-07 | Apple Inc. | User interface for managing access to credentials for use in an operation |
WO2018151647A1 (en) * | 2017-02-20 | 2018-08-23 | Fingerprint Cards Ab | Method and smart card adapted for progressive fingerprint enrollment |
US11288678B2 (en) | 2017-02-20 | 2022-03-29 | Fingerprint Cards Anacatum Ip Ab | Method and smart card adapted for progressive fingerprint enrollment |
US10783227B2 (en) | 2017-09-09 | 2020-09-22 | Apple Inc. | Implementation of biometric authentication |
US10395128B2 (en) | 2017-09-09 | 2019-08-27 | Apple Inc. | Implementation of biometric authentication |
US10872256B2 (en) | 2017-09-09 | 2020-12-22 | Apple Inc. | Implementation of biometric authentication |
US11386189B2 (en) | 2017-09-09 | 2022-07-12 | Apple Inc. | Implementation of biometric authentication |
US11393258B2 (en) | 2017-09-09 | 2022-07-19 | Apple Inc. | Implementation of biometric authentication |
US11765163B2 (en) | 2017-09-09 | 2023-09-19 | Apple Inc. | Implementation of biometric authentication |
US10521579B2 (en) | 2017-09-09 | 2019-12-31 | Apple Inc. | Implementation of biometric authentication |
US11928200B2 (en) | 2018-06-03 | 2024-03-12 | Apple Inc. | Implementation of biometric authentication |
US11170085B2 (en) | 2018-06-03 | 2021-11-09 | Apple Inc. | Implementation of biometric authentication |
US11100349B2 (en) | 2018-09-28 | 2021-08-24 | Apple Inc. | Audio assisted enrollment |
US11809784B2 (en) | 2018-09-28 | 2023-11-07 | Apple Inc. | Audio assisted enrollment |
US11619991B2 (en) | 2018-09-28 | 2023-04-04 | Apple Inc. | Device control using gaze information |
US10860096B2 (en) | 2018-09-28 | 2020-12-08 | Apple Inc. | Device control using gaze information |
US10783576B1 (en) | 2019-03-24 | 2020-09-22 | Apple Inc. | User interfaces for managing an account |
US11669896B2 (en) | 2019-03-24 | 2023-06-06 | Apple Inc. | User interfaces for managing an account |
US11328352B2 (en) | 2019-03-24 | 2022-05-10 | Apple Inc. | User interfaces for managing an account |
US11610259B2 (en) | 2019-03-24 | 2023-03-21 | Apple Inc. | User interfaces for managing an account |
US11688001B2 (en) | 2019-03-24 | 2023-06-27 | Apple Inc. | User interfaces for managing an account |
US11477609B2 (en) | 2019-06-01 | 2022-10-18 | Apple Inc. | User interfaces for location-related communications |
US11481094B2 (en) | 2019-06-01 | 2022-10-25 | Apple Inc. | User interfaces for location-related communications |
US11169830B2 (en) | 2019-09-29 | 2021-11-09 | Apple Inc. | Account management user interfaces |
US11681537B2 (en) | 2019-09-29 | 2023-06-20 | Apple Inc. | Account management user interfaces |
US11782573B2 (en) | 2020-04-10 | 2023-10-10 | Apple Inc. | User interfaces for enabling an activity |
US11816194B2 (en) | 2020-06-21 | 2023-11-14 | Apple Inc. | User interfaces for managing secure operations |
Also Published As
Publication number | Publication date |
---|---|
JP2010510609A (en) | 2010-04-02 |
EP2095343A1 (en) | 2009-09-02 |
AU2007354267A1 (en) | 2008-12-04 |
CA2667306A1 (en) | 2008-12-04 |
AU2007354267A8 (en) | 2010-03-04 |
CN101730907A (en) | 2010-06-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20080126260A1 (en) | Point Of Sale Transaction Device With Magnetic Stripe Emulator And Biometric Authentication | |
WO2008147457A1 (en) | Point0f sale transaction device with magnetic stripe emulator and biometric authentication | |
US20200242589A1 (en) | System and method for providing smart electronic wallet and reconfigurable transaction card thereof | |
US20070131759A1 (en) | Smartcard and magnetic stripe emulator with biometric authentication | |
KR100953231B1 (en) | Electronic transaction systems and methods therefor | |
EP2038227B1 (en) | System and method for activating telephone-based payment instrument | |
CN1307594C (en) | Payment system | |
EP1083527B1 (en) | A method for changing data stored on a universal card | |
US8103881B2 (en) | System, method and apparatus for electronic ticketing | |
EP2171636B1 (en) | Appliance for financial transaction tokens | |
US20140114861A1 (en) | Hand-held self-provisioned pin ped communicator | |
JP5988583B2 (en) | A portable object, including a display and an application, for performing electronic transactions | |
US20110057034A1 (en) | Secure transaction device and system | |
US20180039987A1 (en) | Multi-function transaction card | |
US10621574B1 (en) | Linked wallet device system including a plurality of socio-economic interfaces | |
JP2003044443A (en) | Online individual authentication system, individual authentication data registration center, portable terminal, and online individual authenticating method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 200780049652.2 Country of ref document: CN |
|
DPE1 | Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101) | ||
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 07873625 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2667306 Country of ref document: CA Ref document number: 2633/DELNP/2009 Country of ref document: IN |
|
ENP | Entry into the national phase |
Ref document number: 2009538523 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2007354267 Country of ref document: AU Ref document number: 2007873625 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 2007354267 Country of ref document: AU Date of ref document: 20071121 Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 2007354267 Country of ref document: AU Date of ref document: 20071121 Kind code of ref document: A |