摘要:
A magnetic interface card appears to be a payment card conventionally provided with an electromagnetic stripe and magnetic data tracks. A magnetic emissive element is disposed in the magnetic interface card body under the magnetic data tracks that can emit a variety of ISO-7813 track-2 data strings. A photo-sensor is included to receive a series of optically encoded flashes from a personal trusted device (PTD) smartphone screen that securely communicate one-time-use account information and operational parameters from a financial transaction server. The large installed base of legacy point-of-sale magnetic card readers can continue to be used without any hardware or software modifications, and card security is improved by the change to one-time-use access numbers.
摘要:
A transaction security process includes authentication and identification parts for pushing an encrypted colorgram for user authentication and persona descriptors for user identification from a transaction server to a first personal trusted device. A decryption of the colorgram is displayed on the first personal trusted device. An image is captured by a second personal trusted device. An encryption of the image captured from the second personal trusted device is uploaded to the transaction server. The persona descriptors are used to build a composite rendering for identification of the first user to the second user. The second user clicks “OK” if they recognize the composite drawing as a reasonable persona of the first user.
摘要:
A transaction security process includes authentication and identification parts for pushing an encrypted colorgram for user authentication and persona descriptors for user identification from a transaction server to a first personal trusted device. A decryption of the colorgram is displayed on the first personal trusted device. An image is captured by a second personal trusted device. An encryption of the image captured from the second personal trusted device is uploaded to the transaction server. The persona descriptors are used to build a composite rendering for identification of the first user to the second user. The second user clicks “OK” if they recognize the composite drawing as a reasonable persona of the first user.
摘要:
A payment card manufacturing process glues a thin battery and an autonomously reprogrammable magnetic device to the inside surface of one of two outer front and rear laminate sheets. The magnetic device is pressed through a precisely cut rectangular hole provided for it in the rear laminate sheet, and is sealed with a gasket bead. Such magnetic device is critically placed flush in a magnetic stripe area, and the end gaps are such that they will minimize adverse magnetic transitions seen by a reader between the magnetic stripe field and the autonomously reprogrammable magnetic device. The surfaces of the battery, electronics, and laminate sheets, are plasma treated to promote adhesion. These are then all sandwiched together inside a heated mold that is tilted or vibrated just before a two-part polyurethane is injected. Each of the two polyurethane parts is temperature adjusted to match viscosities and thus improve mixing. The liquid polyurethane is injected through a nozzle and manifold to fill all the voids between the laminate sheets, and air escapes or is vacuumed out the top edge of the mold. The polyurethane sets quickly and sheets of sixteen or more payment cards can then be de-molded and singulated.
摘要:
A payment card comprises a display to support card-not-present transactions where no card reader is available to automate the transaction, and an account number retrieval method for dynamic, one-time use virtual account numbers whose use can assist authorities in rapid fraud and location detection. The account number generator is able to produce a sequence of virtual account numbers over its life that are predictable by the issuing bank and useful in authenticating transactions. A server for the issuing bank logs the merchant locations associated with each use or attempted use, and provides real-time detection of fraudulent attempts to use a virtual account number outside the predicted set. Fraud identification efforts can then be directed in a timely and useful way.
摘要:
A payment card comprises an internal dynamic card verification value (CVV) generator and a user display for card-not-present transactions. Card-present transactions with merchant card readers are enabled by a dynamic magnetic array internally associated with the card's magnetic stripe. The user display and a timer are triggered by the user when the user needs to see the card verification value and/or begin a new transaction. A new card verification value is provided for each new transaction according to a cryptographic process, but the timer limits how soon a next new card verification value can be generated.
摘要:
A payment card fraud detection business model comprises an internal virtual account number generator and a user display for Card-Not-Present transactions. Card-Present transactions with merchant card readers are enabled by a magnetic array internally associated with the card's magnetic stripe. The internal virtual account number generator is able to reprogram some of the magnetic bits encoded in the magnetic stripe to reflect the latest virtual account number. The internal virtual account number generator produces a sequence of virtual numbers that can be predicted and approved by the issuing bank. Once a number is used, such is discarded and put on an exclusion list or reserved for a specific merchant until the expiration date. A server for the issuing bank logs the merchant locations associated with each use or attempted use, and provides real-time detection of fraudulent attempts to use a virtual account number on the exclusion list. Law enforcement efforts can then be directed in a timely and useful way not only where the fraud occurs but also at its origination.
摘要:
Data and financial transactions are secured on a mobile electronics device for traceability and non-repudiation. A mobile personal trusted device (PTD) is needed to communicate over a network to a transaction server. Characteristic abstracts of objects carried by users have distinctive features that can be associated with and registered to a particular user and are recorded. An abstract contemporaneously obtained during a secure transaction is sent to a server for use as an authenticator for comparison to an abstract previously obtained and registered to said user. A traceable transaction record is rendered that is highly identifiable and substantially indisputable.
摘要:
A security system includes a software application running in a user's smartphone and a separately carried visual key that the user can image at will with the smartphone's camera. An effective visual key would typically comprise digital data encoded in a series of colored cells arranged in a colorgram. Such digital data is treated as a what-you-have security factor, and is concatenated with other security factors so users can authenticate themselves to websites, internet services, and even within the smartphone device itself or its applications. In one aspect, when users authenticate themselves to a server, the server returns a short-term supply of one-time-passwords or account numbers for use in secure access and financial transactions on other systems.
摘要:
A payment card financial transaction authenticates for providing overall financial network security computes a number of results from a cryptographic key that match values that were selectively used to personalize individual payment cards with their individual user identification and account access codes. An account access code is later presented daring a financial transaction involving at least one of those individual payment cards. A dynamic portion is included in a merchant's magnetic reading of the payment card. Then authenication can proceed by matching it with values computed from the cryptographic key.