摘要:
The invention relates to exchangeable memory cards having several integrated circuits for personal computers. These memory cards serve as a large capacity mass memory for replacing floppy disks and other exchangeable magnetic supports. In particular, they have a plug-in connector (12) at the end of the card and can be inserted in the reader in accordance with PCMCIA standards of a micro-computer. According to an aspect of the invention, a flush contact chip card memory is formed by such a plug-in card (10) and for this purpose the latter has a supplementary connector with flush contacts on its principal face (14). The thus formed reader is transportable, with its application software stored in the card (10) and can be installed in any random microcomputer equipped with a PCMCIA reader. A credit card or security card (18) can then be inserted in the transportable reader. The memory card is typical a PCMCIA size card with a recess on one major plane surface and the security card fits into this recess.
摘要:
System for controlling communication between electronic information cards, such as IC-cards and a host computer, to be kept in secret. In order to protect the data, various countermeasures have been proposed in which the data are enciphered to be sent and deciphered for reading out. There is a problem, however, the cyphograph is difficult to keep secret when it is used for a long time. The invention intends to provide a device having at least two connectors for an IC-card stored with an algorithm for enciphering the data and another IC-card or other IC-cards for making communication with the host computer so as to readily change the first IC-card with a new one storing another algorithm.
摘要:
A control system for a set of franking machines (1) under the surveillance of a control center (2) for managing them and containing, to this end, as does each of the machines, a logic circuit organized about a processor (24) and memories (26). The data to be transmitted from the control center to the machines and vice-versa are interchanged by means of "smart" cards (3) having incorporated memory (7) and microprocessors (6) which are placed alternately in read/write terminals (5 or 4) of the control center or of the machines.
摘要:
In an IC (integrated circuit) system, a first IC card owned by a cardholder and a second IC card owned by a person other than the cardholder are employed. The first IC card is a normal IC card having a memory for previously storing a personal identification number. The first IC card includes a comparator. The second IC card is a remote PIN entry card having a keyboard for entering the PIN by a cardholder. After the PIN has been entered by the cardholder in the remote PIN entry card, this card is loaded by the person into a card terminal. Then, the PIN entered in the remote PIN entry card is transferred into the card terminal, and thereafter the PIN of the card terminal is transferred into the IC card so as to identify whether the cardholder is an authorized cardholder or not by comparing in the comparator both the PIN's with each other.
摘要:
In a transaction terminal, a credit card reader is used not only to enter data from cards of customers, but a special card is used to place the terminal in supervisory modes in at least one of which it will accept data from further special cards which are used to input data used in the transaction mode, particularly alphanumeric data for printing on transaction slips. The terminal has a customer accessible auxiliary keyboard which may be used for data entry, at a location remote from the main unit, allowing for point of sale data entry, including private entry of a customer's Personal Identification Number, either to validate a transaction or during selection of a PIN for encryption by the terminal. Data captured by the auxiliary keyboard is only retained for so long as a customer's card resides in a slot in the auxiliary keyboard, and PIN numbers are encoded as part of a sequence in which data is downloaded to the main unit.
摘要:
A system and method for distribution of articles or services, especially adapted to be secure against use by unauthorized personel, receives first and second data carriers. Each data carrier includes a processor, data storage, and interfacing circuits. A random number generator feeds a random number to each of the data carriers which use a program to generate a resultant based on the random number, a secret code and an identification number. The secret code and identification number are stored in the data storage of each data carrier. The resultants are compared to determine if they are equal, in which case access is allowed.
摘要:
Separate user accounts can be linked into a group of linked user accounts so that content items assigned to each of the user accounts can be accessed by each user account in the group. Linking user accounts in this way allows the individual user accounts to share content items while also retaining their individual properties such as username, password, preference data, etc. Linking user accounts allows each user account to retain the content items assigned to the user account when the user account is unlinked from the group. Linking user accounts can be restricted according to linking rules that dictate how many user accounts can be included in a group, when a user account can be added or removed from a group, etc. A master user account can set parameters restricting content items accessible to the user accounts in the group, as well as money spent be each user account.
摘要:
Techniques for providing friction-free transactions using geolocation and user identifiers are described herein. These techniques may ascertain a user's location based on a location of a mobile device. A transaction between the user and a merchant may be completed with zero or minimal input from the user based on the geolocation of the mobile device and the user identifiers. In some implementations, a transaction initiated earlier is completed when the mobile device arrives at the merchant. Additionally, a parent-child or similar relationship may be established between multiple devices. Security on the mobile device based may be provided by biometric identification and calculation of variance from regular movement patterns. Advertisements may be sent to the mobile device based on bids from merchants near to the mobile device. Promotions may be sent to the mobile device when more than a threshold number of mobile devices are located at the same merchant.
摘要:
A transaction system for coordinating processing of a transaction payment request associated with a transaction between a consumer and a merchant, comprising: a computer processor programmed for: receiving the transaction payment request including consumer code data and identification information, the consumer code data representative of a subaccount registered with a transaction interface; accessing the subaccount to obtain payment information related to the transaction payment request; creating a payment confirmation request using said identification information; sending said payment confirmation request over the network to a mobile device; obtaining authorization information from the mobile device; sending a funds transfer request to a payment platform based on the authorization information matching the required authorization information; receiving approval of the funds transfer request from the payment platform; and sending a confirmation of the approval of the funds transfer request to a computer device associated with the merchant.
摘要:
Techniques for providing friction-free transactions using geolocation and user identifiers are described herein. These techniques may ascertain a user's location based on a location of a mobile device. A transaction between the user and a merchant may be completed with zero or minimal input from the user based on the geolocation of the mobile device and the user identifiers. In some implementations, a transaction initiated earlier is completed when the mobile device arrives at the merchant. Additionally, a parent-child or similar relationship may be established between multiple devices. Security on the mobile device based may be provided by biometric identification and calculation of variance from regular movement patterns. Advertisements may be sent to the mobile device based on bids from merchants near to the mobile device. Promotions may be sent to the mobile device when more than a threshold number of mobile devices are located at the same merchant.