SYSTEMS AND METHODS FOR PAIRING SITE CONTROLLER TO POINT-OF-SALE DEVICES

    公开(公告)号:US20250007903A1

    公开(公告)日:2025-01-02

    申请号:US18703606

    申请日:2022-10-26

    Applicant: VeriFone, Inc.

    Abstract: Systems and methods for pairing a point-of-sale device (POS) to a site controller (SC) are provided. The method includes: (1) transmitting, from the POS to the SC, via a legacy communication channel, a start pairing command: (2) generating, via the SC, a one-time password upon receiving the start pairing command: (3) transmitting, via the legacy communication channel, the one-time password from the SC to the POS: (4) transmitting, from the POS to the SC, a host CSR: (5) transmitting, from the SC to the POS, a host certificate, and an SSH-CA public key: (6) transmitting, from the POS to the SC, a user CSR: (7) transmitting, from the SC to the POS, a user certificate: (8) storing, via a memory of the POS, the host certificate, the user certificate, and the SSH-CA public key; and (9) removing keys corresponding to the legacy communication channel from the POS.

    SYSTEMS, DEVICES, AND METHODS FOR SELF-CHECKOUT MONITORING

    公开(公告)号:US20240403847A1

    公开(公告)日:2024-12-05

    申请号:US18697140

    申请日:2022-09-26

    Applicant: VeriFone, Inc.

    Abstract: A self-checkout monitoring system including self-checkout terminals, a site controller, and point-of-sale devices, is provided. A self-checkout terminal receives a transaction event, generates a transaction status update based on this transaction event, and transmits the transaction status up-date to a site controller, which routes the transaction status update to a point-of-sale device. The point-of-sale device generates a transaction status icon based on the transaction status update and displays a self-checkout monitoring panel with a status tile displaying the status icon corresponding to the transaction status update most recently received from the self-checkout terminal. The cashier selects the self-checkout terminal by entering a self-checkout terminal selection input causing the point-of-sale device to display transaction control commands. The cashier chooses a transaction control command to apply to the self-checkout terminal. The transaction control command is then transmitted, via the site controller, to the self-checkout terminal to configure the self-checkout terminal accordingly.

    Systems and methods for point-to-point encryption compliance

    公开(公告)号:US11551208B2

    公开(公告)日:2023-01-10

    申请号:US16151846

    申请日:2018-10-04

    Applicant: VeriFone, Inc.

    Abstract: Systems and methods for point-to-point encryption compliance are disclosed. In one embodiment, in an information processing apparatus comprising at least one computer processor, a method for point-to-point encryption compliance may include: (1) a payment application receiving, from a data source, payment data encrypted using a first encryption method; (2) the payment application identifying a second encryption method for the payment data; (3) the payment application requesting, from the data source, the payment data encrypted using the second encryption method; and (4) the payment application receiving from the data source, the payment data encrypted using the second encryption method.

    Systems and methods for providing a trusted keystore

    公开(公告)号:US11356271B2

    公开(公告)日:2022-06-07

    申请号:US16790564

    申请日:2020-02-13

    Applicant: VeriFone, Inc.

    Inventor: Chris Madden

    Abstract: Systems and methods for providing a trusted keystore are disclosed. In one embodiment, in an information processing apparatus comprising at least one computer processor, a method for providing a trusted keystore may include: (1) selecting and storing a root Keyblock Protection Key (KBPK) in a trusted domain; (2) for each key class: creating a keyblock with a class KBPK; and storing the keyblock in an untrusted keystore in an unfrosted domain; (3) loading keyblocks to a trusted key manager in the trusted domain; (4) decrypting the keyblocks with an encryption class key; (5) verifying the keyblocks under a MAC class key; (6) loading class keyblocks to the trusted key manager from the untrusted keystore; (7) writing the keyblocks to the untrusted keystore; and (8) writing class keyblock MACs in a hierarchy to the untrusted keystore. A number of levels in the hierarchy is based on an amount of available storage in the trusted domain.

    Systems and methods for providing low memory killer protection to non-system applications

    公开(公告)号:US11281508B2

    公开(公告)日:2022-03-22

    申请号:US16362292

    申请日:2019-03-22

    Applicant: VeriFone, Inc.

    Abstract: Systems and methods for low memory killer protection are disclosed. According to one embodiment, in an information processing apparatus comprising at least one computer processor and executing an operating system including a LMK subsystem, a method for providing low memory killer (LMK) protection may include: (1) a non-system application embedded with a SDK initiating a foreground service at the beginning of a use case session; (2) the non-system application causing the foreground service to create an ongoing notification with the operating system, wherein the ongoing notification causes the non-system application to have no lower than a perceptible LMK status during the use case session; (3) the non-system application completing the use case session; and (4) the non-system application causing the foreground service to remove the ongoing notification.

    Systems and methods for point-to-point encryption compliance

    公开(公告)号:US11233830B2

    公开(公告)日:2022-01-25

    申请号:US15982434

    申请日:2018-05-17

    Applicant: VeriFone, Inc.

    Abstract: Systems and methods for point-to-point encryption compliance are disclosed. In one embodiment, in a point of interaction device comprising at least one computer processor, a method for point-to-point encryption compliance may include: (1) receiving card data from a card reading device; (2) determining an error with the card data; (3) generating substitute data by replacing at least a portion of the card data with substitute data; and (4) communicating the substitute data to a payment server. The card data may be received from a magnetic stripe reader, from an EMV card reader, or from a contactless card reader. The error may include comprises the card data not being compliant with ISO-7813.

    Systems and methods for determining battery capacity in portable electronic devices

    公开(公告)号:US11221368B2

    公开(公告)日:2022-01-11

    申请号:US16679077

    申请日:2019-11-08

    Applicant: VeriFone, Inc.

    Abstract: Systems and methods for determining battery capacity in portable electronic devices are disclosed. In one embodiment, a method for determining battery capacity in a portable electronic device may include: (1) disabling battery charging for the portable electronic device; (2) measuring a voltage and a current across terminals for a battery installed in the portable electronic device; (3) calculating a voltage offset across the battery using an estimate of an internal resistance for the battery by multiplying the current by the estimate of the internal resistance for the battery; (4) calculating an estimate of the open circuit voltage for the battery by subtracting the voltage offset across the battery calculated from the measured voltage; (5) retrieving a battery capacity based on the estimate of the open circuit voltage; (6) quantifying the battery capacity; and (7) displaying the quantified battery capacity.

    KEY ENTRY DEVICE
    10.
    发明申请
    KEY ENTRY DEVICE 审中-公开

    公开(公告)号:US20200334422A1

    公开(公告)日:2020-10-22

    申请号:US16921550

    申请日:2020-07-06

    Applicant: VeriFone, Inc.

    Abstract: A key entry device including a housing, a keypad array disposed within the housing and including a plurality of keys, a key contact array disposed within the housing below the keypad array and including a plurality of contact pairs, a dome array underlying the keypad array and the key contact array and including a plurality of domes, and a protrusion array underlying the dome array and including a plurality of protrusions, whereby depression of one of the plurality of keys of the keypad array causes a corresponding one of the domes of the dome array to be displaced downwardly and to be deformed by pushing engagement with a corresponding one of the protrusions of the protrusion array into contact with at least one of the contact pairs of the key contact array.

Patent Agency Ranking