摘要:
A method for providing secure transactions generates a Secure Card Number (“SCN”) for a first entity that is transferred with a first entity identifier to a second entity and then to a money source that verifies that the transaction is valid by use of the first entity identifier and the SCN. The SCN includes a Transaction Information Block (“TIB”) used for invoking one or more restrictions on use of the SCN, a Counter Block, and an encrypted Personal Identification Number (“PIN”) Block. The SCN is transferred to the money source in an account number or a non-account data field. The TIB can be used by the money source to determine which of multiple account numbers associated with the first entity should be used for the first transaction. The money source can also use the TIB to determine whether the device which generated the SCN has a changed status condition, such as a low battery condition or an invalid user entry status. The low battery condition may be determined either by a diagnostic program or by an empirical record of the number of transactions presented for authorization.
摘要:
Methods in which an encrypted transaction validation code is received which positively identifies a first transaction for a first entity, the first entity having a first entity identifier, and the first transaction is electronically verified as being valid by use of the first entity identifier and the validation code. The first entity identifier can be transferred as an account number and the validation code transferred to the money source in a non-account data field. A money source can validate the validation code by duplicating the encryption process used to create the validation code and by then comparing the result to the validation code received. The validation code can be, at least in part, encrypted, and a money source can validate the validation code by duplicating a validation code encryption process and by then comparing the result to the validation code received.
摘要:
An electronic card has a power source, a user selection mechanism operable to allow a user to select a customization variable for a single transaction, a processor for generating a transaction specific data packet that includes a card number and a customized number and an electronic communication device operable to cause the data packet to be read by a read head of a magnetic strip reader. The electronic communication device is operable to dynamically convey the transaction specific data packet to a read head of a magnetic card reader so that the transaction specific data packet is read by the read head. The transaction specific data packet is dynamically generated for use by the card for the single transaction of the card and the customized number is determined based upon the customization variable selected by the user selection mechanism.
摘要:
Methods for providing secure transactions in which a customization parameter and an encrypted transaction validation code are received from a user to positively identify a transaction for a user who has a first entity identifier. The validation code and first entity identifier are used by a money source which electronically verifies that the transaction is valid by use of the first entity identifier and the validation code while the first transaction is customized through use of the customization parameter.
摘要:
An electronic card ha a power source, a user selection mechanism operable to allow a user to select a customization variable for a single transaction, a processor for generating a transaction specific data packet that includes a card number and a customized number and an electronic communication device operable to cause the data packet to be read by a read head of a magnetic strip reader. The electronic communication device is operable to dynamically convey the transaction specific data packet to a read head of a magnetic card reader so that the transaction specific data packet is read by the read head. The transaction specific data packet is dynamically generated for use by the card for the single transaction of the card and the customized number is determined based upon the customization variable selected by the user selection mechanism.
摘要:
An East-West casino offers two or more gambling games in which one is a poker game using a traditional Western deck of cards and another is a poker game based upon a new Chinese Poker Deck of cards.
摘要:
A data packet can be dynamically stored in a magnetic strip by an encoder of an electronic card and subsequently transferred to a money source after it is read by a standard magnetic stripe reader as part of a verification process of a payment card transaction. A computer contained on the electronic card can run diagnostic tests and send the results to the money source as part of the data packet. One diagnostic test monitors the battery life of the electronic card to permit the money source to replace the electronic card before its battery runs out of useful life. The data packet can also contain data input into the electronic card by the user, such as a customization variable.
摘要:
An electronic card that can function as an anonymous credit card or banking card for use on or off the Internet utilizes a magnetic storage medium affixed to the card that can be read by a standard magnetic stripe reader. An encoder generates a data packet that is stored in a designated portion of the magnetic storage medium, which can be a magnetic stripe. The data packet can contain a personal coupon and an alias. A computer or microprocessor generates the personal coupon after a Personal Identification Number is input into the card.
摘要:
The System includes an Alarm Unit and a separate Alert Unit. The Alarm Unit is securely affixed to the parcel before the parcel is left at the delivery site, and the Alert Unit is placed at a secure site that is within radio range of the delivery site. The Alarm Unit is armed by the deliveryman upon depositing the parcel at the delivery site, and arming of the Alarm Unit results in the transmission of messages verifying to the seller or delivery agent that delivery has taken place and notifying the purchaser or intended recipient that the parcel has arrived. Movement of the parcel after it has been deposited at the delivery site and has been armed results in messages being transmitted to the shipping agent and to the intended recipient announcing that the parcel has been stolen. Such unauthorized movement of the parcel also activates a very loud audible alarm affixed to the parcel and activates a tracking beacon in or on the parcel, permitting the whereabouts of the parcel to be determined or tracked. The intended recipient of the parcel, after being notified of its delivery can disarm the Alarm Unit by inserting a secret number into a keypad on the Alarm Unit and then pressing a disarm button. Upon being disarmed, the Alarm Unit generates a signal that causes the Alert Unit to notify the seller and the delivery agent that an authorized person has taken possession of the parcel, thereby verifying receipt.
摘要:
A user can customize use of a payment card, which can be an electronic card, by selecting either a first or a second user key as a selected user key. The selected user key is entered into a card number generator that uses it and a user sequence number to generate a user payment card number that differs for each transaction through use of an algorithm. Multiple payment card transactions can be handled differently depending upon which user key is chosen as the selected user key. Different user keys can be used for different accounts, different types of transactions, or to classify the transactions. A user can receive one bill, or multiple bills. Different levels of privacy can be accorded to transactions that use different user keys. A user may pay the issuer for increased security, or the user may be paid by the issuer to allow transaction data to be distributed to third parties.