Abstract:
A method of authentication of a user is provided. The method comprises capturing a brain activity signal from a user; comparing the brain activity signal with reference data; and determining, based at least in part on the comparison, whether the identity of the user can be confirmed. Also provided is a computing device comprising at least one processor and at least one memory. The computing device is adapted to: communicate with a brain activity sensing system to capture a brain activity signal from the user; provide the captured brain activity signal to an authentication service computing system; and authenticate the user based at least in part on the result of a comparison with reference data received from the authentication service computing system. A system comprising the computing device and a brain activity sensing system, and am authentication service computing device are also provided.
Abstract:
A first communication channel is established between a contactless blank IC (integrated circuit) payment card and a mobile device. The mobile device is in proximity to the contactless blank IC payment card. A second communication channel is established, via the mobile device, between a remote personalization server computer and the contactless blank IC payment card. Payment card personalization data is received and stored in the contactless blank IC payment card. The data had been downloaded from the remote personalization server computer to the contactless blank IC payment card via the second communication channel.
Abstract:
A method of operating a payment-enabled mobile device to gain access to a location or a service. In an embodiment, a contactless front-end (CLF) component of a payment-enabled mobile device sequentially detects short-distance radio signals comprising at least two different polling signals, determines based on the sequence of the at least two different polling signals, that the payment-enabled mobile device is in proximity to a non-retail contactless transaction terminal, and then a payment application running on the payment-enabled mobile device bypasses a customary user verification feature. The process also includes the payment-enabled mobile device running the payment application performing a transaction with the non-retail contactless transaction terminal without invoking the customary user verification feature and then gaining access to at least one of a location or service. In some embodiments, the location or service includes one of a transit system, a hotel, a motor vehicle, a workplace, a room, a home, a bank branch, a vehicle charging station and a government facility.
Abstract:
A design element is displayed on a display screen. The design element is modulated over time to encode data in the design element. The design element is presented by a merchant. A camera component of a mobile device is used to capture images over time of the design element. A payment application in the mobile device analyzes the captured images to obtain the encoded data. The payment application uses the encoded data to establish a communication channel with a merchant device operated by the merchant. As a result of communication over the communication channel, a purchase transaction is implemented, including transmission of payment credentials to the merchant from the payment application.
Abstract:
Back-up credentials data is stored for a user. A communication channel is established with a mobile device. A cryptogram is received from the mobile device, such that the cryptogram is relayed by the mobile device from an authentication device that interacted with the mobile device. The authentication device is associated with the user. The cryptogram is verified. In response to the verification of the cryptogram, the stored back-up credentials data is made accessible to the mobile device.
Abstract:
A design element is displayed on a display screen. The design element is modulated over time to encode data in the design element. The design element is presented by a merchant. A camera component of a mobile device is used to capture images over time of the design element. A payment application in the mobile device analyzes the captured images to obtain the encoded data. The payment application uses the encoded data to establish a communication channel with a merchant device operated by the merchant. As a result of communication over the communication channel, a purchase transaction is implemented, including transmission of payment credentials to the merchant from the payment application.
Abstract:
Methods and systems are described for setting a risk management limit to be applied to authorized purchase transactions for a payment card account. In an embodiment, a payment card issuer sets a risk management limit to be applied to authorized purchase transactions for a payment card account, receives an authorization request for a first purchase transaction, determines that the payment card account is within a threshold amount of the risk management limit, and transmits a warning message to a mobile telephone of the account holder that the risk management limit is imminent. Next, the payment card issuer computer receives a second authorization request for a second purchase transaction, determines that the payment card account now exceeds the risk management limit and that no contact has been received from the account holder, and then suspends the payment card account pending contact from the account holder.
Abstract:
Back-up credentials data is stored for a user. A communication channel is established with a mobile device. A cryptogram is received from the mobile device, such that the cryptogram is relayed by the mobile device from an authentication device that interacted with the mobile device. The authentication device is associated with the user. The cryptogram is verified. In response to the verification of the cryptogram, the stored back-up credentials data is made accessible to the mobile device.
Abstract:
In a payment-enabled smartphone, a shared cardholder verification method (CVM) applet serves a number of mobile payment cardlets. The shared CVM applet validates CVM information input by a user of the smartphone and in response issues a CVM token. The CVM token is passed to a particular one of the mobile payment cardlets that is selected for a current transaction. The selected mobile payment cardlet submits the CVM token back to the shared CVM applet for verification. Upon verifying the CVM token, the shared CVM applet enables the selected mobile payment cardlet to perform the current transaction.
Abstract:
A mobile device includes a housing and an antenna. The mobile device further includes a power-receiving circuit, and power-transmitting circuit, and a short-range communications circuit. The antenna performs multiple functions in that it is shared by the power-receiving circuit, the power-transmitting circuit and the short-range communications circuit. Each of the three circuits is selectively connectable to the antenna. The mobile device is configured to participate in a mobile-to-mobile battery-charge-sharing operation via inductive coupling from mobile device to mobile device.