Abstract:
A computer readable universal authorization card system including a card having a computer readable portion for conducting communications over a global network and a magnetic stripe for interfacing with card readers is disclosed. Here, the magnetic stripe has a stripe length and a stripe width, the card has a card length and a card width, and the stripe length is shorter than the card length.
Abstract:
A low-cost, secure, reliable, convenient, and efficient way to reduce the rate of fraud by means of using additional PINs/passwords, which are dynamic PINs delivered periodically via different channels, defined by users, with a changing pre-defined by the user periods.
Abstract:
The present invention provides a money card system, method and apparatus that is convenient, easy to use, does not require good or any credit, is useable by individuals having low incomes, is interchangeable with cash, is available in many currencies, can be used in COD transactions, and is safer than cash, checks, money orders, cashier's checks, traveler's checks, ATM cards, credit cards, debit cards, stored-value cards and smart cards. For these individuals, the money card would provide the functionality of cash enhanced with the security of a Personal Identification Number (PIN) or Personal Identification Code (PIC) or other biometric information, such as fingerprint, handprint, voiceprint, iris scan, retina scan, thermal image, electronic/digital signature or any other form of endorsement that may be used to personalize and secure the transaction.
Abstract:
A system for performing electronic transaction comprises:—a human interface module SPED comprising a keypad KP, a display D, a card reader CR, a processing means MP and an internal bus B for connecting these elements,—a hosting means HT connectable to the human interface module SPED through connection means C1, said hosting means comprising a scheduler means ES, a processing means and a memory HTR, communication means CR, and a power supply PS, EPS,—a gateway means VTS connectable to the hosting means HT through a telecommunication network TN, the gateway means VTS being a virtual terminal server
Abstract:
A secure credit card and a method of use of the same is shown. A transactional processing system using the method and the secure credit card of the present invention is also shown. The secure credit card has a first group of numbers or symbols which identify a user, and a second group of numbers or symbols, which may be different from the first group of numbers or symbols, and which represent unique information known only to the user, such information not being placed, or encoded, on the secure credit card in any way, so that it cannot be used in credit card theft and fraud. The position and/or number and/or type of symbols in the second group of symbols, or a combination of these, may be used to indicate to a card reader a unique piece of information (the identified information) to be requested from a user to verify a transaction.
Abstract:
An integrated multi-serviced stored value card system permits and performs integrated telecommunication and financial services. A card affords the features of a traditional calling card plus a wide array of banking services, such as electronic fund transfers between cards and cash withdrawals, and telecommunication features. Stored values from a primary card according to the system are capable of allocating stored value balances to subsidiary or secondary cards for use by authorized subsidiary card users.
Abstract:
Dynamic fee structuring in a stored valued program is provided. One embodiment is a system for implementing a stored value card program, which comprises: a device that provides stored value card services to a user; and a fee structure database for determining an amount of a transaction fee to charge a user for a stored value card service provided by the device.
Abstract:
The method and system of the invention provide a variety of techniques for using a selected alias and a selected personal identification entry (PIE) in conjunction with use of a transaction card, such as a credit card, debit card or stored value card, for example. A suitable number or other identification parameter is selected by the account-holder as an alias. The account-holder is then required to choose a PIE for security purposes. The alias is linked to the account-holder's credit card number via a database. When the account-holder enters into a transaction with a merchant, the physical card need not be present. The account-holder simply provides his or her alias and then the PIE. This can be done at any point of sale such as a store, catalog telephone order, or over the Internet. The alias and PIE are entered and authorization is returned from the credit card company.
Abstract:
A technique for on-line Personal Identification Number (PIN) verification uses polynomial hiding. The technique comprises enrolling a smart card, including initializing a smart card with an entity-selected PIN hidden in a polynomial over a finite field. The initialization polynomial is a function of the PIN, an entity-identifier, and a random number. The random number and the PIN are discarded after smart card initialization.