Abstract:
A settlement terminal includes a card reader, a settlement processing unit including a processor programmed to carry out a settlement process using information acquired through the card reader and a tampering detection process, a storage device in which a first set of programs is stored after encryption by a first key and a second set of programs is stored after encryption by a second key, each set of programs including a first program for operating the card reader, and a second program for carrying out the settlement process. Upon detection of tampering, the processor of the settlement processing unit notifies an external terminal of the tampering and upon receiving an update instruction from the external terminal, updates a current set of programs used for operating the card reader and carrying out the settlement process from the first set to the second set.
Abstract:
A method to provide authentication services to third party vendors by a service provider hosting an authentication, authorization and accounting (AAA) server or a similar device that can authenticate users for some other service. This method enables easy and substantially error-free end-user authentication, which forms the basis for enabling electronic transactions (e.g., web-based) that are less vulnerable to fraud.
Abstract:
A key is securely injected into a POS PIN pad processor in its usual operating environment. In response to entry of a personal identification number (PIN) into a PIN pad, the processor puts the PIN into a PIN block; puts additional random data into the PIN block; and encrypts the entire PIN block using asymmetric cryptography with a public key derived from the injected key residing in the PIN pad processor. The corresponding private key may be held securely and secretly by an acquirer processor for decrypting the PIN block to retrieve the PIN. The encrypted random data defends the PIN against dictionary attacks. Time stamp data and constant data encrypted with the PIN block enables a defense of the PIN against replay attacks and tampering. The method may also include accepting the PIN from a mobile phone in communication with the processor.
Abstract:
A method for generating a personal identification number (PIN) debit child product for use in performing a debit payment transaction with a merchant entity. A payment processing platform receives a user selection of a financial institution made via a merchant payment page and directs the user to authenticate a user identity with the financial institution. The payment processing platform receives a user selection of a core account held with the financial institution, such that the core account provides financial backing for the PIN debit child product. The PIN debit child product is generated that includes a child card number and a virtual PIN associated with the core account. Advantageously, the method provides the ability to make PIN debit transaction on the Internet.
Abstract:
A self-service tanning system and method allows salon owners to offer tanning customization in order to meet the personal needs of various customers and to meet the various FDA regulations associated with each state. The present invention allows salon owners to customize each tanning customer session to prevent over exposure for new patrons, while allowing patrons who are already tanning to tan at a more progressive rate. In addition to tanning customization, the present invention offers built-in safety features, payment options, and networkability.
Abstract:
A system for enhancing security of a personal identification number is configned for performing a method that includes receiving, from a first entity having an input permission, a first data structure into a HSM, wherein the first data structure maps a first many-to-one mapping between a first and a second PIN numeral system. The method also includes determining whether the content of the first data structure is valid, storing the first data structure in the HSM if the first data structure is valid and marking the stored first data structure as inactive. The method further includes activating the first data structure if a second data structure is input into the HSM by a second entity having an activation permission, wherein the first entity is different from the second entity, the first data structure is identical to the second data structure. The method additionally includes converting from the first to the second PIN numeral system responsive to the activated first data structure.
Abstract:
A system and method for facilitating transactions utilizing phrase tokens are provided. Individual entities can be associated with unambiguous transaction phrase tokens, such as multiple word phrases. The transaction phrase tokens are associated with transaction accounts by a service provider such that the entities can complete a transaction without having to exchange transaction account information. In a transaction, a transaction phrase token is offered to an accepting party, which tenders the offered transaction phrase token to the service provider. The service provider processes the offered transaction phrase token according to configuration information specified for the transaction phrase token. The service provider can automatically process the transaction request or request additional information.
Abstract:
A method of conducting secure electronic payments to a payment acquirer using a credit card payment unit, comprising of a smart card, a portable card reader device, a mobile phone, a stand-alone PIN entry device and a payment server. The method is based on eliminating the unsecure keyboard in a mobile phone used for entering personal identification information, and instead use a separate secure PIN entry device which fulfils the EMV Level specification. Since all sensitive payment information, communicated to the payment server from the card reader and the PIN entry device, is encrypted using unique encryption keys an unsecure mobile phone may be used for relaying the communication between the card reader device and the PIN entry device to and from the payment server.
Abstract:
An automated banking machine operates responsive to data read from data bearing records. The data corresponds to user card data received from a cell phone. The machine generates and displays a random number correlated with a time period. The machine user inputs the displayed random number into their phone. A software application in the phone encrypts the selected card data along with the inputted random number. The phone then displays a bar code image containing the encrypted data. The machine includes a bar code reader to read the displayed image. The machine can decrypt the random number and the card data from the read image. The random number is used to verify the current banking transaction session. The process replaces physical insertion of a card yet allows secure input of card data.
Abstract:
An automated banking machine operates responsive to data read from data bearing records. The data corresponds to card data which corresponds to at least one financial account. The record data is read by a reader and compared to stored data to authorize use of the machine. A financial transfer corresponding to the account may be carried out once use is authorized based on correspondence of the record data. A printed record of transactions is printed by the machine. Record data may alternatively be received by a reading device of the machine from a mobile device of a user, such as a cell phone.