US20070034700A1 - Electronic cards and methods for making same - Google Patents
Electronic cards and methods for making same Download PDFInfo
- Publication number
- US20070034700A1 US20070034700A1 US11/413,595 US41359506A US2007034700A1 US 20070034700 A1 US20070034700 A1 US 20070034700A1 US 41359506 A US41359506 A US 41359506A US 2007034700 A1 US2007034700 A1 US 2007034700A1
- Authority
- US
- United States
- Prior art keywords
- processor
- card
- recited
- electronic card
- battery
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/077—Constructional details, e.g. mounting of circuits in the carrier
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
- B42D25/20—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof characterised by a particular use or purpose
- B42D25/21—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof characterised by a particular use or purpose for multiple purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/0701—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips at least one of the integrated circuit chips comprising an arrangement for power management
- G06K19/0702—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips at least one of the integrated circuit chips comprising an arrangement for power management the arrangement including a battery
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/077—Constructional details, e.g. mounting of circuits in the carrier
- G06K19/0772—Physical layout of the record carrier
- G06K19/07722—Physical layout of the record carrier the record carrier being multilayered, e.g. laminated sheets
Definitions
- Exemplary embodiments disclosed herein pertain to electronic cards. More particularly, exemplary embodiments disclosed herein pertain to secure electronic cards and methods for making same.
- transaction cards Conventional credit cards, debit cards and other financial transaction cards (hereafter “transaction cards” ) have a typically plastic body upon which is embossed a 16 digit account number and other data.
- a magnetic strip usually referred to as a “stripe” , is adhered to the back of the card.
- the stripe typically magnetically encodes the account number and/or other data.
- a stripe is typically a magnetic tape material much like the magnetic tape used in digital data recording.
- the stripe material typically includes a magnetic oxide and binder compounds that provide the magnetic stripe with data encoding capabilities and physical durability characteristics needed for transaction card applications. While these magnetic tape components have been optimized for transaction card applications the magnetic tape used for the magnetic stripe on a transaction card is very similar to standard digital data recording tape.
- Low coercivity LiCo
- HiCo high coercivity
- Coercivity measures how difficult it is to magnetize or demagnetize the stripe and is measured in oersteds.
- Low coercivity magnetic stripes are typically 300 oersteds and high coercivity magnetic stripes are above 2700 oersteds.
- a high coercivity magnetic stripe requires about three times more energy to encode or erase than does a low coercivity magnetic stripe.
- Many transaction card applications have gone to HiCo magnetic stripes because it is much harder to accidentally erase the encoded data than on LoCo magnetic stripes. This provides greater durability and readability of the encoded data in use for many applications.
- the encoding of the magnetic stripe on a transaction card typically follows standard digital recording techniques but is again optimized for transaction card applications.
- the encoded data takes the form of zones of magnetization in the magnetic stripe with alternate magnetic polarities.
- the north and south poles, of the magnetized zones alternate in direction providing an encoding technique that can represent the binary “zeroes” and “ones” of a binary digital code.
- the standard encoding technique for the magnetic stripe on a transaction card is the F2F (Aiken double frequency) code where a binary zero is represented by a long magnetized zone and a binary one is represented by two magnetized zones, each one half the length of the zero—a long magnetized zone.
- the exact length of these zones of magnetization is determined by how much data needs to be recorded on the magnetic stripe.
- Track 2 data is encoded at 75 bits per inch or 75 long zero zones per inch—International Standards Organization (ISO) specifications 7811-2/6. That equates to 0.01333 inches in length for the zero magnetized zone.
- the binary one would then be two zones of one half that length or 0.00666 inches in length.
- Other lengths can be obtained for different data densities such as the 210 bits per inch used in Track 1 and Track 2 of the magnetic stripe.
- Reading the encoded data in the magnetic stripe is accomplished by capturing the magnetic flux field extending from the magnetized zones in the stripe by a magnetic read head.
- the read head converts the changing magnetic flux in the coil of the read head to a voltage pattern mirroring the magnetization zones of the encoded data.
- the voltage pattern can then be translated by the decoding electronics into the binary zeroes and ones of the data as is well known in the industry.
- a magnetic stripe encoder consists of a magnetic write head and an electronic current drive circuit capable of magnetizing the magnetic oxide in the stripe to full magnetization (saturation).
- the encoding current in the write head is capable of alternating direction thereby producing alternating zones of magnetization direction in the stripe that will form the data encoding of the magnetic stripe.
- Transaction cards typically have their stripes encoded with account and/or other information in commercial magnetic stripe encoders prior to delivery to the consumer.
- the stripe is static and is not encrypted, allowing transaction card thieves to “steal”, in the virtual sense, the data from the stripe and use it for unauthorized transactions. This is because with conventional magnetic stripe cards the transaction data is “exposed”, i.e. not encrypted. If “picked off”, the data can be used indistinguishably in a counterfeit transaction card. As such, a counterfeit transaction card can be freely used by a thief until it is cancelled.
- MagnePrint® is a card security technology that can detect “skimmed” or magnetically altered counterfeit cards. Just as fingerprints can uniquely identify human beings, MagnePrint® can uniquely identify magstripe cards. MagnePrint® technology was discovered at Washington University in St. Louis, Mo., USA. MagTek refined the technology, to bring it to practical use, and has an exclusive license to market this technology. However, MagnePrint technology requires modified card readers for its implementation, which would render obsolete millions of legacy card readers.
- conventional transaction cards are also quite limited in storage capacity. That is, conventional cards are limited to their stripe for storage. As such, conventional cards are not electronic cards, e.g. cards with embedded electronics such as an on-board processor and/or digital memory, and are very limited in their functionality.
- Smart Card An example of an electronic card is the so-called “Smart Card” , which includes both an on-board processor and digital memory. By providing an on-board electronics, a Smart Card can implement security protocols such as encryption, store large amounts of user information, etc.
- a common standard for Smart Cards is referred to as the ISO 7816 standard.
- a Smart Card is provided with an electrical interface including a number of electrically conductive and externally accessible contact pads which are coupled to an embedded secure processor.
- the Smart Card is inserted into a Smart Card reader which makes electrical contact with the contact pads to provide power to and communications with the secure processor.
- Smart Cards are not provided with embedded power, e.g. a battery.
- Smart cards can also include a conventional stripe which, in the prior art, does not in any way interact with the secure processor.
- Smart cards using memory chips and microprocessor chips were first introduced to provide increased data storage and to guard against some of the types of fraud found in magnetic stripe transaction cards.
- the Smart Cards do reduce some types of fraud but the cards are much more expensive than a magnetic stripe transaction card and the magnetic stripe readers at the point-of-transaction had to be replaced with readers that could read the data storage chip and the magnetic stripe.
- Smart Cards While broadly adopted abroad, Smart Cards have not been extensively adopted in the U.S., as noted above. As noted above, a major reason for this is the investment made by millions of merchants in legacy card readers, which cannot communicate with the secure processors of Smart Cards. Also, Smart Cards conforming to the ISO 7816 standard suffer from their own limitations, including severely restricted I/O, an inability to provide “smart” transactions with legacy card readers, etc.
- Another limitation of smart cards in general is that they lack the ability to interact with a user when they are not in contact with a smart card reader. This limitation is due to the fact that the smart card of the prior art does not have an on-board power supply. Thus the electronic components lie dormant and do not allow for interaction. This limitation prevents a myriad of features, such as account selection, or a security feature to lock the card, etc.
- stripe emulator will refer to a transaction card where data transmitted to a legacy card reader is under the control of the general processor.
- This approach will be referred to herein as an “emulator card”, which is one form of an electronic card.
- Emulator cards potentially have a number of distinct advantages over conventional credit cards. For one, a single card can emulate a number of different transaction cards, greatly reducing the bulk in one's wallet. For example, an emulator card can emulate a Visa card, a MasterCard, and an ATM card. Also, since the emulator card includes a processor, it is possible to implement additional functionality, such as security functions.
- emulator cards too, have their limitations. For one, since general processors are used the security level of the card is reduced. For example, a hacker could potentially obtain data stored in unsecured electronic memory. Also, emulator cards do not address Smart Card protocols, as they are designed to work with legacy card readers. For example, as with conventional credit cards, data flows from the emulator card to the legacy card reader, and not vice versa. Still further, the information that can be provided by the emulator card is limited to the amount of information that a conventional stripe can hold and that a legacy card reader can read.
- Electronic cards have been used for security purposes to allow, for example, personnel to high security areas of a building (“access control”). Electronic cards can therefore be used for a variety of purposes where the identity and/or status of the bearer needs to be verified by a physical card or “token.”
- Electronic cards tend to be relatively expensive compared to conventional, non-electronic, magnetic stripe cards. This is due, in part, to the cost of the electronic components and is due, in part, to the complexity of manufacture of electronic cards. For example, care must be taken during lamination of electronic cards that the heat and/or pressure do not damage the sensitive electronic components. Also, electronic cards should remain thin, flexible and preferably of the same dimensions as conventional cards. As another example, stripe emulators tend to be difficult to design and manufacture such that they work with legacy readers.
- an electronic card includes a thin, flat digital processor, a thin, flat electrochemical battery, a communications port, a first flexible cover, and a second flexible cover.
- the digital processor preferably has a first substantially planar surface and a substantially opposing second substantially planar surface, wherein at least one of the first surface, the second surface, and a cross-section of the processor define a maximum surface area.
- the battery preferably has a first substantially planar surface and a substantially opposing second substantially planar surface, wherein at least one of the first surface, the second surface, and a cross-section of the processor define a maximum surface area, the battery being positioned substantially co-planar with the processor and capable of powering the processor.
- the communications port is coupled to the processor.
- Each of the first flexible cover and the opposing second flexible cover have a surface area greater than the combined maximum surface areas of the digital processor and the battery.
- the processor and the battery are sandwiched between and enclosed by the first flexible cover and the second flexible cover.
- the electronic card includes a flexible circuit board.
- at least one of the first cover and the second cover are contoured to fit over the circuit board, processor and battery.
- one or more switches are coupled to the circuit board.
- one or more indicators are coupled to the circuit board.
- the processor is coupled to the circuit board in a flip-chip fashion.
- the processor is coupled to the circuit board with bonded wire.
- the bonded wire has a low loop height.
- the processor is encapsulated against the printed circuit board.
- the battery includes two or more batteries.
- the battery is not rechargeable.
- the battery is rechargeable.
- the battery includes a rechargeable battery and a non-rechargeable battery.
- the battery is part of a power supply including a power filter.
- a method for making an electronic card includes making a flexible printed circuit board, attaching at least one processor to the printed circuit board, coupling at least one battery to the printed circuit board, encapsulating at least the one processor, making a top cover and a bottom cover; and sandwiching the printed circuit board, the processor and the battery between the top cover and the bottom cover.
- an enhanced Smart Card includes a card body provided with an externally accessible card interface including a signal port, a power port, and a ground port, a secure processor disposed at least partially within the card body and coupled to the signal port, the power port, and the ground port, a general processor disposed at least partially within the card body, the general processor being coupled to a power source disposed at least partially within the card body and being operative to provide power to and communicate with the secure processor when the secure processor is being used in an enhanced Smart Card mode; and a non-contact communications port coupled to at least one of the secure processor and the general processor.
- a secure transaction card includes a card body, a secure processor disposed at least partially within the card body, a general processor disposed at least partially within the card body, a power source disposed at least partially within the card body; and a non-contact communications port coupled to at least one of the secure processor and the general processor.
- a swipe emulating broadcaster system includes a coil having an elongated core material and a winding having a plurality of turns around the core material; and a signal generator having a broadcaster driver signal coupled to the coil such that the coil provides a dynamic magnetic field which emulates the swiping of a magnetic stripe transaction card past a read head of a card reader.
- the signal generator includes a processor having a digital output and a signal processing circuit which converts the digital output to the broadcaster driver signal.
- the signal generator is a digital signal generator.
- the coil is one of a plurality of coils.
- at least one of the plurality of coils is a track coil.
- at least one of the plurality of coils is a cancellation coil.
- the coil includes a wire wound around the core.
- the coil includes a wire formed around the core by a process including at least the deposition of conductive material and the etching of the conductive material.
- a method for creating a low-loop bonding for thin profile applications includes attaching a first surface of a fabricated semiconductor die to a first surface of a substrate having a plurality of substrate contact pads, such that a second surface of the die which opposes the first surface is exposed to provide access to a plurality of die contact pads, wire bonding a first end of a wire to a substrate contact pad; and wire bonding a second end of the wire to a die contact pad, such that the loop height of the wire is no greater that 5 mils above the second surface of the die, and no greater than 20 mils above the first surface of the substrate.
- FIG. 1 is a top plan view of an exemplary electronic card
- FIG. 2 is a bottom plan view of the exemplary electronic card of FIG. 1 ;
- FIG. 3 is a block diagram of an exemplary circuit for the electronic card illustrated in FIGS. 1 and 2 ;
- FIG. 4 is a block diagram of an exemplary secure processor of FIG. 3 ;
- FIG. 5 is a schematic diagram of an exemplary embodiment of a general processor of FIG. 3 and exemplary associated I/O devices and subsystems;
- FIG. 6 is a top plan view of an exemplary printed circuit (PC) board of an exemplary electronic card
- FIG. 7 is a bottom plan view of the PC board of FIG. 6 ;
- FIG. 8 is an exploded, partially cross-sectional view of an exemplary electronic card
- FIG. 9 is partially cross-sectional view of the electronic card of FIG. 8 after it has been assembled
- FIG. 10 illustrates an exemplary wire bond connection between a processor and a PC board
- FIG. 11 illustrates an exemplary broadcaster slot with alignment marks
- FIG. 12 is a top plan view of a broadcaster before it is inserted into the broadcaster slot illustrated in FIG. 11 ;
- FIG. 13 illustrates an exemplary broadcaster coil
- FIGS. 14-16 illustrate exemplary winding patterns of the broadcaster coil of FIG. 13 ;
- FIG. 17 is a block diagram of an alternate embodiment, set forth by way of example and not limitation, of a broadcaster assembly
- FIG. 18 is a flow-diagram of a manufacturing process, set forth by way of example and not limitation, for producing electronic cards
- FIG. 19 is a flow-diagram illustrating an exemplary Phase I manufacturing process 168 of FIG. 18 in greater detail
- FIG. 20 is a flow-diagram illustrating an exemplary programming process 180 of FIG. 19 in greater detail
- FIG. 21 is a flow-diagram illustrating an exemplary “load software and/or data into chip” process 200 of FIG. 20 in greater detail;
- FIG. 22 is a flow-diagram illustrating an exemplary Phase II manufacturing process 170 of FIG. 18 in greater detail.
- FIG. 23 is a flow-diagram illustrating an exemplary Phase III manufacturing process 172 of FIG. 18 in greater detail.
- FIG. 1 is an embodiment of an electronic card 10 , set forth by way of example but not limitation, which includes a card body 11 .
- the card body may be made from a thermoplastic material, such as polyvinylchloride (PVC) in exemplary embodiments, but other materials with sufficient flexibility and durability are also suitable.
- PVC polyvinylchloride
- other thermoplastics can be used, as well as thin metal (e.g. stainless steel).
- a conductive material is used for the card body 11 , adequate electrical insulation from the electrical and/or electronic components must be maintained.
- Still other materials, such as resins, carbon fibers, organic and non-organic materials, etc. are also suitable for various alternate embodiments.
- card body 11 can be made from any suitable material which is strong enough and durable enough to be used as a transaction card.
- the exemplary electronic card 10 has a front surface 12 which is provided with an electrical interface 16 .
- This is one non-limiting example of a communication port for the electronic card 10 .
- the interface 16 may be eliminated, or additional communication ports may be provided.
- the illustrated electrical interface 16 includes a number of contact pads which, in this example, are formed in a configuration which is compliant with the International Standards Organization “Smart Card” standard ISO 7816, incorporated herein by reference.
- the electronic card is usable as a legacy mode Smart Card.
- Also shown on the front surface 12 is an institution identifier 18 , an institution number 20 , an account number 22 , and a client name 24 .
- the account number is preferably embossed on the electronic card 10 to provide raised numerals for credit card imprint machines.
- FIG. 2 illustrates a back surface 14 of the exemplary electronic card 10 .
- a magnetic stripe emulator 26 is provided on the back surface 14 which can be used to communicate with legacy magnetic stripe readers of the prior art.
- the stripe emulator 26 is therefore another non-limiting example of a communications port.
- the electronic card may also have, for example, an on/off button 28 , an “on” indicator 30 , and an “off” indicator 32 .
- “on” indicator 30 may be a green LED and the “off” indicator 32 may be a red LED.
- Also seen on the exemplary card back 14 are a plurality of account interfaces 34 .
- Each account interface 34 preferably has account indicator LED 36 and an account selector switch 38 .
- Each account interface 34 may also have, for example, printed information identifying the account and expiration date.
- Back surface 14 also has, in this example, instructions 40 , an institution identifier 41 , a signature box 42 , and various other printed information.
- FIG. 3 is a block diagram, presented by way of example but not limitation, of the circuitry of exemplary electronic card 10 .
- the electronic card 10 includes a secure processor 44 , a general processor 52 , and a magnetic stripe emulator 64 .
- both the secure processor 44 and the general processor 52 are coupled to the ISO 7816 interface 16 by a bus 48 .
- Secure processor 44 is preferably a commercially available Smart Card chip which has various tamper resistant properties such as a secure cryptographic function and tamper resistant storage 46 .
- An exemplary embodiment of secure processor 44 given by way of example and not limitation, is a P8WE6032 processor manufactured by Phillips of Germany. Similar devices are manufactured by Hitachi, Infineon, Toshiba, ST and others. As noted previously, in this example secure processor 44 is connected electrically to the interface 16 by a bus 48 .
- General processor 52 is, in this example, also connected to the bus 48 and, therefore, to both the secure processor 44 and the interface 16 . Additionally, in this example, the general processor 52 is coupled to the secure processor 44 by an “I/O 2” line 50 . In the current exemplary embodiment, memory 54 is coupled to the general processor 52 . General processor 52 is also coupled, in this example, to power source 56 , display 58 , switches 60 , and other I/O 62 .
- general processor 52 communicates with the secure processor 44 in an IS 0 7816 compliant mode over the bus 48 .
- no other connection to the secure processor is required (e.g. the I/O 2 line 50 connection can be omitted).
- Power source 56 is preferably an electrochemical battery disposed within the card body 11 . It may be either a non-rechargeable battery or a rechargeable battery. If power source 56 is a non-rechargeable battery, it should have sufficient capacity to power the electronic card 10 for its useful life. If the power source 56 is rechargeable, the electronic card 10 may be used indefinitely.
- a rechargeable battery may, for example, be recharged through interface 16 , by magnetic induction (e.g. through an induction coil or the broadcaster coils), a photovoltaic cell embedded in body 11 , a piezoelectric material embedded in the electronic card 10 , another electrical connector, kinetic recharging mechanisms (e.g. magnets and coils), or other suitable mechanisms. For example, in some situations a rectification of ambient RF energy may provide sufficient energy to power the electronic card 10 , recharge a battery, or store supplemental charge in, for example, a capacitor.
- Alternative exemplary embodiments include both a primary and a secondary battery disposed within the card body.
- a non-rechargeable battery could serve as a primary battery and a rechargeable battery could serve as a secondary battery, or vice versa.
- the power source 56 is embedded in the electronic card 10 , it must be thin. This is because the electronic card 10 , for many applications, must be able to bend within certain ranges.
- an electronic card 10 used for transaction card applications must conform to the ISO 7810 standard, which is 85.60 mm ( ⁇ 3370 mils) wide, 53.98 mm ( ⁇ 2125 mils) tall, and 0.76 mm ( ⁇ 30 mils) thick. This is often referred to as the “CR80” format, which is roughly 31 ⁇ 2′′ by 2′′, and fits well into a standard wallet.
- other formats can also be used which are larger, small, or differently configured than the CR80 format.
- an electronic card of smaller than CR80 dimensions can be made to fit on, for example, a keychain.
- the cards must be somewhat flexible so that they can be used in, for example, insertion-type legacy card readers, so it is also preferable that the power source be somewhat flexible if it is relatively large in surface area. However, flexibility is not a problem if the battery is relatively small in surface area, or if several smaller batteries are coupled together to form the power source 56 . Also, it is important that the power source 56 can withstand heat and/or pressure if, for example, heat and/or pressure lamination techniques are used to manufacture the electronic card 10 .
- Suitable batteries are manufactured by Varta Microbattery of Ellwangen, Germany and Solicore of Lakeland, Fla.
- the batteries are preferably electrochemical in nature, although other types of batteries or capacitive storage devices can also be used.
- Suitable electrochemical batteries can include, by way of example but not limitation, Li-polymer, Ni-MH, lithium, lithium-ion, alkaline, etc.
- General processor 52 may be, for example, a PIC 16 or PIC 18 microcontroller. In an alternative embodiment, general processor 52 may comprise an ASIC chip. In still further embodiments, general processor may be any form of logic (e.g. a state machine, analog processor, etc.) which performs the desired processing functions.
- logic e.g. a state machine, analog processor, etc.
- Display 58 may include, for example, LED devices as disclosed previously. As another non-limiting example, display 58 is may comprise an LCD display. The LCD display is preferably flexible if it is of a relatively large surface area. Switches 60 can be any form of electrical switches or devices which provides the functionality of switches to provide inputs or controls for the electronic card 10 . The processor 52 may, for example, provide software debouncing algorithms with respect to such switches. Other I/O 62 may comprise any number of alternative I/O subsystems. These may include, by way of example and not limitation, audio, tactile, RF, IR, optical, keyboard, biometric I/O or other I/O. The secure processor 44 may also provide I/O by RF or IR in accordance with ISO 7816 standards.
- Magnetic stripe emulator 64 is also coupled to general processor 52 , in this exemplary embodiment, which allows the electronic card 10 to be used in a mode which emulates a magnetic stripe card of the prior art.
- Magnetic stripe emulator 64 in this non-limiting example, is comprised of a buffering circuit 66 , which converts digital output from general processor 52 into a wave form appropriate for magnetic stripe emulation.
- buffering circuit 66 includes a conversion circuit which is typically implemented as an RC network. Along with the broadcaster, the RC network forms an RCL network to condition the waveform. RC networks and their equivalents are well known to those skilled in the art.
- magnetic stripe emulator 64 further includes a broadcaster 68 .
- broadcaster refers to one or more inductive coils which are used to “broadcast” a fluctuating magnetic signal which emulates the movement (“swipe”) of a transaction card's stripe past the read head of a magnetic card reader.
- Broadcaster 68 may be electrically coupled to buffering circuit 66 and preferably receives two tracks of signal which are converted by broadcaster 68 into magnetic impulses for magnetic stripe emulation. Alternative embodiments include one, three, four or more tracks. Broadcaster 68 may include one or more electrical coils to convert electrical signal into magnetic impulses.
- Broadcaster 68 of this example may further include one or more sensors 70 , which are electrically coupled to general processor 52 . These sensors are used to signal to general processor 52 that the physical act of swiping the card body 10 through a legacy card reader has commenced. Sensors 70 also communicate to general processor 52 when contact is lost with the magnetic stripe reader 72 , which receives and interprets magnetic flux impulses from the broadcaster.
- the electronic card 10 of this example includes an electrical interface 16 .
- electrical connectors 16 are used in a manner compliant with ISO 7816 to communicate with an ISO 7816 reader device 74 . That is, electronic card 10 , in this example, can be used as a legacy Smart Card or as a legacy magnetic stripe transaction card.
- secure processor 44 When used in a legacy Smart Card mode, secure processor 44 is powered by bus 48 from a Smart Card reader device 74 .
- the reader device 74 can be used to program and personalize secure processor 44 with various information including, by way of example and not limitation, firmware code, account numbers, cryptographic keys, PIN numbers, etc. This information, once loaded into secure processor 44 , prepares secure processor 44 for an operational mode which no longer requires the use of reader device 74 .
- secure processor 44 communicates with general processor 52 and provides services such as cryptographic functions and the dynamic generation of authentication information which is used to communicate via general processor 52 and magnetic stripe emulator 64 with magnetic stripe reader 72 . Also in this example, the authentication code may be used only once for a single transaction. Subsequent transactions require new authentication codes to be generated. Secure processor 44 can also send account information and/or DACs via RF and IR.
- the card body 10 continues to be used with reader device 74 and also with magnetic stripe reader device 72 .
- the card detects the mode in which it is being used and automatically switches the usage of bus 48 appropriately for the detected mode of operation. This is achieved in optional bus arbitrator 76 .
- Optional bus arbitrator 76 can detect when it is being used with reader device 74 because power is provided by reader device 74 via electrical connectors 16 to bus 48 .
- optional bus arbitrator 76 can detect that power is being provided by general processor 52 and switch to the corresponding mode of operation, which services general processor 52 and the various I/O devices connected thereto.
- optional bus arbitrator 76 allows for the dynamic communication of both general processor 52 and secure processor 44 with each other respectively, and with reader device 74 . This requires bus arbitration logic which is well known to those skilled in the art.
- general processor 52 is interposed between secure processor 44 and electrical connectors 16 . In this alternative embodiment, general processor 52 acts as a “go-between” or a “front end” for secure processor 44 .
- an exemplary non-contact communications port 77 may be included as an alternative to or in addition to exemplary communication ports 16 and 64 . That is, non-contact communications port 77 may be provided to allow communications without physical contact with a reader.
- Non-contact communications port 77 can be a radio frequency communications port, IR communications port, or any other form of communications which does not require physical contact.
- contact communications ports such as communications port 16 and broadcaster. That is, these embodiments are described by way of example and not limitation.
- a standard for radio frequency (“RF”) communication for Smart Card communications is ISO/IEC 14443, dated 2001, incorporated herein by reference. It includes an antenna and RF driver characteristics and defines two types of contactless cards (“A” and “B”), allows for communications at distances up to 10 cm. There have been proposals for ISO 14443 types C, D, E and F that have yet to complete the standards process. An alternative standard for contactless smart cards is ISO 15693, which allows communications at distances up to 50 cm.
- FIG. 4 illustrates exemplary secure processor 44 of FIG. 3 in greater detail.
- Secure processor 44 of this example is an ISO 7816 compliant microcontroller comprising power switch 78 , security sensors 80 , reset generator 82 , clock input filter 84 , CPU 86 , interrupt system 88 , and internal bus 90 .
- tamper resistant storage 46 which may be comprised of RAM, EEPROM, etc.
- co-processor 92 which handles encryption and decryption.
- the co-processor 92 performs TRIPLE-DES encryption and decryption.
- timers 94 and ROM 96 are also coupled to bus 90 , which is used, for example, for storing firmware for secure processor 44 , UART 98 , which is used for serial communications. Also connected to bus 90 is I/O subsystem 100 and random number generator 102 .
- Secure processors 44 as described above are commercially available from a variety of sources including Philips, Hitachi, Infineon, Toshiba, ST, and others.
- a suitable secure processor 44 for use in the disclosed exemplary embodiment is the model P8WE6032 processor made by Philips of Germany.
- the secure processor 44 can be replaced by a general processor.
- FIG. 5 is a schematic of general processor 52 coupled its associated I/O devices subsystems set forth by way of example and not limitation.
- general processor 52 may be a PIC 16 or PIC 18 microcontroller.
- the general processor 52 can be a Microchip LF 77 PIC 16 or Microchip LF 4530 PIC 18. Alternatives are provided bye Texas Instruments, Atmel, and others. Other general processors may also be used and, in certain alternate embodiments, the general processor 52 can also be a secure processor.
- two electrochemical batteries 121 A and 121 B are shown.
- batteries of suitable chemistries and dimensions are commercially available from, for example, Varta Microbattery GmbH.
- non-rechargeable battery 121 A serves as a primary battery
- rechargeable battery 121 B serves as a secondary battery.
- Battery 121 B may be coupled to a recharging apparatus 122 , which is shown here as an RF power source.
- a recharging apparatus 122 which is shown here as an RF power source.
- the induced current is rectified prior to being applied to the battery 121 B.
- there are a number of other suitable recharging apparatus that will be apparent to those skilled in the art.
- capacitor assembly 124 is provided in order to provide a smooth source of power without peaks or power dropouts.
- the capacitor assembly can include one or more capacitors, as illustrated.
- Capacitor assembly 124 may also be used to smooth the power from a rectifier which may be present in recharging apparatus 122 .
- Battery 121 A, battery 121 B, recharging apparatus 122 , and capacitor assembly 124 are all part of power source 56 of FIG. 3 in this exemplary embodiment.
- One or more capacitors can also be used as a charge storage device. That is, “super capacitor” having a sufficiently high capacitance can significantly supplement the current provided by the electrochemical battery in certain embodiments. For example, a capacitance range of about 1 uF+ ⁇ 10% @ 6.3v is suitable in some embodiments to serve as a super capacitor.
- This relatively large capacitor assembly 124 can be conveniently accomplished, for example, by using ten 0.1 uF capacitors connected parallel in order to reduce the size and height of the capacitor.
- a temporary port 125 may be provided to assist in the manufacturing process.
- Temporary port 125 may be used, for example, to load data and programs into general processor 52 and associated EEPROM as well as secure processor 44 and its associated EEPROM.
- Components 123 may be provided to ensure that the electrical connections to general processor 52 have appropriate electrical characteristics, are free of power spikes or power dropouts, etc.
- General processor 52 is, in the present example, connected to a number of switches including on/off switch 28 and account selector switches 38 . Also connected to general processor 52 are a number of light emitting diodes (“LEDs”) including a “power-on” indicator 30 , a “power-off” indicator 32 , and “account-on” indicators 36 . These various LEDs and switches comprise a human/computer interface with the electronic card 10 . Of course, there are many alternates or additions to the electronic card 10 and to devices communicating with the electronic card 10 which are also helpful human/computer interfaces. By way of further example but not limitation, the electronic card 10 may include an LCD screen (with or without a touch panel), audio I/O, voice recognition, and various other alternatives that will be apparent to those of skill in the art.
- an RC buffering circuit 66 is coupled to general processor 52 and converts (in conjunction with the broadcaster 68 and/or other components) square wave type signals emanating from general processor 52 into wave forms which emulate the magnetic signals (“dynamic magnetic flux”) provided by a magnetic stripe transaction card passing through a reader. Wave forms are communicated electrically to broadcaster 68 which converts the electrical signals into a dynamic magnetic field which simulates the passing of a card with a magnetic stripe through a magnetic stripe reader.
- the electronic card 10 may be moving or stationary, and the varying magnetic field broadcasted by the broadcaster 68 will emulate the varying magnetic field created by a magnetic stripe of a conventional transaction card moving past a read head. The magnetic signal created by the broadcaster therefore tends to be substantially uniform along its length.
- Sensors 70 provide signals to general processor 52 to indicate that the card has made physical contact with the reader. Sensors 70 may take various forms including physical switches, pressure sensors or other alternatives which will be apparent to those of skill in the art. Broadcaster 68 achieves its waveform subsequent to the activation of one or more sensors 70 .
- the broadcaster 68 includes a “track one” coil 128 , a “track two” coil 130 , a “track one cancellation” coil 132 and a “track two cancellation” coil 134 .
- the track one coil 128 and the track two coil 130 are preferably positioned on the card for optimal contact with magnetic read head of magnetic stripe reader device 72 (see FIG. 3 ). That is, the track one coil 128 is preferably positioned equidistant from and interposed between the track two coil 130 and the track two cancellation coil 134 .
- the track two cancellation coil 134 is provided to “cancel” this “cross talk” effect.
- “cancel” it is meant that the cross talk is at least significantly reduced.
- the magnetic field generated by the track two cancellation coil 134 is the inverse of that of the track two coil 130 thus reduces the effect of the track two coil 130 magnetic field of track one coil 128 .
- the track two coil 130 is, in this example, equidistant from and interposed between track one coil 128 and track one cancellation coil 132 . Reduction of the cross talk effect of the track one coil 128 is provided by the track one cancellation coil 132 .
- the broadcaster coils 128 - 134 and sensors 70 comprise broadcaster 68 in this exemplary embodiment.
- cancellation coils 134 and 132 are not provided, but rather, the electrical signals provided to these coils are modified in such a manner that the interfering magnetic fields provide appropriate magnetic input to magnetic stripe reader device 72 .
- This may be achieved through the use of an ASIC, digital signal processor (DSP), or by other instrumentalities.
- DSP digital signal processor
- the positions of these two broadcaster coils 126 may be offset from their positions in the previously described embodiment to provide the appropriate effect.
- cancellation can be achieved through mechanical shielding with nano materials that could shield the broadcast data between the two adjacent coils.
- a digitally synthesized signal may be applied to the broadcaster 68 which could reduce or eliminate the need for signal conditioning circuitry such as the RC circuit and/or for the need for cancellation coils.
- the digitally synthesized signal may be accomplished, for example, in the general processor 52 , in a DSP, or in other circuitry, as will be appreciated by those skilled in the art.
- FIG. 6 is a top plan view of an exemplary printed circuit (PC) board 136 .
- PC board 136 is a “flex” board so that the electronic card 10 is compliant with the aforementioned ISO 7810 standard for flexibility.
- PC board 136 is provided with conductive traces, such as traces 137 , and supports various electronic components such as processors 44 and 52 .
- the PC board 36 also provides space for the broadcaster 66 and one or more electrochemical batteries 121 . This exemplary embodiment is provided by way of example and not limitation.
- the thickness (or height, when the card is taken in cross-section) for an electronic card 10 made to ISO 7810 standard dimensions is only about 30 mils. Therefore, it is important that the various internal components of the electronic card 10 be thin, flat, and substantially coplanar.
- the digital processor 52 should be thin and flat, with a first substantially planar surface and a substantially opposing second substantially planar surface. It should also define a first maximum surface area.
- the electrochemical battery 121 should have a first substantially planar surface and as substantially opposing second substantially planar surface, and should define a second maximum surface area.
- a theoretical plane through the center of the digital processor 52 should be substantially coplanar with a theoretical plane through the center of battery 121 so that the desired thinness of the electronic card 10 may be achieved.
- substantially is used herein to mean approximately.
- a substantially planar surface is at least approximately flat. Minor imperfections, steps, bumps or curvatures to the major surfaces are still considered to be “substantially planar”, and do not have to be applied to the entire surface. “Substantially opposing surfaces” are generally facing each other and are at least approximately parallel.
- substantially co-planar it is meant that theoretical center planes are at least close together and approximately parallel.
- the center plane of processor 52 could be above or below the center plane of battery 121 and the two components could still be considered “substantially co-planar” as long as the desired thinness of the electronic card 10 can be maintained.
- the processor 52 and battery 121 can still be considered coplanar as long as there is any plane generally parallel to the major surfaces of these components which intersects both of the components. If, for example, the battery 121 is 16 mils high and the processor 52 is 10 mils high in cross section, the center planes of the components could be separated by as much as 8 mils and they would still be considered to be “substantially co-planar.”
- FIG. 7 is a bottom plan view of exemplary PC board 136 .
- PC board 136 is again provided with a number of traces 137 , as well as space for the broadcaster 66 and batteries 121 .
- interface 16 which is geometrically positioned to coincide with the position of secure processor 44 .
- PC board 136 may be, for example, a multilayer PC board.
- the top of the PC board 136 as seen in FIG. 6 may be a first or top layer
- the bottom of the PC board as seen in FIG. 7 may be a second or bottom layer.
- the two layers may be adhered together, or there may be other intermediate layers.
- Each layer includes an insulating substrate made, for example, from a PVC material, and may include conductive traces, pads, and other structures.
- the PC board be flexible to help the electronic card 10 meet the ISO 7810 standards for flexibility.
- FIG. 8 is an exploded, partially cross-sectional view of electronic card 10 .
- a bottom cover 140 has, in this example, a maximum height of about 25 mils. It should be noted that the bottom cover 140 is contoured on its upper surface 141 to fit the contours of the PC board, battery, and/or components attached to the bottom of the PC board or the like.
- the PC board 136 in this example, has a height of about 6 mils, which makes it thin and flexible.
- General processor 52 is shown mounted on PC board 136 and encapsulated by material 144 (e.g. an epoxy encapsulant). Also shown is secure processor 44 similarly encapsulated by material 144 . Also mounted on PC board 136 are the various components of battery 121 .
- an exemplary embodiment of battery 121 has a height of 16 mils.
- broadcaster 68 which coincides laterally with battery 121 in this embodiment and thus occupies the overlapping space in this cross-section diagram.
- Broadcaster 68 as shown in this exemplary embodiment has a height of about 20 mils.
- Also mounted PC board 136 are account selector switches 38 , “on” indicator 30 , and “off” indicator 32 .
- Account indicators 34 coincide laterally with on indicator 30 and, therefore, occupy overlapping space in this cross-section view.
- Cover 146 is shown with a height of about 5 mils. When assembled, the electric card 30 is therefore approximately 30 mils, which is ISO 7810 compliant.
- the exemplary embodiments shown in FIG. 8 are given by way of example and not limitation, and dimensions can vary, as will be appreciated by those of skill in the art.
- FIG. 9 is a partial cross-sectional view of electronic card 10 after it has been assembled.
- the various exemplary components are shown with the various layers in compact form as with a finished electronic card 10 .
- Covers 140 and 146 enclose and protect the electrical and electronic circuitry within the card.
- an epoxy adhesive 147 is used to encapsulate the electrical and electronic components (other than those which must be exposed) and to hold the assembly together.
- the covers 140 and 146 may be composed of polyester or FR4 or various other materials, as described previously.
- the final assembly is a hermetically sealed electronic card 10 compliant with the dimensions set forth by ISO 7810 standard.
- the thickness T should not be much greater than about 30 mils so that it works properly with legacy card readers.
- Other embodiments provide electronic cards of different sizes and formats.
- FIG. 10 is a detailed elevational view of a wire bond connecting a processor die 56 to PC board 136 .
- This exemplary embodiment allows for a low profile as is advantageous due to the severe size constraints imposed by the thickness standards for electronic card 10 .
- Die 56 is mounted on PC board 136 using an adhesive or other bonding material 158 which forms the physical connection between processor 56 and printed circuit board 136 .
- Wire 148 electrically connects a bonding pad 160 of processor 56 with a bonding pad 160 of PC board 136 .
- wire bonding techniques bond a wire first to the processor and then to the substrate, resulting in a very high loop height.
- a high loop height is unacceptable for electronic cards, which must be made very thin.
- a high loop height creates a reliability problem due to bending and torsional stresses to which the electronic card may be subjected.
- a reverse bonding process is used where the wire 148 is first attached to the PC board 136 and then attached to the processor 56 .
- This results in a short loop height “d” which is preferably less than 5 mils and is more preferably 2-4 mils or less.
- the total height of the loop is equal to d+D, where “D” is the height of the top surface of the processor 56 above the top surface of the PC board 136 .
- the processor die 56 is about 9-10 mils
- the adhesive is about 1-2 mils, resulting in a height D of about 10-12 mils. If the loop height d is in the range of 2-4 mils, the total height of the loop above the top surface of the PC board is in the range of 12-16 mils, in this example.
- the low loop height also helps with the aforementioned bending and torsional stresses to which the electronic card may be subjected.
- a loop height preferably less than 5 mils, more preferably less than 4 mils, and most preferably about 2 mils or less, 7-10 grams of pull-strength on the wire can be achieved.
- the processor 56 is attached to the PC board in a flip-chip fashion.
- Techniques for attaching dies to substrates in a flip-chip fashion are well known to those skilled in the art.
- FIG. 11 shows a receptacle 160 in PC board 136 for broadcaster 68 .
- Broadcaster 68 in this example, is inserted into receptacle 160 at a late stage of the manufacturing process and is then electrically connected to contact pads 161 .
- Guides 162 visible through holes in broadcaster 68 , are provided to aid in this physical alignment process.
- the alignment guides 162 closely align with the holes in broadcaster 68 .
- Optical microscopes may be used to help with this process.
- these exemplary embodiments are given by way of example and not limitation, and other alignment techniques are suitable.
- FIG. 12 shows broadcaster 68 in its final form before it is inserted into slot 160 .
- Track one coil 128 and track two coil 130 are aligned to make optimal contact with magnetic stripe reader device 72 .
- Track one cancellation coil 132 and track two cancellation coil 134 are positioned appropriately to perform their function of cancellation cross talk between track one coil 128 and track two coil 130 .
- Sensors 70 are shown here as trip switches which detect the event of electronic card 10 being passed through magnetic stripe reader device 72 .
- FIG. 13 shows an exemplary broadcaster coil 128 in greater detail.
- the other broadcaster coils 130 - 134 can be of similar or identical design, or can be of different designs in alternated embodiments.
- a wire 164 is wound around a ferromagnetic core 166 .
- the wire 164 can be made from, for example, copper or aluminum, alloys thereof, etc.
- the wire 164 may be insulated, or the core 166 may be insulating or insulated to prevent the windings of wire 164 from shorting out.
- broadcaster core 166 is composed of a material called “HyMu 80”, with favorable magnetic properties, which is commercially available from National Electronic Alloys Inc.
- a single strand of copper wire 164 is wound around broadcaster core 166 at regularly spaced intervals, e.g. with a constant pitch “P.”
- the pitch of the wire coil is about 4.8 mils. This exemplary embodiment is given by way of example and not limitation, as other pitches and variable pitches are suitable in certain embodiments.
- FIG. 14 shows an exemplary spacing of wire 164 coiled around core 166 .
- FIG. 14 shows a regular spacing between each coil wind of copper wire 164 with a constant pitch. This is a preferred embodiment although other embodiments may be used.
- FIG. 15 shows a somewhat irregular winding. Even though some errors may be introduced during the winding process, it is possible to still use the resulting broadcaster coils despite some error in the winding process as shown in FIG. 15 .
- the pitch may also be varied to modify the magnetic flux pattern. However, if too much error is introduced during the manufacture of broadcaster coil 126 , then the coil may be inoperative. It has been found that if the variation in pitch is too great, errors may be introduced into the dynamic magnetic field produced by the coils, resulting in improper operation of the emulator embodiment of electronic card 10 .
- FIG. 16 depicts an example of too much error in the positions of the coil windings of broadcaster coil 126 . It is important to note that many variables exist which affect the threshold of operability and that the broadcaster coil 126 should be tested in order to ensure proper quality. It may not be necessary to test each and every coil but a sampling of broadcaster coils 126 should be tested to ensure that a manufactured batch of coils is operative. FIGS. 14 through 16 are given as examples of alternative coil windings and should not be construed in a limiting way.
- the coils teach winding a wire around a ferromagnetic core.
- the coils can be made in other fashions.
- coils can be made with various deposition, patterning, and etching techniques.
- a ferromagnetic core can be coated with an insulating film, and then coated with a conductive (usually metal) layer of, for example, copper or aluminum or alloys thereof by, by way of example and not limitation, sputtering and nano-sputtering techniques.
- a mask can then be applied to the conductive layer to define the coil, and portions of the conductive layer can be etched away to provide the windings.
- the mask can be made photolithographically, by spraying with, for example, ink-jet technologies, or by other techniques well known to those skilled in the art.
- the etching can be accomplished with an acid which attacks the conductive layer but which is stopped by the insulating film. This method of coil production may have advantages in high-volume manufacturing situations.
- a ferromagnetic coil can be prepared and cleaned.
- An insulating and/or etch stop layer can be applied by a variety of techniques including, but not limited to, dipping, spraying, coating, sputtering, CVD, etc.
- a metal or other conductive layer can then be applied, again by a variety of techniques including, but not limited to, dipping, spraying, coating, sputtering, CVD, etc.
- a mask layer can be applied as a photolithographic material, by painting, printing, spraying, stenciling, etc., as will be appreciated by those skilled in the art.
- the etching of the conductive layer through the mask layer can be accomplished by a variety of techniques including, but not limited to, dipping, spraying, immersing, and plasma etching techniques.
- the mask layer is then removed, and a passifying layer may be applied to protect the coil assembly.
- magnetic material can be lithographically sputtered to create the broadcaster coil effect.
- mass production techniques such as those noted above, by example, which will be apparent to those skilled in the art of semiconductor and micro-machine manufacturing.
- FIG. 17 shows an alternate embodiment which allows a broadcaster 68 ′ to operate without cancellation coils.
- Track one coil 128 and track two coil 130 are shown within broadcaster 68 ′.
- Buffering circuit 66 ′ in this embodiment, is designed to perform cancellation prior to emitting the wave forms to track one coil 128 and track two coil 130 .
- the wave forms are adjusted in such a way that the overall cross talk effect between track one coil 128 and track two coil 130 produces the desired magnetic flux.
- This alternate embodiment cancels cross talk by correcting the wave forms so that the appropriate signals to be received by magnetic stripe reader device 72 .
- buffering circuit 66 ′ may be an ASIC, a DSP, or other appropriate components for signal processing.
- Sensors 70 are present in this embodiment of broadcaster 68 .
- general processor 52 is comprised of an ASIC chip, which optionally includes one or more other components of exemplary transaction card 10 .
- the ASIC assumes the role of buffering circuit 66 as well as the duties of other components associated with general processor 52 in the previously disclosed embodiments.
- the ASIC embodiment could, for example, produce adjusted waveforms for track 1 coil 128 and track 2 coil 130 so that it is not necessary to include track 1 cancellation coil 132 or track 2 cancellation coil 134 .
- the ASIC could apply a correction to the amplitude and phase of the waveform of track 1 coil 128 because of the anticipated effect of magnetic flux interference from track 2 coil 130 . Likewise, a correction would be applied to the waveform for track 2 coil 130 , to cancel the effect of track 1 coil 128 .
- the corrections applied to the waveform may vary with time because the interference from the opposing broadcaster coil 126 may vary with time (at different parts of the waveform).
- the correction constitutes two new waveforms for the two respective broadcaster coils 128 and 130 of this exemplary embodiment.
- the correction waveform for a given broadcaster coil 128 will itself cause interference with the opposing broadcaster coil 130 , and vice versa.
- an additional correction is applied to compensate for the effect of the previous correction.
- one or more additional corrections are applied until the diminishing effect of interference becomes negligible as the series converges. Note that these corrections are performed in a computational manner before the corresponding portions of the waveforms reach the broadcaster 68 .
- the crosstalk cancellation is performed in a linear RC circuit which outputs corrected waveforms to track 1 coil 128 and track 2 coil 130 .
- This RC circuit could be disposed within the exemplary ASIC described above or external to the ASIC. Again, this embodiment is provided by way of example and not limitation.
- FIG. 18 shows a manufacturing process for producing electronic card 10 .
- a first phase of the manufacturing process is performed.
- the various components are mounted and programmed.
- An operation 170 continues this process of manufacture in a second phase by installing additional components such as the broadcaster 68 and battery 121 .
- the manufacturing process is completed in a third phase by an operation 172 which performs an epoxy fill.
- FIG. 19 shows the first phase 168 of manufacturing in greater detail.
- technology components are mounted to the surface of their associated printed circuits.
- the die is attached.
- Previously described wiring bonding process may be performed in an operation 178 to electrically connect the die to the printed circuit board.
- secure processor 44 and general processor 52 are programmed with various data and programs necessary for the operation of electronic card 10 .
- An operation 182 performs a functional test prior to encapsulation to ensure that the programming was successfully loaded and the various electrical connections were secure.
- a decision step 184 it is determined whether or not the functional test has been passed. If it is not, then, control passes to an operation 186 , wherein the problem which causes the failure is determined. Then, in an operation 188 , the problem is reworked in an operation 188 and, then, control passes again to programming step 180 . If, on the other hand, in decision step 184 it is determined that the functional test is passed, then, an encapsulation process is performed in step 190 . Once encapsulation is completed, the first phase of manufacture is completed.
- the process shown here is exemplary and as will be apparent to those of skill in the art, many alternative embodiments may be used. That is, this process is described by way of example and not limitation.
- FIG. 20 describes the programming operation 180 in greater detail.
- the operation is commenced in an operation 192 and continues in an operation 194 wherein electronic card 10 is attached to a test rig.
- a test program is launched on the test rig in an operation 196 .
- the purpose of this test program is to load data and programs on to the technology components of electronic card 10 , such as secure processor 44 and general processor 52 .
- the test program is initialized. This may involve loading various parameters and settings from a file or obtaining them from a user.
- An operation 200 performs the actual loading of the software and data on to the technology components aforementioned.
- the process is concluded. This process is shown in terms of its exemplary embodiments and should not be construed in a limiting way.
- FIG. 21 shows operation 200 of FIG. 20 in greater detail. This operation is used to load software and data into the technology components of electronic card 10 .
- the operation is commenced with an operation 204 and continues with an operation 206 , which opens a file containing the code and data to be loaded.
- an operation 208 an address range is obtained for a specific block of data. This address range is used when communicating with secure processor 44 and general processor 52 to specifically identify the locations in EEPROM where this particular block of data should be stored.
- the data could comprise programs.
- a message is formatted which contains a block of data and the address information.
- the message is sent.
- An operation 214 receives and records status information.
- a decision operation 216 determines whether or not the last block has been sent or if, for other reasons, the process should be terminated, such as in the case of an error. If it is determined that the loading operation should continue, control passes back to operation 208 . If in operation 216 it is determined that the process should terminate, control passes to an operation 218 which reports the status of the loading operation and, then, the process is concluded in an operation 220 .
- FIG. 22 shows the second phase of manufacturing operation 170 in greater detail.
- the process starts in an operation 222 and continues in an operation 224 , which performs a functional test on the device.
- a decision operation 226 it is determined whether or not the functional test has been passed and, if it has not, control passes to an operation 228 where corrective action is taken. Control then passes to back to operation 224 . If, in operation 226 , it is determined that the functional test has been passed, control passes to operation 228 wherein the dome switch is taped and the via switch is soldered.
- broadcaster 68 is installed in the slot provided for it within electronic card 10 .
- battery 121 is installed.
- an operation 234 the assembly is inspected and tested. If it is determined in operation 234 that the assembly is not functioning properly, control passes to an operation 236 where corrective action is taken. Control then passes back to operation 234 . If it is determined in operation 234 that the assembly is working correctly, control passes to an operation 236 which ends the process.
- FIG. 23 describes the third phase 172 of the manufacturing process. It begins with an operation 238 and continues with an operation 240 wherein the assembly of electronic card 10 is filled with epoxy, laminated and tested. Then, in an operation 242 , various measurements of the assembly are taken and, in a decision step 244 , it is determined whether or not the assembly needs to be reworked. If it is determined in operation 244 that the assembly needs to be reworked, corrective action is taken in operation 246 , and control is passed back to operation 244 . If it is determined in operation 244 that the assembly does not require reworking, control is passed to operation 246 , which concludes the process.
- exemplary manufacturing process may be used to a variety of embodiments of transaction card 10 .
- a variant of the manufacturing process uses photolithography techniques well known to those skilled in the art to produce broadcaster 68 . This method avoids the use of coil winding, which may save time and money when manufacturing transaction card 10 in large numbers.
- Another variant of the process would use the “flip chip” method well known to those skilled in the art to mount one or more technology components such as general processor 52 .
- this variant would include the use of an ASIC as general processor 52 .
- This embodiment is given by way of example and not limitation.
- An alternative exemplary embodiment of non-contact communication port 77 of FIG. 3 comprises a WiFi device or equivalent, which allows this embodiment of transaction card 10 to communicate with the internet independently of a card reader.
- the WiFi 802.11b and 802.11g protocols may be used.
- the card could periodically download and upload information, and also perform transactions in response to user input. Information from the internet could be displayed to the user and interaction with the World Wide Web would also be possible in certain embodiments.
- This embodiment would preferably include an LCD display or equivalent and a touch screen or equivalent. This embodiment is given by way of example and not limitation.
Abstract
An electronic card includes a digital processor, an electrochemical battery and a communications port. The processor and battery are essentially coplanar, and are sandwiched between and enclosed by two flexible covers, preferably made from an insulating plastic material, and preferably fitted to the components that they enclose. The communications port can include, for example, a Smart Card contact port, a stripe emulator, an RF port, and IR port, etc. The battery may comprise a rechargeable battery. In an exemplary embodiment, at least the processor is carried by a flexible printed circuit (PC) board. In other exemplary embodiments, switches and/or indicators are also carried by the PC board. A method for manufacturing an electronic card having at least two components is also disclosed.
Description
- This application claims the benefit of U.S. Ser. No. 60/675,388 filed Apr. 27, 2005, and is a Continuation-in-Part of U.S. Ser. No. 11/391,719 filed Mar. 27, 2006, both of which are incorporated herein by reference.
- Exemplary embodiments disclosed herein pertain to electronic cards. More particularly, exemplary embodiments disclosed herein pertain to secure electronic cards and methods for making same.
- There are a great many applications for electronic security. For example, security is desirable or required for financial transactions, or for providing access to various physical and non-physical resources. One area of great concern for electronic security is in the field of financial transaction cards, e.g. credit and debit cards.
- Conventional credit cards, debit cards and other financial transaction cards (hereafter “transaction cards” ) have a typically plastic body upon which is embossed a 16 digit account number and other data. A magnetic strip, usually referred to as a “stripe” , is adhered to the back of the card. The stripe typically magnetically encodes the account number and/or other data.
- A stripe is typically a magnetic tape material much like the magnetic tape used in digital data recording. The stripe material typically includes a magnetic oxide and binder compounds that provide the magnetic stripe with data encoding capabilities and physical durability characteristics needed for transaction card applications. While these magnetic tape components have been optimized for transaction card applications the magnetic tape used for the magnetic stripe on a transaction card is very similar to standard digital data recording tape.
- The two most common magnetic oxides used in magnetic stripe cards are referred to as low coercivity (LoCo) and high coercivity (HiCo) magnetic oxides. Coercivity measures how difficult it is to magnetize or demagnetize the stripe and is measured in oersteds. Low coercivity magnetic stripes are typically 300 oersteds and high coercivity magnetic stripes are above 2700 oersteds. A high coercivity magnetic stripe requires about three times more energy to encode or erase than does a low coercivity magnetic stripe. Many transaction card applications have gone to HiCo magnetic stripes because it is much harder to accidentally erase the encoded data than on LoCo magnetic stripes. This provides greater durability and readability of the encoded data in use for many applications.
- The encoding of the magnetic stripe on a transaction card typically follows standard digital recording techniques but is again optimized for transaction card applications. The encoded data takes the form of zones of magnetization in the magnetic stripe with alternate magnetic polarities. The north and south poles, of the magnetized zones alternate in direction providing an encoding technique that can represent the binary “zeroes” and “ones” of a binary digital code.
- The standard encoding technique for the magnetic stripe on a transaction card is the F2F (Aiken double frequency) code where a binary zero is represented by a long magnetized zone and a binary one is represented by two magnetized zones, each one half the length of the zero—a long magnetized zone. The exact length of these zones of magnetization is determined by how much data needs to be recorded on the magnetic stripe. For example Track 2 data is encoded at 75 bits per inch or 75 long zero zones per inch—International Standards Organization (ISO) specifications 7811-2/6. That equates to 0.01333 inches in length for the zero magnetized zone. The binary one would then be two zones of one half that length or 0.00666 inches in length. Other lengths can be obtained for different data densities such as the 210 bits per inch used in
Track 1 andTrack 2 of the magnetic stripe. - Reading the encoded data in the magnetic stripe is accomplished by capturing the magnetic flux field extending from the magnetized zones in the stripe by a magnetic read head. The read head converts the changing magnetic flux in the coil of the read head to a voltage pattern mirroring the magnetization zones of the encoded data. The voltage pattern can then be translated by the decoding electronics into the binary zeroes and ones of the data as is well known in the industry.
- A magnetic stripe encoder consists of a magnetic write head and an electronic current drive circuit capable of magnetizing the magnetic oxide in the stripe to full magnetization (saturation). The encoding current in the write head is capable of alternating direction thereby producing alternating zones of magnetization direction in the stripe that will form the data encoding of the magnetic stripe. Transaction cards typically have their stripes encoded with account and/or other information in commercial magnetic stripe encoders prior to delivery to the consumer.
- The process of magnetic tape application to transaction cards, the encoding of the magnetic stripe and the reading of the encoded data in the magnetic stripe at point of use has been a reliable and cost effective method for portable personal data storage for financial, ID and other transaction card based applications. However, the relative ease of reading and encoding or re-encoding of the magnetic stripe data has made the magnetic stripe transaction card subject to counterfeiting, copying the data to one or more cards (often referred to as “skimming”) and other fraud abuses. Skimming fraud alone is growing around the world and has reached financial dollar losses that call for immediate solutions.
- There are many security problems with conventional transaction cards. For one, the stripe is static and is not encrypted, allowing transaction card thieves to “steal”, in the virtual sense, the data from the stripe and use it for unauthorized transactions. This is because with conventional magnetic stripe cards the transaction data is “exposed”, i.e. not encrypted. If “picked off”, the data can be used indistinguishably in a counterfeit transaction card. As such, a counterfeit transaction card can be freely used by a thief until it is cancelled.
- The skimming and counterfeiting problem has been partially addressed by MagTek Incorporated with its MagnePrint technology. MagnePrint® is a card security technology that can detect “skimmed” or magnetically altered counterfeit cards. Just as fingerprints can uniquely identify human beings, MagnePrint® can uniquely identify magstripe cards. MagnePrint® technology was discovered at Washington University in St. Louis, Mo., USA. MagTek refined the technology, to bring it to practical use, and has an exclusive license to market this technology. However, MagnePrint technology requires modified card readers for its implementation, which would render obsolete millions of legacy card readers.
- In addition to a lack of security, conventional transaction cards are also quite limited in storage capacity. That is, conventional cards are limited to their stripe for storage. As such, conventional cards are not electronic cards, e.g. cards with embedded electronics such as an on-board processor and/or digital memory, and are very limited in their functionality.
- An example of an electronic card is the so-called “Smart Card” , which includes both an on-board processor and digital memory. By providing an on-board electronics, a Smart Card can implement security protocols such as encryption, store large amounts of user information, etc.
- A common standard for Smart Cards is referred to as the ISO 7816 standard. With this protocol, a Smart Card is provided with an electrical interface including a number of electrically conductive and externally accessible contact pads which are coupled to an embedded secure processor. The Smart Card is inserted into a Smart Card reader which makes electrical contact with the contact pads to provide power to and communications with the secure processor. Smart Cards, however, are not provided with embedded power, e.g. a battery. Smart cards can also include a conventional stripe which, in the prior art, does not in any way interact with the secure processor.
- Smart cards using memory chips and microprocessor chips were first introduced to provide increased data storage and to guard against some of the types of fraud found in magnetic stripe transaction cards. The Smart Cards do reduce some types of fraud but the cards are much more expensive than a magnetic stripe transaction card and the magnetic stripe readers at the point-of-transaction had to be replaced with readers that could read the data storage chip and the magnetic stripe. These cost factors and inertia in changing the existing infrastructure built up around the magnetic stripe transaction card systems and applications (e.g. “legacy” card readers) have prevented the rapid and more general acceptance of Smart Cards in the United States.
- Another factor in the slow acceptance of Smart Cards in the United States, has been the lack of visible benefits to the end user or consumer. The consumer is just as content to use the magnetic stripe as to use the chip to complete a transaction.
- While broadly adopted abroad, Smart Cards have not been extensively adopted in the U.S., as noted above. As noted above, a major reason for this is the investment made by millions of merchants in legacy card readers, which cannot communicate with the secure processors of Smart Cards. Also, Smart Cards conforming to the
ISO 7816 standard suffer from their own limitations, including severely restricted I/O, an inability to provide “smart” transactions with legacy card readers, etc. - Another limitation of smart cards in general is that they lack the ability to interact with a user when they are not in contact with a smart card reader. This limitation is due to the fact that the smart card of the prior art does not have an on-board power supply. Thus the electronic components lie dormant and do not allow for interaction. This limitation prevents a myriad of features, such as account selection, or a security feature to lock the card, etc.
- Another suggested approach, not yet in use, uses a general processor and a stripe emulator which work with legacy card readers. As used here, the term “stripe emulator” will refer to a transaction card where data transmitted to a legacy card reader is under the control of the general processor. This approach will be referred to herein as an “emulator card”, which is one form of an electronic card.
- Emulator cards potentially have a number of distinct advantages over conventional credit cards. For one, a single card can emulate a number of different transaction cards, greatly reducing the bulk in one's wallet. For example, an emulator card can emulate a Visa card, a MasterCard, and an ATM card. Also, since the emulator card includes a processor, it is possible to implement additional functionality, such as security functions.
- However, emulator cards, too, have their limitations. For one, since general processors are used the security level of the card is reduced. For example, a hacker could potentially obtain data stored in unsecured electronic memory. Also, emulator cards do not address Smart Card protocols, as they are designed to work with legacy card readers. For example, as with conventional credit cards, data flows from the emulator card to the legacy card reader, and not vice versa. Still further, the information that can be provided by the emulator card is limited to the amount of information that a conventional stripe can hold and that a legacy card reader can read.
- The need for fraud reduction with a versatile and inexpensively manufactured electronic card is urgent. In the U.S., fraud is tending to cover from 7.5 to 12 basis points in credit card transactions, and skimming alone is estimated to cost $8 billion dollars in 2005. Internationally, the need is even more dire, with fraud tending from 25 to 40 basis points, with 60 percent of that being due to skimming. Nevertheless, merchants in the United States and elsewhere are reluctant to invest the resources necessary to change all of their current magnetic-card transaction equipment for various reasons, including cost, inconvenience, disruption and lack of reliability.
- There are other uses for electronic cards other than for financial transactions. For example, electronic cards have been used for security purposes to allow, for example, personnel to high security areas of a building (“access control”). Electronic cards can therefore be used for a variety of purposes where the identity and/or status of the bearer needs to be verified by a physical card or “token.”
- Electronic cards, as noted above, tend to be relatively expensive compared to conventional, non-electronic, magnetic stripe cards. This is due, in part, to the cost of the electronic components and is due, in part, to the complexity of manufacture of electronic cards. For example, care must be taken during lamination of electronic cards that the heat and/or pressure do not damage the sensitive electronic components. Also, electronic cards should remain thin, flexible and preferably of the same dimensions as conventional cards. As another example, stripe emulators tend to be difficult to design and manufacture such that they work with legacy readers.
- Furthermore, powering the electronic circuitry of electronic cards tends to be problematical. For example, Smart Cards are powered by their readers, limiting their usefulness in non-contact applications. A good solution for powering ubiquitous electronic cards has not been found in the prior art.
- These and other limitations of the prior art will become apparent to those of skill in the art upon a reading of the following descriptions and a study of the several figures of the drawing.
- A number of non-limiting examples of electronic cards which address aforementioned problems and limitations of prior transaction cards and electronic cards are presented. As will be apparent to those skilled in the art, the methods and apparatus as disclosed herein are applicable to a wide variety of problems which require or could be improved with improved electronic cards.
- In an embodiment, set forth by way of example rather than limitation, an electronic card includes a thin, flat digital processor, a thin, flat electrochemical battery, a communications port, a first flexible cover, and a second flexible cover. The digital processor preferably has a first substantially planar surface and a substantially opposing second substantially planar surface, wherein at least one of the first surface, the second surface, and a cross-section of the processor define a maximum surface area. The battery preferably has a first substantially planar surface and a substantially opposing second substantially planar surface, wherein at least one of the first surface, the second surface, and a cross-section of the processor define a maximum surface area, the battery being positioned substantially co-planar with the processor and capable of powering the processor. The communications port is coupled to the processor. Each of the first flexible cover and the opposing second flexible cover have a surface area greater than the combined maximum surface areas of the digital processor and the battery. The processor and the battery are sandwiched between and enclosed by the first flexible cover and the second flexible cover.
- In an exemplary embodiment, the electronic card includes a flexible circuit board. In another exemplary embodiment at least one of the first cover and the second cover are contoured to fit over the circuit board, processor and battery. In another exemplary embodiment, one or more switches are coupled to the circuit board. In another exemplary embodiment, one or more indicators are coupled to the circuit board. In another exemplary embodiment, the processor is coupled to the circuit board in a flip-chip fashion. In another exemplary embodiment, the processor is coupled to the circuit board with bonded wire. In another exemplary embodiment, the bonded wire has a low loop height. In another exemplary embodiment, the processor is encapsulated against the printed circuit board. In another exemplary embodiment, the battery includes two or more batteries. In another exemplary embodiment, the battery is not rechargeable. In another exemplary embodiment, the battery is rechargeable. In another exemplary embodiment, the battery includes a rechargeable battery and a non-rechargeable battery. In another exemplary embodiment, the battery is part of a power supply including a power filter.
- In an embodiment, set forth by way of example rather than limitation, a method for making an electronic card includes making a flexible printed circuit board, attaching at least one processor to the printed circuit board, coupling at least one battery to the printed circuit board, encapsulating at least the one processor, making a top cover and a bottom cover; and sandwiching the printed circuit board, the processor and the battery between the top cover and the bottom cover.
- In an embodiment, set forth by way of example rather than limitation, an enhanced Smart Card includes a card body provided with an externally accessible card interface including a signal port, a power port, and a ground port, a secure processor disposed at least partially within the card body and coupled to the signal port, the power port, and the ground port, a general processor disposed at least partially within the card body, the general processor being coupled to a power source disposed at least partially within the card body and being operative to provide power to and communicate with the secure processor when the secure processor is being used in an enhanced Smart Card mode; and a non-contact communications port coupled to at least one of the secure processor and the general processor.
- In an embodiment, set forth by way of example rather than limitation, a secure transaction card includes a card body, a secure processor disposed at least partially within the card body, a general processor disposed at least partially within the card body, a power source disposed at least partially within the card body; and a non-contact communications port coupled to at least one of the secure processor and the general processor.
- In an embodiment, set forth by way of example rather than limitation, a swipe emulating broadcaster system includes a coil having an elongated core material and a winding having a plurality of turns around the core material; and a signal generator having a broadcaster driver signal coupled to the coil such that the coil provides a dynamic magnetic field which emulates the swiping of a magnetic stripe transaction card past a read head of a card reader.
- In an exemplary embodiment, the signal generator includes a processor having a digital output and a signal processing circuit which converts the digital output to the broadcaster driver signal. In another exemplary embodiment, the signal generator is a digital signal generator. In another exemplary embodiment, the coil is one of a plurality of coils. In another exemplary embodiment, at least one of the plurality of coils is a track coil. In another exemplary embodiment, at least one of the plurality of coils is a cancellation coil. In another exemplary embodiment, the coil includes a wire wound around the core. In another exemplary embodiment, the coil includes a wire formed around the core by a process including at least the deposition of conductive material and the etching of the conductive material.
- In an embodiment, set forth by way of example rather than limitation, a method for creating a low-loop bonding for thin profile applications includes attaching a first surface of a fabricated semiconductor die to a first surface of a substrate having a plurality of substrate contact pads, such that a second surface of the die which opposes the first surface is exposed to provide access to a plurality of die contact pads, wire bonding a first end of a wire to a substrate contact pad; and wire bonding a second end of the wire to a die contact pad, such that the loop height of the wire is no greater that 5 mils above the second surface of the die, and no greater than 20 mils above the first surface of the substrate.
- These and other embodiments, aspects and advantages will become apparent to those of skill in the art upon a reading of the following descriptions and a study of the various figures of the drawing.
- Several exemplary embodiments will now be described with reference to the drawings, wherein like components are provided with like reference numerals. The exemplary embodiments are intended to illustrate, but not to limit. The drawings include the following figures:
-
FIG. 1 is a top plan view of an exemplary electronic card; -
FIG. 2 is a bottom plan view of the exemplary electronic card ofFIG. 1 ; -
FIG. 3 is a block diagram of an exemplary circuit for the electronic card illustrated inFIGS. 1 and 2 ; -
FIG. 4 is a block diagram of an exemplary secure processor ofFIG. 3 ; -
FIG. 5 is a schematic diagram of an exemplary embodiment of a general processor ofFIG. 3 and exemplary associated I/O devices and subsystems; -
FIG. 6 is a top plan view of an exemplary printed circuit (PC) board of an exemplary electronic card; -
FIG. 7 is a bottom plan view of the PC board ofFIG. 6 ; -
FIG. 8 is an exploded, partially cross-sectional view of an exemplary electronic card; -
FIG. 9 is partially cross-sectional view of the electronic card ofFIG. 8 after it has been assembled; -
FIG. 10 illustrates an exemplary wire bond connection between a processor and a PC board; -
FIG. 11 illustrates an exemplary broadcaster slot with alignment marks; -
FIG. 12 is a top plan view of a broadcaster before it is inserted into the broadcaster slot illustrated inFIG. 11 ; -
FIG. 13 illustrates an exemplary broadcaster coil; -
FIGS. 14-16 illustrate exemplary winding patterns of the broadcaster coil ofFIG. 13 ; -
FIG. 17 is a block diagram of an alternate embodiment, set forth by way of example and not limitation, of a broadcaster assembly; -
FIG. 18 is a flow-diagram of a manufacturing process, set forth by way of example and not limitation, for producing electronic cards; -
FIG. 19 is a flow-diagram illustrating an exemplary PhaseI manufacturing process 168 ofFIG. 18 in greater detail; -
FIG. 20 is a flow-diagram illustrating anexemplary programming process 180 ofFIG. 19 in greater detail; -
FIG. 21 is a flow-diagram illustrating an exemplary “load software and/or data into chip”process 200 ofFIG. 20 in greater detail; -
FIG. 22 is a flow-diagram illustrating an exemplary PhaseII manufacturing process 170 ofFIG. 18 in greater detail; and -
FIG. 23 is a flow-diagram illustrating an exemplary PhaseIII manufacturing process 172 ofFIG. 18 in greater detail. - As noted, there are a great many applications for electronic cards. One of many applications is to provide security for financial transactions, e.g. financial transactions using transactions cards such as credit cards and debit cards. In the following exemplary embodiments, particular emphasis will be placed on transaction card security, with the understanding that other uses for enhanced electronic security, such as, but not limited to, access control, are within the true spirit and scope of the invention.
-
FIG. 1 is an embodiment of anelectronic card 10, set forth by way of example but not limitation, which includes acard body 11. The card body may be made from a thermoplastic material, such as polyvinylchloride (PVC) in exemplary embodiments, but other materials with sufficient flexibility and durability are also suitable. For example, other thermoplastics can be used, as well as thin metal (e.g. stainless steel). Of course, if a conductive material is used for thecard body 11, adequate electrical insulation from the electrical and/or electronic components must be maintained. Still other materials, such as resins, carbon fibers, organic and non-organic materials, etc. are also suitable for various alternate embodiments. In summary,card body 11 can be made from any suitable material which is strong enough and durable enough to be used as a transaction card. - The exemplary
electronic card 10 has afront surface 12 which is provided with anelectrical interface 16. This is one non-limiting example of a communication port for theelectronic card 10. In other embodiments, theinterface 16 may be eliminated, or additional communication ports may be provided. - The illustrated
electrical interface 16 includes a number of contact pads which, in this example, are formed in a configuration which is compliant with the International Standards Organization “Smart Card”standard ISO 7816, incorporated herein by reference. In this exemplary embodiment, the electronic card is usable as a legacy mode Smart Card. Also shown on thefront surface 12 is aninstitution identifier 18, aninstitution number 20, anaccount number 22, and aclient name 24. The account number is preferably embossed on theelectronic card 10 to provide raised numerals for credit card imprint machines. -
FIG. 2 illustrates aback surface 14 of the exemplaryelectronic card 10. In this exemplary embodiment, amagnetic stripe emulator 26 is provided on theback surface 14 which can be used to communicate with legacy magnetic stripe readers of the prior art. Thestripe emulator 26 is therefore another non-limiting example of a communications port. - The electronic card may also have, for example, an on/off
button 28, an “on”indicator 30, and an “off”indicator 32. In this exemplary embodiment, “on”indicator 30 may be a green LED and the “off”indicator 32 may be a red LED. Also seen on the exemplary card back 14 are a plurality of account interfaces 34. Eachaccount interface 34 preferably hasaccount indicator LED 36 and anaccount selector switch 38. Eachaccount interface 34 may also have, for example, printed information identifying the account and expiration date. Back surface 14 also has, in this example,instructions 40, aninstitution identifier 41, asignature box 42, and various other printed information. -
FIG. 3 is a block diagram, presented by way of example but not limitation, of the circuitry of exemplaryelectronic card 10. In this example, theelectronic card 10 includes asecure processor 44, ageneral processor 52, and a magnetic stripe emulator 64. In this embodiment, both thesecure processor 44 and thegeneral processor 52 are coupled to theISO 7816interface 16 by abus 48. -
Secure processor 44 is preferably a commercially available Smart Card chip which has various tamper resistant properties such as a secure cryptographic function and tamperresistant storage 46. An exemplary embodiment ofsecure processor 44, given by way of example and not limitation, is a P8WE6032 processor manufactured by Phillips of Germany. Similar devices are manufactured by Hitachi, Infineon, Toshiba, ST and others. As noted previously, in this examplesecure processor 44 is connected electrically to theinterface 16 by abus 48. -
General processor 52 is, in this example, also connected to thebus 48 and, therefore, to both thesecure processor 44 and theinterface 16. Additionally, in this example, thegeneral processor 52 is coupled to thesecure processor 44 by an “I/O 2”line 50. In the current exemplary embodiment,memory 54 is coupled to thegeneral processor 52.General processor 52 is also coupled, in this example, topower source 56,display 58, switches 60, and other I/O 62. - In an alternate embodiment,
general processor 52 communicates with thesecure processor 44 in an IS07816 compliant mode over thebus 48. In such an embodiment, no other connection to the secure processor is required (e.g. the I/O 2line 50 connection can be omitted). -
Power source 56 is preferably an electrochemical battery disposed within thecard body 11. It may be either a non-rechargeable battery or a rechargeable battery. Ifpower source 56 is a non-rechargeable battery, it should have sufficient capacity to power theelectronic card 10 for its useful life. If thepower source 56 is rechargeable, theelectronic card 10 may be used indefinitely. A rechargeable battery may, for example, be recharged throughinterface 16, by magnetic induction (e.g. through an induction coil or the broadcaster coils), a photovoltaic cell embedded inbody 11, a piezoelectric material embedded in theelectronic card 10, another electrical connector, kinetic recharging mechanisms (e.g. magnets and coils), or other suitable mechanisms. For example, in some situations a rectification of ambient RF energy may provide sufficient energy to power theelectronic card 10, recharge a battery, or store supplemental charge in, for example, a capacitor. - Alternative exemplary embodiments include both a primary and a secondary battery disposed within the card body. For example, a non-rechargeable battery could serve as a primary battery and a rechargeable battery could serve as a secondary battery, or vice versa. These exemplary embodiments are given by way of example and not limitation.
- Since the
power source 56 is embedded in theelectronic card 10, it must be thin. This is because theelectronic card 10, for many applications, must be able to bend within certain ranges. For example, anelectronic card 10 used for transaction card applications must conform to the ISO 7810 standard, which is 85.60 mm (˜3370 mils) wide, 53.98 mm (˜2125 mils) tall, and 0.76 mm (˜30 mils) thick. This is often referred to as the “CR80” format, which is roughly 3½″ by 2″, and fits well into a standard wallet. However, other formats can also be used which are larger, small, or differently configured than the CR80 format. By way of non-limiting example, an electronic card of smaller than CR80 dimensions can be made to fit on, for example, a keychain. - The cards must be somewhat flexible so that they can be used in, for example, insertion-type legacy card readers, so it is also preferable that the power source be somewhat flexible if it is relatively large in surface area. However, flexibility is not a problem if the battery is relatively small in surface area, or if several smaller batteries are coupled together to form the
power source 56. Also, it is important that thepower source 56 can withstand heat and/or pressure if, for example, heat and/or pressure lamination techniques are used to manufacture theelectronic card 10. - Examples of suitable batteries are manufactured by Varta Microbattery of Ellwangen, Germany and Solicore of Lakeland, Fla. The batteries are preferably electrochemical in nature, although other types of batteries or capacitive storage devices can also be used. Suitable electrochemical batteries can include, by way of example but not limitation, Li-polymer, Ni-MH, lithium, lithium-ion, alkaline, etc.
-
General processor 52 may be, for example, aPIC 16 orPIC 18 microcontroller. In an alternative embodiment,general processor 52 may comprise an ASIC chip. In still further embodiments, general processor may be any form of logic (e.g. a state machine, analog processor, etc.) which performs the desired processing functions. -
Display 58 may include, for example, LED devices as disclosed previously. As another non-limiting example,display 58 is may comprise an LCD display. The LCD display is preferably flexible if it is of a relatively large surface area.Switches 60 can be any form of electrical switches or devices which provides the functionality of switches to provide inputs or controls for theelectronic card 10. Theprocessor 52 may, for example, provide software debouncing algorithms with respect to such switches. Other I/O 62 may comprise any number of alternative I/O subsystems. These may include, by way of example and not limitation, audio, tactile, RF, IR, optical, keyboard, biometric I/O or other I/O. Thesecure processor 44 may also provide I/O by RF or IR in accordance withISO 7816 standards. - Also coupled to
general processor 52, in this exemplary embodiment, is magnetic stripe emulator 64, which allows theelectronic card 10 to be used in a mode which emulates a magnetic stripe card of the prior art. Magnetic stripe emulator 64, in this non-limiting example, is comprised of abuffering circuit 66, which converts digital output fromgeneral processor 52 into a wave form appropriate for magnetic stripe emulation. In this exemplary embodiment, bufferingcircuit 66 includes a conversion circuit which is typically implemented as an RC network. Along with the broadcaster, the RC network forms an RCL network to condition the waveform. RC networks and their equivalents are well known to those skilled in the art. - In this example, magnetic stripe emulator 64 further includes a
broadcaster 68. As used herein, the term “broadcaster” refers to one or more inductive coils which are used to “broadcast” a fluctuating magnetic signal which emulates the movement (“swipe”) of a transaction card's stripe past the read head of a magnetic card reader. -
Broadcaster 68 may be electrically coupled to bufferingcircuit 66 and preferably receives two tracks of signal which are converted bybroadcaster 68 into magnetic impulses for magnetic stripe emulation. Alternative embodiments include one, three, four or more tracks.Broadcaster 68 may include one or more electrical coils to convert electrical signal into magnetic impulses. -
Broadcaster 68 of this example may further include one ormore sensors 70, which are electrically coupled togeneral processor 52. These sensors are used to signal togeneral processor 52 that the physical act of swiping thecard body 10 through a legacy card reader has commenced.Sensors 70 also communicate togeneral processor 52 when contact is lost with themagnetic stripe reader 72, which receives and interprets magnetic flux impulses from the broadcaster. - As noted previously, the
electronic card 10 of this example includes anelectrical interface 16. In this example,electrical connectors 16 are used in a manner compliant withISO 7816 to communicate with anISO 7816reader device 74. That is,electronic card 10, in this example, can be used as a legacy Smart Card or as a legacy magnetic stripe transaction card. - When used in a legacy Smart Card mode,
secure processor 44 is powered bybus 48 from a SmartCard reader device 74. Thereader device 74 can be used to program and personalizesecure processor 44 with various information including, by way of example and not limitation, firmware code, account numbers, cryptographic keys, PIN numbers, etc. This information, once loaded intosecure processor 44, preparessecure processor 44 for an operational mode which no longer requires the use ofreader device 74. - In this “independent” mode,
secure processor 44 communicates withgeneral processor 52 and provides services such as cryptographic functions and the dynamic generation of authentication information which is used to communicate viageneral processor 52 and magnetic stripe emulator 64 withmagnetic stripe reader 72. Also in this example, the authentication code may be used only once for a single transaction. Subsequent transactions require new authentication codes to be generated.Secure processor 44 can also send account information and/or DACs via RF and IR. - In an alternative embodiment, the
card body 10 continues to be used withreader device 74 and also with magneticstripe reader device 72. In this alternate embodiment, the card detects the mode in which it is being used and automatically switches the usage ofbus 48 appropriately for the detected mode of operation. This is achieved inoptional bus arbitrator 76. In other embodiments, there is nobus arbitrator 76.Optional bus arbitrator 76 can detect when it is being used withreader device 74 because power is provided byreader device 74 viaelectrical connectors 16 tobus 48. Similarly,optional bus arbitrator 76 can detect that power is being provided bygeneral processor 52 and switch to the corresponding mode of operation, which servicesgeneral processor 52 and the various I/O devices connected thereto. In yet another alternative embodiment,optional bus arbitrator 76 allows for the dynamic communication of bothgeneral processor 52 andsecure processor 44 with each other respectively, and withreader device 74. This requires bus arbitration logic which is well known to those skilled in the art. In a further alterative embodiment,general processor 52 is interposed betweensecure processor 44 andelectrical connectors 16. In this alternative embodiment,general processor 52 acts as a “go-between” or a “front end” forsecure processor 44. - With continuing reference to
FIG. 3 , an exemplarynon-contact communications port 77 may be included as an alternative to or in addition toexemplary communication ports 16 and 64. That is,non-contact communications port 77 may be provided to allow communications without physical contact with a reader. -
Non-contact communications port 77 can be a radio frequency communications port, IR communications port, or any other form of communications which does not require physical contact. Of course other embodiments may be provided with contact communications ports, such ascommunications port 16 and broadcaster. That is, these embodiments are described by way of example and not limitation. - A standard for radio frequency (“RF”) communication for Smart Card communications is ISO/IEC 14443, dated 2001, incorporated herein by reference. It includes an antenna and RF driver characteristics and defines two types of contactless cards (“A” and “B”), allows for communications at distances up to 10 cm. There have been proposals for ISO 14443 types C, D, E and F that have yet to complete the standards process. An alternative standard for contactless smart cards is ISO 15693, which allows communications at distances up to 50 cm.
-
FIG. 4 illustrates exemplarysecure processor 44 ofFIG. 3 in greater detail.Secure processor 44 of this example is anISO 7816 compliant microcontroller comprisingpower switch 78,security sensors 80, resetgenerator 82,clock input filter 84,CPU 86, interruptsystem 88, andinternal bus 90. Coupled tointernal bus 90 is tamperresistant storage 46, which may be comprised of RAM, EEPROM, etc. Also coupled tobus 90 is co-processor 92, which handles encryption and decryption. In this exemplary embodiment, theco-processor 92 performs TRIPLE-DES encryption and decryption. Also coupled tobus 90 aretimers 94 andROM 96, which is used, for example, for storing firmware forsecure processor 44,UART 98, which is used for serial communications. Also connected tobus 90 is I/O subsystem 100 andrandom number generator 102. -
Secure processors 44 as described above are commercially available from a variety of sources including Philips, Hitachi, Infineon, Toshiba, ST, and others. A suitablesecure processor 44 for use in the disclosed exemplary embodiment is the model P8WE6032 processor made by Philips of Germany. In certain alternate embodiments, thesecure processor 44 can be replaced by a general processor. -
FIG. 5 is a schematic ofgeneral processor 52 coupled its associated I/O devices subsystems set forth by way of example and not limitation. As noted above,general processor 52 may be aPIC 16 orPIC 18 microcontroller. For example, thegeneral processor 52 can be aMicrochip LF 77PIC 16 or Microchip LF 4530PIC 18. Alternatives are provided bye Texas Instruments, Atmel, and others. Other general processors may also be used and, in certain alternate embodiments, thegeneral processor 52 can also be a secure processor. - In this exemplary embodiment, two
electrochemical batteries non-rechargeable battery 121A serves as a primary battery, whilerechargeable battery 121B serves as a secondary battery.Battery 121B may be coupled to arecharging apparatus 122, which is shown here as an RF power source. Of course, the induced current is rectified prior to being applied to thebattery 121B. As noted above, there are a number of other suitable recharging apparatus that will be apparent to those skilled in the art. - Preferably,
capacitor assembly 124 is provided in order to provide a smooth source of power without peaks or power dropouts. The capacitor assembly can include one or more capacitors, as illustrated.Capacitor assembly 124 may also be used to smooth the power from a rectifier which may be present in rechargingapparatus 122.Battery 121A,battery 121B, rechargingapparatus 122, andcapacitor assembly 124 are all part ofpower source 56 ofFIG. 3 in this exemplary embodiment. - One or more capacitors, such as the
capacitor assembly 124, can also be used as a charge storage device. That is, “super capacitor” having a sufficiently high capacitance can significantly supplement the current provided by the electrochemical battery in certain embodiments. For example, a capacitance range of about 1 uF+−10% @ 6.3v is suitable in some embodiments to serve as a super capacitor. This relativelylarge capacitor assembly 124 can be conveniently accomplished, for example, by using ten 0.1 uF capacitors connected parallel in order to reduce the size and height of the capacitor. - With continuing reference to
FIG. 5 , atemporary port 125 may provided to assist in the manufacturing process. Optionally, it is provided on a part of a printed circuit board that is removed once the manufacturing operations requiring its use are completed.Temporary port 125 may be used, for example, to load data and programs intogeneral processor 52 and associated EEPROM as well assecure processor 44 and its associated EEPROM.Components 123 may be provided to ensure that the electrical connections togeneral processor 52 have appropriate electrical characteristics, are free of power spikes or power dropouts, etc. -
General processor 52 is, in the present example, connected to a number of switches including on/offswitch 28 and account selector switches 38. Also connected togeneral processor 52 are a number of light emitting diodes (“LEDs”) including a “power-on”indicator 30, a “power-off”indicator 32, and “account-on”indicators 36. These various LEDs and switches comprise a human/computer interface with theelectronic card 10. Of course, there are many alternates or additions to theelectronic card 10 and to devices communicating with theelectronic card 10 which are also helpful human/computer interfaces. By way of further example but not limitation, theelectronic card 10 may include an LCD screen (with or without a touch panel), audio I/O, voice recognition, and various other alternatives that will be apparent to those of skill in the art. - In this example, an
RC buffering circuit 66 is coupled togeneral processor 52 and converts (in conjunction with thebroadcaster 68 and/or other components) square wave type signals emanating fromgeneral processor 52 into wave forms which emulate the magnetic signals (“dynamic magnetic flux”) provided by a magnetic stripe transaction card passing through a reader. Wave forms are communicated electrically tobroadcaster 68 which converts the electrical signals into a dynamic magnetic field which simulates the passing of a card with a magnetic stripe through a magnetic stripe reader. Theelectronic card 10 may be moving or stationary, and the varying magnetic field broadcasted by thebroadcaster 68 will emulate the varying magnetic field created by a magnetic stripe of a conventional transaction card moving past a read head. The magnetic signal created by the broadcaster therefore tends to be substantially uniform along its length. -
Sensors 70 provide signals togeneral processor 52 to indicate that the card has made physical contact with the reader.Sensors 70 may take various forms including physical switches, pressure sensors or other alternatives which will be apparent to those of skill in the art.Broadcaster 68 achieves its waveform subsequent to the activation of one ormore sensors 70. - Four
exemplary coils FIG. 5 . More particularly, in this exemplary embodiment, thebroadcaster 68 includes a “track one”coil 128, a “track two”coil 130, a “track one cancellation”coil 132 and a “track two cancellation”coil 134. In this exemplary embodiment, the track onecoil 128 and the track twocoil 130 are preferably positioned on the card for optimal contact with magnetic read head of magnetic stripe reader device 72 (seeFIG. 3 ). That is, the track onecoil 128 is preferably positioned equidistant from and interposed between the track twocoil 130 and the track twocancellation coil 134. - Since the magnetic field from the track two
coil 130 may interfere with the magnetic field of the track onecoil 128, the track twocancellation coil 134 is provided to “cancel” this “cross talk” effect. By “cancel” it is meant that the cross talk is at least significantly reduced. The magnetic field generated by the track twocancellation coil 134 is the inverse of that of the track twocoil 130 thus reduces the effect of the track twocoil 130 magnetic field of track onecoil 128. Similarly, the track twocoil 130 is, in this example, equidistant from and interposed between track onecoil 128 and track onecancellation coil 132. Reduction of the cross talk effect of the track onecoil 128 is provided by the track onecancellation coil 132. The broadcaster coils 128-134 andsensors 70 comprisebroadcaster 68 in this exemplary embodiment. - In an alternative embodiment, cancellation coils 134 and 132 are not provided, but rather, the electrical signals provided to these coils are modified in such a manner that the interfering magnetic fields provide appropriate magnetic input to magnetic
stripe reader device 72. This may be achieved through the use of an ASIC, digital signal processor (DSP), or by other instrumentalities. Optionally, the positions of these twobroadcaster coils 126 may be offset from their positions in the previously described embodiment to provide the appropriate effect. Alternatively, cancellation can be achieved through mechanical shielding with nano materials that could shield the broadcast data between the two adjacent coils. These various exemplary embodiments are given by way of example and not limitation. Alternatives to the embodiments shown inFIG. 5 will be apparent to those of skill in the art. - Furthermore, a digitally synthesized signal may be applied to the
broadcaster 68 which could reduce or eliminate the need for signal conditioning circuitry such as the RC circuit and/or for the need for cancellation coils. The digitally synthesized signal may be accomplished, for example, in thegeneral processor 52, in a DSP, or in other circuitry, as will be appreciated by those skilled in the art. -
FIG. 6 is a top plan view of an exemplary printed circuit (PC)board 136. Preferably,PC board 136 is a “flex” board so that theelectronic card 10 is compliant with the aforementioned ISO 7810 standard for flexibility.PC board 136 is provided with conductive traces, such astraces 137, and supports various electronic components such asprocessors PC board 36 also provides space for thebroadcaster 66 and one or moreelectrochemical batteries 121. This exemplary embodiment is provided by way of example and not limitation. - As noted previously, the thickness (or height, when the card is taken in cross-section) for an
electronic card 10 made to ISO 7810 standard dimensions is only about 30 mils. Therefore, it is important that the various internal components of theelectronic card 10 be thin, flat, and substantially coplanar. By way of example and not limitation, thedigital processor 52 should be thin and flat, with a first substantially planar surface and a substantially opposing second substantially planar surface. It should also define a first maximum surface area. By way of further example but not limitation, theelectrochemical battery 121 should have a first substantially planar surface and as substantially opposing second substantially planar surface, and should define a second maximum surface area. A theoretical plane through the center of thedigital processor 52 should be substantially coplanar with a theoretical plane through the center ofbattery 121 so that the desired thinness of theelectronic card 10 may be achieved. - The word “substantially” is used herein to mean approximately. For example, a substantially planar surface is at least approximately flat. Minor imperfections, steps, bumps or curvatures to the major surfaces are still considered to be “substantially planar”, and do not have to be applied to the entire surface. “Substantially opposing surfaces” are generally facing each other and are at least approximately parallel.
- By “substantially co-planar” it is meant that theoretical center planes are at least close together and approximately parallel. Of course, the center plane of
processor 52 could be above or below the center plane ofbattery 121 and the two components could still be considered “substantially co-planar” as long as the desired thinness of theelectronic card 10 can be maintained. For example, theprocessor 52 andbattery 121 can still be considered coplanar as long as there is any plane generally parallel to the major surfaces of these components which intersects both of the components. If, for example, thebattery 121 is 16 mils high and theprocessor 52 is 10 mils high in cross section, the center planes of the components could be separated by as much as 8 mils and they would still be considered to be “substantially co-planar.” -
FIG. 7 is a bottom plan view ofexemplary PC board 136.PC board 136 is again provided with a number oftraces 137, as well as space for thebroadcaster 66 andbatteries 121. Also shown isinterface 16 which is geometrically positioned to coincide with the position ofsecure processor 44. These exemplary embodiments are given by way of example and not limitation. -
PC board 136 may be, for example, a multilayer PC board. For example, the top of thePC board 136 as seen inFIG. 6 may be a first or top layer, and the bottom of the PC board as seen inFIG. 7 may be a second or bottom layer. The two layers may be adhered together, or there may be other intermediate layers. Each layer includes an insulating substrate made, for example, from a PVC material, and may include conductive traces, pads, and other structures. As noted above, it is desired that the PC board be flexible to help theelectronic card 10 meet the ISO 7810 standards for flexibility. -
FIG. 8 is an exploded, partially cross-sectional view ofelectronic card 10. Abottom cover 140 has, in this example, a maximum height of about 25 mils. It should be noted that thebottom cover 140 is contoured on itsupper surface 141 to fit the contours of the PC board, battery, and/or components attached to the bottom of the PC board or the like. ThePC board 136, in this example, has a height of about 6 mils, which makes it thin and flexible.General processor 52 is shown mounted onPC board 136 and encapsulated by material 144 (e.g. an epoxy encapsulant). Also shown issecure processor 44 similarly encapsulated bymaterial 144. Also mounted onPC board 136 are the various components ofbattery 121. - With continuing reference to
FIG. 8 , an exemplary embodiment ofbattery 121 has a height of 16 mils. Also shown inFIG. 8 isbroadcaster 68 which coincides laterally withbattery 121 in this embodiment and thus occupies the overlapping space in this cross-section diagram.Broadcaster 68 as shown in this exemplary embodiment has a height of about 20 mils. Also mountedPC board 136 are account selector switches 38, “on”indicator 30, and “off”indicator 32.Account indicators 34 coincide laterally with onindicator 30 and, therefore, occupy overlapping space in this cross-section view. Cover 146 is shown with a height of about 5 mils. When assembled, theelectric card 30 is therefore approximately 30 mils, which is ISO 7810 compliant. The exemplary embodiments shown inFIG. 8 are given by way of example and not limitation, and dimensions can vary, as will be appreciated by those of skill in the art. -
FIG. 9 is a partial cross-sectional view ofelectronic card 10 after it has been assembled. The various exemplary components are shown with the various layers in compact form as with a finishedelectronic card 10.Covers epoxy adhesive 147 is used to encapsulate the electrical and electronic components (other than those which must be exposed) and to hold the assembly together. Thecovers electronic card 10 compliant with the dimensions set forth by ISO 7810 standard. Importantly, the thickness T should not be much greater than about 30 mils so that it works properly with legacy card readers. Other embodiments provide electronic cards of different sizes and formats. -
FIG. 10 is a detailed elevational view of a wire bond connecting a processor die 56 toPC board 136. This exemplary embodiment allows for a low profile as is advantageous due to the severe size constraints imposed by the thickness standards forelectronic card 10.Die 56 is mounted onPC board 136 using an adhesive orother bonding material 158 which forms the physical connection betweenprocessor 56 and printedcircuit board 136.Wire 148 electrically connects abonding pad 160 ofprocessor 56 with abonding pad 160 ofPC board 136. - It is very important to have a low loop-height “d” for the
wire 148. Conventional wire bonding techniques bond a wire first to the processor and then to the substrate, resulting in a very high loop height. A high loop height is unacceptable for electronic cards, which must be made very thin. Also, a high loop height creates a reliability problem due to bending and torsional stresses to which the electronic card may be subjected. - In accordance with an aspect of this exemplary embodiment, a reverse bonding process is used where the
wire 148 is first attached to thePC board 136 and then attached to theprocessor 56. This results in a short loop height “d” , which is preferably less than 5 mils and is more preferably 2-4 mils or less. As a result, the total height of the loop is equal to d+D, where “D” is the height of the top surface of theprocessor 56 above the top surface of thePC board 136. In the present example, the processor die 56 is about 9-10 mils, and the adhesive is about 1-2 mils, resulting in a height D of about 10-12 mils. If the loop height d is in the range of 2-4 mils, the total height of the loop above the top surface of the PC board is in the range of 12-16 mils, in this example. - The low loop height also helps with the aforementioned bending and torsional stresses to which the electronic card may be subjected. For example, with a loop height of preferably less than 5 mils, more preferably less than 4 mils, and most preferably about 2 mils or less, 7-10 grams of pull-strength on the wire can be achieved.
- In another embodiment, the
processor 56 is attached to the PC board in a flip-chip fashion. Techniques for attaching dies to substrates in a flip-chip fashion are well known to those skilled in the art. -
FIG. 11 shows areceptacle 160 inPC board 136 forbroadcaster 68.Broadcaster 68, in this example, is inserted intoreceptacle 160 at a late stage of the manufacturing process and is then electrically connected to contactpads 161. When mountingbroadcaster 68 insidereceptacle 160 it is important to achieve a high degree of geometric alignment so thatbroadcaster 68 can be properly aligned with the read head of a card reader.Guides 162, visible through holes inbroadcaster 68, are provided to aid in this physical alignment process. When insertingbroadcaster 68 intoslot 160, it is preferable that the alignment guides 162 closely align with the holes inbroadcaster 68. Optical microscopes may be used to help with this process. Of course, these exemplary embodiments are given by way of example and not limitation, and other alignment techniques are suitable. -
FIG. 12 showsbroadcaster 68 in its final form before it is inserted intoslot 160. Track onecoil 128 and track twocoil 130 are aligned to make optimal contact with magneticstripe reader device 72. Track onecancellation coil 132 and track twocancellation coil 134 are positioned appropriately to perform their function of cancellation cross talk between track onecoil 128 and track twocoil 130.Sensors 70 are shown here as trip switches which detect the event ofelectronic card 10 being passed through magneticstripe reader device 72. - These exemplary embodiments are given by way of example and not limitation. Alternatives for the composition and configuration of
broadcaster 68 will be apparent to those of skill in the art. For example, alternative embodiments which do not include cancellation coils 132 and 134 are contemplated as are other alternative embodiments. As another non-limiting example, certain embodiments have only a single track coil. -
FIG. 13 shows anexemplary broadcaster coil 128 in greater detail. The other broadcaster coils 130-134 can be of similar or identical design, or can be of different designs in alternated embodiments. In this embodiment, awire 164 is wound around aferromagnetic core 166. Thewire 164 can be made from, for example, copper or aluminum, alloys thereof, etc. Thewire 164 may be insulated, or thecore 166 may be insulating or insulated to prevent the windings ofwire 164 from shorting out. - In an exemplary embodiment,
broadcaster core 166 is composed of a material called “HyMu 80”, with favorable magnetic properties, which is commercially available from National Electronic Alloys Inc. A single strand ofcopper wire 164 is wound aroundbroadcaster core 166 at regularly spaced intervals, e.g. with a constant pitch “P.” In an exemplary embodiment, the pitch of the wire coil is about 4.8 mils. This exemplary embodiment is given by way of example and not limitation, as other pitches and variable pitches are suitable in certain embodiments. -
FIG. 14 shows an exemplary spacing ofwire 164 coiled aroundcore 166.FIG. 14 shows a regular spacing between each coil wind ofcopper wire 164 with a constant pitch. This is a preferred embodiment although other embodiments may be used. -
FIG. 15 shows a somewhat irregular winding. Even though some errors may be introduced during the winding process, it is possible to still use the resulting broadcaster coils despite some error in the winding process as shown inFIG. 15 . The pitch may also be varied to modify the magnetic flux pattern. However, if too much error is introduced during the manufacture ofbroadcaster coil 126, then the coil may be inoperative. It has been found that if the variation in pitch is too great, errors may be introduced into the dynamic magnetic field produced by the coils, resulting in improper operation of the emulator embodiment ofelectronic card 10. -
FIG. 16 depicts an example of too much error in the positions of the coil windings ofbroadcaster coil 126. It is important to note that many variables exist which affect the threshold of operability and that thebroadcaster coil 126 should be tested in order to ensure proper quality. It may not be necessary to test each and every coil but a sampling ofbroadcaster coils 126 should be tested to ensure that a manufactured batch of coils is operative.FIGS. 14 through 16 are given as examples of alternative coil windings and should not be construed in a limiting way. - The aforementioned embodiments for the coils teach winding a wire around a ferromagnetic core. In alternate embodiments, the coils can be made in other fashions. For example, coils can be made with various deposition, patterning, and etching techniques. As will be appreciated by those skilled in the art, a ferromagnetic core can be coated with an insulating film, and then coated with a conductive (usually metal) layer of, for example, copper or aluminum or alloys thereof by, by way of example and not limitation, sputtering and nano-sputtering techniques. A mask can then be applied to the conductive layer to define the coil, and portions of the conductive layer can be etched away to provide the windings. The mask can be made photolithographically, by spraying with, for example, ink-jet technologies, or by other techniques well known to those skilled in the art. The etching can be accomplished with an acid which attacks the conductive layer but which is stopped by the insulating film. This method of coil production may have advantages in high-volume manufacturing situations.
- For example, a ferromagnetic coil can be prepared and cleaned. An insulating and/or etch stop layer can be applied by a variety of techniques including, but not limited to, dipping, spraying, coating, sputtering, CVD, etc. A metal or other conductive layer can then be applied, again by a variety of techniques including, but not limited to, dipping, spraying, coating, sputtering, CVD, etc. A mask layer can be applied as a photolithographic material, by painting, printing, spraying, stenciling, etc., as will be appreciated by those skilled in the art. The etching of the conductive layer through the mask layer can be accomplished by a variety of techniques including, but not limited to, dipping, spraying, immersing, and plasma etching techniques. The mask layer is then removed, and a passifying layer may be applied to protect the coil assembly.
- As will be appreciated by those skilled in the art, there are other ways to produce the effects of the “coils” of the broadcaster. For example, magnetic material can be lithographically sputtered to create the broadcaster coil effect. There are a variety of mass production techniques such as those noted above, by example, which will be apparent to those skilled in the art of semiconductor and micro-machine manufacturing.
-
FIG. 17 shows an alternate embodiment which allows abroadcaster 68′ to operate without cancellation coils. Track onecoil 128 and track twocoil 130 are shown withinbroadcaster 68′.Buffering circuit 66′, in this embodiment, is designed to perform cancellation prior to emitting the wave forms to track onecoil 128 and track twocoil 130. The wave forms are adjusted in such a way that the overall cross talk effect between track onecoil 128 and track twocoil 130 produces the desired magnetic flux. This alternate embodiment cancels cross talk by correcting the wave forms so that the appropriate signals to be received by magneticstripe reader device 72. In this embodiment, bufferingcircuit 66′ may be an ASIC, a DSP, or other appropriate components for signal processing.Sensors 70 are present in this embodiment ofbroadcaster 68. - In one exemplary alternative embodiment,
general processor 52 is comprised of an ASIC chip, which optionally includes one or more other components ofexemplary transaction card 10. For example, the ASIC assumes the role of bufferingcircuit 66 as well as the duties of other components associated withgeneral processor 52 in the previously disclosed embodiments. Further, the ASIC embodiment could, for example, produce adjusted waveforms fortrack 1coil 128 andtrack 2coil 130 so that it is not necessary to includetrack 1cancellation coil 132 ortrack 2cancellation coil 134. For example, the ASIC could apply a correction to the amplitude and phase of the waveform oftrack 1coil 128 because of the anticipated effect of magnetic flux interference fromtrack 2coil 130. Likewise, a correction would be applied to the waveform fortrack 2coil 130, to cancel the effect oftrack 1coil 128. - Note that the corrections applied to the waveform may vary with time because the interference from the opposing
broadcaster coil 126 may vary with time (at different parts of the waveform). Thus, the correction constitutes two new waveforms for the two respective broadcaster coils 128 and 130 of this exemplary embodiment. Note also that the correction waveform for a givenbroadcaster coil 128 will itself cause interference with the opposingbroadcaster coil 130, and vice versa. - In some exemplary embodiments, an additional correction is applied to compensate for the effect of the previous correction. In still further exemplary embodiments, one or more additional corrections are applied until the diminishing effect of interference becomes negligible as the series converges. Note that these corrections are performed in a computational manner before the corresponding portions of the waveforms reach the
broadcaster 68. - In a further alternative embodiment, the crosstalk cancellation is performed in a linear RC circuit which outputs corrected waveforms to track 1
coil 128 andtrack 2coil 130. This RC circuit could be disposed within the exemplary ASIC described above or external to the ASIC. Again, this embodiment is provided by way of example and not limitation. -
FIG. 18 shows a manufacturing process for producingelectronic card 10. In anoperation 168, a first phase of the manufacturing process is performed. During this process, the various components are mounted and programmed. Anoperation 170 continues this process of manufacture in a second phase by installing additional components such as thebroadcaster 68 andbattery 121. Finally, the manufacturing process is completed in a third phase by anoperation 172 which performs an epoxy fill. -
FIG. 19 shows thefirst phase 168 of manufacturing in greater detail. In anoperation 174 technology components are mounted to the surface of their associated printed circuits. In anoperation 176, the die is attached. Previously described wiring bonding process may be performed in anoperation 178 to electrically connect the die to the printed circuit board. Then, in aprogramming step 180,secure processor 44 andgeneral processor 52 are programmed with various data and programs necessary for the operation ofelectronic card 10. Anoperation 182 performs a functional test prior to encapsulation to ensure that the programming was successfully loaded and the various electrical connections were secure. - In a
decision step 184, it is determined whether or not the functional test has been passed. If it is not, then, control passes to anoperation 186, wherein the problem which causes the failure is determined. Then, in anoperation 188, the problem is reworked in anoperation 188 and, then, control passes again toprogramming step 180. If, on the other hand, indecision step 184 it is determined that the functional test is passed, then, an encapsulation process is performed instep 190. Once encapsulation is completed, the first phase of manufacture is completed. The process shown here is exemplary and as will be apparent to those of skill in the art, many alternative embodiments may be used. That is, this process is described by way of example and not limitation. -
FIG. 20 describes theprogramming operation 180 in greater detail. The operation is commenced in anoperation 192 and continues in anoperation 194 whereinelectronic card 10 is attached to a test rig. A test program is launched on the test rig in anoperation 196. The purpose of this test program is to load data and programs on to the technology components ofelectronic card 10, such assecure processor 44 andgeneral processor 52. In anoperation 198, the test program is initialized. This may involve loading various parameters and settings from a file or obtaining them from a user. Anoperation 200 performs the actual loading of the software and data on to the technology components aforementioned. Then, in anoperation 202, the process is concluded. This process is shown in terms of its exemplary embodiments and should not be construed in a limiting way. -
FIG. 21 showsoperation 200 ofFIG. 20 in greater detail. This operation is used to load software and data into the technology components ofelectronic card 10. The operation is commenced with anoperation 204 and continues with anoperation 206, which opens a file containing the code and data to be loaded. Then, in anoperation 208, an address range is obtained for a specific block of data. This address range is used when communicating withsecure processor 44 andgeneral processor 52 to specifically identify the locations in EEPROM where this particular block of data should be stored. As is understood by those skilled in the art, the data could comprise programs. In anoperation 210, a message is formatted which contains a block of data and the address information. Then, in anoperation 212, the message is sent. Anoperation 214 receives and records status information. Adecision operation 216 determines whether or not the last block has been sent or if, for other reasons, the process should be terminated, such as in the case of an error. If it is determined that the loading operation should continue, control passes back tooperation 208. If inoperation 216 it is determined that the process should terminate, control passes to an operation 218 which reports the status of the loading operation and, then, the process is concluded in anoperation 220. -
FIG. 22 shows the second phase ofmanufacturing operation 170 in greater detail. The process starts in anoperation 222 and continues in anoperation 224, which performs a functional test on the device. In adecision operation 226, it is determined whether or not the functional test has been passed and, if it has not, control passes to anoperation 228 where corrective action is taken. Control then passes to back tooperation 224. If, inoperation 226, it is determined that the functional test has been passed, control passes tooperation 228 wherein the dome switch is taped and the via switch is soldered. Then, in anoperation 230,broadcaster 68 is installed in the slot provided for it withinelectronic card 10. Then, in anoperation 232,battery 121 is installed. In anoperation 234, the assembly is inspected and tested. If it is determined inoperation 234 that the assembly is not functioning properly, control passes to anoperation 236 where corrective action is taken. Control then passes back tooperation 234. If it is determined inoperation 234 that the assembly is working correctly, control passes to anoperation 236 which ends the process. These exemplary embodiments are given by way of example and not limitation. -
FIG. 23 describes thethird phase 172 of the manufacturing process. It begins with anoperation 238 and continues with anoperation 240 wherein the assembly ofelectronic card 10 is filled with epoxy, laminated and tested. Then, in anoperation 242, various measurements of the assembly are taken and, in adecision step 244, it is determined whether or not the assembly needs to be reworked. If it is determined inoperation 244 that the assembly needs to be reworked, corrective action is taken inoperation 246, and control is passed back tooperation 244. If it is determined inoperation 244 that the assembly does not require reworking, control is passed tooperation 246, which concludes the process. - The above described exemplary manufacturing process, and variants thereof, may be used to a variety of embodiments of
transaction card 10. For example, a variant of the manufacturing process uses photolithography techniques well known to those skilled in the art to producebroadcaster 68. This method avoids the use of coil winding, which may save time and money when manufacturingtransaction card 10 in large numbers. - Another variant of the process would use the “flip chip” method well known to those skilled in the art to mount one or more technology components such as
general processor 52. Optionally, this variant would include the use of an ASIC asgeneral processor 52. This embodiment is given by way of example and not limitation. - An alternative exemplary embodiment of
non-contact communication port 77 ofFIG. 3 comprises a WiFi device or equivalent, which allows this embodiment oftransaction card 10 to communicate with the internet independently of a card reader. By non-limiting example, the WiFi 802.11b and 802.11g protocols may be used. The card could periodically download and upload information, and also perform transactions in response to user input. Information from the internet could be displayed to the user and interaction with the World Wide Web would also be possible in certain embodiments. This embodiment would preferably include an LCD display or equivalent and a touch screen or equivalent. This embodiment is given by way of example and not limitation. - Although various embodiments have been described using specific terms and devices, such description is for illustrative purposes only. The words used are words of description rather than of limitation. It is to be understood that changes and variations may be made by those of ordinary skill in the art without departing from the spirit or the scope of the present invention, which is set forth in the following claims. In addition, it should be understood that aspects of various other embodiments may be interchanged either in whole or in part. It is therefore intended that the claims be interpreted in accordance with the true spirit and scope of the invention without limitation or estoppel.
Claims (35)
1. An electronic card comprising:
a thin, flat digital processor having a first substantially planar surface and a substantially opposing second substantially planar surface, wherein at least one of said first surface, said second surface, and a cross-section of said processor define a maximum surface area;
a thin, flat electrochemical battery having a first substantially planar surface and a substantially opposing second substantially planar surface, wherein at least one of said first surface, said second surface, and a cross-section of said processor define a maximum surface area, said battery being positioned substantially co-planar with said processor and capable of powering said processor;
a communications port coupled to said processor;
a first flexible cover and an opposing second flexible cover, each having card a surface area greater than the combined maximum surface areas of said digital processor and said battery;
wherein said processor and said battery are sandwiched between and enclosed by said first flexible cover and said second flexible cover.
2. An electronic card as recited in claim 1 further comprising a flexible circuit board including a plurality of traces, wherein said processor is electrically coupled to traces of said circuit board.
3. An electronic card as recited in claim 2 wherein said circuit board is no thicker than about 10 mils.
4. An electronic card as recited in claim 2 wherein said battery can be electrically coupled to said circuit board.
5. An electronic card as recited in claim 2 wherein at least said processor is encapsulated.
6. An electronic card as recited in claim 2 further comprising an encapsulant substantially covering said circuit board, processor and battery.
7. An electronic card as recited in claim 2 wherein at least one of said first cover and said second cover are contoured to fit over said circuit board, processor and battery.
8. An electronic card as recited in claim 2 wherein said communication port is coupled to said circuit board.
9. An electronic card as recited in claim 2 further comprising a switch coupled to said circuit board.
10. An electronic card as recited in claim 9 wherein said switch is a power switch.
11. An electronic card as recited in claim 9 wherein a plurality of switches are coupled to said circuit board.
12. An electronic card as recited in claim 2 further comprising an indicator coupled to said circuit board.
13. An electronic card as recited in claim 12 wherein said indicator is an LED.
14. An electronic card as recited in claim 12 wherein a plurality of indicators are coupled to said circuit board.
15. An electronic card as recited in claim 2 wherein said processor is electrically coupled to traces of said circuit board in a flip-chip fashion.
16. An electronic card as recited in claim 2 wherein said processor is electrically coupled to traces of said circuit board by wires bonded at a first end to said circuit board and bonded at a second end to said processor.
17. An electronic card as recited in claim 16 wherein said wires to not extend more than 5 mils above a surface of said processor to which they are bonded.
18. An electronic card as recited in claim 1 wherein said battery is rechargeable.
19. An electronic card as recited in claim 1 wherein said battery is not rechargeable.
20. An electronic card as recited in claim 1 further comprising a capacitor coupled to said battery to provide additional charge storage.
21. An electronic card as recited in claim 1 wherein said battery is no thicker than 20 mils.
22. An electronic card as recited in claim 21 wherein said battery includes a plurality of batteries.
23. An electronic card as recited in claim 22 wherein said battery includes a filter.
24. A method for making an electronic card comprising:
making a flexible printed circuit board;
attaching at least one processor to said printed circuit board;
coupling at least one battery to said printed circuit board;
encapsulating at least said one processor;
making a top cover and a bottom cover; and
sandwiching said printed circuit board, said processor and said battery between said top cover and said bottom cover.
25. An enhanced Smart Card comprising:
a card body provided with an externally accessible card interface including a signal port, a power port, and a ground port;
a secure processor disposed at least partially within said card body and coupled to said signal port, said power port, and said ground port;
a general processor disposed at least partially within said card body, said general processor being coupled to a power source disposed at least partially within said card body and being operative to provide power to and communicate with said secure processor when said secure processor is being used in an enhanced Smart Card mode; and
a non-contact communications port coupled to at least one of said secure processor and said general processor.
26. A secure transaction card comprising:
a card body;
a secure processor disposed at least partially within said card body;
a general processor disposed at least partially within said card body;
a power source disposed at least partially within said card body; and
a non-contact communications port coupled to at least one of said secure processor and said general processor.
27. A swipe emulating broadcaster system comprising:
a coil including an elongated core material and a winding having a plurality of turns around said core material; and
a signal generator having a broadcaster driver signal coupled to said coil such that said coil provides a dynamic magnetic field which emulates the swiping of a magnetic stripe transaction card past a read head of a card reader.
28. A swipe emulating broadcaster as recited in claim 27 wherein said signal generator includes a processor having a digital output and a signal processing circuit which converts said digital output to said broadcaster driver signal.
29. A swipe emulating broadcaster system as recited in claim 27 wherein said signal generator is a digital signal processor.
30. A swipe emulating broadcaster as recited in claim 27 wherein said coil one of a plurality of coils.
31. A swipe emulating broadcaster as recited in claim 30 wherein at least one of said plurality of coils is a track coil.
32. A swipe emulating broadcaster as recited in claim 30 wherein at least one of said plurality of coils is a cancellation coil.
33. A swipe emulating broadcaster as recited in claim 27 wherein said coil comprises a wire wound around said core.
34. A swipe emulating broadcaster as recited in claim 27 wherein said coil comprises a wire formed around said core by a process including at least the deposition of conductive material and the etching of said conductive material.
35. A method for creating a low-loop bonding for thin profile applications comprising:
attaching a first surface of a fabricated semiconductor die to a first surface of a substrate having a plurality of substrate contact pads, such that a second surface of said die which opposes said first surface is exposed to provide access to a plurality of die contact pads;
wire bonding a first end of a wire to a substrate contact pad; and
wire bonding a second end of said wire to a die contact pad, such that the loop height of said wire is no greater that 5 mils above said second surface of said die, and no greater than 20 mils above said first surface of said substrate.
Priority Applications (13)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/413,595 US20070034700A1 (en) | 2005-04-27 | 2006-04-27 | Electronic cards and methods for making same |
US12/726,868 US7954724B2 (en) | 2005-04-27 | 2010-03-18 | Electronic card and methods for making same |
US13/102,991 US8231063B2 (en) | 2005-03-26 | 2011-05-06 | Electronic card and methods for making same |
US13/438,655 US9053399B2 (en) | 2005-03-26 | 2012-04-03 | Method for broadcasting a magnetic stripe data packet from an electronic smart card |
US13/438,700 US8540165B2 (en) | 2005-03-26 | 2012-04-03 | Laminated electronic card assembly |
US13/438,680 US8684267B2 (en) | 2005-03-26 | 2012-04-03 | Method for broadcasting a magnetic stripe data packet from an electronic smart card |
US13/448,256 US8302871B2 (en) | 2005-03-26 | 2012-04-16 | Method for conducting a transaction between a magnetic stripe reader and an electronic card |
US13/448,281 US8360332B2 (en) | 2005-03-26 | 2012-04-16 | Electronic card |
US13/448,266 US8480002B2 (en) | 2005-03-26 | 2012-04-16 | Conducting a transaction with an electronic card |
US13/448,244 US8500019B2 (en) | 2005-03-26 | 2012-04-16 | Electronic cards and methods for making same |
US13/453,882 US8286889B2 (en) | 2005-03-26 | 2012-04-23 | Electronic financial transaction cards and methods |
US13/598,524 US8678276B2 (en) | 2005-03-26 | 2012-08-29 | Method for conducting a transaction between a magnetic stripe reader and an electronic card |
US14/731,683 US20150347891A1 (en) | 2005-03-26 | 2015-06-05 | Method for Broadcasting a Magnetic Stripe data Packet from an Electronic Device |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US67538805P | 2005-04-27 | 2005-04-27 | |
US11/391,719 US20080148394A1 (en) | 2005-03-26 | 2006-03-27 | Electronic financial transaction cards and methods |
US11/413,595 US20070034700A1 (en) | 2005-04-27 | 2006-04-27 | Electronic cards and methods for making same |
Related Parent Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/391,719 Continuation-In-Part US20080148394A1 (en) | 2005-03-26 | 2006-03-27 | Electronic financial transaction cards and methods |
US13/438,680 Continuation-In-Part US8684267B2 (en) | 2005-03-26 | 2012-04-03 | Method for broadcasting a magnetic stripe data packet from an electronic smart card |
Related Child Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/726,868 Continuation US7954724B2 (en) | 2005-03-26 | 2010-03-18 | Electronic card and methods for making same |
US12/726,868 Continuation-In-Part US7954724B2 (en) | 2005-03-26 | 2010-03-18 | Electronic card and methods for making same |
Publications (1)
Publication Number | Publication Date |
---|---|
US20070034700A1 true US20070034700A1 (en) | 2007-02-15 |
Family
ID=37215598
Family Applications (9)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/413,595 Abandoned US20070034700A1 (en) | 2005-03-26 | 2006-04-27 | Electronic cards and methods for making same |
US12/726,868 Expired - Fee Related US7954724B2 (en) | 2005-03-26 | 2010-03-18 | Electronic card and methods for making same |
US13/102,991 Active US8231063B2 (en) | 2005-03-26 | 2011-05-06 | Electronic card and methods for making same |
US13/448,256 Active US8302871B2 (en) | 2005-03-26 | 2012-04-16 | Method for conducting a transaction between a magnetic stripe reader and an electronic card |
US13/448,266 Active US8480002B2 (en) | 2005-03-26 | 2012-04-16 | Conducting a transaction with an electronic card |
US13/448,281 Active US8360332B2 (en) | 2005-03-26 | 2012-04-16 | Electronic card |
US13/448,244 Active US8500019B2 (en) | 2005-03-26 | 2012-04-16 | Electronic cards and methods for making same |
US13/453,882 Active US8286889B2 (en) | 2005-03-26 | 2012-04-23 | Electronic financial transaction cards and methods |
US13/598,524 Active US8678276B2 (en) | 2005-03-26 | 2012-08-29 | Method for conducting a transaction between a magnetic stripe reader and an electronic card |
Family Applications After (8)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/726,868 Expired - Fee Related US7954724B2 (en) | 2005-03-26 | 2010-03-18 | Electronic card and methods for making same |
US13/102,991 Active US8231063B2 (en) | 2005-03-26 | 2011-05-06 | Electronic card and methods for making same |
US13/448,256 Active US8302871B2 (en) | 2005-03-26 | 2012-04-16 | Method for conducting a transaction between a magnetic stripe reader and an electronic card |
US13/448,266 Active US8480002B2 (en) | 2005-03-26 | 2012-04-16 | Conducting a transaction with an electronic card |
US13/448,281 Active US8360332B2 (en) | 2005-03-26 | 2012-04-16 | Electronic card |
US13/448,244 Active US8500019B2 (en) | 2005-03-26 | 2012-04-16 | Electronic cards and methods for making same |
US13/453,882 Active US8286889B2 (en) | 2005-03-26 | 2012-04-23 | Electronic financial transaction cards and methods |
US13/598,524 Active US8678276B2 (en) | 2005-03-26 | 2012-08-29 | Method for conducting a transaction between a magnetic stripe reader and an electronic card |
Country Status (4)
Country | Link |
---|---|
US (9) | US20070034700A1 (en) |
EP (1) | EP1882229B1 (en) |
KR (1) | KR20080003006A (en) |
WO (1) | WO2006116772A2 (en) |
Cited By (168)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030033246A1 (en) * | 2000-02-09 | 2003-02-13 | Slater Kim Michele | Sponsor funded stored value card |
US20050127168A1 (en) * | 1998-06-22 | 2005-06-16 | Jpmorgan Chase Bank, N.A. | Debit purchasing of stored value card for use by and/or delivery to others |
US20060053125A1 (en) * | 2002-10-02 | 2006-03-09 | Bank One Corporation | System and method for network-based project management |
US20060106703A1 (en) * | 2000-11-02 | 2006-05-18 | First Usa Bank, Na | System and method for aggregate portfolio client support |
US20080040276A1 (en) * | 2006-06-19 | 2008-02-14 | Ayman Hammad | Transaction Authentication Using Network |
US20080035738A1 (en) * | 2005-05-09 | 2008-02-14 | Mullen Jeffrey D | Dynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit card |
US20080054079A1 (en) * | 2005-05-09 | 2008-03-06 | Mullen Jeffrey D | Dynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit card |
US20080105751A1 (en) * | 2006-10-31 | 2008-05-08 | Steven Landau | Powered Authenticating Cards |
US20080126260A1 (en) * | 2006-07-12 | 2008-05-29 | Cox Mark A | Point Of Sale Transaction Device With Magnetic Stripe Emulator And Biometric Authentication |
US20080126212A1 (en) * | 2006-07-12 | 2008-05-29 | Cox Mark A | Method of Marketing Credit Card Accounts and Point-Of-Sale Payment Devices |
US20080200210A1 (en) * | 2007-02-16 | 2008-08-21 | Lim Hwang-Kiu | Mobile communication device and battery recharge method thereof |
US20080223925A1 (en) * | 2005-08-18 | 2008-09-18 | Ivi Samrt Technologies, Inc. | Biometric Identity Verification System and Method |
US20080237356A1 (en) * | 2007-03-23 | 2008-10-02 | Innovatier, Inc. | Step card and method for making a step card |
US20080319912A1 (en) * | 2007-06-22 | 2008-12-25 | Faith Patrick L | Powering financial transaction token with onboard and external power source |
US20090119211A1 (en) * | 2007-11-02 | 2009-05-07 | Citicorp Credit Services, Inc. | Methods and systems for managing financial institution customer accounts |
US20090159667A1 (en) * | 2007-12-24 | 2009-06-25 | Dynamics, Inc. | Cards with serial magnetic emulators |
US20090199004A1 (en) * | 2008-01-31 | 2009-08-06 | Mark Stanley Krawczewicz | System and method for self-authenticating token |
US20100027788A1 (en) * | 2007-07-02 | 2010-02-04 | Freescale Semiconductor, Inc. | Asymmetric Cryptographic Device With Local Private Key Generation and Method Therefor |
US7747463B1 (en) | 1998-06-22 | 2010-06-29 | Jpmorgan Chase Bank, N.A. | Debit purchasing of stored value card for use by and/or delivery to others |
DE102009031011A1 (en) * | 2009-06-29 | 2010-08-19 | Siemens Aktiengesellschaft | Universal serial bus storage-stick has unit with connection for connecting to universal serial bus interface, controller, data storage and emergency power supply |
US20100207735A1 (en) * | 2009-02-18 | 2010-08-19 | Samsung Sdi Co., Ltd. | Rfid communication device |
US7801816B2 (en) | 2001-05-23 | 2010-09-21 | Jp Morgan Chase Bank, N.A. | System and method for currency selectable stored value instrument |
US7801799B1 (en) | 1998-11-17 | 2010-09-21 | Jpmorgan Chase Bank, N.A. | Customer activated multi-value (CAM) card |
US7809595B2 (en) | 2002-09-17 | 2010-10-05 | Jpmorgan Chase Bank, Na | System and method for managing risks associated with outside service providers |
US7860789B2 (en) | 2001-07-24 | 2010-12-28 | Jpmorgan Chase Bank, N.A. | Multiple account advanced payment card and method of routing card transactions |
US7899753B1 (en) | 2002-03-25 | 2011-03-01 | Jpmorgan Chase Bank, N.A | Systems and methods for time variable financial authentication |
US7966496B2 (en) | 1999-07-02 | 2011-06-21 | Jpmorgan Chase Bank, N.A. | System and method for single sign on process for websites with multiple applications and services |
US7987501B2 (en) | 2001-12-04 | 2011-07-26 | Jpmorgan Chase Bank, N.A. | System and method for single session sign-on |
USD643063S1 (en) | 2010-07-09 | 2011-08-09 | Dynamics Inc. | Interactive electronic card with display |
US8020754B2 (en) | 2001-08-13 | 2011-09-20 | Jpmorgan Chase Bank, N.A. | System and method for funding a collective account by use of an electronic tag |
US20110251955A1 (en) * | 2008-12-19 | 2011-10-13 | Nxp B.V. | Enhanced smart card usage |
US8066191B1 (en) | 2009-04-06 | 2011-11-29 | Dynamics Inc. | Cards and assemblies with user interfaces |
USD651238S1 (en) | 2010-07-09 | 2011-12-27 | Dynamics Inc. | Interactive electronic card with display |
USD651237S1 (en) | 2010-07-09 | 2011-12-27 | Dynamics Inc. | Interactive electronic card with display |
USD651644S1 (en) | 2010-07-09 | 2012-01-03 | Dynamics Inc. | Interactive electronic card with display |
USD652075S1 (en) | 2010-07-02 | 2012-01-10 | Dynamics Inc. | Multiple button interactive electronic card |
USD652076S1 (en) | 2010-07-09 | 2012-01-10 | Dynamics Inc. | Multiple button interactive electronic card with display |
USD652450S1 (en) | 2010-07-09 | 2012-01-17 | Dynamics Inc. | Multiple button interactive electronic card |
USD652448S1 (en) | 2010-07-02 | 2012-01-17 | Dynamics Inc. | Multiple button interactive electronic card |
USD652449S1 (en) | 2010-07-02 | 2012-01-17 | Dynamics Inc. | Multiple button interactive electronic card |
USD652867S1 (en) | 2010-07-02 | 2012-01-24 | Dynamics Inc. | Multiple button interactive electronic card |
USD653288S1 (en) | 2010-07-09 | 2012-01-31 | Dynamics Inc. | Multiple button interactive electronic card |
US8145549B2 (en) | 2003-05-30 | 2012-03-27 | Jpmorgan Chase Bank, N.A. | System and method for offering risk-based interest rates in a credit instutment |
US8141780B2 (en) | 2008-02-23 | 2012-03-27 | Cedar Ridge Research Llc | System and method for data card emulation |
US8160960B1 (en) | 2001-06-07 | 2012-04-17 | Jpmorgan Chase Bank, N.A. | System and method for rapid updating of credit information |
EP2442259A1 (en) * | 2009-06-12 | 2012-04-18 | Hierstar Limited (Beijing) | Smart card capable of being used for infrared communication |
US8185940B2 (en) | 2001-07-12 | 2012-05-22 | Jpmorgan Chase Bank, N.A. | System and method for providing discriminated content to network users |
USD665022S1 (en) | 2010-07-09 | 2012-08-07 | Dynamics Inc. | Multiple button interactive electronic card with light source |
USD665447S1 (en) | 2010-07-09 | 2012-08-14 | Dynamics Inc. | Multiple button interactive electronic card with light source and display |
USD666241S1 (en) | 2010-07-09 | 2012-08-28 | Dynamics Inc. | Multiple button interactive electronic card with light source |
US8301493B2 (en) | 2002-11-05 | 2012-10-30 | Jpmorgan Chase Bank, N.A. | System and method for providing incentives to consumers to share information |
USD670332S1 (en) | 2011-05-12 | 2012-11-06 | Dynamics Inc. | Interactive card |
USD670329S1 (en) | 2011-05-12 | 2012-11-06 | Dynamics Inc. | Interactive display card |
USD670330S1 (en) | 2011-05-12 | 2012-11-06 | Dynamics Inc. | Interactive card |
USD670331S1 (en) | 2011-05-12 | 2012-11-06 | Dynamics Inc. | Interactive display card |
USD670759S1 (en) | 2010-07-02 | 2012-11-13 | Dynamics Inc. | Multiple button interactive electronic card with light sources |
US8322623B1 (en) | 2010-07-26 | 2012-12-04 | Dynamics Inc. | Systems and methods for advanced card printing |
USD672389S1 (en) | 2010-07-02 | 2012-12-11 | Dynamics Inc. | Multiple button interactive electronic card with light sources |
USD673606S1 (en) | 2012-08-27 | 2013-01-01 | Dynamics Inc. | Interactive electronic card with display and buttons |
USD674013S1 (en) | 2010-07-02 | 2013-01-08 | Dynamics Inc. | Multiple button interactive electronic card with light sources |
US8348172B1 (en) | 2010-03-02 | 2013-01-08 | Dynamics Inc. | Systems and methods for detection mechanisms for magnetic cards and devices |
USD675256S1 (en) | 2012-08-27 | 2013-01-29 | Dynamics Inc. | Interactive electronic card with display and button |
USD676487S1 (en) | 2012-08-27 | 2013-02-19 | Dynamics Inc. | Interactive electronic card with display and buttons |
USD676904S1 (en) | 2011-05-12 | 2013-02-26 | Dynamics Inc. | Interactive display card |
US8393546B1 (en) | 2009-10-25 | 2013-03-12 | Dynamics Inc. | Games, prizes, and entertainment for powered cards and devices |
US8393545B1 (en) | 2009-06-23 | 2013-03-12 | Dynamics Inc. | Cards deployed with inactivated products for activation |
US8447672B2 (en) | 2005-05-27 | 2013-05-21 | Jp Morgan Chase Bank, N.A. | Universal payment protection |
US8485446B1 (en) * | 2011-03-28 | 2013-07-16 | Dynamics Inc. | Shielded magnetic stripe for magnetic cards and devices |
USD687095S1 (en) | 2012-08-27 | 2013-07-30 | Dynamics Inc. | Interactive electronic card with buttons |
USD687094S1 (en) | 2010-07-02 | 2013-07-30 | Dynamics Inc. | Multiple button interactive electronic card with light sources |
USD687487S1 (en) | 2012-08-27 | 2013-08-06 | Dynamics Inc. | Interactive electronic card with display and button |
USD687488S1 (en) | 2012-08-27 | 2013-08-06 | Dynamics Inc. | Interactive electronic card with buttons |
USD687489S1 (en) | 2012-08-27 | 2013-08-06 | Dynamics Inc. | Interactive electronic card with buttons |
USD687490S1 (en) | 2012-08-27 | 2013-08-06 | Dynamics Inc. | Interactive electronic card with display and button |
USD687887S1 (en) | 2012-08-27 | 2013-08-13 | Dynamics Inc. | Interactive electronic card with buttons |
US8511574B1 (en) | 2009-08-17 | 2013-08-20 | Dynamics Inc. | Advanced loyalty applications for powered cards and devices |
USD688744S1 (en) | 2012-08-27 | 2013-08-27 | Dynamics Inc. | Interactive electronic card with display and button |
US8523059B1 (en) | 2009-10-20 | 2013-09-03 | Dynamics Inc. | Advanced payment options for powered cards and devices |
US20130255078A1 (en) * | 2012-04-03 | 2013-10-03 | X-Card Holdings, Llc | Information carrying card comprising a cross-linked polymer composition, and method of making the same |
US8561894B1 (en) | 2010-10-20 | 2013-10-22 | Dynamics Inc. | Powered cards and devices designed, programmed, and deployed from a kiosk |
USD692053S1 (en) | 2012-08-27 | 2013-10-22 | Dynamics Inc. | Interactive electronic card with display and button |
US8567679B1 (en) | 2011-01-23 | 2013-10-29 | Dynamics Inc. | Cards and devices with embedded holograms |
US8579203B1 (en) * | 2008-12-19 | 2013-11-12 | Dynamics Inc. | Electronic magnetic recorded media emulators in magnetic card devices |
USD694322S1 (en) | 2012-08-27 | 2013-11-26 | Dynamics Inc. | Interactive electronic card with display buttons |
US8602312B2 (en) | 2010-02-16 | 2013-12-10 | Dynamics Inc. | Systems and methods for drive circuits for dynamic magnetic stripe communications devices |
USD695636S1 (en) | 2012-08-27 | 2013-12-17 | Dynamics Inc. | Interactive electronic card with display and buttons |
US20140001269A1 (en) * | 2012-06-29 | 2014-01-02 | David Joseph Hartwick | Multiple layer card circuit boards |
US8622309B1 (en) * | 2009-04-06 | 2014-01-07 | Dynamics Inc. | Payment cards and devices with budgets, parental controls, and virtual accounts |
US8628022B1 (en) | 2011-05-23 | 2014-01-14 | Dynamics Inc. | Systems and methods for sensor mechanisms for magnetic cards and devices |
US8727219B1 (en) | 2009-10-12 | 2014-05-20 | Dynamics Inc. | Magnetic stripe track signal having multiple communications channels |
US8751391B2 (en) | 2002-03-29 | 2014-06-10 | Jpmorgan Chase Bank, N.A. | System and process for performing purchase transactions using tokens |
US8768830B1 (en) | 2011-09-08 | 2014-07-01 | Citibank, N.A. | Method and system for a multi-purpose transactional platform |
US8793160B2 (en) | 1999-12-07 | 2014-07-29 | Steve Sorem | System and method for processing transactions |
US8827153B1 (en) | 2011-07-18 | 2014-09-09 | Dynamics Inc. | Systems and methods for waveform generation for dynamic magnetic stripe communications devices |
US8849716B1 (en) | 2001-04-20 | 2014-09-30 | Jpmorgan Chase Bank, N.A. | System and method for preventing identity theft or misuse by restricting access |
US8888009B1 (en) | 2012-02-14 | 2014-11-18 | Dynamics Inc. | Systems and methods for extended stripe mechanisms for magnetic cards and devices |
US8931703B1 (en) | 2009-03-16 | 2015-01-13 | Dynamics Inc. | Payment cards and devices for displaying barcodes |
US8960545B1 (en) | 2011-11-21 | 2015-02-24 | Dynamics Inc. | Data modification for magnetic cards and devices |
US9010647B2 (en) | 2012-10-29 | 2015-04-21 | Dynamics Inc. | Multiple sensor detector systems and detection methods of magnetic cards and devices |
US9010644B1 (en) | 2012-11-30 | 2015-04-21 | Dynamics Inc. | Dynamic magnetic stripe communications device with stepped magnetic material for magnetic cards and devices |
US9033218B1 (en) | 2012-05-15 | 2015-05-19 | Dynamics Inc. | Cards, devices, systems, methods and dynamic security codes |
USD729871S1 (en) | 2012-08-27 | 2015-05-19 | Dynamics Inc. | Interactive electronic card with display and buttons |
USD729869S1 (en) | 2012-08-27 | 2015-05-19 | Dynamics Inc. | Interactive electronic card with display and button |
USD729870S1 (en) | 2012-08-27 | 2015-05-19 | Dynamics Inc. | Interactive electronic card with display and button |
USD730438S1 (en) | 2012-08-27 | 2015-05-26 | Dynamics Inc. | Interactive electronic card with display and button |
USD730439S1 (en) | 2012-08-27 | 2015-05-26 | Dynamics Inc. | Interactive electronic card with buttons |
US9053398B1 (en) | 2010-08-12 | 2015-06-09 | Dynamics Inc. | Passive detection mechanisms for magnetic cards and devices |
USD737373S1 (en) | 2013-09-10 | 2015-08-25 | Dynamics Inc. | Interactive electronic card with contact connector |
US20150278670A1 (en) * | 2014-03-31 | 2015-10-01 | Infineon Technologies Ag | Chip card and method for operating a chip card |
US20150339662A1 (en) * | 2014-05-23 | 2015-11-26 | LoopPay Inc. | Systems and methods for linking devices to user accounts |
USD750168S1 (en) | 2013-03-04 | 2016-02-23 | Dynamics Inc. | Interactive electronic card with display and button |
USD750166S1 (en) | 2013-03-04 | 2016-02-23 | Dynamics Inc. | Interactive electronic card with display and buttons |
USD750167S1 (en) | 2013-03-04 | 2016-02-23 | Dynamics Inc. | Interactive electronic card with buttons |
USD751640S1 (en) | 2013-03-04 | 2016-03-15 | Dynamics Inc. | Interactive electronic card with display and button |
USD751639S1 (en) | 2013-03-04 | 2016-03-15 | Dynamics Inc. | Interactive electronic card with display and button |
US9306666B1 (en) | 2009-10-08 | 2016-04-05 | Dynamics Inc. | Programming protocols for powered cards and devices |
US9329619B1 (en) | 2009-04-06 | 2016-05-03 | Dynamics Inc. | Cards with power management |
USD764584S1 (en) | 2013-03-04 | 2016-08-23 | Dynamics Inc. | Interactive electronic card with buttons |
USD765174S1 (en) | 2013-03-04 | 2016-08-30 | Dynamics Inc. | Interactive electronic card with button |
USD765173S1 (en) | 2013-03-04 | 2016-08-30 | Dynamics Inc. | Interactive electronic card with display and button |
US9439334B2 (en) | 2012-04-03 | 2016-09-06 | X-Card Holdings, Llc | Information carrying card comprising crosslinked polymer composition, and method of making the same |
USD767024S1 (en) | 2013-09-10 | 2016-09-20 | Dynamics Inc. | Interactive electronic card with contact connector |
USD777252S1 (en) | 2013-03-04 | 2017-01-24 | Dynamics Inc. | Interactive electronic card with buttons |
US20170092442A1 (en) * | 2015-09-29 | 2017-03-30 | Datalogic Ip Tech S.R.L. | Modular trigger assembly |
US9619741B1 (en) | 2011-11-21 | 2017-04-11 | Dynamics Inc. | Systems and methods for synchronization mechanisms for magnetic cards and devices |
US9646240B1 (en) | 2010-11-05 | 2017-05-09 | Dynamics Inc. | Locking features for powered cards and devices |
US9659246B1 (en) | 2012-11-05 | 2017-05-23 | Dynamics Inc. | Dynamic magnetic stripe communications device with beveled magnetic material for magnetic cards and devices |
USD792512S1 (en) | 2010-07-09 | 2017-07-18 | Dynamics Inc. | Display with font |
US9710745B1 (en) | 2012-02-09 | 2017-07-18 | Dynamics Inc. | Systems and methods for automated assembly of dynamic magnetic stripe communications devices |
USD792511S1 (en) | 2010-07-09 | 2017-07-18 | Dynamics Inc. | Display with font |
USD792513S1 (en) | 2010-07-09 | 2017-07-18 | Dynamics Inc. | Display with font |
US9734669B1 (en) | 2012-04-02 | 2017-08-15 | Dynamics Inc. | Cards, devices, systems, and methods for advanced payment game of skill and game of chance functionality |
KR101766996B1 (en) * | 2016-02-05 | 2017-08-23 | 스마트디스플레이어 테크놀로지 씨오., 엘티디. | Magnetic card |
US9815596B1 (en) * | 2015-07-07 | 2017-11-14 | Patchiouky Leveille | Container with calorie information display |
US9818125B2 (en) | 2011-02-16 | 2017-11-14 | Dynamics Inc. | Systems and methods for information exchange mechanisms for powered cards and devices |
US9916992B2 (en) | 2012-02-20 | 2018-03-13 | Dynamics Inc. | Systems and methods for flexible components for powered cards and devices |
US9990642B2 (en) | 2002-10-11 | 2018-06-05 | Jpmorgan Chase Bank, N.A. | System and method for granting promotional rewards to credit account holders |
CN108229634A (en) * | 2016-12-09 | 2018-06-29 | 第资本服务有限责任公司 | Transactional cards with interior lighting |
US10022884B1 (en) | 2010-10-15 | 2018-07-17 | Dynamics Inc. | Systems and methods for alignment techniques for magnetic cards and devices |
US10032049B2 (en) | 2016-02-23 | 2018-07-24 | Dynamics Inc. | Magnetic cards and devices for motorized readers |
US10055614B1 (en) | 2010-08-12 | 2018-08-21 | Dynamics Inc. | Systems and methods for advanced detection mechanisms for magnetic cards and devices |
US10062024B1 (en) | 2012-02-03 | 2018-08-28 | Dynamics Inc. | Systems and methods for spike suppression for dynamic magnetic stripe communications devices |
USD828870S1 (en) | 2012-08-27 | 2018-09-18 | Dynamics Inc. | Display card |
US10095970B1 (en) | 2011-01-31 | 2018-10-09 | Dynamics Inc. | Cards including anti-skimming devices |
US10108891B1 (en) | 2014-03-21 | 2018-10-23 | Dynamics Inc. | Exchange coupled amorphous ribbons for electronic stripes |
US10282536B1 (en) | 2002-03-29 | 2019-05-07 | Jpmorgan Chase Bank, N.A. | Method and system for performing purchase and other transactions using tokens with multiple chips |
US20190236422A1 (en) * | 2016-06-21 | 2019-08-01 | Idemia France | Method implemented in an electronic entity and associated electronic entity |
US10417630B2 (en) | 2016-07-28 | 2019-09-17 | Samsung Electronics Co., Ltd. | Transmission-pulse sequence including proxy for secondary magnetic stripe |
US10504105B2 (en) | 2010-05-18 | 2019-12-10 | Dynamics Inc. | Systems and methods for cards and devices operable to communicate to touch sensitive displays |
WO2020072633A1 (en) * | 2018-10-03 | 2020-04-09 | Wunchun Chau | Fueling station transaction system and method |
US10693263B1 (en) | 2010-03-16 | 2020-06-23 | Dynamics Inc. | Systems and methods for audio connectors for powered cards and devices |
US10726417B1 (en) | 2002-03-25 | 2020-07-28 | Jpmorgan Chase Bank, N.A. | Systems and methods for multifactor authentication |
CN111492377A (en) * | 2017-10-18 | 2020-08-04 | 安全创造有限责任公司 | Transaction card with window or window pattern and optional backlit metal, ceramic or ceramic coating |
US10906287B2 (en) | 2013-03-15 | 2021-02-02 | X-Card Holdings, Llc | Methods of making a core layer for an information carrying card, and resulting products |
US10949627B2 (en) | 2012-12-20 | 2021-03-16 | Dynamics Inc. | Systems and methods for non-time smearing detection mechanisms for magnetic cards and devices |
US10977540B2 (en) | 2016-07-27 | 2021-04-13 | Composecure, Llc | RFID device |
US11100431B2 (en) | 2011-05-10 | 2021-08-24 | Dynamics Inc. | Systems and methods for mobile authorizations |
US11126997B1 (en) | 2012-10-02 | 2021-09-21 | Dynamics Inc. | Cards, devices, systems, and methods for a fulfillment system |
US11151437B2 (en) * | 2017-09-07 | 2021-10-19 | Composecure, Llc | Metal, ceramic, or ceramic-coated transaction card with window or window pattern and optional backlighting |
USD943669S1 (en) | 2018-01-30 | 2022-02-15 | Composecure, Llc | Layer of a transaction card |
US11247371B2 (en) | 2016-07-27 | 2022-02-15 | Composecure, Llc | Overmolded electronic components for transaction cards and methods of making thereof |
US11361204B2 (en) | 2018-03-07 | 2022-06-14 | X-Card Holdings, Llc | Metal card |
US11409971B1 (en) | 2011-10-23 | 2022-08-09 | Dynamics Inc. | Programming and test modes for powered cards and devices |
US11418483B1 (en) | 2012-04-19 | 2022-08-16 | Dynamics Inc. | Cards, devices, systems, and methods for zone-based network management |
US11551046B1 (en) | 2011-10-19 | 2023-01-10 | Dynamics Inc. | Stacked dynamic magnetic stripe commmunications device for magnetic cards and devices |
US11593794B2 (en) | 2018-10-03 | 2023-02-28 | Wunchun Chau | Fuel dispensing terminal and proxy system and method of redundancy |
US11618191B2 (en) | 2016-07-27 | 2023-04-04 | Composecure, Llc | DI metal transaction devices and processes for the manufacture thereof |
US11961147B1 (en) | 2012-04-15 | 2024-04-16 | K. Shane Cupp | Cards, devices, systems, and methods for financial management services |
Families Citing this family (74)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8226001B1 (en) | 2010-06-23 | 2012-07-24 | Fiteq, Inc. | Method for broadcasting a magnetic stripe data packet from an electronic smart card |
US8684267B2 (en) * | 2005-03-26 | 2014-04-01 | Privasys | Method for broadcasting a magnetic stripe data packet from an electronic smart card |
JP4965573B2 (en) | 2005-09-08 | 2012-07-04 | カルドラブ・エーピーエス | Dynamic transaction card and how to write information to it |
EP2095343A1 (en) * | 2006-11-22 | 2009-09-02 | Mark A. Cox | Point0f sale transaction device with magnetic stripe emulator and biometric authentication |
US8002193B2 (en) * | 2007-03-12 | 2011-08-23 | Visa U.S.A. Inc. | Payment card dynamically receiving power from external source |
GB0805780D0 (en) * | 2008-03-31 | 2008-04-30 | Royal Bank Of Scotland Plc The | Processor card arrangement |
FR2953619B1 (en) * | 2009-12-03 | 2012-08-03 | Uint | ACTIVATION AND INDICATION OF RF FIELD ON A DEVICE COMPRISING A CHIP. |
US8317103B1 (en) | 2010-06-23 | 2012-11-27 | FiTeq | Method for broadcasting a magnetic stripe data packet from an electronic smart card |
DE102010035312A1 (en) | 2010-08-25 | 2012-03-01 | Giesecke & Devrient Gmbh | Portable data carrier medium i.e. smart card, has oscillating circuit whose detuning is caused by magnet read head when reading magnetic strip, where number of detuning of oscillating circuit is realized and processed by evaluation unit |
US9824600B1 (en) * | 2010-11-28 | 2017-11-21 | Mario Placido Portela | Electromagnetic band and photoelectric cell safety device |
EP2463808A1 (en) * | 2010-12-10 | 2012-06-13 | Gemalto SA | Smartcard providing an improved standby mode |
US9836680B1 (en) | 2011-03-03 | 2017-12-05 | Dynamics Inc. | Systems and methods for advanced communication mechanisms for magnetic cards and devices |
US8925826B2 (en) | 2011-05-03 | 2015-01-06 | Microsoft Corporation | Magnetic stripe-based transactions using mobile communication devices |
US8544735B2 (en) * | 2011-05-23 | 2013-10-01 | Mastercard International Incorporated | Combicard transaction method and system having an application parameter update mechanism |
TWM416820U (en) * | 2011-07-04 | 2011-11-21 | Anica Corp | Flexible public transportation card with display function |
US8313037B1 (en) * | 2011-07-08 | 2012-11-20 | Thomas David Humphrey | Simulated magnetic stripe card system and method for use with magnetic stripe card reading terminals |
US10332102B2 (en) | 2011-10-17 | 2019-06-25 | Capital One Services, Llc | System, method, and apparatus for a dynamic transaction card |
US9978058B2 (en) | 2011-10-17 | 2018-05-22 | Capital One Services, Llc | System, method, and apparatus for a dynamic transaction card |
TWI550504B (en) * | 2012-02-24 | 2016-09-21 | 達意科技股份有限公司 | Electronic card |
US20130248594A1 (en) * | 2012-03-21 | 2013-09-26 | Sunit SOOM | Multi-function, interactive payment card |
TWI478069B (en) * | 2012-04-20 | 2015-03-21 | Smartdisplayer Technology Co Ltd | A display card with a security check |
WO2013181281A1 (en) | 2012-05-29 | 2013-12-05 | Protean Payment, Inc. | Payment card and methods |
US9892357B2 (en) | 2013-05-29 | 2018-02-13 | Cardlab, Aps. | Method for remotely controlling a reprogrammable payment card |
US9406011B2 (en) | 2012-05-29 | 2016-08-02 | Stratos Technologies, Inc. | Virtual wallet |
DE102012212026A1 (en) * | 2012-07-10 | 2014-01-16 | Siemens Aktiengesellschaft | Product with applied, visible product information and process for applying visible product information to a product |
US10360556B2 (en) * | 2012-07-19 | 2019-07-23 | Veritec Inc. | Financial card transaction security and processing methods |
US9286460B2 (en) * | 2012-08-15 | 2016-03-15 | Aviv Soffer | User authentication device having multiple isolated host interfaces |
US8820649B2 (en) * | 2012-11-20 | 2014-09-02 | Omne Mobile Payments, Inc. | Electronic card with a programmable magnetic stripe |
US9888283B2 (en) | 2013-03-13 | 2018-02-06 | Nagrastar Llc | Systems and methods for performing transport I/O |
USD758372S1 (en) * | 2013-03-13 | 2016-06-07 | Nagrastar Llc | Smart card interface |
US9647997B2 (en) | 2013-03-13 | 2017-05-09 | Nagrastar, Llc | USB interface for performing transport I/O |
USD729808S1 (en) | 2013-03-13 | 2015-05-19 | Nagrastar Llc | Smart card interface |
USD759022S1 (en) | 2013-03-13 | 2016-06-14 | Nagrastar Llc | Smart card interface |
US11176546B2 (en) | 2013-03-15 | 2021-11-16 | Ologn Technologies Ag | Systems, methods and apparatuses for securely storing and providing payment information |
US9600755B2 (en) | 2013-04-12 | 2017-03-21 | Cardlab Aps | Card, an assembly, a method of assembling the card and a method of outputting information |
CA2912105A1 (en) | 2013-04-12 | 2014-10-16 | Cardlab Aps | A card with an offset field generator |
US8690054B1 (en) | 2013-05-29 | 2014-04-08 | The Toronto-Dominion Bank | System and method for chip-enabled card transaction processing and alert communication |
US9275386B2 (en) | 2013-05-29 | 2016-03-01 | Stratos Technologies, Inc. | Method for facilitating payment with a programmable payment card |
WO2015009874A1 (en) | 2013-07-16 | 2015-01-22 | Microfabrica Inc. | Counterfeiting deterent and security devices systems and methods |
US10380471B2 (en) | 2013-07-23 | 2019-08-13 | Capital One Services, Llc | Dynamic transaction card power management |
US20150069126A1 (en) * | 2013-09-09 | 2015-03-12 | Omne Mobile Payments, Inc. | Method and apparatus for enabling communication between two devices using magnetic field generator and magnetic field detector |
US9010651B2 (en) * | 2013-09-24 | 2015-04-21 | Coin, Inc. | Devices and methods using swipe detection |
EP2884470A1 (en) * | 2013-12-11 | 2015-06-17 | Panasonic Intellectual Property Management Co., Ltd. | Mobile payment terminal device |
US9858572B2 (en) * | 2014-02-06 | 2018-01-02 | Google Llc | Dynamic alteration of track data |
EP2933759A1 (en) | 2014-04-18 | 2015-10-21 | Gemalto SA | Method for manufacturing a device with an electrical/electronic circuit |
KR101742666B1 (en) * | 2014-05-29 | 2017-06-15 | 삼성에스디에스 주식회사 | Integrated circuit device and signal processing method thereof |
SG11201704445XA (en) | 2014-12-19 | 2017-07-28 | Cardlab Aps | A method and an assembly for generating a magnetic field and a method of manufacturing an assembly |
EP3035230A1 (en) | 2014-12-19 | 2016-06-22 | Cardlab ApS | A method and an assembly for generating a magnetic field |
WO2016106271A1 (en) * | 2014-12-22 | 2016-06-30 | Capital One Services, LLC. | A system, method, and apparatus for locating a bluetooth enabled transaction card |
USD780763S1 (en) | 2015-03-20 | 2017-03-07 | Nagrastar Llc | Smart card interface |
US10074888B2 (en) | 2015-04-03 | 2018-09-11 | NXT-ID, Inc. | Accordion antenna structure |
CA2982770C (en) | 2015-04-14 | 2023-07-04 | Capital One Services, Llc | Tamper-resistant dynamic transaction card and method of providing a tamper-resistant dynamic transaction card |
US10482453B2 (en) | 2015-04-14 | 2019-11-19 | Capital One Services, Llc | Dynamic transaction card protected by gesture and voice recognition |
CA2982763C (en) * | 2015-04-14 | 2023-08-08 | Capital One Services, Llc | A system, method, and apparatus for a dynamic transaction card |
US10474941B2 (en) | 2015-04-14 | 2019-11-12 | Capital One Services, Llc | Dynamic transaction card antenna mounting |
US10360557B2 (en) | 2015-04-14 | 2019-07-23 | Capital One Services, Llc | Dynamic transaction card protected by dropped card detection |
WO2016168457A1 (en) * | 2015-04-14 | 2016-10-20 | Capital One Services, Llc | Dynamic transaction card power management |
US10997588B2 (en) | 2015-04-14 | 2021-05-04 | Capital One Services, Llc | Dynamic transaction card protected by dropped card detection |
EP3082071A1 (en) | 2015-04-17 | 2016-10-19 | Cardlab ApS | Device for and method of outputting a magnetic field |
EP3086272A1 (en) * | 2015-04-20 | 2016-10-26 | Oberthur Technologies | Selecting an application on a card |
USD864968S1 (en) | 2015-04-30 | 2019-10-29 | Echostar Technologies L.L.C. | Smart card interface |
WO2017126930A1 (en) * | 2016-01-21 | 2017-07-27 | 브릴리언츠 주식회사 | Smart multi-card and method for manufacturing smart multi-card |
US10296907B1 (en) * | 2016-02-01 | 2019-05-21 | United Services Automobile Association (Usaa) | Systems and methods for electronic presentation of financial instrument offers |
TWI571814B (en) * | 2016-03-04 | 2017-02-21 | 絡達科技股份有限公司 | Method for emulating card reader interface and control device using the same |
MY194538A (en) * | 2017-07-03 | 2022-11-30 | Gp Network Asia Pte Ltd | Processing payments |
KR20190006932A (en) * | 2017-07-11 | 2019-01-21 | 크리모 주식회사 | Antenna apparatus for wireless comunication |
US10496914B2 (en) * | 2017-10-31 | 2019-12-03 | University Of Florida Research Foundation, Incorporated | Payment card overlay skimmer detection |
US10509926B2 (en) * | 2017-11-01 | 2019-12-17 | Samsung Electronics Co., Ltd. | Ternary encoding magnetic stripe data transmitter, system, and method |
GB201804626D0 (en) * | 2018-03-22 | 2018-05-09 | Nordic Semiconductor Asa | Devices with removable smart cards |
FR3080699B1 (en) * | 2018-04-27 | 2020-05-15 | Ingenico Group | SECURITY SYSTEM FOR A MAGNETIC CARD READER, CORRESPONDING MAGNETIC CARD READER AND ELECTRONIC DEVICE. |
CN108596606A (en) | 2018-06-25 | 2018-09-28 | 阿里巴巴集团控股有限公司 | A kind of transactional cards and method for information display |
JP7247125B2 (en) | 2020-01-22 | 2023-03-28 | 株式会社東芝 | microcontroller |
EP4357972A1 (en) | 2022-10-20 | 2024-04-24 | X-Card Holdings, LLC | Core layer for information carrying card, resulting information carrying card, and methods of making the same |
EP4357971A1 (en) | 2022-10-20 | 2024-04-24 | X-Card Holdings, LLC | Methods of making a core layer for information carrying card |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4692601A (en) * | 1985-03-25 | 1987-09-08 | Casio Computer Co., Ltd. | Identification card including switching means for built-in battery |
US4931623A (en) * | 1987-11-14 | 1990-06-05 | Kabushiki Kaisha Toshiba | Portable storage medium |
US5978701A (en) * | 1995-06-02 | 1999-11-02 | Alza Corporation | Electrotransport device with separable controller and drug unit and method of setting controller output |
US6360954B1 (en) * | 1997-10-22 | 2002-03-26 | Cambridge Consultants Limited | Portable cards |
US6481630B1 (en) * | 1999-03-24 | 2002-11-19 | Paganini Ruben Nicolas | Electronic card for commercial operations and encoding console to be used for the initial loading of the code assigned to the user of the said card |
US20050061889A1 (en) * | 2003-09-19 | 2005-03-24 | First Data Corporation | Financial presentation instruments with integrated holder and methods for use |
US20060213972A1 (en) * | 2005-03-24 | 2006-09-28 | International Business Machines Corporation | Secure credit card with near field communications |
Family Cites Families (189)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE1944378B1 (en) * | 1969-09-02 | 1970-12-03 | Fernseh Gmbh | Method and circuit arrangement for regulating the amplitude of the color synchronizing signal of color television signals which are picked up from a recording medium |
US4529870A (en) | 1980-03-10 | 1985-07-16 | David Chaum | Cryptographic identification, financial transaction, and credential device |
DE3014882C2 (en) | 1980-04-17 | 1983-08-11 | Porst, Hannsheinz, 8500 Nürnberg | Authorization ID |
US4353064A (en) | 1981-01-14 | 1982-10-05 | Honeywell Inc. | Battery operated access control card |
US4626670A (en) * | 1983-06-16 | 1986-12-02 | Xico, Inc. | Method and system for decoding time-varying, two-frequency, coherent-phase data |
US4614861A (en) * | 1984-11-15 | 1986-09-30 | Intellicard International, Inc. | Unitary, self-contained card verification and validation system and method |
US5168520A (en) | 1984-11-30 | 1992-12-01 | Security Dynamics Technologies, Inc. | Method and apparatus for personal identification |
US4720860A (en) | 1984-11-30 | 1988-01-19 | Security Dynamics Technologies, Inc. | Method and apparatus for positively identifying an individual |
US4701601A (en) | 1985-04-26 | 1987-10-20 | Visa International Service Association | Transaction card with magnetic stripe emulator |
US4707594A (en) * | 1985-06-27 | 1987-11-17 | Intellicard International, Inc. | Unitary, self-contained consumer transaction card |
JPS62179994A (en) | 1986-02-04 | 1987-08-07 | カシオ計算機株式会社 | Electronic card |
US4667087A (en) | 1986-03-31 | 1987-05-19 | Max A. Quintana | Secure credit card |
US4791283A (en) | 1986-06-03 | 1988-12-13 | Intellicard International, Inc. | Transaction card magnetic stripe emulator |
US4786791A (en) | 1987-02-10 | 1988-11-22 | Gateway Technology | Data processing apparatus with portable card having magnetic strip simulator |
KR910004797B1 (en) | 1987-04-08 | 1991-07-13 | 가시오 게이상기 가부시기가이샤 | Mini-electronic device and its manufacturing method |
DE3906349A1 (en) | 1989-03-01 | 1990-09-13 | Hartmut Hennige | METHOD AND DEVICE FOR SIMPLIFYING THE USE OF A VARIETY OF CREDIT CARDS AND THE LIKE |
US5029207A (en) * | 1990-02-01 | 1991-07-02 | Scientific-Atlanta, Inc. | External security module for a television signal decoder |
US5085320A (en) | 1990-05-30 | 1992-02-04 | Sgs International | Bag for carrying a game ball |
US5485519A (en) | 1991-06-07 | 1996-01-16 | Security Dynamics Technologies, Inc. | Enhanced security for a secure token code |
US5237614A (en) | 1991-06-07 | 1993-08-17 | Security Dynamics Technologies, Inc. | Integrated network security system |
US5657388A (en) | 1993-05-25 | 1997-08-12 | Security Dynamics Technologies, Inc. | Method and apparatus for utilizing a token for resource access |
US5479512A (en) | 1991-06-07 | 1995-12-26 | Security Dynamics Technologies, Inc. | Method and apparatus for performing concryption |
US5272596A (en) | 1991-06-24 | 1993-12-21 | At&T Bell Laboratories | Personal data card fabricated from a polymer thick-film circuit |
US5585787A (en) | 1991-12-09 | 1996-12-17 | Wallerstein; Robert S. | Programmable credit card |
US5608203A (en) | 1992-02-12 | 1997-03-04 | Finkelstein; Alan | Credit card with magnifying lens |
US5856661A (en) | 1993-02-12 | 1999-01-05 | Universal Magnifier Llc | Credit card with magnifying lens formed with a radiation-curable resin |
US6176430B1 (en) | 1992-02-12 | 2001-01-23 | Lenscard U.S. Llc | Method for making a wallet card with an integral magnifying lens |
US6817532B2 (en) | 1992-02-12 | 2004-11-16 | Lenscard U.S., Llc | Wallet card with built-in light |
US5412199A (en) | 1992-02-12 | 1995-05-02 | Finkelstein; Alan | Credit card with magnifying lens |
US6769618B1 (en) | 1992-02-12 | 2004-08-03 | Lenscard U.S., Llc | Wallet card with a magnifying lens and light |
EP0566811A1 (en) | 1992-04-23 | 1993-10-27 | International Business Machines Corporation | Authentication method and system with a smartcard |
US6130621A (en) | 1992-07-09 | 2000-10-10 | Rsa Security Inc. | Method and apparatus for inhibiting unauthorized access to or utilization of a protected device |
US5361062A (en) | 1992-11-25 | 1994-11-01 | Security Dynamics Technologies, Inc. | Personal security system |
JPH06273499A (en) * | 1993-03-17 | 1994-09-30 | Fujitsu Ltd | Digital squid |
US5484997A (en) | 1993-12-07 | 1996-01-16 | Haynes; George W. | Identification card with RF downlink capability |
US5623552A (en) * | 1994-01-21 | 1997-04-22 | Cardguard International, Inc. | Self-authenticating identification card with fingerprint identification |
US5434398A (en) | 1994-02-22 | 1995-07-18 | Haim Labenski | Magnetic smartcard |
US5590038A (en) * | 1994-06-20 | 1996-12-31 | Pitroda; Satyan G. | Universal electronic transaction card including receipt storage and system and methods of conducting electronic transactions |
US5478994A (en) | 1994-07-13 | 1995-12-26 | Rahman; Sam | Secure credit card which prevents unauthorized transactions |
US5748737A (en) | 1994-11-14 | 1998-05-05 | Daggar; Robert N. | Multimedia electronic wallet with generic card |
US5591949A (en) | 1995-01-06 | 1997-01-07 | Bernstein; Robert J. | Automatic portable account controller for remotely arranging for payment of debt to a vendor |
DE19503607A1 (en) * | 1995-02-03 | 1996-08-08 | Angewandte Digital Elektronik | Chip cards for displaying different card information |
GB9506909D0 (en) * | 1995-04-04 | 1995-05-24 | Scient Generics Ltd | Spatial magnetic interrogation system |
US5907142A (en) | 1995-12-12 | 1999-05-25 | Kelsey; Craig E. | Fraud resistant personally activated transaction card |
US6085320A (en) | 1996-05-15 | 2000-07-04 | Rsa Security Inc. | Client/server protocol for proving authenticity |
US5834756A (en) | 1996-06-03 | 1998-11-10 | Motorola, Inc. | Magnetically communicative card |
US5864623A (en) | 1996-07-15 | 1999-01-26 | Intellicheck Inc. | Authentication system for driver licenses |
US5913203A (en) | 1996-10-03 | 1999-06-15 | Jaesent Inc. | System and method for pseudo cash transactions |
IL119943A (en) | 1996-12-31 | 2000-11-21 | On Track Innovations Ltd | Contact/contactless data transaction card |
US5955021A (en) | 1997-05-19 | 1999-09-21 | Cardxx, Llc | Method of making smart cards |
US6163771A (en) | 1997-08-28 | 2000-12-19 | Walker Digital, Llc | Method and device for generating a single-use financial account number |
US6240184B1 (en) | 1997-09-05 | 2001-05-29 | Rsa Security Inc. | Password synchronization |
US6025054A (en) | 1997-09-08 | 2000-02-15 | Cardxx, Inc. | Smart cards having glue-positioned electronic components |
US6076163A (en) | 1997-10-20 | 2000-06-13 | Rsa Security Inc. | Secure user identification based on constrained polynomials |
US6411715B1 (en) | 1997-11-10 | 2002-06-25 | Rsa Security, Inc. | Methods and apparatus for verifying the cryptographic security of a selected private and public key pair without knowing the private key |
EP1031939B1 (en) * | 1997-11-14 | 2005-09-14 | Toppan Printing Co., Ltd. | Composite ic card |
US6286022B1 (en) | 1997-11-18 | 2001-09-04 | Rsa Security Inc. | Efficient finite field basis conversion involving a dual basis |
US6157920A (en) | 1997-11-19 | 2000-12-05 | Lucent Technologies Inc. | Executable digital cash for electronic commerce |
AU2085199A (en) | 1997-11-19 | 1999-06-07 | Security Dynamics Technologies, Inc. | Digital coin tracing using trustee tokens |
US6389442B1 (en) | 1997-12-30 | 2002-05-14 | Rsa Security Inc. | Efficient finite field multiplication in normal basis |
US6095416A (en) | 1998-02-24 | 2000-08-01 | Privicom, Inc. | Method and device for preventing unauthorized use of credit cards |
US6161181A (en) | 1998-03-06 | 2000-12-12 | Deloitte & Touche Usa Llp | Secure electronic transactions using a trusted intermediary |
US6145079A (en) | 1998-03-06 | 2000-11-07 | Deloitte & Touche Usa Llp | Secure electronic transactions using a trusted intermediary to perform electronic services |
US6199052B1 (en) | 1998-03-06 | 2001-03-06 | Deloitte & Touche Usa Llp | Secure electronic transactions using a trusted intermediary with archive and verification request services |
US6256873B1 (en) | 1998-03-17 | 2001-07-10 | Cardxx, Inc. | Method for making smart cards using isotropic thermoset adhesive materials |
US6241153B1 (en) | 1998-03-17 | 2001-06-05 | Cardxx, Inc. | Method for making tamper-preventing, contact-type, smart cards |
US7207477B1 (en) | 2004-03-08 | 2007-04-24 | Diebold, Incorporated | Wireless transfer of account data and signature from hand-held device to electronic check generator |
DE69922082T2 (en) | 1998-05-11 | 2005-12-15 | Citicorp Development Center, Inc., Los Angeles | System and method for biometric authentication of a user with a smart card |
US6269163B1 (en) | 1998-06-15 | 2001-07-31 | Rsa Security Inc. | Enhanced block ciphers with data-dependent rotations |
US6393447B1 (en) | 1998-10-22 | 2002-05-21 | Lucent Technologies Inc. | Method and apparatus for extracting unbiased random bits from a potentially biased source of randomness |
US6182894B1 (en) | 1998-10-28 | 2001-02-06 | American Express Travel Related Services Company, Inc. | Systems and methods for authorizing a transaction card |
US6460141B1 (en) | 1998-10-28 | 2002-10-01 | Rsa Security Inc. | Security and access management system for web-enabled and non-web-enabled applications and content on a computer network |
FR2786006B1 (en) * | 1998-11-17 | 2001-10-12 | Schlumberger Systems & Service | DEVICE FOR LIMITING FRAUD IN AN INTEGRATED CIRCUIT CARD |
US6473740B2 (en) | 1998-11-29 | 2002-10-29 | Qpass, Inc. | Electronic commerce using a transaction network |
US7197639B1 (en) | 1999-02-05 | 2007-03-27 | Rsa Security Inc. | Cryptographic countermeasures against connection depletion attacks |
US7219368B2 (en) | 1999-02-11 | 2007-05-15 | Rsa Security Inc. | Robust visual passwords |
US20040139004A1 (en) | 1999-04-08 | 2004-07-15 | Aceinc Pty Ltd. | Secure online commerce transactions |
US6985583B1 (en) | 1999-05-04 | 2006-01-10 | Rsa Security Inc. | System and method for authentication seed distribution |
US7111172B1 (en) | 1999-07-19 | 2006-09-19 | Rsa Security Inc. | System and methods for maintaining and distributing personal security devices |
US7461250B1 (en) | 1999-07-22 | 2008-12-02 | Rsa Security, Inc. | System and method for certificate exchange |
US6873974B1 (en) | 1999-08-17 | 2005-03-29 | Citibank, N.A. | System and method for use of distributed electronic wallets |
EP1077436A3 (en) | 1999-08-19 | 2005-06-22 | Citicorp Development Center, Inc. | System and method for performing an on-line transaction using a single-use payment instrument |
EP1216460A1 (en) | 1999-09-28 | 2002-06-26 | Chameleon Network Inc. | Portable electronic authorization system and associated method |
US7487908B1 (en) * | 1999-10-23 | 2009-02-10 | Ultracard, Inc. | Article having an embedded accessible storage member, apparatus and method for using same |
US6705520B1 (en) * | 1999-11-15 | 2004-03-16 | Satyan G. Pitroda | Point of sale adapter for electronic transaction device |
US20010034702A1 (en) | 2000-02-04 | 2001-10-25 | Mockett Gregory P. | System and method for dynamically issuing and processing transaction specific digital credit or debit cards |
US7472093B2 (en) | 2000-03-08 | 2008-12-30 | Rsa Security Inc. | Targeted delivery of informational content with privacy protection |
US6813354B1 (en) | 2000-03-09 | 2004-11-02 | Lucent Technologies Inc. | Mixing in small batches |
US7359507B2 (en) | 2000-03-10 | 2008-04-15 | Rsa Security Inc. | Server-assisted regeneration of a strong secret from a weak secret |
US20010047335A1 (en) | 2000-04-28 | 2001-11-29 | Martin Arndt | Secure payment method and apparatus |
US6592044B1 (en) | 2000-05-15 | 2003-07-15 | Jacob Y. Wong | Anonymous electronic card for generating personal coupons useful in commercial and security transactions |
US6755341B1 (en) | 2000-05-15 | 2004-06-29 | Jacob Y. Wong | Method for storing data in payment card transaction |
US6609654B1 (en) | 2000-05-15 | 2003-08-26 | Privasys, Inc. | Method for allowing a user to customize use of a payment card that generates a different payment card number for multiple transactions |
US6805288B2 (en) | 2000-05-15 | 2004-10-19 | Larry Routhenstein | Method for generating customer secure card numbers subject to use restrictions by an electronic card |
US6775776B1 (en) | 2000-06-27 | 2004-08-10 | Intel Corporation | Biometric-based authentication in a nonvolatile memory device |
US20030173409A1 (en) | 2000-06-28 | 2003-09-18 | Werner Vogt | Transport or conveyor unit for a chip, particularly a telephone chip |
US20020043566A1 (en) | 2000-07-14 | 2002-04-18 | Alan Goodman | Transaction card and method for reducing frauds |
US7356696B1 (en) | 2000-08-01 | 2008-04-08 | Lucent Technologies Inc. | Proofs of work and bread pudding protocols |
IL138323A0 (en) * | 2000-09-07 | 2009-02-11 | Av Doron | Smart magnetic card |
WO2002029702A1 (en) | 2000-10-04 | 2002-04-11 | American Express Travel Related Services Company, Inc. | System and method for providing feedback in an interactive payment system |
US7360688B1 (en) | 2000-10-16 | 2008-04-22 | Harris Scott C | Intelligent credit card system |
US8103881B2 (en) * | 2000-11-06 | 2012-01-24 | Innovation Connection Corporation | System, method and apparatus for electronic ticketing |
US8015592B2 (en) | 2002-03-28 | 2011-09-06 | Innovation Connection Corporation | System, method and apparatus for enabling transactions using a biometrically enabled programmable magnetic stripe |
US6980969B1 (en) | 2000-11-16 | 2005-12-27 | Sears, Roebuck And Co. | Methods and apparatus for allowing internet based purchases based on a temporary credit card number |
US7660902B2 (en) | 2000-11-20 | 2010-02-09 | Rsa Security, Inc. | Dynamic file access control and management |
US7602904B2 (en) | 2000-11-27 | 2009-10-13 | Rsa Security, Inc. | Order invariant fuzzy commitment system |
US6681988B2 (en) | 2000-11-28 | 2004-01-27 | Citibank, N.A. | Method and system for managing a transaction card account |
US20020066039A1 (en) * | 2000-11-30 | 2002-05-30 | Dent Paul W. | Anti-spoofing password protection |
US6631849B2 (en) | 2000-12-06 | 2003-10-14 | Bank One, Delaware, National Association | Selectable multi-purpose card |
WO2002047019A1 (en) | 2000-12-08 | 2002-06-13 | Silverman Martin S | Dynamic virtual magnetic stripe |
US6313724B1 (en) | 2000-12-12 | 2001-11-06 | Josef Osterweil | Multifaceted balanced magnetic proximity sensor |
US7606771B2 (en) | 2001-01-11 | 2009-10-20 | Cardinalcommerce Corporation | Dynamic number authentication for credit/debit cards |
US20020096570A1 (en) | 2001-01-25 | 2002-07-25 | Wong Jacob Y. | Card with a dynamic embossing apparatus |
US20020174031A1 (en) * | 2001-03-06 | 2002-11-21 | Andrew Weiss | System and method for processing multi-currency transactions at a point of sale |
US7044394B2 (en) | 2003-12-17 | 2006-05-16 | Kerry Dennis Brown | Programmable magnetic data storage card |
US20040177045A1 (en) | 2001-04-17 | 2004-09-09 | Brown Kerry Dennis | Three-legacy mode payment card with parametric authentication and data input elements |
US7303120B2 (en) * | 2001-07-10 | 2007-12-04 | American Express Travel Related Services Company, Inc. | System for biometric security using a FOB |
US6811082B2 (en) | 2001-09-18 | 2004-11-02 | Jacob Y. Wong | Advanced magnetic stripe bridge (AMSB) |
US6607127B2 (en) | 2001-09-18 | 2003-08-19 | Jacob Y. Wong | Magnetic stripe bridge |
US7195154B2 (en) | 2001-09-21 | 2007-03-27 | Privasys, Inc. | Method for generating customer secure card numbers |
US6604686B1 (en) | 2001-10-09 | 2003-08-12 | Vahid Taban | High speed system for embedding wire antennas in an array of smart cards |
US6641050B2 (en) * | 2001-11-06 | 2003-11-04 | International Business Machines Corporation | Secure credit card |
JP4271576B2 (en) | 2001-11-19 | 2009-06-03 | エル.バーチェット ジュニア ロバート | Transaction card system with safety to prevent unauthorized use |
US7363494B2 (en) | 2001-12-04 | 2008-04-22 | Rsa Security Inc. | Method and apparatus for performing enhanced time-based authentication |
US20040035942A1 (en) * | 2001-12-07 | 2004-02-26 | Silverman Martin S. | Dynamic virtual magnetic stripe |
ATE467201T1 (en) * | 2002-01-07 | 2010-05-15 | Nds Ltd | SAFE OFFLINE INTERACTIVE BETTING |
US7039223B2 (en) | 2002-02-14 | 2006-05-02 | Wong Jacob Y | Authentication method utilizing a sequence of linear partial fingerprint signatures selected by a personal code |
US7013030B2 (en) | 2002-02-14 | 2006-03-14 | Wong Jacob Y | Personal choice biometric signature |
US6853412B2 (en) * | 2002-02-28 | 2005-02-08 | Eastman Kodak Company | Transaction card with memory and polymer dispersed cholesteric liquid crystal display |
US7035443B2 (en) | 2002-03-22 | 2006-04-25 | Wong Jacob Y | Personal choice biometric signature |
EP1535421A4 (en) | 2002-03-28 | 2005-09-07 | Innovation Connection Corp | Apparatus and method for transactions security using biometric identity validation and contactless smartcard. |
US8082575B2 (en) * | 2002-03-28 | 2011-12-20 | Rampart-Id Systems, Inc. | System, method and apparatus for enabling transactions using a user enabled programmable magnetic stripe |
JP2003317202A (en) * | 2002-04-11 | 2003-11-07 | Cis Electronica Industria & Comercio Ltda | Magnetic head for magnetic reader |
US7100049B2 (en) | 2002-05-10 | 2006-08-29 | Rsa Security Inc. | Method and apparatus for authentication of users and web sites |
US7562222B2 (en) | 2002-05-10 | 2009-07-14 | Rsa Security Inc. | System and method for authenticating entities to users |
JP2004021814A (en) | 2002-06-19 | 2004-01-22 | Konica Minolta Holdings Inc | Ic card and creation method therefor |
US7225994B2 (en) | 2002-08-06 | 2007-06-05 | Innovative Card Technologies, Inc. | Financial transaction card with sound recording |
US7188627B2 (en) * | 2002-09-06 | 2007-03-13 | Apneon, Inc. | Magnetic force devices, systems, and methods for resisting tissue collapse within the pharyngeal conduit |
CZ2005209A3 (en) * | 2002-09-10 | 2005-12-14 | Ivi Smart Technologies, Inc. | Safe biometric verification of identity |
US7494055B2 (en) | 2002-09-17 | 2009-02-24 | Vivotech, Inc. | Collaborative negotiation techniques for mobile personal trusted device financial transactions |
JP2006508471A (en) | 2002-11-27 | 2006-03-09 | アールエスエイ セキュリティー インク | Identification and authentication system and method |
US6776332B2 (en) | 2002-12-26 | 2004-08-17 | Micropin Technologies Inc. | System and method for validating and operating an access card |
US7143953B2 (en) | 2002-12-27 | 2006-12-05 | Konica Minolta Holdings, Inc. | IC card, IC card manufacturing method, IC card manufacturing apparatus and IC card judgement system |
US20040162732A1 (en) | 2003-02-14 | 2004-08-19 | Rubens Rahim | System and method for credit card replenishment of a wireless subscriber's account balance |
TWI240212B (en) * | 2003-03-14 | 2005-09-21 | Lightuning Tech Inc | Card-type biometric identification device and method therefor |
FR2853434B1 (en) * | 2003-04-03 | 2005-07-01 | Oberthur Card Syst Sa | MICROCIRCUIT BOARD ATTACHED TO AN ADAPTER SUPPORT, CARD HOLDER, AND MANUFACTURING METHOD |
US7591426B2 (en) | 2003-04-21 | 2009-09-22 | Josef Osterweil | Method and system for data writing/reading onto/from and emulating a magnetic stripe |
US7532104B2 (en) | 2003-05-06 | 2009-05-12 | Rsa Security, Inc. | Low-complexity cryptographic techniques for use with radio frequency identification devices |
US6970070B2 (en) | 2003-05-08 | 2005-11-29 | Rsa Security Inc. | Method and apparatus for selective blocking of radio frequency identification devices |
US7100821B2 (en) | 2003-05-15 | 2006-09-05 | Mehran Randall Rasti | Charge card and debit transactions using a variable charge number |
US7761374B2 (en) | 2003-08-18 | 2010-07-20 | Visa International Service Association | Method and system for generating a dynamic verification value |
US7954151B1 (en) | 2003-10-28 | 2011-05-31 | Emc Corporation | Partial document content matching using sectional analysis |
US7523301B2 (en) | 2003-10-28 | 2009-04-21 | Rsa Security | Inferring content sensitivity from partial content matching |
US7298243B2 (en) | 2003-11-12 | 2007-11-20 | Rsa Security Inc. | Radio frequency identification system with privacy policy implementation based on device classification |
US8032416B2 (en) | 2003-12-01 | 2011-10-04 | Incard Sa | Method for the decomposition in modules of smart-card event-driven applications |
US7404087B2 (en) | 2003-12-15 | 2008-07-22 | Rsa Security Inc. | System and method for providing improved claimant authentication |
US7454349B2 (en) | 2003-12-15 | 2008-11-18 | Rsa Security Inc. | Virtual voiceprint system and method for generating voiceprints |
US7641124B2 (en) | 2003-12-17 | 2010-01-05 | Qsecure, Inc. | Magnetic data recording device |
US7543739B2 (en) | 2003-12-17 | 2009-06-09 | Qsecure, Inc. | Automated payment card fraud detection and location |
US20050154643A1 (en) | 2004-01-08 | 2005-07-14 | International Business Machines Corporation | Purchasing information requested and conveyed on demand |
WO2005077066A2 (en) | 2004-02-09 | 2005-08-25 | American Express Travel Related Services Company, Inc. | System and method to reduce travel-related transaction fraud |
US7472829B2 (en) | 2004-12-10 | 2009-01-06 | Qsecure, Inc. | Payment card with internally generated virtual account numbers for its magnetic stripe encoder and user display |
US7580898B2 (en) | 2004-03-15 | 2009-08-25 | Qsecure, Inc. | Financial transactions with dynamic personal account numbers |
US7584153B2 (en) | 2004-03-15 | 2009-09-01 | Qsecure, Inc. | Financial transactions with dynamic card verification values |
US7424570B2 (en) | 2004-04-08 | 2008-09-09 | Incard Sa | Method for patching ROM instructions in an electronic embedded system including at least a further memory portion |
US7886345B2 (en) | 2004-07-02 | 2011-02-08 | Emc Corporation | Password-protection module |
US7461399B2 (en) | 2004-07-30 | 2008-12-02 | Rsa Security Inc. | PIN recovery in a smart card |
US7451921B2 (en) * | 2004-09-01 | 2008-11-18 | Eric Morgan Dowling | Methods, smart cards, and systems for providing portable computer, VoIP, and application services |
US7591427B2 (en) | 2004-09-10 | 2009-09-22 | Josef Osterweil | Method and system for a static magnetic read/write head |
US8145816B2 (en) * | 2004-09-15 | 2012-03-27 | Intel Corporation | System and method for deadlock free bus protection of resources during search execution |
US7051929B2 (en) | 2004-10-18 | 2006-05-30 | Gongling Li | Secure credit card having daily changed security number |
US7097108B2 (en) | 2004-10-28 | 2006-08-29 | Bellsouth Intellectual Property Corporation | Multiple function electronic cards |
TW200642408A (en) | 2004-12-07 | 2006-12-01 | Farsheed Atef | System and method for identity verification and management |
JP2008524751A (en) | 2004-12-20 | 2008-07-10 | アールエスエイ セキュリティー インク | Consumer Internet authentication service |
US7357319B1 (en) | 2005-01-24 | 2008-04-15 | Vivotech, Inc. | External adapter for magnetic stripe card reader |
US7225537B2 (en) | 2005-01-27 | 2007-06-05 | Cardxx, Inc. | Method for making memory cards and similar devices using isotropic thermoset materials with high quality exterior surfaces |
US7673171B2 (en) * | 2005-02-18 | 2010-03-02 | Hewlett-Packard Development Company, L.P. | Systems and methods for CPU repair |
CN101120351B (en) | 2005-02-18 | 2010-10-06 | Rsa安全公司 | Derivative seeds distribution method |
US7581678B2 (en) | 2005-02-22 | 2009-09-01 | Tyfone, Inc. | Electronic transaction card |
US8820637B1 (en) | 2005-02-26 | 2014-09-02 | James A. Roskind | Time-varying security code for enabling authorizations and other uses of financial accounts |
US20060212407A1 (en) * | 2005-03-17 | 2006-09-21 | Lyon Dennis B | User authentication and secure transaction system |
BRPI0520452A2 (en) | 2005-03-23 | 2009-05-12 | Cardxx Inc | method for manufacturing an advanced smart card or similar device |
JP5186359B2 (en) | 2005-03-26 | 2013-04-17 | プリバシーズ,インコーポレイテッド | Electronic financial transaction card and method |
US7237724B2 (en) | 2005-04-06 | 2007-07-03 | Robert Singleton | Smart card and method for manufacturing a smart card |
JP4965573B2 (en) * | 2005-09-08 | 2012-07-04 | カルドラブ・エーピーエス | Dynamic transaction card and how to write information to it |
US7568631B2 (en) | 2005-11-21 | 2009-08-04 | Sony Corporation | System, apparatus and method for obtaining one-time credit card numbers using a smart card |
US7594603B2 (en) * | 2006-03-29 | 2009-09-29 | Stmicroelectronics, Inc. | System and method for sensing biometric and non-biometric smart card devices |
US7818264B2 (en) | 2006-06-19 | 2010-10-19 | Visa U.S.A. Inc. | Track data encryption |
US7380710B2 (en) | 2006-04-28 | 2008-06-03 | Qsecure, Inc. | Payment card preloaded with unique numbers |
-
2006
- 2006-04-27 EP EP06752097.3A patent/EP1882229B1/en not_active Not-in-force
- 2006-04-27 KR KR1020077027490A patent/KR20080003006A/en not_active Application Discontinuation
- 2006-04-27 US US11/413,595 patent/US20070034700A1/en not_active Abandoned
- 2006-04-27 WO PCT/US2006/016842 patent/WO2006116772A2/en active Application Filing
-
2010
- 2010-03-18 US US12/726,868 patent/US7954724B2/en not_active Expired - Fee Related
-
2011
- 2011-05-06 US US13/102,991 patent/US8231063B2/en active Active
-
2012
- 2012-04-16 US US13/448,256 patent/US8302871B2/en active Active
- 2012-04-16 US US13/448,266 patent/US8480002B2/en active Active
- 2012-04-16 US US13/448,281 patent/US8360332B2/en active Active
- 2012-04-16 US US13/448,244 patent/US8500019B2/en active Active
- 2012-04-23 US US13/453,882 patent/US8286889B2/en active Active
- 2012-08-29 US US13/598,524 patent/US8678276B2/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4692601A (en) * | 1985-03-25 | 1987-09-08 | Casio Computer Co., Ltd. | Identification card including switching means for built-in battery |
US4931623A (en) * | 1987-11-14 | 1990-06-05 | Kabushiki Kaisha Toshiba | Portable storage medium |
US5978701A (en) * | 1995-06-02 | 1999-11-02 | Alza Corporation | Electrotransport device with separable controller and drug unit and method of setting controller output |
US6360954B1 (en) * | 1997-10-22 | 2002-03-26 | Cambridge Consultants Limited | Portable cards |
US6481630B1 (en) * | 1999-03-24 | 2002-11-19 | Paganini Ruben Nicolas | Electronic card for commercial operations and encoding console to be used for the initial loading of the code assigned to the user of the said card |
US20050061889A1 (en) * | 2003-09-19 | 2005-03-24 | First Data Corporation | Financial presentation instruments with integrated holder and methods for use |
US20060213972A1 (en) * | 2005-03-24 | 2006-09-28 | International Business Machines Corporation | Secure credit card with near field communications |
Cited By (374)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8005756B2 (en) | 1998-06-22 | 2011-08-23 | Jpmorgan Chase Bank, N.A. | Debit purchasing of stored value card for use by and/or delivery to others |
US7747463B1 (en) | 1998-06-22 | 2010-06-29 | Jpmorgan Chase Bank, N.A. | Debit purchasing of stored value card for use by and/or delivery to others |
US20050127168A1 (en) * | 1998-06-22 | 2005-06-16 | Jpmorgan Chase Bank, N.A. | Debit purchasing of stored value card for use by and/or delivery to others |
US7805368B2 (en) | 1998-06-22 | 2010-09-28 | Jpmorgan Chase Bank, N.A. | Debit purchasing of stored value card for use by and/or delivery to others |
US20080021825A1 (en) * | 1998-06-22 | 2008-01-24 | Phillips Gregory J | Debit Purchasing of Stored Value Card for Use By And/Or Delivery to Others |
US7809643B2 (en) | 1998-06-22 | 2010-10-05 | Jpmorgan Chase Bank, N.A. | Debit purchasing of stored value card for use by and/or delivery to others |
US7809642B1 (en) | 1998-06-22 | 2010-10-05 | Jpmorgan Chase Bank, N.A. | Debit purchasing of stored value card for use by and/or delivery to others |
US7818253B2 (en) | 1998-06-22 | 2010-10-19 | Jpmorgan Chase Bank, N.A. | Debit purchasing of stored value card for use by and/or delivery to others |
US7801799B1 (en) | 1998-11-17 | 2010-09-21 | Jpmorgan Chase Bank, N.A. | Customer activated multi-value (CAM) card |
US8590008B1 (en) | 1999-07-02 | 2013-11-19 | Jpmorgan Chase Bank, N.A. | System and method for single sign on process for websites with multiple applications and services |
US7966496B2 (en) | 1999-07-02 | 2011-06-21 | Jpmorgan Chase Bank, N.A. | System and method for single sign on process for websites with multiple applications and services |
US8793160B2 (en) | 1999-12-07 | 2014-07-29 | Steve Sorem | System and method for processing transactions |
US20030033246A1 (en) * | 2000-02-09 | 2003-02-13 | Slater Kim Michele | Sponsor funded stored value card |
US20060106703A1 (en) * | 2000-11-02 | 2006-05-18 | First Usa Bank, Na | System and method for aggregate portfolio client support |
US8849716B1 (en) | 2001-04-20 | 2014-09-30 | Jpmorgan Chase Bank, N.A. | System and method for preventing identity theft or misuse by restricting access |
US10380374B2 (en) | 2001-04-20 | 2019-08-13 | Jpmorgan Chase Bank, N.A. | System and method for preventing identity theft or misuse by restricting access |
US7801816B2 (en) | 2001-05-23 | 2010-09-21 | Jp Morgan Chase Bank, N.A. | System and method for currency selectable stored value instrument |
US8160960B1 (en) | 2001-06-07 | 2012-04-17 | Jpmorgan Chase Bank, N.A. | System and method for rapid updating of credit information |
US8185940B2 (en) | 2001-07-12 | 2012-05-22 | Jpmorgan Chase Bank, N.A. | System and method for providing discriminated content to network users |
US7860789B2 (en) | 2001-07-24 | 2010-12-28 | Jpmorgan Chase Bank, N.A. | Multiple account advanced payment card and method of routing card transactions |
US7890422B1 (en) | 2001-07-24 | 2011-02-15 | Jpmorgan Chase Bank, N.A. | Multiple account advanced payment card and method of routing card transactions |
US8751383B2 (en) | 2001-07-24 | 2014-06-10 | Jpmorgan Chase Bank, N.A. | Multiple account advanced payment card and method of routing card transactions |
US8515868B2 (en) | 2001-07-24 | 2013-08-20 | Jpmorgan Chase Bank, N.A. | Multiple account advanced payment card and method of routing card transactions |
US8020754B2 (en) | 2001-08-13 | 2011-09-20 | Jpmorgan Chase Bank, N.A. | System and method for funding a collective account by use of an electronic tag |
US7987501B2 (en) | 2001-12-04 | 2011-07-26 | Jpmorgan Chase Bank, N.A. | System and method for single session sign-on |
US8707410B2 (en) | 2001-12-04 | 2014-04-22 | Jpmorgan Chase Bank, N.A. | System and method for single session sign-on |
US7899753B1 (en) | 2002-03-25 | 2011-03-01 | Jpmorgan Chase Bank, N.A | Systems and methods for time variable financial authentication |
US9240089B2 (en) | 2002-03-25 | 2016-01-19 | Jpmorgan Chase Bank, N.A. | Systems and methods for time variable financial authentication |
US10726417B1 (en) | 2002-03-25 | 2020-07-28 | Jpmorgan Chase Bank, N.A. | Systems and methods for multifactor authentication |
US10282536B1 (en) | 2002-03-29 | 2019-05-07 | Jpmorgan Chase Bank, N.A. | Method and system for performing purchase and other transactions using tokens with multiple chips |
US8751391B2 (en) | 2002-03-29 | 2014-06-10 | Jpmorgan Chase Bank, N.A. | System and process for performing purchase transactions using tokens |
US7809595B2 (en) | 2002-09-17 | 2010-10-05 | Jpmorgan Chase Bank, Na | System and method for managing risks associated with outside service providers |
US20060053125A1 (en) * | 2002-10-02 | 2006-03-09 | Bank One Corporation | System and method for network-based project management |
US7756816B2 (en) | 2002-10-02 | 2010-07-13 | Jpmorgan Chase Bank, N.A. | System and method for network-based project management |
US10007923B1 (en) | 2002-10-11 | 2018-06-26 | Jpmorgan Chase Bank, N.A. | System and method for granting promotional rewards to credit account holders |
US9990642B2 (en) | 2002-10-11 | 2018-06-05 | Jpmorgan Chase Bank, N.A. | System and method for granting promotional rewards to credit account holders |
US8301493B2 (en) | 2002-11-05 | 2012-10-30 | Jpmorgan Chase Bank, N.A. | System and method for providing incentives to consumers to share information |
US8306907B2 (en) | 2003-05-30 | 2012-11-06 | Jpmorgan Chase Bank N.A. | System and method for offering risk-based interest rates in a credit instrument |
US8145549B2 (en) | 2003-05-30 | 2012-03-27 | Jpmorgan Chase Bank, N.A. | System and method for offering risk-based interest rates in a credit instutment |
US20080035738A1 (en) * | 2005-05-09 | 2008-02-14 | Mullen Jeffrey D | Dynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit card |
US7931195B2 (en) | 2005-05-09 | 2011-04-26 | Dynamics Inc. | Dynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit card |
US20080054079A1 (en) * | 2005-05-09 | 2008-03-06 | Mullen Jeffrey D | Dynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit card |
US20080302869A1 (en) * | 2005-05-09 | 2008-12-11 | Mullen Jeffrey D | Dynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit card |
US20080054068A1 (en) * | 2005-05-09 | 2008-03-06 | Mullen Jeffrey D | Dynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit card |
US20080054081A1 (en) * | 2005-05-09 | 2008-03-06 | Mullen Jeffrey D | Dynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit card |
US20080065555A1 (en) * | 2005-05-09 | 2008-03-13 | Mullen Jeffrey D | Dynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit card |
US20090308921A1 (en) * | 2005-05-09 | 2009-12-17 | Mullen Jeffrey D | Dynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit card |
US7828220B2 (en) | 2005-05-09 | 2010-11-09 | Dynamics Inc. | Dynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit card |
US7954705B2 (en) | 2005-05-09 | 2011-06-07 | Dynamics Inc. | Dynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit card |
US8447670B1 (en) | 2005-05-27 | 2013-05-21 | Jp Morgan Chase Bank, N.A. | Universal payment protection |
US8447672B2 (en) | 2005-05-27 | 2013-05-21 | Jp Morgan Chase Bank, N.A. | Universal payment protection |
US8473395B1 (en) | 2005-05-27 | 2013-06-25 | Jpmorgan Chase Bank, Na | Universal payment protection |
US20080223925A1 (en) * | 2005-08-18 | 2008-09-18 | Ivi Samrt Technologies, Inc. | Biometric Identity Verification System and Method |
US8899487B2 (en) * | 2005-08-18 | 2014-12-02 | Ivi Holdings Ltd. | Biometric identity verification system and method |
US7819322B2 (en) * | 2006-06-19 | 2010-10-26 | Visa U.S.A. Inc. | Portable consumer device verification system |
US8489506B2 (en) | 2006-06-19 | 2013-07-16 | Visa U.S.A. Inc. | Portable consumer device verification system |
US20080040276A1 (en) * | 2006-06-19 | 2008-02-14 | Ayman Hammad | Transaction Authentication Using Network |
US11107069B2 (en) | 2006-06-19 | 2021-08-31 | Visa U.S.A. Inc. | Transaction authentication using network |
US20080040271A1 (en) * | 2006-06-19 | 2008-02-14 | Ayman Hammad | Portable Consumer Device Verification System |
US20110004526A1 (en) * | 2006-06-19 | 2011-01-06 | Ayman Hammad | Portable consumer device verification system |
US11783326B2 (en) | 2006-06-19 | 2023-10-10 | Visa U.S.A. Inc. | Transaction authentication using network |
US20080126212A1 (en) * | 2006-07-12 | 2008-05-29 | Cox Mark A | Method of Marketing Credit Card Accounts and Point-Of-Sale Payment Devices |
US20080126260A1 (en) * | 2006-07-12 | 2008-05-29 | Cox Mark A | Point Of Sale Transaction Device With Magnetic Stripe Emulator And Biometric Authentication |
US20080105751A1 (en) * | 2006-10-31 | 2008-05-08 | Steven Landau | Powered Authenticating Cards |
US20080200210A1 (en) * | 2007-02-16 | 2008-08-21 | Lim Hwang-Kiu | Mobile communication device and battery recharge method thereof |
US20080237356A1 (en) * | 2007-03-23 | 2008-10-02 | Innovatier, Inc. | Step card and method for making a step card |
US20080319912A1 (en) * | 2007-06-22 | 2008-12-25 | Faith Patrick L | Powering financial transaction token with onboard and external power source |
US20110084149A1 (en) * | 2007-06-22 | 2011-04-14 | Faith Patrick L | Powering financial transaction token with onboard and external power source |
US20100027788A1 (en) * | 2007-07-02 | 2010-02-04 | Freescale Semiconductor, Inc. | Asymmetric Cryptographic Device With Local Private Key Generation and Method Therefor |
US9111122B2 (en) * | 2007-07-02 | 2015-08-18 | Freescale Semiconductor, Inc. | Asymmetric cryptographic device with local private key generation and method therefor |
US11244289B2 (en) * | 2007-11-02 | 2022-02-08 | Citicorp Credit Services, Inc. (Usa) | Methods and systems for managing financial institution customer accounts |
US20090119211A1 (en) * | 2007-11-02 | 2009-05-07 | Citicorp Credit Services, Inc. | Methods and systems for managing financial institution customer accounts |
US20090159668A1 (en) * | 2007-12-24 | 2009-06-25 | Dynamics Inc. | Cards and devices with multifunction magnetic emulators and methods for using same |
US10095974B1 (en) | 2007-12-24 | 2018-10-09 | Dynamics Inc. | Payment cards and devices with displays, chips, RFIDs, magnetic emulators, magnetic encoders, and other components |
US8973824B2 (en) | 2007-12-24 | 2015-03-10 | Dynamics Inc. | Cards and devices with magnetic emulators with zoning control and advanced interiors |
US9010630B2 (en) | 2007-12-24 | 2015-04-21 | Dynamics Inc. | Systems and methods for programmable payment cards and devices with loyalty-based payment applications |
US20090159671A1 (en) * | 2007-12-24 | 2009-06-25 | Dynamics Inc. | Cards and devices with magnetic emulators with zoning control and advanced interiors |
US9004368B2 (en) | 2007-12-24 | 2015-04-14 | Dynamics Inc. | Payment cards and devices with enhanced magnetic emulators |
US8011577B2 (en) | 2007-12-24 | 2011-09-06 | Dynamics Inc. | Payment cards and devices with gift card, global integration, and magnetic stripe reader communication functionality |
US8020775B2 (en) | 2007-12-24 | 2011-09-20 | Dynamics Inc. | Payment cards and devices with enhanced magnetic emulators |
US20090159690A1 (en) * | 2007-12-24 | 2009-06-25 | Dynamics Inc. | Payment cards and devices with gift card, global integration, and magnetic stripe reader communication functionality |
US20090159667A1 (en) * | 2007-12-24 | 2009-06-25 | Dynamics, Inc. | Cards with serial magnetic emulators |
US20110272481A1 (en) * | 2007-12-24 | 2011-11-10 | Mullen Jeffrey D | Credit, security, debit cards and the like with buttons |
US20110272472A1 (en) * | 2007-12-24 | 2011-11-10 | Mullen Jeffrey D | Advanced dynamic credit cards |
US20110272466A1 (en) * | 2007-12-24 | 2011-11-10 | Mullen Jeffrey D | Payment cards and devices with enhanced magnetic emulators |
US20110272475A1 (en) * | 2007-12-24 | 2011-11-10 | Mullen Jeffrey D | Cards and devices with multifunction magnetic emulators and methods for using same |
US20110272479A1 (en) * | 2007-12-24 | 2011-11-10 | Mullen Jeffrey D | Advanced dynamic credit cards |
US20110272483A1 (en) * | 2007-12-24 | 2011-11-10 | Mullen Jeffrey D | Cards and devices with magnetic emulators with zoning control and advanced interiors |
US20110272480A1 (en) * | 2007-12-24 | 2011-11-10 | Mullen Jeffrey D | Cards with serial magnetic emulators |
US20110272465A1 (en) * | 2007-12-24 | 2011-11-10 | Mullen Jeffrey D | Cards and devices with magnetic emulators and magnetic reader read-head detectors |
US20110272482A1 (en) * | 2007-12-24 | 2011-11-10 | Mullen Jeffrey D | Cards and devices with multifunction magnetic emulators and methods for using same |
US20110278364A1 (en) * | 2007-12-24 | 2011-11-17 | Mullen Jeffrey D | Cards and devices with magnetic emulators and magnetic reader read-head detectors |
US20090159696A1 (en) * | 2007-12-24 | 2009-06-25 | Dynamics Inc. | Advanced dynamic credit cards |
US8074877B2 (en) | 2007-12-24 | 2011-12-13 | Dynamics Inc. | Systems and methods for programmable payment cards and devices with loyalty-based payment applications |
US11494606B2 (en) * | 2007-12-24 | 2022-11-08 | Dynamics Inc. | Cards and devices with magnetic emulators with zoning control and advanced interiors |
US20090159710A1 (en) * | 2007-12-24 | 2009-06-25 | Dynamics Inc. | Cards and devices with magnetic emulators and magnetic reader read-head detectors |
US11238329B2 (en) | 2007-12-24 | 2022-02-01 | Dynamics Inc. | Payment cards and devices with gift card, global integration, and magnetic stripe reader communication functionality |
US8881989B2 (en) * | 2007-12-24 | 2014-11-11 | Dynamics Inc. | Cards and devices with magnetic emulators with zoning control and advanced interiors |
US20090159704A1 (en) * | 2007-12-24 | 2009-06-25 | Dynamics Inc. | Cards and devices with magnetic emulators and magnetic read-head detectors |
US11062195B2 (en) * | 2007-12-24 | 2021-07-13 | Dynamics Inc. | Cards and devices with multifunction magnetic emulators and methods for using same |
US11055600B2 (en) * | 2007-12-24 | 2021-07-06 | Dynamics Inc. | Cards with serial magnetic emulators |
US11037045B2 (en) * | 2007-12-24 | 2021-06-15 | Dynamics Inc. | Cards and devices with magnetic emulators with zoning control and advanced interiors |
US8875999B2 (en) | 2007-12-24 | 2014-11-04 | Dynamics Inc. | Payment cards and devices with gift card, global integration, and magnetic stripe reader communication functionality |
US10997489B2 (en) | 2007-12-24 | 2021-05-04 | Dynamics Inc. | Cards and devices with multifunction magnetic emulators and methods for using same |
US20090159708A1 (en) * | 2007-12-24 | 2009-06-25 | Dynamics Inc. | Payment cards and devices with enhanced magnetic emulators |
US20090159703A1 (en) * | 2007-12-24 | 2009-06-25 | Dynamics Inc. | Credit, security, debit cards and the like with buttons |
US20090159700A1 (en) * | 2007-12-24 | 2009-06-25 | Dynamics Inc. | Systems and methods for programmable payment cards and devices with loyalty-based payment applications |
US20090159697A1 (en) * | 2007-12-24 | 2009-06-25 | Dynamics, Inc. | Cards and devices with magnetic emulators with zoning control and advanced interiors |
US20090159701A1 (en) * | 2007-12-24 | 2009-06-25 | Dynamics Inc. | Payment cards and devices with enhanced magnetic emulators |
US20090159681A1 (en) * | 2007-12-24 | 2009-06-25 | Dynamics, Inc. | Cards and devices with magnetic emulators and magnetic reader read-head detectors |
US20090159698A1 (en) * | 2007-12-24 | 2009-06-25 | Dymanics Inc. | Payment cards and devices with gift card, global integration, and magnetic stripe reader communication functionality |
US20090159712A1 (en) * | 2007-12-24 | 2009-06-25 | Dynamics Inc. | Payment cards and devices with displays, chips, rfids, magnetic emulators, magentic decoders, and other components |
US20090159680A1 (en) * | 2007-12-24 | 2009-06-25 | Dynamics Inc. | Credit, security, debit cards and the like with buttons |
US10579920B2 (en) | 2007-12-24 | 2020-03-03 | Dynamics Inc. | Systems and methods for programmable payment cards and devices with loyalty-based payment applications |
US20090159711A1 (en) * | 2007-12-24 | 2009-06-25 | Dynamics Inc. | Cards and devices with magnetic emulators with zoning control and advanced interiors |
US8286876B2 (en) * | 2007-12-24 | 2012-10-16 | Dynamics Inc. | Cards and devices with magnetic emulators and magnetic reader read-head detectors |
US20090159706A1 (en) * | 2007-12-24 | 2009-06-25 | Dynamics Inc. | Payment cards and devices with displays, chips, rfids, magentic emulators, magentic decoders, and other components |
US20090159669A1 (en) * | 2007-12-24 | 2009-06-25 | Dynamics Inc. | Cards with serial magnetic emulators |
US10496918B2 (en) * | 2007-12-24 | 2019-12-03 | Dynamics Inc. | Cards and devices with multifunction magnetic emulators and methods for using the same |
US10467521B2 (en) | 2007-12-24 | 2019-11-05 | Dynamics Inc. | Payment cards and devices with gift card, global integration, and magnetic stripe reader communication functionality |
US10430704B2 (en) | 2007-12-24 | 2019-10-01 | Dynamics Inc. | Payment cards and devices with displays, chips, RFIDs, magnetic emulators, magnetic encoders, and other components |
US8302872B2 (en) * | 2007-12-24 | 2012-11-06 | Dynamics Inc. | Advanced dynamic credit cards |
US20090159702A1 (en) * | 2007-12-24 | 2009-06-25 | Dynamics Inc. | Advanced dynamic credit cards |
US20190197387A1 (en) * | 2007-12-24 | 2019-06-27 | Dynamics Inc. | Cards and devices with magnetic emulators with zoning control and advanced interiors |
US10325199B2 (en) * | 2007-12-24 | 2019-06-18 | Dynamics Inc. | Payment cards and devices with displays, chips, RFIDs, magnetic emulators, magentic decoders, and other components |
US20090160617A1 (en) * | 2007-12-24 | 2009-06-25 | Dynamics Inc. | Credit, security, debit cards and the like with buttons |
US20120318871A1 (en) * | 2007-12-24 | 2012-12-20 | Mullen Jeffrey D | Cards and devices with magnetic emulators and magnetic reader read-head detectors |
US10255545B2 (en) | 2007-12-24 | 2019-04-09 | Dynamics Inc. | Cards and devices with multifunction magnetic emulators and methods for using same |
US10223631B2 (en) | 2007-12-24 | 2019-03-05 | Dynamics Inc. | Cards and devices with multifunction magnetic emulators and methods for using same |
US10198687B2 (en) * | 2007-12-24 | 2019-02-05 | Dynamics Inc. | Cards and devices with multifunction magnetic emulators and methods for using same |
US20130020396A1 (en) * | 2007-12-24 | 2013-01-24 | Mullen Jeffrey D | Cards and devices with multifunction magnetic emulators and methods for using same |
US8733638B2 (en) | 2007-12-24 | 2014-05-27 | Dynamics Inc. | Payment cards and devices with displays, chips, RFIDs, magnetic emulators, magentic decoders, and other components |
US20090159682A1 (en) * | 2007-12-24 | 2009-06-25 | Dynamics Inc. | Cards and devices with multi-function magnetic emulators and methods for using same |
US10169692B2 (en) | 2007-12-24 | 2019-01-01 | Dynamics Inc. | Credit, security, debit cards and the like with buttons |
US8382000B2 (en) * | 2007-12-24 | 2013-02-26 | Dynamics Inc. | Payment cards and devices with enhanced magnetic emulators |
US8668143B2 (en) | 2007-12-24 | 2014-03-11 | Dynamics Inc. | Payment cards and devices with gift card, global integration, and magnetic stripe reader communication functionality |
US10032100B2 (en) * | 2007-12-24 | 2018-07-24 | Dynamics Inc. | Cards and devices with multifunction magnetic emulators and methods for using same |
US9361569B2 (en) * | 2007-12-24 | 2016-06-07 | Dynamics, Inc. | Cards with serial magnetic emulators |
US8413892B2 (en) | 2007-12-24 | 2013-04-09 | Dynamics Inc. | Payment cards and devices with displays, chips, RFIDs, magnetic emulators, magnetic encoders, and other components |
US9384438B2 (en) | 2007-12-24 | 2016-07-05 | Dynamics, Inc. | Cards with serial magnetic emulators |
US8424773B2 (en) * | 2007-12-24 | 2013-04-23 | Dynamics Inc. | Payment cards and devices with enhanced magnetic emulators |
US20090159707A1 (en) * | 2007-12-24 | 2009-06-25 | Dynamics Inc. | Systems and methods for programmable payment cards and devices with loyalty-based payment applications |
US20090159673A1 (en) * | 2007-12-24 | 2009-06-25 | Dynamics Inc. | Systems and methods for programmable payment cards and devices with loyalty-based payment applications |
US8459548B2 (en) | 2007-12-24 | 2013-06-11 | Dynamics Inc. | Payment cards and devices with gift card, global integration, and magnetic stripe reader communication functionality |
US20090159689A1 (en) * | 2007-12-24 | 2009-06-25 | Dynamics Inc. | Payment cards and devices with gift card, global integration, and magnetic stripe reader communication functionality |
US20090159705A1 (en) * | 2007-12-24 | 2009-06-25 | Dynamics Inc. | Payment cards and devices operable to receive point-of-sale actions before point-of-sale and forward actions at point-of-sale |
US8485437B2 (en) | 2007-12-24 | 2013-07-16 | Dynamics Inc. | Systems and methods for programmable payment cards and devices with loyalty-based payment applications |
US20090159699A1 (en) * | 2007-12-24 | 2009-06-25 | Dynamics Inc. | Payment cards and devices operable to receive point-of-sale actions before point-of-sale and forward actions at point-of-sale |
US20090159709A1 (en) * | 2007-12-24 | 2009-06-25 | Dynamics Inc. | Advanced dynamic credit cards |
US8608083B2 (en) | 2007-12-24 | 2013-12-17 | Dynamics Inc. | Cards and devices with magnetic emulators with zoning control and advanced interiors |
US20160239735A1 (en) * | 2007-12-24 | 2016-08-18 | Dynamics Inc. | Cards and devices with multifunction magnetic emulators and methods for using same |
US20160283837A1 (en) * | 2007-12-24 | 2016-09-29 | Dynamics Inc. | Cards with serial magnetic emulators |
US9805297B2 (en) | 2007-12-24 | 2017-10-31 | Dynamics Inc. | Systems and methods for programmable payment cards and devices with loyalty-based payment applications |
US9727813B2 (en) | 2007-12-24 | 2017-08-08 | Dynamics Inc. | Credit, security, debit cards and the like with buttons |
US9704089B2 (en) | 2007-12-24 | 2017-07-11 | Dynamics Inc. | Systems and methods for programmable payment cards and devices with loyalty-based payment applications |
US20090159713A1 (en) * | 2007-12-24 | 2009-06-25 | Dynamics Inc. | Payment cards and devices with enhanced magnetic emulators |
US20090159672A1 (en) * | 2007-12-24 | 2009-06-25 | Dynamics Inc. | Cards with serial magnetic emulators |
US8517276B2 (en) * | 2007-12-24 | 2013-08-27 | Dynamics Inc. | Cards and devices with multifunction magnetic emulators and methods for using same |
US9704088B2 (en) * | 2007-12-24 | 2017-07-11 | Dynamics Inc. | Cards and devices with multifunction magnetic emulators and methods for using same |
US9697454B2 (en) | 2007-12-24 | 2017-07-04 | Dynamics Inc. | Payment cards and devices with displays, chips, RFIDs, magnetic emulators, magnetic encoders, and other components |
US9684861B2 (en) | 2007-12-24 | 2017-06-20 | Dynamics Inc. | Payment cards and devices with displays, chips, RFIDs, magnetic emulators, magnetic decoders, and other components |
US9639796B2 (en) * | 2007-12-24 | 2017-05-02 | Dynamics Inc. | Cards and devices with magnetic emulators with zoning control and advanced interiors |
US9547816B2 (en) | 2007-12-24 | 2017-01-17 | Dynamics Inc. | Cards and devices with multifunction magnetic emulators and methods for using same |
US20160342878A1 (en) * | 2007-12-24 | 2016-11-24 | Dynamics Inc. | Cards and devices with multifunction magnetic emulators and methods for using same |
US20160307085A1 (en) * | 2007-12-24 | 2016-10-20 | Dynamics Inc. | Cards and devices with multifunction magnetic emulators and methods for using same |
US20090199004A1 (en) * | 2008-01-31 | 2009-08-06 | Mark Stanley Krawczewicz | System and method for self-authenticating token |
US8944328B2 (en) | 2008-02-23 | 2015-02-03 | Cedar Ridge Research | System for data card emulation |
US8141780B2 (en) | 2008-02-23 | 2012-03-27 | Cedar Ridge Research Llc | System and method for data card emulation |
US20110251955A1 (en) * | 2008-12-19 | 2011-10-13 | Nxp B.V. | Enhanced smart card usage |
US9208634B2 (en) * | 2008-12-19 | 2015-12-08 | Nxp B.V. | Enhanced smart card usage |
US8579203B1 (en) * | 2008-12-19 | 2013-11-12 | Dynamics Inc. | Electronic magnetic recorded media emulators in magnetic card devices |
US20100207735A1 (en) * | 2009-02-18 | 2010-08-19 | Samsung Sdi Co., Ltd. | Rfid communication device |
US8368515B2 (en) | 2009-02-18 | 2013-02-05 | Samsung Sdi Co., Ltd. | Dual mode RFID communication device operating as a reader or tag |
US8931703B1 (en) | 2009-03-16 | 2015-01-13 | Dynamics Inc. | Payment cards and devices for displaying barcodes |
US10948964B1 (en) | 2009-04-06 | 2021-03-16 | Dynamics Inc. | Cards with power management |
US8622309B1 (en) * | 2009-04-06 | 2014-01-07 | Dynamics Inc. | Payment cards and devices with budgets, parental controls, and virtual accounts |
US8590796B1 (en) | 2009-04-06 | 2013-11-26 | Dynamics Inc. | Cards having dynamic magnetic stripe communication devices fabricated from multiple boards |
US10176419B1 (en) | 2009-04-06 | 2019-01-08 | Dynamics Inc. | Cards and assemblies with user interfaces |
US8282007B1 (en) | 2009-04-06 | 2012-10-09 | Dynamics Inc. | Laminated cards with manual input interfaces |
US9928456B1 (en) | 2009-04-06 | 2018-03-27 | Dynamics Inc. | Cards and assemblies with user interfaces |
US8066191B1 (en) | 2009-04-06 | 2011-11-29 | Dynamics Inc. | Cards and assemblies with user interfaces |
US8757499B2 (en) | 2009-04-06 | 2014-06-24 | Dynamics Inc. | Laminated cards with manual input interfaces |
US9329619B1 (en) | 2009-04-06 | 2016-05-03 | Dynamics Inc. | Cards with power management |
US8172148B1 (en) | 2009-04-06 | 2012-05-08 | Dynamics Inc. | Cards and assemblies with user interfaces |
EP2442259A4 (en) * | 2009-06-12 | 2013-04-17 | Hierstar Ltd Beijing | Smart card capable of being used for infrared communication |
US20120154290A1 (en) * | 2009-06-12 | 2012-06-21 | Hierstar Limited | Smart card capable of being used for infrared communication |
EP2442259A1 (en) * | 2009-06-12 | 2012-04-18 | Hierstar Limited (Beijing) | Smart card capable of being used for infrared communication |
US11144909B1 (en) | 2009-06-23 | 2021-10-12 | Dynamics Inc. | Cards deployed with inactivated products for activation |
US8757483B1 (en) | 2009-06-23 | 2014-06-24 | Dynamics Inc. | Cards deployed with inactivated products for activation |
US8393545B1 (en) | 2009-06-23 | 2013-03-12 | Dynamics Inc. | Cards deployed with inactivated products for activation |
US9064255B1 (en) | 2009-06-23 | 2015-06-23 | Dynamics Inc. | Cards deployed with inactivated products for activation |
DE102009031011A1 (en) * | 2009-06-29 | 2010-08-19 | Siemens Aktiengesellschaft | Universal serial bus storage-stick has unit with connection for connecting to universal serial bus interface, controller, data storage and emergency power supply |
US9953255B1 (en) | 2009-08-17 | 2018-04-24 | Dynamics Inc. | Advanced loyalty applications for powered cards and devices |
US11003970B1 (en) | 2009-08-17 | 2021-05-11 | Dynamics Inc. | Advanced loyalty applications for powered cards and devices |
US9852368B1 (en) | 2009-08-17 | 2017-12-26 | Dynamics Inc. | Advanced loyalty applications for powered cards and devices |
US8511574B1 (en) | 2009-08-17 | 2013-08-20 | Dynamics Inc. | Advanced loyalty applications for powered cards and devices |
US9306666B1 (en) | 2009-10-08 | 2016-04-05 | Dynamics Inc. | Programming protocols for powered cards and devices |
US8727219B1 (en) | 2009-10-12 | 2014-05-20 | Dynamics Inc. | Magnetic stripe track signal having multiple communications channels |
US8814050B1 (en) | 2009-10-20 | 2014-08-26 | Dynamics Inc. | Advanced payment options for powered cards and devices |
US10181097B1 (en) | 2009-10-20 | 2019-01-15 | Dynamics Inc. | Advanced payment options for powered cards and devices |
US9292843B1 (en) | 2009-10-20 | 2016-03-22 | Dynamics Inc. | Advanced payment options for powered cards and devices |
US8523059B1 (en) | 2009-10-20 | 2013-09-03 | Dynamics Inc. | Advanced payment options for powered cards and devices |
US9652436B1 (en) | 2009-10-25 | 2017-05-16 | Dynamics Inc. | Games, prizes, and entertainment for powered cards and devices |
US8393546B1 (en) | 2009-10-25 | 2013-03-12 | Dynamics Inc. | Games, prizes, and entertainment for powered cards and devices |
US9373069B2 (en) | 2010-02-16 | 2016-06-21 | Dynamics Inc. | Systems and methods for drive circuits for dynamic magnetic stripe communications devices |
US9875437B2 (en) | 2010-02-16 | 2018-01-23 | Dynamics Inc. | Systems and methods for drive circuits for dynamic magnetic stripe communications devices |
US8602312B2 (en) | 2010-02-16 | 2013-12-10 | Dynamics Inc. | Systems and methods for drive circuits for dynamic magnetic stripe communications devices |
US8348172B1 (en) | 2010-03-02 | 2013-01-08 | Dynamics Inc. | Systems and methods for detection mechanisms for magnetic cards and devices |
US8746579B1 (en) | 2010-03-02 | 2014-06-10 | Dynamics Inc. | Systems and methods for detection mechanisms for magnetic cards and devices |
US8573503B1 (en) | 2010-03-02 | 2013-11-05 | Dynamics Inc. | Systems and methods for detection mechanisms for magnetic cards and devices |
US10482363B1 (en) * | 2010-03-02 | 2019-11-19 | Dynamics Inc. | Systems and methods for detection mechanisms for magnetic cards and devices |
US10693263B1 (en) | 2010-03-16 | 2020-06-23 | Dynamics Inc. | Systems and methods for audio connectors for powered cards and devices |
US11120427B2 (en) | 2010-05-18 | 2021-09-14 | Dynamics Inc. | Systems and methods for cards and devices operable to communicate via light pulsing |
US10504105B2 (en) | 2010-05-18 | 2019-12-10 | Dynamics Inc. | Systems and methods for cards and devices operable to communicate to touch sensitive displays |
USD652075S1 (en) | 2010-07-02 | 2012-01-10 | Dynamics Inc. | Multiple button interactive electronic card |
USD652867S1 (en) | 2010-07-02 | 2012-01-24 | Dynamics Inc. | Multiple button interactive electronic card |
USD670759S1 (en) | 2010-07-02 | 2012-11-13 | Dynamics Inc. | Multiple button interactive electronic card with light sources |
USD672389S1 (en) | 2010-07-02 | 2012-12-11 | Dynamics Inc. | Multiple button interactive electronic card with light sources |
USD674013S1 (en) | 2010-07-02 | 2013-01-08 | Dynamics Inc. | Multiple button interactive electronic card with light sources |
USD687094S1 (en) | 2010-07-02 | 2013-07-30 | Dynamics Inc. | Multiple button interactive electronic card with light sources |
USD652448S1 (en) | 2010-07-02 | 2012-01-17 | Dynamics Inc. | Multiple button interactive electronic card |
USD652449S1 (en) | 2010-07-02 | 2012-01-17 | Dynamics Inc. | Multiple button interactive electronic card |
USD666241S1 (en) | 2010-07-09 | 2012-08-28 | Dynamics Inc. | Multiple button interactive electronic card with light source |
USD665447S1 (en) | 2010-07-09 | 2012-08-14 | Dynamics Inc. | Multiple button interactive electronic card with light source and display |
USD665022S1 (en) | 2010-07-09 | 2012-08-07 | Dynamics Inc. | Multiple button interactive electronic card with light source |
USD652450S1 (en) | 2010-07-09 | 2012-01-17 | Dynamics Inc. | Multiple button interactive electronic card |
USD653288S1 (en) | 2010-07-09 | 2012-01-31 | Dynamics Inc. | Multiple button interactive electronic card |
USD643063S1 (en) | 2010-07-09 | 2011-08-09 | Dynamics Inc. | Interactive electronic card with display |
USD651644S1 (en) | 2010-07-09 | 2012-01-03 | Dynamics Inc. | Interactive electronic card with display |
USD792513S1 (en) | 2010-07-09 | 2017-07-18 | Dynamics Inc. | Display with font |
USD792511S1 (en) | 2010-07-09 | 2017-07-18 | Dynamics Inc. | Display with font |
USD651237S1 (en) | 2010-07-09 | 2011-12-27 | Dynamics Inc. | Interactive electronic card with display |
USD792512S1 (en) | 2010-07-09 | 2017-07-18 | Dynamics Inc. | Display with font |
USD652076S1 (en) | 2010-07-09 | 2012-01-10 | Dynamics Inc. | Multiple button interactive electronic card with display |
USD651238S1 (en) | 2010-07-09 | 2011-12-27 | Dynamics Inc. | Interactive electronic card with display |
US8322623B1 (en) | 2010-07-26 | 2012-12-04 | Dynamics Inc. | Systems and methods for advanced card printing |
US10055614B1 (en) | 2010-08-12 | 2018-08-21 | Dynamics Inc. | Systems and methods for advanced detection mechanisms for magnetic cards and devices |
US9053398B1 (en) | 2010-08-12 | 2015-06-09 | Dynamics Inc. | Passive detection mechanisms for magnetic cards and devices |
US10022884B1 (en) | 2010-10-15 | 2018-07-17 | Dynamics Inc. | Systems and methods for alignment techniques for magnetic cards and devices |
US8561894B1 (en) | 2010-10-20 | 2013-10-22 | Dynamics Inc. | Powered cards and devices designed, programmed, and deployed from a kiosk |
US9646240B1 (en) | 2010-11-05 | 2017-05-09 | Dynamics Inc. | Locking features for powered cards and devices |
US8944333B1 (en) | 2011-01-23 | 2015-02-03 | Dynamics Inc. | Cards and devices with embedded holograms |
US9721201B1 (en) | 2011-01-23 | 2017-08-01 | Dynamics Inc. | Cards and devices with embedded holograms |
US8567679B1 (en) | 2011-01-23 | 2013-10-29 | Dynamics Inc. | Cards and devices with embedded holograms |
US10176423B1 (en) | 2011-01-23 | 2019-01-08 | Dynamics Inc. | Cards and devices with embedded holograms |
US10095970B1 (en) | 2011-01-31 | 2018-10-09 | Dynamics Inc. | Cards including anti-skimming devices |
US9818125B2 (en) | 2011-02-16 | 2017-11-14 | Dynamics Inc. | Systems and methods for information exchange mechanisms for powered cards and devices |
US8485446B1 (en) * | 2011-03-28 | 2013-07-16 | Dynamics Inc. | Shielded magnetic stripe for magnetic cards and devices |
US11100431B2 (en) | 2011-05-10 | 2021-08-24 | Dynamics Inc. | Systems and methods for mobile authorizations |
US20220327435A1 (en) * | 2011-05-10 | 2022-10-13 | Michael T. Wallace | Systems and methods for contactless communication mechanisms for cards and mobile devices |
US11501217B2 (en) | 2011-05-10 | 2022-11-15 | Dynamics Inc. | Systems and methods for a mobile electronic wallet |
USD670329S1 (en) | 2011-05-12 | 2012-11-06 | Dynamics Inc. | Interactive display card |
USD670332S1 (en) | 2011-05-12 | 2012-11-06 | Dynamics Inc. | Interactive card |
USD670330S1 (en) | 2011-05-12 | 2012-11-06 | Dynamics Inc. | Interactive card |
USD676904S1 (en) | 2011-05-12 | 2013-02-26 | Dynamics Inc. | Interactive display card |
USD670331S1 (en) | 2011-05-12 | 2012-11-06 | Dynamics Inc. | Interactive display card |
US8628022B1 (en) | 2011-05-23 | 2014-01-14 | Dynamics Inc. | Systems and methods for sensor mechanisms for magnetic cards and devices |
US9881245B1 (en) | 2011-05-23 | 2018-01-30 | Dynamics Inc. | Systems and methods for sensor mechanisms for magnetic cards and devices |
US9349089B1 (en) * | 2011-05-23 | 2016-05-24 | Dynamics Inc. | Systems and methods for sensor mechanisms for magnetic cards and devices |
US10936926B1 (en) | 2011-05-23 | 2021-03-02 | Dynamics Inc. | Systems and methods for sensor mechanisms for magnetic cards and devices |
US8827153B1 (en) | 2011-07-18 | 2014-09-09 | Dynamics Inc. | Systems and methods for waveform generation for dynamic magnetic stripe communications devices |
US8768830B1 (en) | 2011-09-08 | 2014-07-01 | Citibank, N.A. | Method and system for a multi-purpose transactional platform |
US11551046B1 (en) | 2011-10-19 | 2023-01-10 | Dynamics Inc. | Stacked dynamic magnetic stripe commmunications device for magnetic cards and devices |
US11409971B1 (en) | 2011-10-23 | 2022-08-09 | Dynamics Inc. | Programming and test modes for powered cards and devices |
US9619741B1 (en) | 2011-11-21 | 2017-04-11 | Dynamics Inc. | Systems and methods for synchronization mechanisms for magnetic cards and devices |
US10169693B1 (en) | 2011-11-21 | 2019-01-01 | Dynamics Inc. | Data modification for magnetic cards and devices |
US8960545B1 (en) | 2011-11-21 | 2015-02-24 | Dynamics Inc. | Data modification for magnetic cards and devices |
US11941469B1 (en) | 2011-11-21 | 2024-03-26 | Dynamics Inc. | Systems and methods for synchronization mechanisms for magnetic cards and devices |
US10062024B1 (en) | 2012-02-03 | 2018-08-28 | Dynamics Inc. | Systems and methods for spike suppression for dynamic magnetic stripe communications devices |
US9710745B1 (en) | 2012-02-09 | 2017-07-18 | Dynamics Inc. | Systems and methods for automated assembly of dynamic magnetic stripe communications devices |
US8888009B1 (en) | 2012-02-14 | 2014-11-18 | Dynamics Inc. | Systems and methods for extended stripe mechanisms for magnetic cards and devices |
US9916992B2 (en) | 2012-02-20 | 2018-03-13 | Dynamics Inc. | Systems and methods for flexible components for powered cards and devices |
US9734669B1 (en) | 2012-04-02 | 2017-08-15 | Dynamics Inc. | Cards, devices, systems, and methods for advanced payment game of skill and game of chance functionality |
US10127489B2 (en) | 2012-04-03 | 2018-11-13 | X-Card Holdings, Llc | Information carrying card comprising crosslinked polymer composition, and method of making the same |
US9183486B2 (en) * | 2012-04-03 | 2015-11-10 | X-Card Holdings, Llc | Information carrying card comprising a cross-linked polymer composition, and method of making the same |
US20130255078A1 (en) * | 2012-04-03 | 2013-10-03 | X-Card Holdings, Llc | Information carrying card comprising a cross-linked polymer composition, and method of making the same |
US11359084B2 (en) | 2012-04-03 | 2022-06-14 | X-Card Holdings, Llc | Information carrying card comprising a cross-linked polymer composition, and method of making the same |
US11390737B2 (en) | 2012-04-03 | 2022-07-19 | X-Card Holdings, Llc | Method of making an information carrying card comprising a cross-linked polymer composition |
US11560474B2 (en) | 2012-04-03 | 2023-01-24 | X-Card Holdings, Llc | Information carrying card comprising a cross-linked polymer composition, and method of making the same |
US11170281B2 (en) | 2012-04-03 | 2021-11-09 | Idemia America Corp. | Information carrying card comprising crosslinked polymer composition, and method of making the same |
US9594999B2 (en) | 2012-04-03 | 2017-03-14 | X-Card Holdings, Llc | Information carrying card comprising crosslinked polymer composition, and method of making the same |
US9122968B2 (en) | 2012-04-03 | 2015-09-01 | X-Card Holdings, Llc | Information carrying card comprising a cross-linked polymer composition, and method of making the same |
US11555108B2 (en) | 2012-04-03 | 2023-01-17 | Idemia America Corp. | Information carrying card comprising a cross-linked polymer composition, and method of making the same |
US10392502B2 (en) | 2012-04-03 | 2019-08-27 | X-Card Holdings, Llc | Information carrying card comprising a cross-linked polymer composition, and method of making the same |
US9275321B2 (en) | 2012-04-03 | 2016-03-01 | X-Card Holdings, Llc | Information carrying card comprising a cross-linked polymer composition, and method of making the same |
US11359085B2 (en) | 2012-04-03 | 2022-06-14 | X-Card Holdings, Llc | Information carrying card comprising a cross-linked polymer composition, and method of making the same |
US10255539B2 (en) | 2012-04-03 | 2019-04-09 | X-Card Holdings, Llc | Information carrying card comprising crosslinked polymer composition, and method of making the same |
US10836894B2 (en) | 2012-04-03 | 2020-11-17 | X-Card Holdings, Llc | Information carrying card comprising a cross-linked polymer composition, and method of making the same |
US10611907B2 (en) | 2012-04-03 | 2020-04-07 | X-Card Holdings, Llc | Information carrying card comprising a cross-linked polymer composition, and method of making the same |
US10570281B2 (en) | 2012-04-03 | 2020-02-25 | X-Card Holdings, Llc. | Information carrying card comprising a cross-linked polymer composition, and method of making the same |
US9439334B2 (en) | 2012-04-03 | 2016-09-06 | X-Card Holdings, Llc | Information carrying card comprising crosslinked polymer composition, and method of making the same |
US9688850B2 (en) | 2012-04-03 | 2017-06-27 | X-Card Holdings, Llc | Information carrying card comprising a cross-linked polymer composition, and method of making the same |
US11961147B1 (en) | 2012-04-15 | 2024-04-16 | K. Shane Cupp | Cards, devices, systems, and methods for financial management services |
US11418483B1 (en) | 2012-04-19 | 2022-08-16 | Dynamics Inc. | Cards, devices, systems, and methods for zone-based network management |
US9033218B1 (en) | 2012-05-15 | 2015-05-19 | Dynamics Inc. | Cards, devices, systems, methods and dynamic security codes |
US10395156B1 (en) | 2012-05-15 | 2019-08-27 | Dynamics Inc. | Cards, devices, systems, methods and dynamic security codes |
US20140001269A1 (en) * | 2012-06-29 | 2014-01-02 | David Joseph Hartwick | Multiple layer card circuit boards |
US9064195B2 (en) * | 2012-06-29 | 2015-06-23 | Dynamics Inc. | Multiple layer card circuit boards |
USD729870S1 (en) | 2012-08-27 | 2015-05-19 | Dynamics Inc. | Interactive electronic card with display and button |
USD730439S1 (en) | 2012-08-27 | 2015-05-26 | Dynamics Inc. | Interactive electronic card with buttons |
USD828870S1 (en) | 2012-08-27 | 2018-09-18 | Dynamics Inc. | Display card |
USD687487S1 (en) | 2012-08-27 | 2013-08-06 | Dynamics Inc. | Interactive electronic card with display and button |
USD687095S1 (en) | 2012-08-27 | 2013-07-30 | Dynamics Inc. | Interactive electronic card with buttons |
USD673606S1 (en) | 2012-08-27 | 2013-01-01 | Dynamics Inc. | Interactive electronic card with display and buttons |
USD687489S1 (en) | 2012-08-27 | 2013-08-06 | Dynamics Inc. | Interactive electronic card with buttons |
USD692053S1 (en) | 2012-08-27 | 2013-10-22 | Dynamics Inc. | Interactive electronic card with display and button |
USD694322S1 (en) | 2012-08-27 | 2013-11-26 | Dynamics Inc. | Interactive electronic card with display buttons |
USD676487S1 (en) | 2012-08-27 | 2013-02-19 | Dynamics Inc. | Interactive electronic card with display and buttons |
USD688744S1 (en) | 2012-08-27 | 2013-08-27 | Dynamics Inc. | Interactive electronic card with display and button |
USD687488S1 (en) | 2012-08-27 | 2013-08-06 | Dynamics Inc. | Interactive electronic card with buttons |
USD675256S1 (en) | 2012-08-27 | 2013-01-29 | Dynamics Inc. | Interactive electronic card with display and button |
USD687490S1 (en) | 2012-08-27 | 2013-08-06 | Dynamics Inc. | Interactive electronic card with display and button |
USD687887S1 (en) | 2012-08-27 | 2013-08-13 | Dynamics Inc. | Interactive electronic card with buttons |
USD729871S1 (en) | 2012-08-27 | 2015-05-19 | Dynamics Inc. | Interactive electronic card with display and buttons |
USD730438S1 (en) | 2012-08-27 | 2015-05-26 | Dynamics Inc. | Interactive electronic card with display and button |
USD695636S1 (en) | 2012-08-27 | 2013-12-17 | Dynamics Inc. | Interactive electronic card with display and buttons |
USD729869S1 (en) | 2012-08-27 | 2015-05-19 | Dynamics Inc. | Interactive electronic card with display and button |
US11126997B1 (en) | 2012-10-02 | 2021-09-21 | Dynamics Inc. | Cards, devices, systems, and methods for a fulfillment system |
US9010647B2 (en) | 2012-10-29 | 2015-04-21 | Dynamics Inc. | Multiple sensor detector systems and detection methods of magnetic cards and devices |
US9659246B1 (en) | 2012-11-05 | 2017-05-23 | Dynamics Inc. | Dynamic magnetic stripe communications device with beveled magnetic material for magnetic cards and devices |
US10922597B1 (en) | 2012-11-05 | 2021-02-16 | Dynamics Inc. | Dynamic magnetic stripe communications device with beveled magnetic material for magnetic cards and devices |
US9010644B1 (en) | 2012-11-30 | 2015-04-21 | Dynamics Inc. | Dynamic magnetic stripe communications device with stepped magnetic material for magnetic cards and devices |
US9646750B1 (en) | 2012-11-30 | 2017-05-09 | Dynamics Inc. | Dynamic magnetic stripe communications device with stepped magnetic material for magnetic cards and devices |
US10311349B1 (en) | 2012-11-30 | 2019-06-04 | Dynamics Inc. | Dynamic magnetic stripe communications device with stepped magnetic material for magnetic cards and devices |
US11023796B1 (en) | 2012-11-30 | 2021-06-01 | Dynamics Inc. | Dynamic magnetic stripe communications device with stepped magnetic material for magnetic cards and devices |
US10949627B2 (en) | 2012-12-20 | 2021-03-16 | Dynamics Inc. | Systems and methods for non-time smearing detection mechanisms for magnetic cards and devices |
USD777252S1 (en) | 2013-03-04 | 2017-01-24 | Dynamics Inc. | Interactive electronic card with buttons |
USD751640S1 (en) | 2013-03-04 | 2016-03-15 | Dynamics Inc. | Interactive electronic card with display and button |
USD750167S1 (en) | 2013-03-04 | 2016-02-23 | Dynamics Inc. | Interactive electronic card with buttons |
USD750166S1 (en) | 2013-03-04 | 2016-02-23 | Dynamics Inc. | Interactive electronic card with display and buttons |
USD750168S1 (en) | 2013-03-04 | 2016-02-23 | Dynamics Inc. | Interactive electronic card with display and button |
USD765174S1 (en) | 2013-03-04 | 2016-08-30 | Dynamics Inc. | Interactive electronic card with button |
USD765173S1 (en) | 2013-03-04 | 2016-08-30 | Dynamics Inc. | Interactive electronic card with display and button |
USD764584S1 (en) | 2013-03-04 | 2016-08-23 | Dynamics Inc. | Interactive electronic card with buttons |
USD751639S1 (en) | 2013-03-04 | 2016-03-15 | Dynamics Inc. | Interactive electronic card with display and button |
US10906287B2 (en) | 2013-03-15 | 2021-02-02 | X-Card Holdings, Llc | Methods of making a core layer for an information carrying card, and resulting products |
US11884051B2 (en) | 2013-03-15 | 2024-01-30 | X-Card Holdings, Llc | Methods of making a core layer for an information carrying card, and resulting products |
USD737373S1 (en) | 2013-09-10 | 2015-08-25 | Dynamics Inc. | Interactive electronic card with contact connector |
USD767024S1 (en) | 2013-09-10 | 2016-09-20 | Dynamics Inc. | Interactive electronic card with contact connector |
US10108891B1 (en) | 2014-03-21 | 2018-10-23 | Dynamics Inc. | Exchange coupled amorphous ribbons for electronic stripes |
US11062188B1 (en) | 2014-03-21 | 2021-07-13 | Dynamics Inc | Exchange coupled amorphous ribbons for electronic stripes |
US20150278670A1 (en) * | 2014-03-31 | 2015-10-01 | Infineon Technologies Ag | Chip card and method for operating a chip card |
US20210081928A1 (en) * | 2014-05-23 | 2021-03-18 | Samsung Electronics Co., Ltd. | Systems and methods for linking devices to user accounts |
US20150339662A1 (en) * | 2014-05-23 | 2015-11-26 | LoopPay Inc. | Systems and methods for linking devices to user accounts |
US9815596B1 (en) * | 2015-07-07 | 2017-11-14 | Patchiouky Leveille | Container with calorie information display |
US20170092442A1 (en) * | 2015-09-29 | 2017-03-30 | Datalogic Ip Tech S.R.L. | Modular trigger assembly |
US10049831B2 (en) * | 2015-09-29 | 2018-08-14 | Datalogic Ip Tech S.R.L. | Modular trigger assembly |
KR101766996B1 (en) * | 2016-02-05 | 2017-08-23 | 스마트디스플레이어 테크놀로지 씨오., 엘티디. | Magnetic card |
US10032049B2 (en) | 2016-02-23 | 2018-07-24 | Dynamics Inc. | Magnetic cards and devices for motorized readers |
US20190236422A1 (en) * | 2016-06-21 | 2019-08-01 | Idemia France | Method implemented in an electronic entity and associated electronic entity |
US11164060B2 (en) * | 2016-06-21 | 2021-11-02 | Idemia France | Method implemented in an electronic entity and associated electronic entity |
US10977540B2 (en) | 2016-07-27 | 2021-04-13 | Composecure, Llc | RFID device |
US11829826B2 (en) | 2016-07-27 | 2023-11-28 | Composecure, Llc | RFID device |
US11247371B2 (en) | 2016-07-27 | 2022-02-15 | Composecure, Llc | Overmolded electronic components for transaction cards and methods of making thereof |
US11267172B2 (en) | 2016-07-27 | 2022-03-08 | Composecure, Llc | Overmolded electronic components for transaction cards and methods of making thereof |
US11461608B2 (en) | 2016-07-27 | 2022-10-04 | Composecure, Llc | RFID device |
US11618191B2 (en) | 2016-07-27 | 2023-04-04 | Composecure, Llc | DI metal transaction devices and processes for the manufacture thereof |
US10417630B2 (en) | 2016-07-28 | 2019-09-17 | Samsung Electronics Co., Ltd. | Transmission-pulse sequence including proxy for secondary magnetic stripe |
CN108229634A (en) * | 2016-12-09 | 2018-06-29 | 第资本服务有限责任公司 | Transactional cards with interior lighting |
US11151437B2 (en) * | 2017-09-07 | 2021-10-19 | Composecure, Llc | Metal, ceramic, or ceramic-coated transaction card with window or window pattern and optional backlighting |
US11669708B2 (en) | 2017-09-07 | 2023-06-06 | Composecure, Llc | Metal, ceramic, or ceramic-coated transaction card with window or window pattern and optional backlighting |
US11232341B2 (en) | 2017-10-18 | 2022-01-25 | Composecure, Llc | Metal, ceramic, or ceramic-coated transaction card with window or window pattern and optional backlighting |
CN111492377A (en) * | 2017-10-18 | 2020-08-04 | 安全创造有限责任公司 | Transaction card with window or window pattern and optional backlit metal, ceramic or ceramic coating |
US11710024B2 (en) | 2018-01-30 | 2023-07-25 | Composecure, Llc | Di capacitive embedded metal card |
USD944322S1 (en) | 2018-01-30 | 2022-02-22 | Composecure, Llc | Layer of a transaction card |
USD943669S1 (en) | 2018-01-30 | 2022-02-15 | Composecure, Llc | Layer of a transaction card |
USD943670S1 (en) | 2018-01-30 | 2022-02-15 | Composecure, Llc | Layer of a transaction card |
US11301743B2 (en) | 2018-01-30 | 2022-04-12 | Composecure, Llc | Di capacitive embedded metal card |
USD944323S1 (en) | 2018-01-30 | 2022-02-22 | Composecure, Llc | Layer of a transaction card |
US11853824B2 (en) | 2018-03-07 | 2023-12-26 | X-Card Holdings, Llc | Metal card |
US11361204B2 (en) | 2018-03-07 | 2022-06-14 | X-Card Holdings, Llc | Metal card |
US11593794B2 (en) | 2018-10-03 | 2023-02-28 | Wunchun Chau | Fuel dispensing terminal and proxy system and method of redundancy |
US11593782B2 (en) | 2018-10-03 | 2023-02-28 | Wunchun Chau | Fueling station transaction system and method |
WO2020072633A1 (en) * | 2018-10-03 | 2020-04-09 | Wunchun Chau | Fueling station transaction system and method |
Also Published As
Publication number | Publication date |
---|---|
US8678276B2 (en) | 2014-03-25 |
EP1882229A4 (en) | 2012-08-01 |
WO2006116772A9 (en) | 2007-02-15 |
US8286889B2 (en) | 2012-10-16 |
US20130112756A1 (en) | 2013-05-09 |
US8360332B2 (en) | 2013-01-29 |
US8302871B2 (en) | 2012-11-06 |
US8480002B2 (en) | 2013-07-09 |
WO2006116772A2 (en) | 2006-11-02 |
US20120235794A1 (en) | 2012-09-20 |
US20110266354A1 (en) | 2011-11-03 |
US20120235797A1 (en) | 2012-09-20 |
US8231063B2 (en) | 2012-07-31 |
EP1882229B1 (en) | 2014-07-23 |
US7954724B2 (en) | 2011-06-07 |
US20120205451A1 (en) | 2012-08-16 |
US20120241523A1 (en) | 2012-09-27 |
US20120234927A1 (en) | 2012-09-20 |
EP1882229A2 (en) | 2008-01-30 |
WO2006116772A3 (en) | 2007-09-20 |
US20100270373A1 (en) | 2010-10-28 |
KR20080003006A (en) | 2008-01-04 |
US8500019B2 (en) | 2013-08-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8231063B2 (en) | Electronic card and methods for making same | |
JP5049959B2 (en) | How to create low-loop adhesion for electronic cards, their manufacturing methods, smart cards, secure transaction cards, swipe emulating broadcasters and thin contouring applications | |
US20240121299A1 (en) | Systems and methods for constructing programmable credential and security cards | |
EP0180380B1 (en) | Flexible inductor | |
AU2018227071B2 (en) | Chip card and method for fabricating a chip card | |
US11847518B2 (en) | Systems and methods for constructing programmable credential and security cards | |
US11113593B2 (en) | Contactless metal cards with fingerprint sensor and display | |
JP2001028037A (en) | Noncontact information medium and communication system using the medium | |
JP2001034725A (en) | Non-contact ic module, production thereof and non- contact information medium | |
TWI383573B (en) | Self-powered piezoelectric card | |
JP2003058853A (en) | Non-contact ic card and production method therefor | |
JP2001216485A (en) | Non-contact information medium and communication system | |
KR200317195Y1 (en) | A smart card | |
KR200265243Y1 (en) | Multi-function rf card | |
KR200344170Y1 (en) | Switching access card | |
JP2002279382A (en) | Ic card, and manufacturing method therefor | |
JPH07282215A (en) | Ic seal, ic card using the same, and genuineness certication seal, and manufacture of ic seal | |
JP5938942B2 (en) | Compound IC card | |
TW200912763A (en) | Card structure with printed RFID | |
JPH0482798A (en) | Information medium and reading device | |
JP2011154414A (en) | Non-contact type ic card | |
TWM258366U (en) | New type compound card | |
JPH05135227A (en) | Information medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: PRIVASYS, CALIFORNIA Free format text: CONSULTANT AGREEMENT;ASSIGNOR:MCGUIRE, CHUCK;REEL/FRAME:021166/0528 Effective date: 20031020 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |