US20080148394A1 - Electronic financial transaction cards and methods - Google Patents
Electronic financial transaction cards and methods Download PDFInfo
- Publication number
- US20080148394A1 US20080148394A1 US11/391,719 US39171906A US2008148394A1 US 20080148394 A1 US20080148394 A1 US 20080148394A1 US 39171906 A US39171906 A US 39171906A US 2008148394 A1 US2008148394 A1 US 2008148394A1
- Authority
- US
- United States
- Prior art keywords
- processor
- card
- secure
- recited
- control
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/073—Special arrangements for circuits, e.g. for protecting identification code in memory
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/81—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer by operating on the power supply, e.g. enabling or disabling power-on, sleep or resume operations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/02—Comparing digital values
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/077—Constructional details, e.g. mounting of circuits in the carrier
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/409—Device specific authentication in transaction processing
- G06Q20/4097—Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
- G06Q20/40975—Device specific authentication in transaction processing using mutual authentication between devices and transaction partners using encryption therefor
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1016—Devices or methods for securing the PIN and other transaction-data, e.g. by encryption
Definitions
- Exemplary embodiments disclosed herein pertain to electronic security. More particularly, exemplary embodiments disclosed herein pertain to electronic cards implementing security protocols.
- transaction card Conventional credit cards, debit cards and other financial transaction cards hereafter “transaction card” have a typically plastic body upon which is embossed a 16 digit account number and other data.
- a magnetic strip usually referred to as a “stripe”, is adhered to the back of the card, and also includes the account number and other data.
- the stripe allows the transaction card to be read by a card reader, hereafter referred to as a “legacy card reader.”
- the stripe is static and is not encrypted, allowing transaction card thieves to “steal”, in the virtual sense, the data from the stripe and use it for unauthorized transactions. Also, a stolen conventional card can be freely used by the thief unless until it is cancelled.
- Smart Card i.e. a transaction card including an on-board processor and digital memory
- security protocols such as encryption, store user information, etc.
- a common standard for Smart Cards is referred to as the ISO 7816 standard.
- a Smart Card is provided with an electrical interface including a number of electrically conductive and externally accessible contact pads which are coupled to an embedded secure processor.
- the Smart Card is inserted into a Smart Card reader which makes electrical contact with the contact pads to provide power to and communications with the secure processor.
- Smart cards can also include a conventional stripe, which does not in any way interact with the secure processor.
- Smart Cards While broadly adopted abroad, Smart Cards have not been extensively adopted in the U.S. A major reason for this is the investment made by millions of merchants in legacy card readers, which cannot communicate with the secure processors of Smart Cards. Also, Smart Cards conforming to the ISO 7816 standard suffer from their own limitations, including severely restricted I/O, an inability to provide “smart” transactions with legacy card readers, etc.
- a third approach uses a general processor and a stripe emulator which work with legacy card readers.
- stripe emulator will refer to a transaction card where data transmitted to a legacy card reader can be changed under the control of the general processor.
- This third approach will be referred to herein as an “emulator card.”
- Emulator cards potentially have a number of distinct advantages over conventional credit cards. For one, a single card can emulate a number of different transaction cards, greatly reducing the bulk in one's wallet. For example, an emulator card can emulate a Visa card, a MasterCard, and an ATM card. Also, since the emulator card includes a processor, it is possible to implement additional functionality, such as security functions.
- emulator cards too, have their limitations. For one, since general processors are used the security level of the card is reduced. For example, a hacker could potentially obtain data stored in unsecured electronic memory. Also, emulator cards do not address Smart Card protocols, as they are designed to work with legacy card readers. For example, as with conventional credit cards, data flows from the emulator card to the legacy card reader, and not vice versa. Still further, the information that can be provided by the emulator card is limited to the amount of information that a conventional stripe can hold and that a legacy card reader can read.
- Embodiments are disclosed which provide examples of enhanced electronic security.
- a number of non-limiting examples of transaction cards which address aforementioned problems and limitations of prior transaction cards are presented.
- the methods and apparatus as disclosed herein are applicable to a wide variety of problems which require or could be improved with electronic security measures.
- an enhanced Smart Card includes a card body, a secure processor and a general processor.
- the card body may be provided with an externally accessible card interface including a signal port, a power port, and a ground port.
- the secure processor is carried by the card body and is coupled to the signal port, the power port, and the ground port.
- the general processor is also carried by the card body, the general processor being coupled to a power source and being operative to provide power to and communicate with the secure processor when the secure processor is being used in an enhanced Smart Card mode.
- the secure processor is a Smart Chip processor compliant with the ISO 7816 standard. In other embodiments, the secure processor is compliant with other standards, or is proprietary in nature. In another exemplary embodiment, the general processor has a plurality of I/O ports. These ports can provide I/O for such devices as displays, switches and stripe emulators.
- a secure transaction card in another embodiment, set forth by way of example and not limitation, includes a card body carrying a secure processor, a strip emulator and a general processor.
- the general processor is interposed between the secure processor and the stripe emulator such that there is not a direct connection between the stripe emulator and the secure processor.
- the general processor selectively powers the secure processor.
- the general processor may directly power the secure processor or may cause the secure processor to be powered.
- the secure processor is ISO 7816 compliant.
- the secure transaction card may be provided with inputs such as switches or keypads, and outputs such as LEDs and flat panel displays.
- a companion processor system in another embodiment which is generally applicable electronic security applications in addition to transaction card security application, pairs a secure processor with a general processor.
- the secure processor can, for example, include a signal port, a power port and a ground port.
- the general processor is, in this example, operative to power up the secure processor by applying, directly or indirectly, at least one of power and ground to the power port and ground port, respectively of the secure processor when it wishes to communicate with the secure processor via the signal port.
- a method for providing secure transactions includes: detecting an input with a general processor of the initiation of a desired transaction; powering up a secure processor under the direction of the general processor; and communicating between the general processor and the secure processor to provide at least one secure transaction.
- FIG. 1 is a top plan view of an exemplary transaction card
- FIG. 2 is a bottom plan view of the exemplary transaction card of FIG. 1 ;
- FIG. 3 is a block diagram of an exemplary circuit for the transaction card illustrated in FIGS. 1 and 2 ;
- FIG. 4 is a block diagram of an exemplary secure processor of FIG. 3 ;
- FIG. 5 is a flow diagram of an exemplary main process running on the secure processor of FIG. 3 ;
- FIG. 6 is a flow diagram of an exemplary operation 116 “Handle Smart Card Terminal” of FIG. 5 ;
- FIG. 7 is a flow diagram of an exemplary operation 128 “Process Command” of FIG. 6 ;
- FIG. 8 is a flow diagram of an exemplary operation 132 “GET DATA—Serial Number” of FIG. 7 ;
- FIG. 9 is a flow diagram of an exemplary operation 134 “GET DATA—Key ID” of FIG. 7 ;
- FIG. 10 is a flow diagram of an exemplary operation 136 “GET CHALLENGE” of FIG. 7 ;
- FIG. 11 is a flow diagram of an exemplary operation 138 “EXTERNAL AUTHENTICATE” of FIG. 7 ;
- FIG. 12 is a flow diagram of an exemplary operation 140 “GET DATA—Personalization” of FIG. 7 ;
- FIG. 13 is a flow diagram of an exemplary operation 142 “PUT DATA—Update EEPROM Firmware” of FIG. 7 ;
- FIG. 14 is a flow diagram of an exemplary operation 144 “PUT DATA—Activate EEPROM Firmware” of FIG. 7 ;
- FIG. 15 is a flow diagram of an exemplary operation 146 “PUT DATA—Reset Firmware to ROM Version” of FIG. 7 ;
- FIG. 16 is a flow diagram of an exemplary operation 148 “GET DATA—ROM Firmware” of FIG. 7 ;
- FIG. 17 is a flow diagram of an exemplary operation 150 “GET DATA—EEPROM Firmware Version” of FIG. 7 ;
- FIG. 18 is a flow diagram of an exemplary operation 152 “PUT DATA—Initialize Diverse Key” of FIG. 7 ;
- FIG. 19 is a flow diagram of an exemplary operation 154 “PUT DATA—Personalize” of FIG. 7 ;
- FIG. 20 is a flow diagram of an exemplary operation 156 “PUT DATA—Enable” of FIG. 7 ;
- FIG. 21 is a flow diagram of an exemplary operation 118 “Handle M 2 ” of FIG. 5 ;
- FIG. 22 is an exemplary and highly simplified block diagram of the general processor of FIG. 3 ;
- FIG. 23 is a flow diagram which illustrates an example of a main process of the general processor of FIG. 3 ;
- FIG. 24 is a flow diagram of an exemplary operation 372 “INITIALIZE HELPER CHIP State” of FIG. 23 ;
- FIG. 25 is a flow diagram of an exemplary operation 384 “MENU State” of FIG. 24 ;
- FIG. 26 is a flow diagram of an exemplary operation 410 “INITIALIZE SMARTCHIP State” of FIG. 25 ;
- FIG. 27 is a flow diagram of an exemplary operation 476 “DATA State” of FIG. 26 ;
- FIG. 28 is a flow diagram of an exemplary operation 516 “ACTIVE State” of FIG. 27 ;
- FIG. 29 is a flow diagram of an exemplary operation 540 “SHUTDOWN State” of FIG. 28 as well as exemplary operation 396 of FIG. 25 ;
- FIG. 30 is a flow diagram of an exemplary operation 420 “ERROR State” of FIG. 26 also referenced as operation 490 “ERROR State” of FIG. 27 ;
- FIG. 31 is a flow diagram of an exemplary operation 438 “BIST State” of FIG. 26 ;
- FIG. 32 is a block diagram of an exemplary process for signal conversion
- FIG. 33 is a diagram of an exemplary broadcaster 68 of FIG. 3 ;
- FIG. 34 is a diagram of an exemplary broadcaster 68 interface
- FIG. 35 is a diagram showing the various waveforms of an exemplary signal conversion
- FIG. 36 is a block diagram of an exemplary ASIC embodiment
- FIG. 37 is a schematic diagram of an exemplary RC network of buffering circuit 66 ;
- FIG. 38 is a graph of a waveform generated by an exemplary buffering circuit 66 .
- FIGS. 39A-39D are graphs of dual track waveforms generated by an exemplary buffering circuit 66 .
- FIG. 1 is an exemplary embodiment of a transaction card 10 which includes a card body 11 typically including thermoplastic material in an exemplary embodiment; other materials are also contemplated.
- the transaction card 10 of this non-limiting example has a front surface 12 which is provided with an electrical interface 16 .
- the illustrated electrical interface includes a number of contact pads, preferably formed in a configuration which is compliant with the International Standards Organization “Smart Card” standard ISO 7816, incorporated herein by reference.
- the transaction card is usable as a legacy mode Smart Card.
- the interface 16 may be omitted.
- Also shown on the front surface 12 is an institution identifier 18 , an institution number 20 , an account number 22 , and a client name 24 .
- the account number is preferably embossed on the transaction card 10 to provide raised numerals for credit card imprint machines.
- FIG. 2 illustrates a back surface 14 of the exemplary transaction card 10 .
- a magnetic stripe emulator 26 is provided on the back surface 14 which can communicate with legacy magnetic stripe readers of the prior art.
- the card back 14 may also have an on/off button 28 , an “on” indicator 30 , and an “off” indicator 32 .
- “on” indicator 30 may be a green LED and the “off” indicator 32 may be a red LED.
- Also placed on the card back 14 may be a plurality of account interfaces 34 .
- Each account interface 34 preferably has account indicator LED 36 and an account selector switch 38 .
- Each account interface 34 may also have, for example, printed information identifying the account and expiration date.
- Back surface 14 also has, in this example, instructions 40 , an institution identifier 41 , a signature box 42 , various other optional printed information.
- FIG. 3 is a block diagram of an embodiment of exemplary circuitry, presented by way of example but not limitation, of the transaction card 10 .
- the transaction card 10 includes a secure processor 44 , a general processor 52 , and a magnetic stripe emulator 64 .
- both the secure processor 44 and the general processor 52 are coupled to the ISO 7816 interface 16 by a bus 48 .
- Secure processor 44 is preferably a commercially available Smart Card chip which has various tamper resistant properties such as a secure cryptographic function and tamper resistant storage 46 .
- An exemplary embodiment of secure processor 44 given by way of example and not limitation, is a P8WE6032 processor manufactured by Phillips of Germany. Similar devices are manufactured by Hitachi, Infineon, Toshiba, ST and others.
- secure processor 44 is connected electrically to the interface 16 a bus 48 . This bus is therefore preferably ISO 7816 compliant.
- General processor 52 is, in this example, also connected to the bus 48 and, therefore, to both the secure processor 44 and the interface 16 . Additionally, in this example, the general processor 52 is coupled to the secure processor 44 by an I/O 2 line 50 . In the currently exemplary embodiment, memory 54 is coupled to the general processor 52 . General processor 52 is also coupled, in this example, to power source 56 , display 58 , switches 60 , and other I/O 62 . Power source 56 is preferably a battery disposed within the card body 10 . Alternative exemplary embodiments include a battery operable to be a primary (non-rechargeable) and a battery operable to be a secondary (rechargeable).
- the exemplary rechargeable battery may, for example, be recharged through electrical interface 16 , or through magnetic induction, a solar cell, another electrical connector, or other means.
- electrical interface 16 or through magnetic induction, a solar cell, another electrical connector, or other means.
- General processor 52 may be, for example, a PIC16 micro controller. In an alternative embodiment, general processor 52 may comprise an ASIC chip. In still further embodiments, general processor may be any form of logic (e.g. a state machine) which performs the desired functions.
- logic e.g. a state machine
- Display 58 may be, for example, LED devices as disclosed previously. As another non-limiting example, display 58 is may comprise a flexible LCD display. Switches 60 can be any form of electrical switches to allow for configuring the operation of general processor 52 and associated I/O apparatus. The processor 52 may provide software debouncing algorithms with respect to such switches. Other I/O 62 may comprise any number of alternative I/O subsystems. These may include, by way of example and not limitation, audio, tactile, RF, IR, optical, keyboard, biometric I/O or other I/O.
- Magnetic stripe emulator 64 is also coupled to general processor 52 , which allows the card body 10 to be used in a mode which emulates the magnetic stripe card of the prior art.
- Magnetic stripe emulator 64 in this non-limiting example, is comprised of a buffering circuit 66 , which converts digital output from general processor 52 into a wave form appropriate for magnetic stripe emulation.
- buffering circuit 66 includes an RC signal conversion circuit which is typically implemented as an RC network. RC networks are well known to those skilled in the art.
- magnetic stripe emulator 64 is further comprised of a broadcaster 68 .
- Broadcaster 68 may be electrically coupled to buffering circuit 66 and preferably receives two tracks of signal which are converted by broadcaster 68 into magnetic impulses for magnetic stripe emulation.
- Alternative embodiments include a single track embodiment, and three or more tracks.
- Broadcaster 68 may include on e or more electrical coils to convert electrical signal into magnetic impulses.
- Broadcaster 68 of this example may further include one or more sensors 70 , which are electrically coupled to general processor 52 . These sensors are used to signal to general processor 52 that the physical act of swiping the card body 10 through a legacy card reader has commenced. Sensors 70 also communicate to general processor 52 when contact is lost with the magnetic stripe reader 72 , which receives and interprets magnetic flux impulses from the broadcaster.
- the transaction card 10 of this example includes an electrical interface 16 .
- electrical connectors 16 are used in a manner compliant with ISO 7816 to communicate with an ISO 7816 reader device 74 .
- secure processor 44 When used in a legacy Smart Card mode, secure processor 44 is powered by bus 48 from a Smart Card reader device 74 .
- the reader device 74 can be used to program and personalize secure processor 44 with various information including, by way of example and not limitation, firmware code, account numbers, cryptographic keys, PIN numbers, etc. This information, once loaded into secure processor 44 , prepares secure processor 44 for an operational mode which no longer requires the use of reader device 74 .
- secure processor 44 communicates with general processor 52 and provides services such as cryptographic functions and the dynamic generation of authentication information which is used to communicate via general processor 52 and magnetic stripe emulator 64 with magnetic stripe reader 72 .
- the authentication code may be used only once for a single transaction. Subsequent transactions require new authentication codes to be generated.
- the card body 10 continues to be used with reader device 74 and also with magnetic stripe reader device 72 .
- the card detects the mode in which it is being used and automatically switches the usage of bus 48 appropriately for the detected mode of operation. This is achieved in optional bus arbitrator 76 .
- Optional bus arbitrator 76 can detect when it is being used with reader device 74 because power is provided by reader device 74 via electrical connectors 16 to bus 48 .
- optional bus arbitrator 76 can detect that power is being provided by general processor 52 and switch to the corresponding mode of operation, which services general processor 52 and the various I/O devices connected thereto.
- optional bus arbitrator 76 allows for the dynamic communication of both general processor 52 and secure processor 44 with each other respectively, and with reader device 74 . This requires bus arbitration logic which is well known to those skilled in the art.
- general processor 52 is interposed between secure processor 44 and electrical connectors 16 . In this alternative embodiment, general processor 52 acts as a “go-between” or a “front end” for secure processor 44 .
- FIG. 4 shows an exemplary secure processor 44 of FIG. 3 in greater detail.
- Secure processor 44 of this example is an ISO 7816 compliant micro controller comprising power apparatus 78 , security sensors 80 , reset generator 82 , clock input filter 84 , CPU 86 , interrupt system 88 , and internal bus 90 .
- tamper resistant storage 46 which may be comprised of RAM 91 , EEPROM 93 , or both. Both RAM 91 and EEPROM 93 are coupled to internal bus 90 , in a preferred embodiment.
- crypto processor 92 is also coupled to bus 90 , which handles encryption and decryption.
- bus 90 Also coupled of bus 90 are timers 94 and ROM 96 , which is used for storing the firmware necessary for secure processor 44 to operate, UART 98 , which is used for serial communications via bus 48 and electrical connectors 16 with reader device 74 . Also connected to bus 90 is I/O subsystem 100 and random number generator 102 .
- Secure processors 44 as described above are commercially available from a variety of sources including Philips, Hitachi, Infineon, Toshiba, ST, and others.
- a suitable secure processor 44 for use in the disclosed exemplary embodiment is the model P8WE6032 processor made by Philips of Germany.
- FIG. 5 illustrates by way of example and not limitation a main process to be implemented by secure processor 44 .
- This main process can be, for example, encoded into either the ROM 96 or EEPROM 93 of secure processor 44 .
- the process begins in operation 110 which passes control to operation 112 wherein the power to secure processor 44 is turned on by the general processor 52 or by reader device 74 .
- an “operation” is a specified act performed by a processor.
- secure processor 44 detects its mode of operation and branches to an appropriate handler for the detected mode.
- One of the operation modes handles operation with reader device 74 .
- Operation 116 passes control to a handler which handles this mode of operation.
- Operation 118 passes control to a handler which handles communication with general processor 52 .
- Operation 120 handles other modes of operation.
- this handler could handle a mode of operation involving both secure processor 44 and general processor 52 communicating cooperatively with each other respectively, and with reader device 74 .
- This alternative embodiment is given by way of example and not limitation.
- FIG. 6 illustrates, by way of example, one embodiment for operation 116 of FIG. 5 in more detail.
- the process begins in operation 123 , and continues in operation 124 with secure processor 44 sending a signal called “answer to reset,” which indicates that secure processor 44 is online and ready to communicate, preferably via asynchronous serial communications utilizing UART 98 .
- secure processor 44 waits for a command to be received. If a command is not received, it continues waiting. In an alternative embodiment, this period of waiting could be used to perform some computational task in the background, such as authentication code generation based on a pseudo random sequence.
- control is passed to operation 128 , which processes the command. Once the command is processed, control is passed back to operation 126 which waits for another command. Commands are processed in the above described manner until this process is interrupted by the power being turned off.
- FIG. 7 shows an exemplary operation 128 of FIG. 6 in more detail.
- the process begins with operation 129 which passes control to a branching operation 130 .
- Operation 130 dispatches control to one of several handlers for the various messages that may be received.
- Operation 130 passes control to only one of the handlers shown in FIG. 7 .
- Operation 132 is a handler which processes the message “GET DATA—Serial Number”
- Operation 134 handles a command called “GET DATA—Key ID.”
- Operation 136 is a handler which handles the “GET CHALLENGE.”
- Operation 138 is a handler for “EXTERNAL AUTHENTICATE.”
- Operation 140 is a handler for “GET DATA—Personalization.”
- Operation 142 is a handler for “PUT DATA—Update EEPROM Firmware.”
- Operation 144 is a handler for “PUT DATA—Activate EEPROM Firmware.”
- Operation 146 is a handler for “PUT DATA—Reset Firmware to ROM Version.”
- Operation 148 is a handler for “GET DATA—ROM Firmware Version.”
- Operation 150 is a handler for “GET DATA—EEPROM Firm
- Operation 158 is shown to represent any additional handler that one may wish to introduce to enhance communication with or the internal processes of secure processor 44 .
- An example of such a command is to initiate a background task to perform authentication code generation in the background.
- Another example of such a command would be a self-destruct command which would render the card unusable. This embodiment would be used in the event that it was clear that fraud was taking place.
- FIG. 8 shows an exemplary operation 132 of FIG. 7 in more detail.
- the purpose of this process is to allow the retrieval of a unique serial number from secure processor 44 .
- the process begins with operation 162 ; control is passed to operation 164 which retrieves the unique serial number which is stored within the secure processor 44 and its associated storage. In one embodiment, this serial number is encoded into EEPROM 93 . In another embodiment, the serial number is encoded into ROM 96 .
- control is passed to operation 166 , which formats a message containing the serial number.
- Control is then passed to operation 168 , which sends the message back to the source which requested it. It should be noted that this information may be either encrypted or unencrypted and both embodiments are contemplated.
- the process is completed in operation 170 .
- FIG. 9 shows an exemplary operation 134 of FIG. 7 in greater detail.
- the process begins in operation 172 , control is passed to operation 174 which retrieves a key ID from secure processor 44 and its associated storage. Control is passed to operation 176 , which formats a message containing the key ID. The message is then sent in operation 178 . The entire message or parts of the message may be encrypted. The process is completed in operation 180 .
- FIG. 10 shows an exemplary operation 136 of FIG. 7 in greater detail.
- the process begins in operation 182 ; control is passed to operation 184 which generates a random number using random number generator 110 .
- This random number is used as part of an authentication sequence in connection with operation 138 of FIG. 7 .
- the random number is stored within secure processor 44 and its associated storage, preferably in RAM 91 . Later, during authentication, this number is recalled and compared to a message generated externally.
- control is passed to operation 188 , which formats a message containing the random number.
- this random number is sent back to the client that requested it.
- the process is completed in operation 192 .
- FIG. 11 shows an exemplary operation 138 of FIG. 7 in greater detail.
- the process begins with operation 194 .
- Operation 196 accesses a challenge response parameter in the incoming message from the client.
- the challenge response parameter represents the client's attempt to replicate in encrypted form the random number that it has previously received.
- Control is then passed to operation 198 , which compares the challenge response parameter to the previously stored random number. If these two numbers match, it means that the client has successfully replicated the number in encrypted form and returned it to secure processor 44 in an effort to authenticate itself to the secure processor 44 .
- If the challenge response is correct control is passed to operation 200 , which sets an unlocked state in secure processor 44 , preferably, in RAM 91 .
- FIG. 12 shows an exemplary operation 140 of FIG. 7 in greater detail.
- the process begins in operation 210 ; control is passed to operation 212 which determines whether or not the secure processor 44 is locked. Secure processor 44 can only be unlocked if a previous authentication during the present communication session was successful. If secure processor 44 is unlocked, control is passed to operation 214 , which accesses a parameter in the incoming message specifying the account to be accessed. Control is passed to operation 216 , which retrieves personalization data for the specified account. This data is retrieved from the storage associated with secure processor 44 . In operation 218 , the message is formatted containing the encrypted account data that was requested. This account data pertains to the account specified in the message. This encrypted account data is then sent to the client in operation 220 .
- control is passed to operation 224 , which formats and sends a message specifying that secure processor 44 is locked and, therefore refuses to provide the requested information. Control is then passed to operation 222 , which completes the process.
- FIG. 13 shows an exemplary operation 142 of FIG. 7 in greater detail.
- the process begins in operation 226 , control is then passed to operation 228 which determines whether or not secure processor 44 is locked. If secure processor 44 is not locked, control is passed to operation 230 , which determines whether or not the secure processor 44 is in an appropriate state for the firmware to be updated. If secure processor 44 is in an appropriate state for the firmware to be updated, control is passed to operation 232 , which verifies that the data length of the incoming firmware update is valid. If it is determined in operation 232 that the data length is valid, control is passed to operation 234 , which examines a parameter in the message identifying the address to be updated in the firmware of EEPROM 91 .
- control is passed to operation 236 , which updates the firmware at the specified address in EEPROM 91 with data from the message.
- Control is then passed to operation 238 , which formats and sends to the client, a message indicating the status of secure processor 44 and the present process.
- Control is then passed to operation 240 , which completes the process. If, in operation 228 , it is determined that secure processor 44 is locked, control is passed to operation 242 , which formats and sends a message to the client indicating failure and the reason for the failure. Similarly, if it is found in operation 230 that secure processor 44 is not in an appropriate state for the firmware to be updated, control is passed to operation 242 , which signals an error.
- control is passed to operation 242 , which signals an error by formatting a message to contain error status information and sending it.
- operation 242 which signals an error.
- FIG. 14 shows an exemplary operation 144 of FIG. 7 in greater detail.
- the process begins with operation 244 ; control is passed to operation 246 , which determines whether or not the secure processor 44 is in a locked condition. If it is determined that secure processor 44 is not locked, control is then passed to operation 248 , which sets the internal state of secure processor 44 to indicate that the software that has been loaded into the EEPROM 93 should be executed after the next reset. This allows secure processor 44 to transition from a state where it automatically executes the firmware stored in the ROM 96 to a state where it is executing the firmware that has been loaded into the EEPROM 93 . In operation 250 a message which indicates the status of secure processor 44 and the present process is formatted and sent to the client.
- control is passed to operation 254 which formats and sends to the client a message indicating failure of the present process and the reason for the failure. Control is then passed to operation 252 which ends the process.
- FIG. 15 shows an exemplary operation 146 of FIG. 7 in greater detail.
- the process is started in operation 256 ; control is passed to operation 258 , which determines whether or not secure processor 44 is in a locked condition. If it is determined in operation 258 that the secure processor 44 is not in a locked condition, control is passed to operation 260 which sets the internal state of secure processor 44 to indicate that the firmware in ROM 96 should be executed after the next reset. This allows the secure processor 44 to transition to a state where it executes the firmware stored in ROM 96 which is known to be storing the original firmware of secure processor 44 . Control is then passed to operation 262 , which signals the status of secure processor 44 as well as the status of the present process. This status message is formatted and sent to the client. The process then terminates in operation 264 . If it is determined in operation 258 that the secure processor 44 is in a locked condition, control is passed to operation 266 which formats and sends a message to the client indicating failure and the reason for the failure.
- FIG. 16 shows an exemplary operation 148 of FIG. 7 in greater detail.
- the process begins in operation 268 , control is passed to operation 270 , which retrieves from ROM 96 the version number of the information stored in ROM 96 . Control is then passed to operation 272 , which formats a message containing the ROM 96 version number. Preferably, this information is in unencrypted form. Operation 274 , then, sends the message to the client and the process terminates with operation 276 . In an alternate embodiment, this information is encrypted.
- FIG. 17 shows an exemplary operation 150 of FIG. 7 in greater detail.
- the process begins in operation 278 ; control is passed to operation 280 , which retrieves the firmware version of EEPROM 93 . This information is preferably stored in EEPROM 93 . Control is then passed to operation 282 , which formats a message containing the EEPROM 93 firmware version. Preferably, this version information is in unencrypted form. Control is then passed to operation 284 , which sends the message to the client. The process is then terminated in operation 286 . In an alternate embodiment, this information is encrypted.
- the process 152 begins with at 288 , and, in a decision operation 290 it is determined whether it is locked. If it is locked, operation 292 signals an error by formatting a message containing error status information and sending it to the client, and the process is completed at 294 . If decision operation 290 determines that it is not locked, operation 296 accesses a parameter containing the card diverse transport key (CDTK) which must be decrypted since it is transmitted by the client in encrypted form using the transpork key of secure processor 44 . Next, in operation 298 , the process updates the internal CDTK with a specified value. Next, in an operation 300 , a message is formatted to indicate the status of secure processor 44 and the present process. The message is then sent in an opreation 302 and the process 152 is completed at operation 294 .
- CDTK card diverse transport key
- FIG. 19 an exemplary operation 154 PUT DATA-Personalize of FIG. 7 is described in greater detail.
- the process 154 begins at 304 and, in a decision operation 306 it is determined whether it is locked. If it is locked, an operation 308 signals an error by formatting and sending a message indicating error status to the client and the process 154 is completed at 310 . If operation 306 determines that it is not locked, operation 312 decrypts and updates the personalization data stored in EEPROM as specified in the message. Next, in an operation 314 , a message is formatted to indicate the status of secure processor 44 and the present process. Finally, in operation 316 , the message is sent and the process 154 is complete at 310 .
- FIG. 20 describes an exemplary process of operation 156 of FIG. 7 in greater detail.
- the process begins at operation 318 ; control is then passed to decision operation 320 which determines whether or not secure processor 44 is in a locked condition. If secure processor 44 is locked, then control is passed to operation 322 which formats and sends a message containing error information to the client. Control is then passed to operation 324 which terminates the process. If in operation 320 it is determined that secure processor 44 is not locked, control passes to operation 326 which sets the internal state of secure processor 44 to indicate that the card is enabled for normal operation. In a preferred embodiment, this internal state is stored in EEPROM 93 . Control is then passed to operation 328 which formats a message indicating the status of processor 44 and of the present process. The message is then sent in operation 340 . The process then ends in operation 324 .
- FIG. 21 shows an exemplary process of operation 118 of FIG. 5 in greater detail.
- the process begins with operation 342 , control is then passed to operation 344 , which sends an “I am here” message to general processor 52 .
- secure processor 44 begins listening for a command to be sent from the client, general processor 52 . This is handled in operation 346 .
- a decision operation 348 it is determined whether or not a request has been received. If not, control is passed back to operation 346 .
- control is passed to operation 350 .
- the incoming request or command is examined for a selector code that is used to dispatch the message to an appropriate handler.
- One such handler is operation 352 , which retrieves account data specified in the command and returns it to the client.
- Another such handler is operation 354 , which retrieves configuration data for secure processor 44 and returns it to the client.
- Operation 356 could be used to handle any other kind of communication between general processor 52 and secure processor 44 . By way of example, and not limitation, this command could be used to allow the general processor to access the random number generator 102 on secure processor 44 .
- Steps 352 , 354 , and 356 when completed, return control to operation 346 , which listens for a subsequent command. This process continues until the power is interrupted.
- an external event other than a power interruption event would cause the loop of the present process to terminate.
- communications between general processor 52 and secure processor 44 may optionally use additional connections such as auxiliary connector 50 .
- One exemplary embodiment of this communication uses one communication line on bus 48 in concert with auxiliary connector 50 , to establish synchronous serial communications between general processor 52 and secure processor 44 . This is especially useful in situations where general processor 52 does not have a UART for asynchronous serial communications.
- Auxiliary connector 50 and the I/O communications line of bus 48 can be used in a wide variety of ways to achieve synchronous communication.
- one of the two processors 52 and 44 will send a message to the other processor which uses one of the two communication lines to signal the receipt of each bit by transitioning the state of said communication line from one to zero or from zero to one.
- FIG. 22 is an exemplary and highly simplified block diagram of general processor 52 on FIG. 3 .
- General processor 52 is comprised of a CPU 358 , a bus 360 , an I/O subsystem 362 , ROM 364 , SRAM 366 , and EEPROM 368 .
- I/O subsystem 362 drives display 58 , switches 60 , other I/O 62 , and the interface with magnetic stripe emulator 64 , which sends signal data to the broadcaster and receives sensor data from the broadcaster.
- Switches 60 include on/off button 28 , and account selector 38 , of FIG. 2 .
- FIG. 23 illustrates, by way of example and not limitation, a main process of general processor 52 .
- General processor 52 is initially in an off state when the on/off button 28 is pressed. When the on/off button 28 is released, control is passed from operation 370 to operation 372 . If the amount of time that the on/off button 28 remains pressed exceeds a certain threshold, general processor 52 passes control to operation 374 , which blinks on indicator 30 and off indicator 32 , twice, simultaneously. Control is then passed to operation 370 . At the moment on/off button 28 is pressed, general processor 52 receives power so that it can perform these operations. If on/off button 28 is not released, the on indicator 30 and off indicator 32 continue to blink twice, simultaneously, every two seconds until on/off button 28 is released.
- FIG. 24 shows an exemplary process of operation 372 of FIG. 23 in greater detail.
- the process begins with the operation 376 and continues with operation 378 , which initializes the general processor 52 .
- a decision operation 380 a determination is made whether an error has occurred during said initialization operation. If no error has occurred, control is passed to operation 382 , which blinks on indicator 30 twice, and passes control to operation 384 , which enters the menu state. If in operation 380 , an error has occurred, control is passed to operation 386 , which sets an error code to one and blinks off indicator 32 three times. In subsequent operation 388 , control is then passed to operation 390 , which enters an error state.
- FIG. 25 illustrates an exemplary operation 384 of FIG. 24 in greater detail.
- the process begins in operation 392 , which discriminates between a number of different events that are induced externally.
- control is passed to operation 394 , which blinks off indicator 32 twice. Control is, then passed to operation 396 , which enters a shut down state. If, on the other hand, in operation 392 , it is determined that account button one has been pressed, control is passed to operation 398 , which blinks account indicator 36 for account one once. Control is, then, passed to operation 400 , which sets an internal account buffer to one, indicating that the data for account one is to be accessed subsequently.
- control is passed to operation 402 , which blinks the account indicator 36 for account two once.
- Control is, then passed to operation 404 , which sets an internal account buffer to two, indicating that subsequent account activity should pertain to account two.
- control is passed to operation 406 , which blinks the account indicator 36 for account three once, and passes control to operation 408 , which sets the account buffer to three, indicating that the account data for account three is to be accessed subsequently.
- Control is, then passed to operation 410 . Steps 400 and 404 also transition to operation 410 upon completion.
- control is passed to operation 412 , which blinks on indicator 30 and off indicator 32 twice, simultaneously. Control is, then passed back to operation 392 , which Continues to monitor external events.
- additional events and event handlers could be added to the present process, such as operation 414 , which could, for example, detect a chord which would be produced by a combination of buttons on card back 14 . Such a chord could be used, for example, to instruct the card to enter a self-diagnostic mode, or a demonstration mode which flashes various LEDs, or a game mode.
- operation 414 could render the card unusable for a period of time or until a special code is entered. Such an embodiment would be useful if, for example, the card were temporarily not in one's possession.
- FIG. 26 shows an exemplary operation 410 of FIG. 25 in greater detail.
- the process begins with operation 416 ; control is passed to operation 418 , which powers up secure processor 44 and performs a handshake to verify that secure processor 44 is operating properly.
- decision operation 420 it is determined whether or not a timeout has expired while waiting for the handshake to be completed. If a timeout does occur, control is passed to operation 414 , which powers off the secure processor 44 . Control is, then passed to operation 416 , which blinks off indicator 32 three times. Control is, then passed to operation 418 , which sets an error code to nine. Once this is completed, control is passed to error operation 420 .
- control is passed to operation 422 which waits for an “I am here” message from secure processor 44 .
- decision operation 424 it is determined whether or not a timeout has expired while waiting for the “I am here” message. If a timeout has expired, control is passed to operation 426 which powers off secure processor 44 . Control is then passed to operation 428 , which blinks off indicator 32 three times. Then in operation 430 , an error code is set to two and then control passes to error operation 420 . If in operation 424 it is determined that a timeout has not expired, control is passed to decision operation 432 , which determines whether or not a mode is enabled or enabled for self-test.
- control is passed to operation 434 , which powers off secure processor 44 .
- Control is then passed to operation 436 , which blinks the off indicator 32 three times.
- Control is then passed to operation 438 , which enters a BIST state.
- operation 440 determines whether or not some other error has occurred. If so, control is passed to operation 442 , which powers off secure processor 44 . At this point control is passed to operation 444 , which blinks off indicator 32 three times. Then control passes to operation 446 , which sets an error code. Control is then passed to 420 , which processes the error.
- control is passed to operation 448 , which sends a message to secure processor 44 requesting configuration parameters. Then, in decision operation 450 , it is determined whether or not an error has occurred. If so, control passes to operation 452 which powers off secure processor 44 . Control is then passed to operation 454 , which blinks off indicator 32 three times. Control then passes to operation 456 , which sets an error code and passes control to operation 420 , which processes the error.
- control is passed to operation 458 , which waits for a response from secure processor 44 regarding the request of operation 448 . Then, in a decision operation 460 , it is determined whether or not a timeout has expired. If so, control is passed to operation 462 , which powers off secure processor 44 . Control is then passed to operation 464 , which blinks off indicator 32 three times. Then, in operation 466 , an error code is set to three and control is passed to operation 420 , which processes the error.
- control is passed to a decision operation 468 , which determines whether or not another error has occurred. If an error has occurred, control is passed to operation 470 , which powers off secure processor 44 . Then, in operation 472 , off indicator 32 is blinked three times and control is passed to operation 474 which sets an error control and passes control to operation 420 , which processes the error. If, in operation 468 , it is determined that no error has occurred, control is passed to operation 476 , which enters a data state.
- FIG. 27 illustrates an exemplary operation 476 of FIG. 26 in greater detail.
- the process begins with operation 478 ; control is then passed to operation 480 , which sends a “Get user data” request to secure processor 44 . Then, in a decision operation 482 , it is determined whether or not an error has occurred while sending the request. If it is determined that an error has occurred, control is passed to operation 484 , which powers off secure processor 44 . Control is, then, passed to operation 486 , which blinks off indicator 32 three times. Then, in operation 488 , an error code is set and in operation 490 , an error state is entered which processes the error.
- control is passed to operation 492 , which waits for a response to the request of operation 480 . Then, in a decision operation 494 , it is determined whether or not there has been a timeout while waiting for the response from secure processor 44 . If it is determined that there has been a timeout, control is passed to operation 496 , which powers off secure processor 44 . Control is then passed to operation 498 , which blinks off indicator 32 three times and passes control to operation 500 , which sets an error code to five and passes control to operation 490 , which processes the error.
- operation 502 powers off secure processor 44 .
- decision operation 504 it is determined whether or not all dynamic authentication codes have been used. If so, control is passed to operation 506 , which blinks off indicator 32 three times and passes control to operation 508 , which sets an error code to six and, then, an error state 490 is entered, which processes the error.
- control is passed to decision operation 506 , which determines whether or not another error has occurred. If so, control is passed to operation 508 which blinks off indicator 32 three times. Control is, then, passed to operation 510 which sets an error code and control is passed to operation 490 , which processes the error.
- control is passed to operation 512 , which blinks on indicator 30 twice. Then, in operation 514 , the account data which was received from secure processor 44 is placed into the track two buffer. Control is, then, passed to operation 516 , which enters an active state.
- FIG. 28 shows exemplary operation 516 of FIG. 27 in greater detail.
- the process begins with operation 518 , which detects various events and dispatches them. If it is determined that a blink timeout has occurred, control is passed to operation 520 , which blinks the account indicator 36 for the selected account once. Then, in operation 522 , the blink timeout is reset and control is passed back to operation 518 .
- control is passed to operation 524 .
- decision operation 524 it is determined whether or not account selector 38 for the currently selected account has been selected. If not, control is passed back to operation 518 .
- control is passed to operation 526 , which turns on the on indicator 30 .
- the track two data buffer, or alternatively data from the data buffers of multiple tracks is sent to the encoder.
- on indicator 30 is turned off.
- the timer mode is set to short.
- control is passed back to operation 518 . If, in operation 518 , it is determined that a swipe sensor has been triggered, control is passed to operation 526 , which processes the event as previously described in the discussion of operation 526 above.
- control is passed to operation 536 , which blinks off indicator 32 twice. Control is, then, passed to operation 538 , which clears the track two data buffer and, then, passes control to operation 540 , which enters a shutdown state. If it is determined in operation 518 that there has been a power button timeout, control is passed to operation 542 , which blinks on indicator 30 and off indicator 32 twice, simultaneously. Control is, then, passed to operation 518 .
- FIG. 29 shows exemplary operation 540 of FIG. 28 , as well as exemplary operation 396 of FIG. 25 . It also describes the process labeled as “A” on FIGS. 30 and 31 .
- the process begins with operation 544 ; control is passed to operation 546 , which prepares general processor 52 for removal of power. Then, in operation 548 , the power is turned off. At this point, the process enters operation 550 , wherein the card is deprived of power until power is reintroduced.
- the diagram for this stage is shown on FIG. 23 , as previously discussed.
- FIG. 30 shows exemplary operation 420 of FIG. 26 and operation 490 of FIG. 27 in greater detail.
- the process starts with operation 552 , which is entered when an error has occurred. Operation 552 waits for various events to occur and dispatches them appropriately. If an account indicator 36 is pressed, control is passed to operation 554 , which ignores the press and controls pass back to operation 552 . If a swipe sensor is triggered, control is passed to operation 556 , which blinks an error code in binary on the various LEDs of card back 14 . Then, control is passed to operation 558 , which resets the blink interval timeout. Control is, then, passed back to operation 552 .
- control is passed to operation 560 , which blinks off indicator 32 twice. At this point, control is passed to operation 562 , which enters a shutdown state. If it is determined in operation 552 that an error state blink interval timeout has occurred, control is passed to operation 564 , which blinks off indicator 32 once and passes control to operation 566 . In operation 566 , the error state counter is incremented and control is passed to decision operation 568 , which determines whether or not the error state counter is equal to 20 . If so, control is passed to operation 562 , which enters a shutdown state.
- control is passed to operation 570 , which resets the blink interval timeout and passes control back to operation 552 . If it is determined in operation 552 , that a power button timeout has occurred, control is passed to operation 572 , which blinks on indicator 30 and off indicator 32 twice, simultaneously.
- FIG. 31 shows exemplary operation 438 of FIG. 26 in greater detail.
- the process begins with operation 574 which waits for various events to occur and dispatches them accordingly. If, in state 574 , it is determined that account selector 38 corresponding to account one has been selected, account indicator 36 for account one is blinked along with the account indicator 36 for account two, on indicator 30 , off indicator 32 , all simultaneously. This is accomplished in operation 576 . If it is determined in operation 574 that the account selector 38 for account two has been selected, or the left swipe sensor, or the right swipe sensor, has been activated, control is passed to operation 578 , which turns on selected LEDs on card back 14 to indicate a version number. Control is, then, passed to operation 580 , which activates track two with test data.
- control is passed to operation 582 , which turns off all LEDs. Then, in operation 584 , a timer associated with the BIST state is reset and control is passed back to operation 574 . Likewise, upon completion of operation 576 , operation 584 is entered, which resets this timer and control is likewise passed subsequently passed to operation 574 .
- FIG. 32 shows an exemplary process for signal conversion which is used to transform the digital square wave output of general processor 52 into the custom waveforms needed to drive broadcaster 68 .
- the digital square wave output of general processor 52 is used to drive the RC network of buffering circuit 66 which produces an analog waveform as output. This is, in turn, used to drive broadcaster 68 which produces magnetic impulses to be received by a magnetic stripe reader.
- FIG. 33 shows the exemplary broadcaster 68 of FIG. 3 in greater detail.
- the broadcaster dynamically creates the magnetic signals which can be read by a conventional magnetic stripe reader.
- the output waveform is converted herein to compliant magnetic flux reversal broadcast in broadcaster 68 .
- Broadcaster 68 includes a core of specialty material chosen for its magnetic permeability as well as other chemically related properties.
- the core is surrounded by the multiple waveform circuit configurations made of another type of specialty material chosen for its electrical and magnetic properties.
- Cancellation system 594 is shown here which reduces crosstalk of the magnetic field that is broadcast.
- An advantage of this exemplary embodiment is reduced cross talk in cases where multiple tracks are used.
- the broadcaster is also comprised of sensors 70 which indicate when a transaction has begun and when the transaction has ended.
- the various tracks are labeled “ 1 ” and “ 2 ”. This example should not be construed as a limitation to the number of tracks which can be broadcast by broadcaster 68 .
- the cancellation tracks are labeled “ 1 ′” and “ 2 ′” to provide cancellation for tracks 1 and 2 respectively.
- FIG. 34 describes an emulated magnetic stripe signal created by the exemplary broadcaster 68 interface.
- the diagram indicates the temporal and spatial orientation of the broadcaster 68 to the magnetic stripe reader 72 to detect and use the magnetic stripe data.
- FIG. 35 shows a sample of exemplary waveforms generated. These exemplary wave forms are representative only, and demonstrate the relationship between the square wave output of general processor 52 and the analog output of buffer circuit 66 .
- the RCCN takes the output from general processor 52 and uses the Integrated Circuit including its capacitors and resistors to convert the magnetic stripe data that is readable by a conventional magnetic stripe reader.
- FIG. 36 shows an alternative embodiment wherein an application specific integrated circuit (ASIC) referred to hereinafter as ASIC 596 .
- ASIC 596 is used in place of general processor 52 .
- ASIC 596 includes a digital to analog converter 598 .
- the analog signal is output to a buffering circuit 66 which outputs an F2F signal; no RC network is needed.
- the ASIC uses alternative means of shaping the broadcast not through a proximate broadcaster but either through a processor with a Digital to Analog converter or by a processor that could effect the wave shape through the circuit.
- FIG. 37 shows an exemplary RC network comprised of resistors and capacitors.
- RC networks are well known to those skilled in the art.
- An exemplary embodiment of the RC network enables the proximate broadcasters to send an emulated or simulated magnetic stripe message to the read head of a magnetic stripe reader.
- FIG. 38 shows a waveform of an exemplary broadcaster 68 .
- the figure indicates the role of the sensor for creating the timing necessary to effect the broadcast in the proper temporal and spatial alignment to the read head so that it can be detected and used to close a financial transaction.
- FIG. 39A through 39D show exemplary waveforms from both track 1 and track 2 overlaid one upon the other.
- Alternative means of generating this wave form is either the Digital to Analog processor or the in-circuit cancellation as depicted in FIG. 36 .
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- General Business, Economics & Management (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Software Systems (AREA)
- Strategic Management (AREA)
- Mathematical Physics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Finance (AREA)
- Computational Mathematics (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Pure & Applied Mathematics (AREA)
- Storage Device Security (AREA)
- Credit Cards Or The Like (AREA)
- Power Sources (AREA)
Priority Applications (19)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/391,719 US20080148394A1 (en) | 2005-03-26 | 2006-03-27 | Electronic financial transaction cards and methods |
PCT/US2006/016842 WO2006116772A2 (fr) | 2005-04-27 | 2006-04-27 | Cartes electroniques et leurs procedes de production |
EP06752097.3A EP1882229B1 (fr) | 2005-04-27 | 2006-04-27 | Cartes electroniques et leurs procedes de production |
JP2008509246A JP5049959B2 (ja) | 2005-04-27 | 2006-04-27 | 電子カード、その製造方法、スマートカード、セキュアトランザクションカード、スワイプエミュレーティングブロードキャスタおよび薄い輪郭を描くアプリケーションについての低ループ接着を造り出す方法 |
KR1020077027490A KR20080003006A (ko) | 2005-04-27 | 2006-04-27 | 전자 카드 및 그의 제조방법 |
US11/413,595 US20070034700A1 (en) | 2005-04-27 | 2006-04-27 | Electronic cards and methods for making same |
US12/726,868 US7954724B2 (en) | 2005-04-27 | 2010-03-18 | Electronic card and methods for making same |
US13/102,991 US8231063B2 (en) | 2005-03-26 | 2011-05-06 | Electronic card and methods for making same |
US13/438,680 US8684267B2 (en) | 2005-03-26 | 2012-04-03 | Method for broadcasting a magnetic stripe data packet from an electronic smart card |
US13/438,655 US9053399B2 (en) | 2005-03-26 | 2012-04-03 | Method for broadcasting a magnetic stripe data packet from an electronic smart card |
US13/438,700 US8540165B2 (en) | 2005-03-26 | 2012-04-03 | Laminated electronic card assembly |
US13/448,281 US8360332B2 (en) | 2005-03-26 | 2012-04-16 | Electronic card |
US13/448,244 US8500019B2 (en) | 2005-03-26 | 2012-04-16 | Electronic cards and methods for making same |
US13/448,256 US8302871B2 (en) | 2005-03-26 | 2012-04-16 | Method for conducting a transaction between a magnetic stripe reader and an electronic card |
US13/448,266 US8480002B2 (en) | 2005-03-26 | 2012-04-16 | Conducting a transaction with an electronic card |
US13/453,882 US8286889B2 (en) | 2005-03-26 | 2012-04-23 | Electronic financial transaction cards and methods |
JP2012132148A JP2012212451A (ja) | 2005-04-27 | 2012-06-11 | 電子カード読み込み方法 |
US13/598,524 US8678276B2 (en) | 2005-03-26 | 2012-08-29 | Method for conducting a transaction between a magnetic stripe reader and an electronic card |
US14/731,683 US20150347891A1 (en) | 2005-03-26 | 2015-06-05 | Method for Broadcasting a Magnetic Stripe data Packet from an Electronic Device |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US59430005P | 2005-03-26 | 2005-03-26 | |
US67538805P | 2005-04-27 | 2005-04-27 | |
US11/391,719 US20080148394A1 (en) | 2005-03-26 | 2006-03-27 | Electronic financial transaction cards and methods |
Related Child Applications (4)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/413,595 Continuation-In-Part US20070034700A1 (en) | 2005-03-26 | 2006-04-27 | Electronic cards and methods for making same |
US13/448,244 Continuation-In-Part US8500019B2 (en) | 2005-03-26 | 2012-04-16 | Electronic cards and methods for making same |
US13/453,882 Continuation US8286889B2 (en) | 2005-03-26 | 2012-04-23 | Electronic financial transaction cards and methods |
US13/598,524 Continuation-In-Part US8678276B2 (en) | 2005-03-26 | 2012-08-29 | Method for conducting a transaction between a magnetic stripe reader and an electronic card |
Publications (1)
Publication Number | Publication Date |
---|---|
US20080148394A1 true US20080148394A1 (en) | 2008-06-19 |
Family
ID=37054011
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/391,719 Abandoned US20080148394A1 (en) | 2005-03-26 | 2006-03-27 | Electronic financial transaction cards and methods |
US13/438,700 Expired - Fee Related US8540165B2 (en) | 2005-03-26 | 2012-04-03 | Laminated electronic card assembly |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/438,700 Expired - Fee Related US8540165B2 (en) | 2005-03-26 | 2012-04-03 | Laminated electronic card assembly |
Country Status (5)
Country | Link |
---|---|
US (2) | US20080148394A1 (fr) |
EP (1) | EP1882220A2 (fr) |
JP (1) | JP5186359B2 (fr) |
KR (1) | KR20070119051A (fr) |
WO (1) | WO2006105092A2 (fr) |
Cited By (126)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080035738A1 (en) * | 2005-05-09 | 2008-02-14 | Mullen Jeffrey D | Dynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit card |
US20080054081A1 (en) * | 2005-05-09 | 2008-03-06 | Mullen Jeffrey D | Dynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit card |
US20090037275A1 (en) * | 2007-08-03 | 2009-02-05 | Pollio Michael J | Consolidated membership/rewards card system |
US20090159703A1 (en) * | 2007-12-24 | 2009-06-25 | Dynamics Inc. | Credit, security, debit cards and the like with buttons |
USD643063S1 (en) | 2010-07-09 | 2011-08-09 | Dynamics Inc. | Interactive electronic card with display |
US20110251955A1 (en) * | 2008-12-19 | 2011-10-13 | Nxp B.V. | Enhanced smart card usage |
US8066191B1 (en) | 2009-04-06 | 2011-11-29 | Dynamics Inc. | Cards and assemblies with user interfaces |
USD651238S1 (en) | 2010-07-09 | 2011-12-27 | Dynamics Inc. | Interactive electronic card with display |
USD651237S1 (en) | 2010-07-09 | 2011-12-27 | Dynamics Inc. | Interactive electronic card with display |
USD651644S1 (en) | 2010-07-09 | 2012-01-03 | Dynamics Inc. | Interactive electronic card with display |
USD652076S1 (en) | 2010-07-09 | 2012-01-10 | Dynamics Inc. | Multiple button interactive electronic card with display |
USD652075S1 (en) | 2010-07-02 | 2012-01-10 | Dynamics Inc. | Multiple button interactive electronic card |
USD652449S1 (en) | 2010-07-02 | 2012-01-17 | Dynamics Inc. | Multiple button interactive electronic card |
USD652448S1 (en) | 2010-07-02 | 2012-01-17 | Dynamics Inc. | Multiple button interactive electronic card |
USD652450S1 (en) | 2010-07-09 | 2012-01-17 | Dynamics Inc. | Multiple button interactive electronic card |
USD652867S1 (en) | 2010-07-02 | 2012-01-24 | Dynamics Inc. | Multiple button interactive electronic card |
USD653288S1 (en) | 2010-07-09 | 2012-01-31 | Dynamics Inc. | Multiple button interactive electronic card |
US8226001B1 (en) | 2010-06-23 | 2012-07-24 | Fiteq, Inc. | Method for broadcasting a magnetic stripe data packet from an electronic smart card |
US8231063B2 (en) | 2005-03-26 | 2012-07-31 | Privasys Inc. | Electronic card and methods for making same |
USD665022S1 (en) | 2010-07-09 | 2012-08-07 | Dynamics Inc. | Multiple button interactive electronic card with light source |
USD665447S1 (en) | 2010-07-09 | 2012-08-14 | Dynamics Inc. | Multiple button interactive electronic card with light source and display |
USD666241S1 (en) | 2010-07-09 | 2012-08-28 | Dynamics Inc. | Multiple button interactive electronic card with light source |
USD670330S1 (en) | 2011-05-12 | 2012-11-06 | Dynamics Inc. | Interactive card |
USD670331S1 (en) | 2011-05-12 | 2012-11-06 | Dynamics Inc. | Interactive display card |
USD670332S1 (en) | 2011-05-12 | 2012-11-06 | Dynamics Inc. | Interactive card |
USD670329S1 (en) | 2011-05-12 | 2012-11-06 | Dynamics Inc. | Interactive display card |
USD670759S1 (en) | 2010-07-02 | 2012-11-13 | Dynamics Inc. | Multiple button interactive electronic card with light sources |
US8317103B1 (en) | 2010-06-23 | 2012-11-27 | FiTeq | Method for broadcasting a magnetic stripe data packet from an electronic smart card |
US8322623B1 (en) | 2010-07-26 | 2012-12-04 | Dynamics Inc. | Systems and methods for advanced card printing |
USD672389S1 (en) | 2010-07-02 | 2012-12-11 | Dynamics Inc. | Multiple button interactive electronic card with light sources |
USD673606S1 (en) | 2012-08-27 | 2013-01-01 | Dynamics Inc. | Interactive electronic card with display and buttons |
US8348172B1 (en) | 2010-03-02 | 2013-01-08 | Dynamics Inc. | Systems and methods for detection mechanisms for magnetic cards and devices |
USD674013S1 (en) | 2010-07-02 | 2013-01-08 | Dynamics Inc. | Multiple button interactive electronic card with light sources |
USD675256S1 (en) | 2012-08-27 | 2013-01-29 | Dynamics Inc. | Interactive electronic card with display and button |
USD676487S1 (en) | 2012-08-27 | 2013-02-19 | Dynamics Inc. | Interactive electronic card with display and buttons |
USD676904S1 (en) | 2011-05-12 | 2013-02-26 | Dynamics Inc. | Interactive display card |
US8393546B1 (en) | 2009-10-25 | 2013-03-12 | Dynamics Inc. | Games, prizes, and entertainment for powered cards and devices |
US8393545B1 (en) | 2009-06-23 | 2013-03-12 | Dynamics Inc. | Cards deployed with inactivated products for activation |
US8485446B1 (en) | 2011-03-28 | 2013-07-16 | Dynamics Inc. | Shielded magnetic stripe for magnetic cards and devices |
USD687095S1 (en) | 2012-08-27 | 2013-07-30 | Dynamics Inc. | Interactive electronic card with buttons |
USD687094S1 (en) | 2010-07-02 | 2013-07-30 | Dynamics Inc. | Multiple button interactive electronic card with light sources |
USD687488S1 (en) | 2012-08-27 | 2013-08-06 | Dynamics Inc. | Interactive electronic card with buttons |
USD687489S1 (en) | 2012-08-27 | 2013-08-06 | Dynamics Inc. | Interactive electronic card with buttons |
USD687487S1 (en) | 2012-08-27 | 2013-08-06 | Dynamics Inc. | Interactive electronic card with display and button |
USD687490S1 (en) | 2012-08-27 | 2013-08-06 | Dynamics Inc. | Interactive electronic card with display and button |
USD687887S1 (en) | 2012-08-27 | 2013-08-13 | Dynamics Inc. | Interactive electronic card with buttons |
US8511574B1 (en) | 2009-08-17 | 2013-08-20 | Dynamics Inc. | Advanced loyalty applications for powered cards and devices |
USD688744S1 (en) | 2012-08-27 | 2013-08-27 | Dynamics Inc. | Interactive electronic card with display and button |
US8523059B1 (en) | 2009-10-20 | 2013-09-03 | Dynamics Inc. | Advanced payment options for powered cards and devices |
US8540165B2 (en) | 2005-03-26 | 2013-09-24 | Privasys, Inc. | Laminated electronic card assembly |
US8561894B1 (en) | 2010-10-20 | 2013-10-22 | Dynamics Inc. | Powered cards and devices designed, programmed, and deployed from a kiosk |
USD692053S1 (en) | 2012-08-27 | 2013-10-22 | Dynamics Inc. | Interactive electronic card with display and button |
US8567679B1 (en) | 2011-01-23 | 2013-10-29 | Dynamics Inc. | Cards and devices with embedded holograms |
US8579203B1 (en) | 2008-12-19 | 2013-11-12 | Dynamics Inc. | Electronic magnetic recorded media emulators in magnetic card devices |
USD694322S1 (en) | 2012-08-27 | 2013-11-26 | Dynamics Inc. | Interactive electronic card with display buttons |
US8602312B2 (en) | 2010-02-16 | 2013-12-10 | Dynamics Inc. | Systems and methods for drive circuits for dynamic magnetic stripe communications devices |
USD695636S1 (en) | 2012-08-27 | 2013-12-17 | Dynamics Inc. | Interactive electronic card with display and buttons |
US8622309B1 (en) | 2009-04-06 | 2014-01-07 | Dynamics Inc. | Payment cards and devices with budgets, parental controls, and virtual accounts |
US8628022B1 (en) | 2011-05-23 | 2014-01-14 | Dynamics Inc. | Systems and methods for sensor mechanisms for magnetic cards and devices |
US8684267B2 (en) | 2005-03-26 | 2014-04-01 | Privasys | Method for broadcasting a magnetic stripe data packet from an electronic smart card |
US8727219B1 (en) | 2009-10-12 | 2014-05-20 | Dynamics Inc. | Magnetic stripe track signal having multiple communications channels |
US8768830B1 (en) | 2011-09-08 | 2014-07-01 | Citibank, N.A. | Method and system for a multi-purpose transactional platform |
US8827153B1 (en) | 2011-07-18 | 2014-09-09 | Dynamics Inc. | Systems and methods for waveform generation for dynamic magnetic stripe communications devices |
US8888009B1 (en) | 2012-02-14 | 2014-11-18 | Dynamics Inc. | Systems and methods for extended stripe mechanisms for magnetic cards and devices |
US8931703B1 (en) | 2009-03-16 | 2015-01-13 | Dynamics Inc. | Payment cards and devices for displaying barcodes |
US8960545B1 (en) | 2011-11-21 | 2015-02-24 | Dynamics Inc. | Data modification for magnetic cards and devices |
US9010647B2 (en) | 2012-10-29 | 2015-04-21 | Dynamics Inc. | Multiple sensor detector systems and detection methods of magnetic cards and devices |
US9010644B1 (en) | 2012-11-30 | 2015-04-21 | Dynamics Inc. | Dynamic magnetic stripe communications device with stepped magnetic material for magnetic cards and devices |
USD729869S1 (en) | 2012-08-27 | 2015-05-19 | Dynamics Inc. | Interactive electronic card with display and button |
US9033218B1 (en) | 2012-05-15 | 2015-05-19 | Dynamics Inc. | Cards, devices, systems, methods and dynamic security codes |
USD729870S1 (en) | 2012-08-27 | 2015-05-19 | Dynamics Inc. | Interactive electronic card with display and button |
USD729871S1 (en) | 2012-08-27 | 2015-05-19 | Dynamics Inc. | Interactive electronic card with display and buttons |
USD730438S1 (en) | 2012-08-27 | 2015-05-26 | Dynamics Inc. | Interactive electronic card with display and button |
USD730439S1 (en) | 2012-08-27 | 2015-05-26 | Dynamics Inc. | Interactive electronic card with buttons |
US9053398B1 (en) | 2010-08-12 | 2015-06-09 | Dynamics Inc. | Passive detection mechanisms for magnetic cards and devices |
US9064195B2 (en) | 2012-06-29 | 2015-06-23 | Dynamics Inc. | Multiple layer card circuit boards |
USD737373S1 (en) | 2013-09-10 | 2015-08-25 | Dynamics Inc. | Interactive electronic card with contact connector |
USD750166S1 (en) | 2013-03-04 | 2016-02-23 | Dynamics Inc. | Interactive electronic card with display and buttons |
USD750167S1 (en) | 2013-03-04 | 2016-02-23 | Dynamics Inc. | Interactive electronic card with buttons |
USD750168S1 (en) | 2013-03-04 | 2016-02-23 | Dynamics Inc. | Interactive electronic card with display and button |
USD751640S1 (en) | 2013-03-04 | 2016-03-15 | Dynamics Inc. | Interactive electronic card with display and button |
USD751639S1 (en) | 2013-03-04 | 2016-03-15 | Dynamics Inc. | Interactive electronic card with display and button |
US9306666B1 (en) | 2009-10-08 | 2016-04-05 | Dynamics Inc. | Programming protocols for powered cards and devices |
US9329619B1 (en) | 2009-04-06 | 2016-05-03 | Dynamics Inc. | Cards with power management |
USD764584S1 (en) | 2013-03-04 | 2016-08-23 | Dynamics Inc. | Interactive electronic card with buttons |
USD765173S1 (en) | 2013-03-04 | 2016-08-30 | Dynamics Inc. | Interactive electronic card with display and button |
USD765174S1 (en) | 2013-03-04 | 2016-08-30 | Dynamics Inc. | Interactive electronic card with button |
USD767024S1 (en) | 2013-09-10 | 2016-09-20 | Dynamics Inc. | Interactive electronic card with contact connector |
USD777252S1 (en) | 2013-03-04 | 2017-01-24 | Dynamics Inc. | Interactive electronic card with buttons |
USD780184S1 (en) * | 2013-03-13 | 2017-02-28 | Nagrastar Llc | Smart card interface |
USD780763S1 (en) * | 2015-03-20 | 2017-03-07 | Nagrastar Llc | Smart card interface |
US9619741B1 (en) | 2011-11-21 | 2017-04-11 | Dynamics Inc. | Systems and methods for synchronization mechanisms for magnetic cards and devices |
US9646240B1 (en) * | 2010-11-05 | 2017-05-09 | Dynamics Inc. | Locking features for powered cards and devices |
US9659246B1 (en) | 2012-11-05 | 2017-05-23 | Dynamics Inc. | Dynamic magnetic stripe communications device with beveled magnetic material for magnetic cards and devices |
USD792511S1 (en) | 2010-07-09 | 2017-07-18 | Dynamics Inc. | Display with font |
USD792512S1 (en) | 2010-07-09 | 2017-07-18 | Dynamics Inc. | Display with font |
USD792513S1 (en) | 2010-07-09 | 2017-07-18 | Dynamics Inc. | Display with font |
US9710745B1 (en) | 2012-02-09 | 2017-07-18 | Dynamics Inc. | Systems and methods for automated assembly of dynamic magnetic stripe communications devices |
US9734669B1 (en) | 2012-04-02 | 2017-08-15 | Dynamics Inc. | Cards, devices, systems, and methods for advanced payment game of skill and game of chance functionality |
US9818125B2 (en) | 2011-02-16 | 2017-11-14 | Dynamics Inc. | Systems and methods for information exchange mechanisms for powered cards and devices |
US9836680B1 (en) | 2011-03-03 | 2017-12-05 | Dynamics Inc. | Systems and methods for advanced communication mechanisms for magnetic cards and devices |
US9864599B2 (en) * | 2014-06-30 | 2018-01-09 | Feitian Technologies Co., Ltd. | Firmware update method in two-chip solution for secure terminal |
US9916992B2 (en) | 2012-02-20 | 2018-03-13 | Dynamics Inc. | Systems and methods for flexible components for powered cards and devices |
US10022884B1 (en) | 2010-10-15 | 2018-07-17 | Dynamics Inc. | Systems and methods for alignment techniques for magnetic cards and devices |
US10032049B2 (en) | 2016-02-23 | 2018-07-24 | Dynamics Inc. | Magnetic cards and devices for motorized readers |
US10055614B1 (en) * | 2010-08-12 | 2018-08-21 | Dynamics Inc. | Systems and methods for advanced detection mechanisms for magnetic cards and devices |
US10062024B1 (en) | 2012-02-03 | 2018-08-28 | Dynamics Inc. | Systems and methods for spike suppression for dynamic magnetic stripe communications devices |
USD828870S1 (en) | 2012-08-27 | 2018-09-18 | Dynamics Inc. | Display card |
US10095970B1 (en) | 2011-01-31 | 2018-10-09 | Dynamics Inc. | Cards including anti-skimming devices |
US10108891B1 (en) | 2014-03-21 | 2018-10-23 | Dynamics Inc. | Exchange coupled amorphous ribbons for electronic stripes |
US10504105B2 (en) | 2010-05-18 | 2019-12-10 | Dynamics Inc. | Systems and methods for cards and devices operable to communicate to touch sensitive displays |
US10693263B1 (en) | 2010-03-16 | 2020-06-23 | Dynamics Inc. | Systems and methods for audio connectors for powered cards and devices |
US10949627B2 (en) | 2012-12-20 | 2021-03-16 | Dynamics Inc. | Systems and methods for non-time smearing detection mechanisms for magnetic cards and devices |
US10970698B1 (en) | 2017-12-08 | 2021-04-06 | Square, Inc. | Reader detection signal bypassing secure processor |
US11100431B2 (en) | 2011-05-10 | 2021-08-24 | Dynamics Inc. | Systems and methods for mobile authorizations |
US11126997B1 (en) | 2012-10-02 | 2021-09-21 | Dynamics Inc. | Cards, devices, systems, and methods for a fulfillment system |
RU2762299C2 (ru) * | 2016-08-08 | 2021-12-17 | Илипс Ворлд, Инк. | Способ для системы генерирования защитного кода предоплаченной, дебетовой и кредитной карт |
US11257058B1 (en) * | 2017-10-30 | 2022-02-22 | Square, Inc. | Sharing output device between unsecured processor and secured processor |
US11409971B1 (en) | 2011-10-23 | 2022-08-09 | Dynamics Inc. | Programming and test modes for powered cards and devices |
US11418483B1 (en) | 2012-04-19 | 2022-08-16 | Dynamics Inc. | Cards, devices, systems, and methods for zone-based network management |
US11551046B1 (en) | 2011-10-19 | 2023-01-10 | Dynamics Inc. | Stacked dynamic magnetic stripe commmunications device for magnetic cards and devices |
US11561593B2 (en) | 2017-04-28 | 2023-01-24 | Block, Inc. | Point of sale device power management and undervoltage protection |
US11961147B1 (en) | 2012-04-15 | 2024-04-16 | K. Shane Cupp | Cards, devices, systems, and methods for financial management services |
US11995642B1 (en) | 2012-09-05 | 2024-05-28 | Dynamics Inc. | Cards, devices, systems, and methods for a notification system |
US12056684B2 (en) | 2013-03-15 | 2024-08-06 | Cardware, Inc. | Multi-function electronic payment card and device system |
US12141785B2 (en) | 2022-04-08 | 2024-11-12 | Cardware, Inc. | Multi-function electronic payment card and device system |
Families Citing this family (30)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6615189B1 (en) | 1998-06-22 | 2003-09-02 | Bank One, Delaware, National Association | Debit purchasing of stored value card for use by and/or delivery to others |
US7660763B1 (en) | 1998-11-17 | 2010-02-09 | Jpmorgan Chase Bank, N.A. | Customer activated multi-value (CAM) card |
US8849716B1 (en) | 2001-04-20 | 2014-09-30 | Jpmorgan Chase Bank, N.A. | System and method for preventing identity theft or misuse by restricting access |
WO2003010701A1 (fr) | 2001-07-24 | 2003-02-06 | First Usa Bank, N.A. | Carte a comptes multiples et acheminement de transactions |
US7899753B1 (en) | 2002-03-25 | 2011-03-01 | Jpmorgan Chase Bank, N.A | Systems and methods for time variable financial authentication |
US20180165441A1 (en) | 2002-03-25 | 2018-06-14 | Glenn Cobourn Everhart | Systems and methods for multifactor authentication |
US20040210498A1 (en) | 2002-03-29 | 2004-10-21 | Bank One, National Association | Method and system for performing purchase and other transactions using tokens with multiple chips |
US7058660B2 (en) | 2002-10-02 | 2006-06-06 | Bank One Corporation | System and method for network-based project management |
US7946502B2 (en) | 2008-01-22 | 2011-05-24 | Visa Usa Inc. | Financial transaction token |
ATE530997T1 (de) * | 2009-04-09 | 2011-11-15 | NagraID Security SA | Karte vom typ bankkarte mit einem durch den benutzer aktivierbaren schalter |
US9594999B2 (en) | 2012-04-03 | 2017-03-14 | X-Card Holdings, Llc | Information carrying card comprising crosslinked polymer composition, and method of making the same |
US9122968B2 (en) | 2012-04-03 | 2015-09-01 | X-Card Holdings, Llc | Information carrying card comprising a cross-linked polymer composition, and method of making the same |
CN105190651B (zh) | 2013-03-15 | 2019-06-04 | X卡控股有限公司 | 用于制作信息携带卡的芯层的方法以及结果产品 |
JP2016520448A (ja) | 2013-04-12 | 2016-07-14 | カードラブ・アンパルトセルスカブCardLab ApS | オフセット電磁場生成器を伴うカード |
BR112015025775A2 (pt) | 2013-04-12 | 2017-07-25 | Cardlab Aps | cartão, montagem, método para montar o cartão e método de emissão de informações |
CN105740165A (zh) | 2014-12-10 | 2016-07-06 | 国际商业机器公司 | 用于管理统一存储系统的文件系统的方法和装置 |
MA41187A (fr) | 2014-12-19 | 2021-04-07 | Cardlab Aps | Procédé et ensemble pour générer un champ magnétique et procédé de fabrication d'un ensemble |
EP3035230A1 (fr) | 2014-12-19 | 2016-06-22 | Cardlab ApS | Procédé et ensemble permettant de générer un champ magnétique |
US10127488B2 (en) * | 2014-12-30 | 2018-11-13 | Qvivr, Inc. | Systems and methods for creating dynamic programmable magnetic stripes |
EP3082071A1 (fr) | 2015-04-17 | 2016-10-19 | Cardlab ApS | Dispositif pour produire un champ magnétique et procédé associé |
USD776664S1 (en) * | 2015-05-20 | 2017-01-17 | Chaya Coleena Hendrick | Smart card |
KR101957159B1 (ko) * | 2017-04-21 | 2019-03-13 | 코나아이 (주) | 보안 요소를 이용한 통신 방법 및 이를 수행하는 장치 |
WO2018217647A1 (fr) | 2017-05-23 | 2018-11-29 | Fiteq, Inc. | Procédé pour la saisie et la mise en place de composants électroniques sous vide |
CN107672266B (zh) * | 2017-11-21 | 2023-12-15 | 捷德(中国)科技有限公司 | 一种表面具有光栅效果的智能卡及其生产方法 |
KR101853765B1 (ko) * | 2017-11-23 | 2018-05-02 | 콘티넨탈 오토모티브 게엠베하 | 차량용 스마트키 |
KR101853764B1 (ko) | 2017-11-23 | 2018-05-02 | 콘티넨탈 오토모티브 게엠베하 | 파손 방지형 카드키 |
KR101853763B1 (ko) | 2017-11-24 | 2018-05-02 | 콘티넨탈 오토모티브 게엠베하 | 카드형 스마트키 |
US11361204B2 (en) | 2018-03-07 | 2022-06-14 | X-Card Holdings, Llc | Metal card |
US10970612B2 (en) | 2018-10-22 | 2021-04-06 | Fiteq, Inc. | Interactive core for electronic cards |
DE102021112447B4 (de) * | 2021-05-12 | 2024-06-20 | Infineon Technologies Ag | Chipkarten-Biometrie-Sensor-Bauteil, Chipkarte, Verfahren zum Bilden eines Chipkarten-Biometrie-Sensor-Bauteils und Verfahren zum Bilden einer Chipkarte |
Citations (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4177514A (en) * | 1976-11-12 | 1979-12-04 | General Electric Company | Graph architecture information processing system |
US4707594A (en) * | 1985-06-27 | 1987-11-17 | Intellicard International, Inc. | Unitary, self-contained consumer transaction card |
US5936226A (en) * | 1995-09-27 | 1999-08-10 | Intel Corporation | Mass storage device adapter for smart cards |
US6360954B1 (en) * | 1997-10-22 | 2002-03-26 | Cambridge Consultants Limited | Portable cards |
US20030135699A1 (en) * | 2000-12-20 | 2003-07-17 | Yasurou Matsuzaki | Multi-port memory based on DRAM core |
US6611819B1 (en) * | 1998-06-05 | 2003-08-26 | Fujitsu Limited | Electronic money apparatus, method, card and computer readable record medium having electronic money processing program recorded thereon |
US6641050B2 (en) * | 2001-11-06 | 2003-11-04 | International Business Machines Corporation | Secure credit card |
US20030212776A1 (en) * | 2002-05-07 | 2003-11-13 | Roberts David Gary | Methods and systems for changing a topology of a network |
US20030218064A1 (en) * | 2002-03-12 | 2003-11-27 | Storcard, Inc. | Multi-purpose personal portable electronic system |
US20030223586A1 (en) * | 2002-05-30 | 2003-12-04 | Edward Green | Method and system for secure communications over a communications network |
US20030222152A1 (en) * | 2002-05-28 | 2003-12-04 | Boley George E.S. | Pre-paid debit & credit card |
US6678268B1 (en) * | 1998-09-18 | 2004-01-13 | The United States Of America As Represented By The Secretary Of The Navy | Multi-interface point-to-point switching system (MIPPSS) with rapid fault recovery capability |
US20040129787A1 (en) * | 2002-09-10 | 2004-07-08 | Ivi Smart Technologies, Inc. | Secure biometric verification of identity |
US20040154043A1 (en) * | 2003-01-31 | 2004-08-05 | Roman Gerald J. | Methods and systems for delivering signals from cable networks to telecommunications networks |
US20040165725A1 (en) * | 2003-02-20 | 2004-08-26 | Nishit Kumar | Unique identifier per chip for digital audio/video data encryption/decryption in personal video recorders |
US20050022169A1 (en) * | 1999-05-11 | 2005-01-27 | Microsoft Corporation | Interlaced protocol for smart card application development |
US20050038651A1 (en) * | 2003-02-17 | 2005-02-17 | Catena Networks, Inc. | Method and apparatus for detecting voice activity |
US20050252978A1 (en) * | 2004-05-11 | 2005-11-17 | Renesas Technology Corp. | IC card module |
US20080173708A1 (en) * | 2004-07-01 | 2008-07-24 | American Express Travel Related Services Company, Inc. | Biometric safeguard method with a smartcard |
US20080223925A1 (en) * | 2005-08-18 | 2008-09-18 | Ivi Samrt Technologies, Inc. | Biometric Identity Verification System and Method |
Family Cites Families (174)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4529870A (en) | 1980-03-10 | 1985-07-16 | David Chaum | Cryptographic identification, financial transaction, and credential device |
DE3014882C2 (de) | 1980-04-17 | 1983-08-11 | Porst, Hannsheinz, 8500 Nürnberg | Berechtigungsausweis |
US4353064A (en) | 1981-01-14 | 1982-10-05 | Honeywell Inc. | Battery operated access control card |
US4876441A (en) * | 1984-03-27 | 1989-10-24 | Casio Computer Co., Ltd. | Card-like electronic apparatus |
US4614861A (en) | 1984-11-15 | 1986-09-30 | Intellicard International, Inc. | Unitary, self-contained card verification and validation system and method |
US4720860A (en) | 1984-11-30 | 1988-01-19 | Security Dynamics Technologies, Inc. | Method and apparatus for positively identifying an individual |
US5168520A (en) | 1984-11-30 | 1992-12-01 | Security Dynamics Technologies, Inc. | Method and apparatus for personal identification |
US4701601A (en) * | 1985-04-26 | 1987-10-20 | Visa International Service Association | Transaction card with magnetic stripe emulator |
JPS62179994A (ja) | 1986-02-04 | 1987-08-07 | カシオ計算機株式会社 | 電子カ−ド |
US4667087A (en) | 1986-03-31 | 1987-05-19 | Max A. Quintana | Secure credit card |
US4791283A (en) | 1986-06-03 | 1988-12-13 | Intellicard International, Inc. | Transaction card magnetic stripe emulator |
US4786791A (en) | 1987-02-10 | 1988-11-22 | Gateway Technology | Data processing apparatus with portable card having magnetic strip simulator |
KR910004797B1 (ko) | 1987-04-08 | 1991-07-13 | 가시오 게이상기 가부시기가이샤 | 소형 전자기기 및 그 제조방법 |
DE3906349A1 (de) | 1989-03-01 | 1990-09-13 | Hartmut Hennige | Verfahren und vorrichtung zur vereinfachung des gebrauchs einer vielzahl von kreditkarten u. dgl. |
US6122704A (en) * | 1989-05-15 | 2000-09-19 | Dallas Semiconductor Corp. | Integrated circuit for identifying an item via a serial port |
US4995077A (en) * | 1989-10-30 | 1991-02-19 | Malinowski Igor P | Card-like device having a microprocessor and speaker for communicating with a telephone line |
US5485519A (en) | 1991-06-07 | 1996-01-16 | Security Dynamics Technologies, Inc. | Enhanced security for a secure token code |
US5479512A (en) | 1991-06-07 | 1995-12-26 | Security Dynamics Technologies, Inc. | Method and apparatus for performing concryption |
US5657388A (en) | 1993-05-25 | 1997-08-12 | Security Dynamics Technologies, Inc. | Method and apparatus for utilizing a token for resource access |
US5237614A (en) | 1991-06-07 | 1993-08-17 | Security Dynamics Technologies, Inc. | Integrated network security system |
US5272596A (en) | 1991-06-24 | 1993-12-21 | At&T Bell Laboratories | Personal data card fabricated from a polymer thick-film circuit |
US5585787A (en) | 1991-12-09 | 1996-12-17 | Wallerstein; Robert S. | Programmable credit card |
US5608203A (en) | 1992-02-12 | 1997-03-04 | Finkelstein; Alan | Credit card with magnifying lens |
US5856661A (en) | 1993-02-12 | 1999-01-05 | Universal Magnifier Llc | Credit card with magnifying lens formed with a radiation-curable resin |
US6176430B1 (en) | 1992-02-12 | 2001-01-23 | Lenscard U.S. Llc | Method for making a wallet card with an integral magnifying lens |
US6817532B2 (en) | 1992-02-12 | 2004-11-16 | Lenscard U.S., Llc | Wallet card with built-in light |
US5412199A (en) | 1992-02-12 | 1995-05-02 | Finkelstein; Alan | Credit card with magnifying lens |
US6769618B1 (en) | 1992-02-12 | 2004-08-03 | Lenscard U.S., Llc | Wallet card with a magnifying lens and light |
EP0566811A1 (fr) | 1992-04-23 | 1993-10-27 | International Business Machines Corporation | Méthode et système d'authentification à l'aide d'une carte à puce |
US6130621A (en) | 1992-07-09 | 2000-10-10 | Rsa Security Inc. | Method and apparatus for inhibiting unauthorized access to or utilization of a protected device |
US5361062A (en) | 1992-11-25 | 1994-11-01 | Security Dynamics Technologies, Inc. | Personal security system |
US5484997A (en) | 1993-12-07 | 1996-01-16 | Haynes; George W. | Identification card with RF downlink capability |
US5623552A (en) | 1994-01-21 | 1997-04-22 | Cardguard International, Inc. | Self-authenticating identification card with fingerprint identification |
US5434398A (en) | 1994-02-22 | 1995-07-18 | Haim Labenski | Magnetic smartcard |
US5478994A (en) | 1994-07-13 | 1995-12-26 | Rahman; Sam | Secure credit card which prevents unauthorized transactions |
US5748737A (en) | 1994-11-14 | 1998-05-05 | Daggar; Robert N. | Multimedia electronic wallet with generic card |
US5591949A (en) | 1995-01-06 | 1997-01-07 | Bernstein; Robert J. | Automatic portable account controller for remotely arranging for payment of debt to a vendor |
GB9506909D0 (en) | 1995-04-04 | 1995-05-24 | Scient Generics Ltd | Spatial magnetic interrogation system |
US5907142A (en) | 1995-12-12 | 1999-05-25 | Kelsey; Craig E. | Fraud resistant personally activated transaction card |
US6085320A (en) | 1996-05-15 | 2000-07-04 | Rsa Security Inc. | Client/server protocol for proving authenticity |
US5834756A (en) | 1996-06-03 | 1998-11-10 | Motorola, Inc. | Magnetically communicative card |
US5864623A (en) | 1996-07-15 | 1999-01-26 | Intellicheck Inc. | Authentication system for driver licenses |
US5913203A (en) | 1996-10-03 | 1999-06-15 | Jaesent Inc. | System and method for pseudo cash transactions |
IL119943A (en) | 1996-12-31 | 2000-11-21 | On Track Innovations Ltd | Contact/contactless data transaction card |
SE9701612D0 (sv) * | 1997-04-29 | 1997-04-29 | Johan Asplund | Smartcard and method for its manufacture |
US5955021A (en) | 1997-05-19 | 1999-09-21 | Cardxx, Llc | Method of making smart cards |
US6163771A (en) | 1997-08-28 | 2000-12-19 | Walker Digital, Llc | Method and device for generating a single-use financial account number |
US6240184B1 (en) | 1997-09-05 | 2001-05-29 | Rsa Security Inc. | Password synchronization |
US6025054A (en) | 1997-09-08 | 2000-02-15 | Cardxx, Inc. | Smart cards having glue-positioned electronic components |
US6076163A (en) | 1997-10-20 | 2000-06-13 | Rsa Security Inc. | Secure user identification based on constrained polynomials |
US6411715B1 (en) | 1997-11-10 | 2002-06-25 | Rsa Security, Inc. | Methods and apparatus for verifying the cryptographic security of a selected private and public key pair without knowing the private key |
US6286022B1 (en) | 1997-11-18 | 2001-09-04 | Rsa Security Inc. | Efficient finite field basis conversion involving a dual basis |
US6157920A (en) | 1997-11-19 | 2000-12-05 | Lucent Technologies Inc. | Executable digital cash for electronic commerce |
WO1999026207A1 (fr) | 1997-11-19 | 1999-05-27 | Rsa Security Inc. | Traçage d'especes numeriques au moyen d'authentifications delivrees par un representant fiduciaire |
US6389442B1 (en) | 1997-12-30 | 2002-05-14 | Rsa Security Inc. | Efficient finite field multiplication in normal basis |
US6095416A (en) | 1998-02-24 | 2000-08-01 | Privicom, Inc. | Method and device for preventing unauthorized use of credit cards |
US6161181A (en) | 1998-03-06 | 2000-12-12 | Deloitte & Touche Usa Llp | Secure electronic transactions using a trusted intermediary |
US6145079A (en) | 1998-03-06 | 2000-11-07 | Deloitte & Touche Usa Llp | Secure electronic transactions using a trusted intermediary to perform electronic services |
US6199052B1 (en) | 1998-03-06 | 2001-03-06 | Deloitte & Touche Usa Llp | Secure electronic transactions using a trusted intermediary with archive and verification request services |
US6241153B1 (en) | 1998-03-17 | 2001-06-05 | Cardxx, Inc. | Method for making tamper-preventing, contact-type, smart cards |
US6256873B1 (en) | 1998-03-17 | 2001-07-10 | Cardxx, Inc. | Method for making smart cards using isotropic thermoset adhesive materials |
US7207477B1 (en) | 2004-03-08 | 2007-04-24 | Diebold, Incorporated | Wireless transfer of account data and signature from hand-held device to electronic check generator |
ES2234203T3 (es) | 1998-05-11 | 2005-06-16 | Citicorp Development Center, Inc. | Sistema y metodo de autenticacion biometrica de un usuario de tarjeta inteligente. |
US6269163B1 (en) | 1998-06-15 | 2001-07-31 | Rsa Security Inc. | Enhanced block ciphers with data-dependent rotations |
US6393447B1 (en) | 1998-10-22 | 2002-05-21 | Lucent Technologies Inc. | Method and apparatus for extracting unbiased random bits from a potentially biased source of randomness |
US6182894B1 (en) | 1998-10-28 | 2001-02-06 | American Express Travel Related Services Company, Inc. | Systems and methods for authorizing a transaction card |
US6460141B1 (en) | 1998-10-28 | 2002-10-01 | Rsa Security Inc. | Security and access management system for web-enabled and non-web-enabled applications and content on a computer network |
US6473740B2 (en) | 1998-11-29 | 2002-10-29 | Qpass, Inc. | Electronic commerce using a transaction network |
US6594760B1 (en) * | 1998-12-21 | 2003-07-15 | Pitney Bowes Inc. | System and method for suppressing conducted emissions by a cryptographic device |
US7197639B1 (en) | 1999-02-05 | 2007-03-27 | Rsa Security Inc. | Cryptographic countermeasures against connection depletion attacks |
US7219368B2 (en) | 1999-02-11 | 2007-05-15 | Rsa Security Inc. | Robust visual passwords |
US20040139004A1 (en) | 1999-04-08 | 2004-07-15 | Aceinc Pty Ltd. | Secure online commerce transactions |
US6985583B1 (en) | 1999-05-04 | 2006-01-10 | Rsa Security Inc. | System and method for authentication seed distribution |
US7111172B1 (en) | 1999-07-19 | 2006-09-19 | Rsa Security Inc. | System and methods for maintaining and distributing personal security devices |
US7461250B1 (en) | 1999-07-22 | 2008-12-02 | Rsa Security, Inc. | System and method for certificate exchange |
US6873974B1 (en) | 1999-08-17 | 2005-03-29 | Citibank, N.A. | System and method for use of distributed electronic wallets |
EP1077436A3 (fr) | 1999-08-19 | 2005-06-22 | Citicorp Development Center, Inc. | Système et méthode pour effectuer une transaction en-ligne utilisant un titre de paiement à usage unique |
CA2388007A1 (fr) | 1999-09-28 | 2001-04-05 | Chameleon Network Inc. | Systeme electronique d'autorisation portatif et procede correspondant |
US6705520B1 (en) | 1999-11-15 | 2004-03-16 | Satyan G. Pitroda | Point of sale adapter for electronic transaction device |
US20010034702A1 (en) | 2000-02-04 | 2001-10-25 | Mockett Gregory P. | System and method for dynamically issuing and processing transaction specific digital credit or debit cards |
US7472093B2 (en) | 2000-03-08 | 2008-12-30 | Rsa Security Inc. | Targeted delivery of informational content with privacy protection |
US6813354B1 (en) | 2000-03-09 | 2004-11-02 | Lucent Technologies Inc. | Mixing in small batches |
US7359507B2 (en) | 2000-03-10 | 2008-04-15 | Rsa Security Inc. | Server-assisted regeneration of a strong secret from a weak secret |
US20010047335A1 (en) | 2000-04-28 | 2001-11-29 | Martin Arndt | Secure payment method and apparatus |
US6592044B1 (en) | 2000-05-15 | 2003-07-15 | Jacob Y. Wong | Anonymous electronic card for generating personal coupons useful in commercial and security transactions |
US6609654B1 (en) | 2000-05-15 | 2003-08-26 | Privasys, Inc. | Method for allowing a user to customize use of a payment card that generates a different payment card number for multiple transactions |
US6805288B2 (en) | 2000-05-15 | 2004-10-19 | Larry Routhenstein | Method for generating customer secure card numbers subject to use restrictions by an electronic card |
US6755341B1 (en) | 2000-05-15 | 2004-06-29 | Jacob Y. Wong | Method for storing data in payment card transaction |
US6775776B1 (en) | 2000-06-27 | 2004-08-10 | Intel Corporation | Biometric-based authentication in a nonvolatile memory device |
US20030173409A1 (en) | 2000-06-28 | 2003-09-18 | Werner Vogt | Transport or conveyor unit for a chip, particularly a telephone chip |
US7356696B1 (en) | 2000-08-01 | 2008-04-08 | Lucent Technologies Inc. | Proofs of work and bread pudding protocols |
AU2002211424A1 (en) | 2000-10-04 | 2002-04-15 | American Express Travel Related Services Company, Inc. | System and method for providing feedback in an interactive payment system |
US7360688B1 (en) | 2000-10-16 | 2008-04-22 | Harris Scott C | Intelligent credit card system |
US8015592B2 (en) | 2002-03-28 | 2011-09-06 | Innovation Connection Corporation | System, method and apparatus for enabling transactions using a biometrically enabled programmable magnetic stripe |
US6980969B1 (en) | 2000-11-16 | 2005-12-27 | Sears, Roebuck And Co. | Methods and apparatus for allowing internet based purchases based on a temporary credit card number |
US7660902B2 (en) | 2000-11-20 | 2010-02-09 | Rsa Security, Inc. | Dynamic file access control and management |
US7602904B2 (en) | 2000-11-27 | 2009-10-13 | Rsa Security, Inc. | Order invariant fuzzy commitment system |
US6681988B2 (en) | 2000-11-28 | 2004-01-27 | Citibank, N.A. | Method and system for managing a transaction card account |
US6631849B2 (en) | 2000-12-06 | 2003-10-14 | Bank One, Delaware, National Association | Selectable multi-purpose card |
AU2002227297A1 (en) | 2000-12-08 | 2002-06-18 | Martin S Silverman | Dynamic virtual magnetic stripe |
US6313724B1 (en) | 2000-12-12 | 2001-11-06 | Josef Osterweil | Multifaceted balanced magnetic proximity sensor |
US7606771B2 (en) | 2001-01-11 | 2009-10-20 | Cardinalcommerce Corporation | Dynamic number authentication for credit/debit cards |
US20020096570A1 (en) | 2001-01-25 | 2002-07-25 | Wong Jacob Y. | Card with a dynamic embossing apparatus |
US7044394B2 (en) | 2003-12-17 | 2006-05-16 | Kerry Dennis Brown | Programmable magnetic data storage card |
US20040177045A1 (en) | 2001-04-17 | 2004-09-09 | Brown Kerry Dennis | Three-legacy mode payment card with parametric authentication and data input elements |
US6586078B2 (en) * | 2001-07-05 | 2003-07-01 | Soundcraft, Inc. | High pressure lamination of electronic cards |
US6607127B2 (en) | 2001-09-18 | 2003-08-19 | Jacob Y. Wong | Magnetic stripe bridge |
US6811082B2 (en) | 2001-09-18 | 2004-11-02 | Jacob Y. Wong | Advanced magnetic stripe bridge (AMSB) |
US7195154B2 (en) | 2001-09-21 | 2007-03-27 | Privasys, Inc. | Method for generating customer secure card numbers |
US6604686B1 (en) | 2001-10-09 | 2003-08-12 | Vahid Taban | High speed system for embedding wire antennas in an array of smart cards |
EP1446759B1 (fr) | 2001-11-19 | 2013-01-16 | Robert L. Burchette, Jr. | Systeme de carte de transaction securisee contre l'utilisation non autorisee |
US7363494B2 (en) | 2001-12-04 | 2008-04-22 | Rsa Security Inc. | Method and apparatus for performing enhanced time-based authentication |
US20040035942A1 (en) | 2001-12-07 | 2004-02-26 | Silverman Martin S. | Dynamic virtual magnetic stripe |
WO2003056499A2 (fr) * | 2001-12-24 | 2003-07-10 | Digimarc Id Systems Llc | Cartes a puce a contact ayant un noyau document et cartes a puce sans contact comprenant une structure multicouche, un document d'identification a base de pet, et leurs procedes de production |
US7013030B2 (en) | 2002-02-14 | 2006-03-14 | Wong Jacob Y | Personal choice biometric signature |
US7039223B2 (en) | 2002-02-14 | 2006-05-02 | Wong Jacob Y | Authentication method utilizing a sequence of linear partial fingerprint signatures selected by a personal code |
US6853412B2 (en) | 2002-02-28 | 2005-02-08 | Eastman Kodak Company | Transaction card with memory and polymer dispersed cholesteric liquid crystal display |
US7035443B2 (en) | 2002-03-22 | 2006-04-25 | Wong Jacob Y | Personal choice biometric signature |
EP1535421A4 (fr) | 2002-03-28 | 2005-09-07 | Innovation Connection Corp | Appareil et procede permettant de securiser des transactions par validation d'identite biometrique et au moyen d'une carte intelligente sans contact. |
US7562222B2 (en) | 2002-05-10 | 2009-07-14 | Rsa Security Inc. | System and method for authenticating entities to users |
US7100049B2 (en) | 2002-05-10 | 2006-08-29 | Rsa Security Inc. | Method and apparatus for authentication of users and web sites |
US7225994B2 (en) | 2002-08-06 | 2007-06-05 | Innovative Card Technologies, Inc. | Financial transaction card with sound recording |
US7494055B2 (en) | 2002-09-17 | 2009-02-24 | Vivotech, Inc. | Collaborative negotiation techniques for mobile personal trusted device financial transactions |
AU2003293125A1 (en) | 2002-11-27 | 2004-06-23 | Rsa Security Inc | Identity authentication system and method |
US6776332B2 (en) | 2002-12-26 | 2004-08-17 | Micropin Technologies Inc. | System and method for validating and operating an access card |
US7143953B2 (en) | 2002-12-27 | 2006-12-05 | Konica Minolta Holdings, Inc. | IC card, IC card manufacturing method, IC card manufacturing apparatus and IC card judgement system |
US20040162732A1 (en) | 2003-02-14 | 2004-08-19 | Rubens Rahim | System and method for credit card replenishment of a wireless subscriber's account balance |
US7591426B2 (en) | 2003-04-21 | 2009-09-22 | Josef Osterweil | Method and system for data writing/reading onto/from and emulating a magnetic stripe |
JP2004326335A (ja) * | 2003-04-23 | 2004-11-18 | Toshiba Corp | Icカード及び暗号処理システム |
JP2004334281A (ja) * | 2003-04-30 | 2004-11-25 | Matsushita Electric Ind Co Ltd | Icカード及びプログラム |
US7532104B2 (en) | 2003-05-06 | 2009-05-12 | Rsa Security, Inc. | Low-complexity cryptographic techniques for use with radio frequency identification devices |
US6970070B2 (en) | 2003-05-08 | 2005-11-29 | Rsa Security Inc. | Method and apparatus for selective blocking of radio frequency identification devices |
US7100821B2 (en) | 2003-05-15 | 2006-09-05 | Mehran Randall Rasti | Charge card and debit transactions using a variable charge number |
US7761374B2 (en) | 2003-08-18 | 2010-07-20 | Visa International Service Association | Method and system for generating a dynamic verification value |
US7954151B1 (en) | 2003-10-28 | 2011-05-31 | Emc Corporation | Partial document content matching using sectional analysis |
US7523301B2 (en) | 2003-10-28 | 2009-04-21 | Rsa Security | Inferring content sensitivity from partial content matching |
US7298243B2 (en) | 2003-11-12 | 2007-11-20 | Rsa Security Inc. | Radio frequency identification system with privacy policy implementation based on device classification |
US8032416B2 (en) | 2003-12-01 | 2011-10-04 | Incard Sa | Method for the decomposition in modules of smart-card event-driven applications |
US7404087B2 (en) | 2003-12-15 | 2008-07-22 | Rsa Security Inc. | System and method for providing improved claimant authentication |
US7454349B2 (en) | 2003-12-15 | 2008-11-18 | Rsa Security Inc. | Virtual voiceprint system and method for generating voiceprints |
US7641124B2 (en) | 2003-12-17 | 2010-01-05 | Qsecure, Inc. | Magnetic data recording device |
US7543739B2 (en) | 2003-12-17 | 2009-06-09 | Qsecure, Inc. | Automated payment card fraud detection and location |
US20050154643A1 (en) | 2004-01-08 | 2005-07-14 | International Business Machines Corporation | Purchasing information requested and conveyed on demand |
TWI457835B (zh) * | 2004-02-04 | 2014-10-21 | Semiconductor Energy Lab | 攜帶薄膜積體電路的物品 |
US8386376B2 (en) | 2004-02-09 | 2013-02-26 | American Express Travel Related Services Company, Inc. | System and method using enhanced authorization data to reduce travel-related transaction fraud |
US7755484B2 (en) * | 2004-02-12 | 2010-07-13 | Avery Dennison Corporation | RFID tag and method of manufacturing the same |
US7580898B2 (en) | 2004-03-15 | 2009-08-25 | Qsecure, Inc. | Financial transactions with dynamic personal account numbers |
US7472829B2 (en) | 2004-12-10 | 2009-01-06 | Qsecure, Inc. | Payment card with internally generated virtual account numbers for its magnetic stripe encoder and user display |
US7584153B2 (en) | 2004-03-15 | 2009-09-01 | Qsecure, Inc. | Financial transactions with dynamic card verification values |
US7424570B2 (en) | 2004-04-08 | 2008-09-09 | Incard Sa | Method for patching ROM instructions in an electronic embedded system including at least a further memory portion |
US7886345B2 (en) | 2004-07-02 | 2011-02-08 | Emc Corporation | Password-protection module |
KR101300453B1 (ko) * | 2004-07-22 | 2013-08-27 | 솔리코어 인코포레이티드 | 향상된 전지 탭 및 패키징 설계 |
US7461399B2 (en) | 2004-07-30 | 2008-12-02 | Rsa Security Inc. | PIN recovery in a smart card |
US7591427B2 (en) | 2004-09-10 | 2009-09-22 | Josef Osterweil | Method and system for a static magnetic read/write head |
US7051929B2 (en) | 2004-10-18 | 2006-05-30 | Gongling Li | Secure credit card having daily changed security number |
US7097108B2 (en) | 2004-10-28 | 2006-08-29 | Bellsouth Intellectual Property Corporation | Multiple function electronic cards |
WO2006062998A2 (fr) | 2004-12-07 | 2006-06-15 | Farsheed Atef | Systeme et procede de verification et de gestion d'identite |
US8060922B2 (en) | 2004-12-20 | 2011-11-15 | Emc Corporation | Consumer internet authentication device |
US7357319B1 (en) | 2005-01-24 | 2008-04-15 | Vivotech, Inc. | External adapter for magnetic stripe card reader |
US7225537B2 (en) | 2005-01-27 | 2007-06-05 | Cardxx, Inc. | Method for making memory cards and similar devices using isotropic thermoset materials with high quality exterior surfaces |
WO2006089101A2 (fr) | 2005-02-18 | 2006-08-24 | Rsa Security Inc. | Graines derivees |
US7581678B2 (en) | 2005-02-22 | 2009-09-01 | Tyfone, Inc. | Electronic transaction card |
US7427033B1 (en) | 2005-02-26 | 2008-09-23 | James Roskind | Time-varying security code for enabling authorizations and other uses of financial accounts |
BRPI0520452A2 (pt) | 2005-03-23 | 2009-05-12 | Cardxx Inc | método para fabricar um cartão inteligente avançado ou dispositivo similar |
WO2006105092A2 (fr) | 2005-03-26 | 2006-10-05 | Privasys, Inc. | Procedes et cartes de transactions financieres electroniques |
US7237724B2 (en) | 2005-04-06 | 2007-07-03 | Robert Singleton | Smart card and method for manufacturing a smart card |
US20060237543A1 (en) * | 2005-04-20 | 2006-10-26 | Ngk Spark Plug Co., Ltd. | Card, manufacturing method of card, and thin type battery for card |
US7568631B2 (en) | 2005-11-21 | 2009-08-04 | Sony Corporation | System, apparatus and method for obtaining one-time credit card numbers using a smart card |
US7818264B2 (en) | 2006-06-19 | 2010-10-19 | Visa U.S.A. Inc. | Track data encryption |
JP5209602B2 (ja) * | 2006-04-10 | 2013-06-12 | イノベイティア インコーポレイテッド | 電子カードおよび電子タグ用の電子埋込物モジュール |
US7380710B2 (en) | 2006-04-28 | 2008-06-03 | Qsecure, Inc. | Payment card preloaded with unique numbers |
DE102006030406A1 (de) * | 2006-06-29 | 2008-01-03 | Bundesdruckerei Gmbh | Wert- oder Sicherheitsdokument mit zumindest zwei Anzeigevorrichtungen |
US8608080B2 (en) * | 2006-09-26 | 2013-12-17 | Feinics Amatech Teoranta | Inlays for security documents |
US20080201264A1 (en) * | 2007-02-17 | 2008-08-21 | Brown Kerry D | Payment card financial transaction authenticator |
-
2006
- 2006-03-27 WO PCT/US2006/011289 patent/WO2006105092A2/fr active Application Filing
- 2006-03-27 KR KR1020077024788A patent/KR20070119051A/ko not_active Application Discontinuation
- 2006-03-27 EP EP06748807A patent/EP1882220A2/fr not_active Withdrawn
- 2006-03-27 JP JP2008504249A patent/JP5186359B2/ja not_active Expired - Fee Related
- 2006-03-27 US US11/391,719 patent/US20080148394A1/en not_active Abandoned
-
2012
- 2012-04-03 US US13/438,700 patent/US8540165B2/en not_active Expired - Fee Related
Patent Citations (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4177514A (en) * | 1976-11-12 | 1979-12-04 | General Electric Company | Graph architecture information processing system |
US4707594A (en) * | 1985-06-27 | 1987-11-17 | Intellicard International, Inc. | Unitary, self-contained consumer transaction card |
US5936226A (en) * | 1995-09-27 | 1999-08-10 | Intel Corporation | Mass storage device adapter for smart cards |
US6360954B1 (en) * | 1997-10-22 | 2002-03-26 | Cambridge Consultants Limited | Portable cards |
US6611819B1 (en) * | 1998-06-05 | 2003-08-26 | Fujitsu Limited | Electronic money apparatus, method, card and computer readable record medium having electronic money processing program recorded thereon |
US6678268B1 (en) * | 1998-09-18 | 2004-01-13 | The United States Of America As Represented By The Secretary Of The Navy | Multi-interface point-to-point switching system (MIPPSS) with rapid fault recovery capability |
US20050022169A1 (en) * | 1999-05-11 | 2005-01-27 | Microsoft Corporation | Interlaced protocol for smart card application development |
US20030135699A1 (en) * | 2000-12-20 | 2003-07-17 | Yasurou Matsuzaki | Multi-port memory based on DRAM core |
US6641050B2 (en) * | 2001-11-06 | 2003-11-04 | International Business Machines Corporation | Secure credit card |
US20030218064A1 (en) * | 2002-03-12 | 2003-11-27 | Storcard, Inc. | Multi-purpose personal portable electronic system |
US20030212776A1 (en) * | 2002-05-07 | 2003-11-13 | Roberts David Gary | Methods and systems for changing a topology of a network |
US20030222152A1 (en) * | 2002-05-28 | 2003-12-04 | Boley George E.S. | Pre-paid debit & credit card |
US20030223586A1 (en) * | 2002-05-30 | 2003-12-04 | Edward Green | Method and system for secure communications over a communications network |
US20040129787A1 (en) * | 2002-09-10 | 2004-07-08 | Ivi Smart Technologies, Inc. | Secure biometric verification of identity |
US20040154043A1 (en) * | 2003-01-31 | 2004-08-05 | Roman Gerald J. | Methods and systems for delivering signals from cable networks to telecommunications networks |
US20050038651A1 (en) * | 2003-02-17 | 2005-02-17 | Catena Networks, Inc. | Method and apparatus for detecting voice activity |
US20040165725A1 (en) * | 2003-02-20 | 2004-08-26 | Nishit Kumar | Unique identifier per chip for digital audio/video data encryption/decryption in personal video recorders |
US20050252978A1 (en) * | 2004-05-11 | 2005-11-17 | Renesas Technology Corp. | IC card module |
US20080173708A1 (en) * | 2004-07-01 | 2008-07-24 | American Express Travel Related Services Company, Inc. | Biometric safeguard method with a smartcard |
US20080223925A1 (en) * | 2005-08-18 | 2008-09-18 | Ivi Samrt Technologies, Inc. | Biometric Identity Verification System and Method |
Cited By (239)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8500019B2 (en) | 2005-03-26 | 2013-08-06 | Mark Poidomani | Electronic cards and methods for making same |
US8286889B2 (en) | 2005-03-26 | 2012-10-16 | Privasys, Inc | Electronic financial transaction cards and methods |
US8302871B2 (en) | 2005-03-26 | 2012-11-06 | Privasys, Inc | Method for conducting a transaction between a magnetic stripe reader and an electronic card |
US8360332B2 (en) | 2005-03-26 | 2013-01-29 | Privasys | Electronic card |
US8480002B2 (en) | 2005-03-26 | 2013-07-09 | Mark Poidomani | Conducting a transaction with an electronic card |
US8231063B2 (en) | 2005-03-26 | 2012-07-31 | Privasys Inc. | Electronic card and methods for making same |
US9053399B2 (en) | 2005-03-26 | 2015-06-09 | Privasys | Method for broadcasting a magnetic stripe data packet from an electronic smart card |
US8684267B2 (en) | 2005-03-26 | 2014-04-01 | Privasys | Method for broadcasting a magnetic stripe data packet from an electronic smart card |
US8540165B2 (en) | 2005-03-26 | 2013-09-24 | Privasys, Inc. | Laminated electronic card assembly |
US20080302869A1 (en) * | 2005-05-09 | 2008-12-11 | Mullen Jeffrey D | Dynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit card |
US20080065555A1 (en) * | 2005-05-09 | 2008-03-13 | Mullen Jeffrey D | Dynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit card |
US20080035738A1 (en) * | 2005-05-09 | 2008-02-14 | Mullen Jeffrey D | Dynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit card |
US20080054068A1 (en) * | 2005-05-09 | 2008-03-06 | Mullen Jeffrey D | Dynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit card |
US20080054079A1 (en) * | 2005-05-09 | 2008-03-06 | Mullen Jeffrey D | Dynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit card |
US20090308921A1 (en) * | 2005-05-09 | 2009-12-17 | Mullen Jeffrey D | Dynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit card |
US7828220B2 (en) | 2005-05-09 | 2010-11-09 | Dynamics Inc. | Dynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit card |
US7931195B2 (en) | 2005-05-09 | 2011-04-26 | Dynamics Inc. | Dynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit card |
US7954705B2 (en) | 2005-05-09 | 2011-06-07 | Dynamics Inc. | Dynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit card |
US20080054081A1 (en) * | 2005-05-09 | 2008-03-06 | Mullen Jeffrey D | Dynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit card |
US20090037275A1 (en) * | 2007-08-03 | 2009-02-05 | Pollio Michael J | Consolidated membership/rewards card system |
US10255545B2 (en) | 2007-12-24 | 2019-04-09 | Dynamics Inc. | Cards and devices with multifunction magnetic emulators and methods for using same |
US20090159701A1 (en) * | 2007-12-24 | 2009-06-25 | Dynamics Inc. | Payment cards and devices with enhanced magnetic emulators |
US20090159703A1 (en) * | 2007-12-24 | 2009-06-25 | Dynamics Inc. | Credit, security, debit cards and the like with buttons |
US20110272472A1 (en) * | 2007-12-24 | 2011-11-10 | Mullen Jeffrey D | Advanced dynamic credit cards |
US8668143B2 (en) | 2007-12-24 | 2014-03-11 | Dynamics Inc. | Payment cards and devices with gift card, global integration, and magnetic stripe reader communication functionality |
US8074877B2 (en) | 2007-12-24 | 2011-12-13 | Dynamics Inc. | Systems and methods for programmable payment cards and devices with loyalty-based payment applications |
US10032100B2 (en) | 2007-12-24 | 2018-07-24 | Dynamics Inc. | Cards and devices with multifunction magnetic emulators and methods for using same |
US8608083B2 (en) | 2007-12-24 | 2013-12-17 | Dynamics Inc. | Cards and devices with magnetic emulators with zoning control and advanced interiors |
US8875999B2 (en) | 2007-12-24 | 2014-11-04 | Dynamics Inc. | Payment cards and devices with gift card, global integration, and magnetic stripe reader communication functionality |
US10169692B2 (en) | 2007-12-24 | 2019-01-01 | Dynamics Inc. | Credit, security, debit cards and the like with buttons |
US8881989B2 (en) | 2007-12-24 | 2014-11-11 | Dynamics Inc. | Cards and devices with magnetic emulators with zoning control and advanced interiors |
US9805297B2 (en) | 2007-12-24 | 2017-10-31 | Dynamics Inc. | Systems and methods for programmable payment cards and devices with loyalty-based payment applications |
US9727813B2 (en) | 2007-12-24 | 2017-08-08 | Dynamics Inc. | Credit, security, debit cards and the like with buttons |
US9704088B2 (en) | 2007-12-24 | 2017-07-11 | Dynamics Inc. | Cards and devices with multifunction magnetic emulators and methods for using same |
US9704089B2 (en) | 2007-12-24 | 2017-07-11 | Dynamics Inc. | Systems and methods for programmable payment cards and devices with loyalty-based payment applications |
US9697454B2 (en) | 2007-12-24 | 2017-07-04 | Dynamics Inc. | Payment cards and devices with displays, chips, RFIDs, magnetic emulators, magnetic encoders, and other components |
US8973824B2 (en) | 2007-12-24 | 2015-03-10 | Dynamics Inc. | Cards and devices with magnetic emulators with zoning control and advanced interiors |
US9684861B2 (en) | 2007-12-24 | 2017-06-20 | Dynamics Inc. | Payment cards and devices with displays, chips, RFIDs, magnetic emulators, magnetic decoders, and other components |
US8011577B2 (en) | 2007-12-24 | 2011-09-06 | Dynamics Inc. | Payment cards and devices with gift card, global integration, and magnetic stripe reader communication functionality |
US9004368B2 (en) | 2007-12-24 | 2015-04-14 | Dynamics Inc. | Payment cards and devices with enhanced magnetic emulators |
US9639796B2 (en) | 2007-12-24 | 2017-05-02 | Dynamics Inc. | Cards and devices with magnetic emulators with zoning control and advanced interiors |
US10198687B2 (en) | 2007-12-24 | 2019-02-05 | Dynamics Inc. | Cards and devices with multifunction magnetic emulators and methods for using same |
US20090159670A1 (en) * | 2007-12-24 | 2009-06-25 | Dynamics Inc. | Cards and devices with multifunction magnetic emulators and methods for using the same |
US8286876B2 (en) | 2007-12-24 | 2012-10-16 | Dynamics Inc. | Cards and devices with magnetic emulators and magnetic reader read-head detectors |
US10095974B1 (en) | 2007-12-24 | 2018-10-09 | Dynamics Inc. | Payment cards and devices with displays, chips, RFIDs, magnetic emulators, magnetic encoders, and other components |
US10223631B2 (en) | 2007-12-24 | 2019-03-05 | Dynamics Inc. | Cards and devices with multifunction magnetic emulators and methods for using same |
US8302872B2 (en) | 2007-12-24 | 2012-11-06 | Dynamics Inc. | Advanced dynamic credit cards |
US8733638B2 (en) | 2007-12-24 | 2014-05-27 | Dynamics Inc. | Payment cards and devices with displays, chips, RFIDs, magnetic emulators, magentic decoders, and other components |
US20090159672A1 (en) * | 2007-12-24 | 2009-06-25 | Dynamics Inc. | Cards with serial magnetic emulators |
US9547816B2 (en) | 2007-12-24 | 2017-01-17 | Dynamics Inc. | Cards and devices with multifunction magnetic emulators and methods for using same |
US10325199B2 (en) | 2007-12-24 | 2019-06-18 | Dynamics Inc. | Payment cards and devices with displays, chips, RFIDs, magnetic emulators, magentic decoders, and other components |
US10430704B2 (en) | 2007-12-24 | 2019-10-01 | Dynamics Inc. | Payment cards and devices with displays, chips, RFIDs, magnetic emulators, magnetic encoders, and other components |
US10467521B2 (en) | 2007-12-24 | 2019-11-05 | Dynamics Inc. | Payment cards and devices with gift card, global integration, and magnetic stripe reader communication functionality |
US9384438B2 (en) | 2007-12-24 | 2016-07-05 | Dynamics, Inc. | Cards with serial magnetic emulators |
US9361569B2 (en) | 2007-12-24 | 2016-06-07 | Dynamics, Inc. | Cards with serial magnetic emulators |
US12121328B2 (en) | 2007-12-24 | 2024-10-22 | Dynamics Inc. | Credit, security, debit cards and the like with buttons |
US9010630B2 (en) | 2007-12-24 | 2015-04-21 | Dynamics Inc. | Systems and methods for programmable payment cards and devices with loyalty-based payment applications |
US10496918B2 (en) | 2007-12-24 | 2019-12-03 | Dynamics Inc. | Cards and devices with multifunction magnetic emulators and methods for using the same |
US20090159697A1 (en) * | 2007-12-24 | 2009-06-25 | Dynamics, Inc. | Cards and devices with magnetic emulators with zoning control and advanced interiors |
US8020775B2 (en) | 2007-12-24 | 2011-09-20 | Dynamics Inc. | Payment cards and devices with enhanced magnetic emulators |
US10579920B2 (en) | 2007-12-24 | 2020-03-03 | Dynamics Inc. | Systems and methods for programmable payment cards and devices with loyalty-based payment applications |
US8517276B2 (en) | 2007-12-24 | 2013-08-27 | Dynamics Inc. | Cards and devices with multifunction magnetic emulators and methods for using same |
US8382000B2 (en) | 2007-12-24 | 2013-02-26 | Dynamics Inc. | Payment cards and devices with enhanced magnetic emulators |
US11238329B2 (en) | 2007-12-24 | 2022-02-01 | Dynamics Inc. | Payment cards and devices with gift card, global integration, and magnetic stripe reader communication functionality |
US11062195B2 (en) | 2007-12-24 | 2021-07-13 | Dynamics Inc. | Cards and devices with multifunction magnetic emulators and methods for using same |
US8413892B2 (en) | 2007-12-24 | 2013-04-09 | Dynamics Inc. | Payment cards and devices with displays, chips, RFIDs, magnetic emulators, magnetic encoders, and other components |
US8424773B2 (en) | 2007-12-24 | 2013-04-23 | Dynamics Inc. | Payment cards and devices with enhanced magnetic emulators |
US8459548B2 (en) | 2007-12-24 | 2013-06-11 | Dynamics Inc. | Payment cards and devices with gift card, global integration, and magnetic stripe reader communication functionality |
US20090159709A1 (en) * | 2007-12-24 | 2009-06-25 | Dynamics Inc. | Advanced dynamic credit cards |
US8485437B2 (en) | 2007-12-24 | 2013-07-16 | Dynamics Inc. | Systems and methods for programmable payment cards and devices with loyalty-based payment applications |
US20090159699A1 (en) * | 2007-12-24 | 2009-06-25 | Dynamics Inc. | Payment cards and devices operable to receive point-of-sale actions before point-of-sale and forward actions at point-of-sale |
US20090159702A1 (en) * | 2007-12-24 | 2009-06-25 | Dynamics Inc. | Advanced dynamic credit cards |
US10997489B2 (en) | 2007-12-24 | 2021-05-04 | Dynamics Inc. | Cards and devices with multifunction magnetic emulators and methods for using same |
US11055600B2 (en) | 2007-12-24 | 2021-07-06 | Dynamics Inc. | Cards with serial magnetic emulators |
US11037045B2 (en) | 2007-12-24 | 2021-06-15 | Dynamics Inc. | Cards and devices with magnetic emulators with zoning control and advanced interiors |
US11494606B2 (en) | 2007-12-24 | 2022-11-08 | Dynamics Inc. | Cards and devices with magnetic emulators with zoning control and advanced interiors |
US9208634B2 (en) * | 2008-12-19 | 2015-12-08 | Nxp B.V. | Enhanced smart card usage |
US20110251955A1 (en) * | 2008-12-19 | 2011-10-13 | Nxp B.V. | Enhanced smart card usage |
US8579203B1 (en) | 2008-12-19 | 2013-11-12 | Dynamics Inc. | Electronic magnetic recorded media emulators in magnetic card devices |
US8931703B1 (en) | 2009-03-16 | 2015-01-13 | Dynamics Inc. | Payment cards and devices for displaying barcodes |
US8172148B1 (en) | 2009-04-06 | 2012-05-08 | Dynamics Inc. | Cards and assemblies with user interfaces |
US9928456B1 (en) | 2009-04-06 | 2018-03-27 | Dynamics Inc. | Cards and assemblies with user interfaces |
US9329619B1 (en) | 2009-04-06 | 2016-05-03 | Dynamics Inc. | Cards with power management |
US8282007B1 (en) | 2009-04-06 | 2012-10-09 | Dynamics Inc. | Laminated cards with manual input interfaces |
US10176419B1 (en) | 2009-04-06 | 2019-01-08 | Dynamics Inc. | Cards and assemblies with user interfaces |
US10948964B1 (en) | 2009-04-06 | 2021-03-16 | Dynamics Inc. | Cards with power management |
US8066191B1 (en) | 2009-04-06 | 2011-11-29 | Dynamics Inc. | Cards and assemblies with user interfaces |
US8757499B2 (en) | 2009-04-06 | 2014-06-24 | Dynamics Inc. | Laminated cards with manual input interfaces |
US8622309B1 (en) | 2009-04-06 | 2014-01-07 | Dynamics Inc. | Payment cards and devices with budgets, parental controls, and virtual accounts |
US8590796B1 (en) | 2009-04-06 | 2013-11-26 | Dynamics Inc. | Cards having dynamic magnetic stripe communication devices fabricated from multiple boards |
US11144909B1 (en) | 2009-06-23 | 2021-10-12 | Dynamics Inc. | Cards deployed with inactivated products for activation |
US8757483B1 (en) | 2009-06-23 | 2014-06-24 | Dynamics Inc. | Cards deployed with inactivated products for activation |
US8393545B1 (en) | 2009-06-23 | 2013-03-12 | Dynamics Inc. | Cards deployed with inactivated products for activation |
US9064255B1 (en) | 2009-06-23 | 2015-06-23 | Dynamics Inc. | Cards deployed with inactivated products for activation |
US9852368B1 (en) | 2009-08-17 | 2017-12-26 | Dynamics Inc. | Advanced loyalty applications for powered cards and devices |
US9953255B1 (en) | 2009-08-17 | 2018-04-24 | Dynamics Inc. | Advanced loyalty applications for powered cards and devices |
US8511574B1 (en) | 2009-08-17 | 2013-08-20 | Dynamics Inc. | Advanced loyalty applications for powered cards and devices |
US11003970B1 (en) | 2009-08-17 | 2021-05-11 | Dynamics Inc. | Advanced loyalty applications for powered cards and devices |
US9306666B1 (en) | 2009-10-08 | 2016-04-05 | Dynamics Inc. | Programming protocols for powered cards and devices |
US8727219B1 (en) | 2009-10-12 | 2014-05-20 | Dynamics Inc. | Magnetic stripe track signal having multiple communications channels |
US8814050B1 (en) | 2009-10-20 | 2014-08-26 | Dynamics Inc. | Advanced payment options for powered cards and devices |
US8523059B1 (en) | 2009-10-20 | 2013-09-03 | Dynamics Inc. | Advanced payment options for powered cards and devices |
US9652436B1 (en) | 2009-10-25 | 2017-05-16 | Dynamics Inc. | Games, prizes, and entertainment for powered cards and devices |
US8393546B1 (en) | 2009-10-25 | 2013-03-12 | Dynamics Inc. | Games, prizes, and entertainment for powered cards and devices |
US8602312B2 (en) | 2010-02-16 | 2013-12-10 | Dynamics Inc. | Systems and methods for drive circuits for dynamic magnetic stripe communications devices |
US9373069B2 (en) | 2010-02-16 | 2016-06-21 | Dynamics Inc. | Systems and methods for drive circuits for dynamic magnetic stripe communications devices |
US8746579B1 (en) | 2010-03-02 | 2014-06-10 | Dynamics Inc. | Systems and methods for detection mechanisms for magnetic cards and devices |
US10482363B1 (en) | 2010-03-02 | 2019-11-19 | Dynamics Inc. | Systems and methods for detection mechanisms for magnetic cards and devices |
US8573503B1 (en) | 2010-03-02 | 2013-11-05 | Dynamics Inc. | Systems and methods for detection mechanisms for magnetic cards and devices |
US8348172B1 (en) | 2010-03-02 | 2013-01-08 | Dynamics Inc. | Systems and methods for detection mechanisms for magnetic cards and devices |
US10693263B1 (en) | 2010-03-16 | 2020-06-23 | Dynamics Inc. | Systems and methods for audio connectors for powered cards and devices |
US10504105B2 (en) | 2010-05-18 | 2019-12-10 | Dynamics Inc. | Systems and methods for cards and devices operable to communicate to touch sensitive displays |
US11120427B2 (en) | 2010-05-18 | 2021-09-14 | Dynamics Inc. | Systems and methods for cards and devices operable to communicate via light pulsing |
US8317103B1 (en) | 2010-06-23 | 2012-11-27 | FiTeq | Method for broadcasting a magnetic stripe data packet from an electronic smart card |
US8226001B1 (en) | 2010-06-23 | 2012-07-24 | Fiteq, Inc. | Method for broadcasting a magnetic stripe data packet from an electronic smart card |
USD652448S1 (en) | 2010-07-02 | 2012-01-17 | Dynamics Inc. | Multiple button interactive electronic card |
USD670759S1 (en) | 2010-07-02 | 2012-11-13 | Dynamics Inc. | Multiple button interactive electronic card with light sources |
USD672389S1 (en) | 2010-07-02 | 2012-12-11 | Dynamics Inc. | Multiple button interactive electronic card with light sources |
USD652867S1 (en) | 2010-07-02 | 2012-01-24 | Dynamics Inc. | Multiple button interactive electronic card |
USD674013S1 (en) | 2010-07-02 | 2013-01-08 | Dynamics Inc. | Multiple button interactive electronic card with light sources |
USD687094S1 (en) | 2010-07-02 | 2013-07-30 | Dynamics Inc. | Multiple button interactive electronic card with light sources |
USD652075S1 (en) | 2010-07-02 | 2012-01-10 | Dynamics Inc. | Multiple button interactive electronic card |
USD652449S1 (en) | 2010-07-02 | 2012-01-17 | Dynamics Inc. | Multiple button interactive electronic card |
USD792512S1 (en) | 2010-07-09 | 2017-07-18 | Dynamics Inc. | Display with font |
USD792513S1 (en) | 2010-07-09 | 2017-07-18 | Dynamics Inc. | Display with font |
USD643063S1 (en) | 2010-07-09 | 2011-08-09 | Dynamics Inc. | Interactive electronic card with display |
USD666241S1 (en) | 2010-07-09 | 2012-08-28 | Dynamics Inc. | Multiple button interactive electronic card with light source |
USD651238S1 (en) | 2010-07-09 | 2011-12-27 | Dynamics Inc. | Interactive electronic card with display |
USD665022S1 (en) | 2010-07-09 | 2012-08-07 | Dynamics Inc. | Multiple button interactive electronic card with light source |
USD651237S1 (en) | 2010-07-09 | 2011-12-27 | Dynamics Inc. | Interactive electronic card with display |
USD651644S1 (en) | 2010-07-09 | 2012-01-03 | Dynamics Inc. | Interactive electronic card with display |
USD652076S1 (en) | 2010-07-09 | 2012-01-10 | Dynamics Inc. | Multiple button interactive electronic card with display |
USD653288S1 (en) | 2010-07-09 | 2012-01-31 | Dynamics Inc. | Multiple button interactive electronic card |
USD652450S1 (en) | 2010-07-09 | 2012-01-17 | Dynamics Inc. | Multiple button interactive electronic card |
USD792511S1 (en) | 2010-07-09 | 2017-07-18 | Dynamics Inc. | Display with font |
USD665447S1 (en) | 2010-07-09 | 2012-08-14 | Dynamics Inc. | Multiple button interactive electronic card with light source and display |
US8322623B1 (en) | 2010-07-26 | 2012-12-04 | Dynamics Inc. | Systems and methods for advanced card printing |
US9053398B1 (en) | 2010-08-12 | 2015-06-09 | Dynamics Inc. | Passive detection mechanisms for magnetic cards and devices |
US10055614B1 (en) * | 2010-08-12 | 2018-08-21 | Dynamics Inc. | Systems and methods for advanced detection mechanisms for magnetic cards and devices |
US10022884B1 (en) | 2010-10-15 | 2018-07-17 | Dynamics Inc. | Systems and methods for alignment techniques for magnetic cards and devices |
US8561894B1 (en) | 2010-10-20 | 2013-10-22 | Dynamics Inc. | Powered cards and devices designed, programmed, and deployed from a kiosk |
US9646240B1 (en) * | 2010-11-05 | 2017-05-09 | Dynamics Inc. | Locking features for powered cards and devices |
US9721201B1 (en) | 2011-01-23 | 2017-08-01 | Dynamics Inc. | Cards and devices with embedded holograms |
US8567679B1 (en) | 2011-01-23 | 2013-10-29 | Dynamics Inc. | Cards and devices with embedded holograms |
US8944333B1 (en) | 2011-01-23 | 2015-02-03 | Dynamics Inc. | Cards and devices with embedded holograms |
US10176423B1 (en) | 2011-01-23 | 2019-01-08 | Dynamics Inc. | Cards and devices with embedded holograms |
US10095970B1 (en) | 2011-01-31 | 2018-10-09 | Dynamics Inc. | Cards including anti-skimming devices |
US9818125B2 (en) | 2011-02-16 | 2017-11-14 | Dynamics Inc. | Systems and methods for information exchange mechanisms for powered cards and devices |
US9836680B1 (en) | 2011-03-03 | 2017-12-05 | Dynamics Inc. | Systems and methods for advanced communication mechanisms for magnetic cards and devices |
US10990867B1 (en) | 2011-03-03 | 2021-04-27 | Dynamics Inc. | Systems and methods for advanced communication mechanisms for magnetic cards and devices |
US8485446B1 (en) | 2011-03-28 | 2013-07-16 | Dynamics Inc. | Shielded magnetic stripe for magnetic cards and devices |
US11100431B2 (en) | 2011-05-10 | 2021-08-24 | Dynamics Inc. | Systems and methods for mobile authorizations |
US11501217B2 (en) | 2011-05-10 | 2022-11-15 | Dynamics Inc. | Systems and methods for a mobile electronic wallet |
USD670331S1 (en) | 2011-05-12 | 2012-11-06 | Dynamics Inc. | Interactive display card |
USD670332S1 (en) | 2011-05-12 | 2012-11-06 | Dynamics Inc. | Interactive card |
USD670329S1 (en) | 2011-05-12 | 2012-11-06 | Dynamics Inc. | Interactive display card |
USD676904S1 (en) | 2011-05-12 | 2013-02-26 | Dynamics Inc. | Interactive display card |
USD670330S1 (en) | 2011-05-12 | 2012-11-06 | Dynamics Inc. | Interactive card |
US10936926B1 (en) | 2011-05-23 | 2021-03-02 | Dynamics Inc. | Systems and methods for sensor mechanisms for magnetic cards and devices |
US9881245B1 (en) | 2011-05-23 | 2018-01-30 | Dynamics Inc. | Systems and methods for sensor mechanisms for magnetic cards and devices |
US9349089B1 (en) | 2011-05-23 | 2016-05-24 | Dynamics Inc. | Systems and methods for sensor mechanisms for magnetic cards and devices |
US8628022B1 (en) | 2011-05-23 | 2014-01-14 | Dynamics Inc. | Systems and methods for sensor mechanisms for magnetic cards and devices |
US8827153B1 (en) | 2011-07-18 | 2014-09-09 | Dynamics Inc. | Systems and methods for waveform generation for dynamic magnetic stripe communications devices |
US8768830B1 (en) | 2011-09-08 | 2014-07-01 | Citibank, N.A. | Method and system for a multi-purpose transactional platform |
US11551046B1 (en) | 2011-10-19 | 2023-01-10 | Dynamics Inc. | Stacked dynamic magnetic stripe commmunications device for magnetic cards and devices |
US11409971B1 (en) | 2011-10-23 | 2022-08-09 | Dynamics Inc. | Programming and test modes for powered cards and devices |
US10169693B1 (en) | 2011-11-21 | 2019-01-01 | Dynamics Inc. | Data modification for magnetic cards and devices |
US9619741B1 (en) | 2011-11-21 | 2017-04-11 | Dynamics Inc. | Systems and methods for synchronization mechanisms for magnetic cards and devices |
US8960545B1 (en) | 2011-11-21 | 2015-02-24 | Dynamics Inc. | Data modification for magnetic cards and devices |
US11941469B1 (en) | 2011-11-21 | 2024-03-26 | Dynamics Inc. | Systems and methods for synchronization mechanisms for magnetic cards and devices |
US10062024B1 (en) | 2012-02-03 | 2018-08-28 | Dynamics Inc. | Systems and methods for spike suppression for dynamic magnetic stripe communications devices |
US9710745B1 (en) | 2012-02-09 | 2017-07-18 | Dynamics Inc. | Systems and methods for automated assembly of dynamic magnetic stripe communications devices |
US8888009B1 (en) | 2012-02-14 | 2014-11-18 | Dynamics Inc. | Systems and methods for extended stripe mechanisms for magnetic cards and devices |
US9916992B2 (en) | 2012-02-20 | 2018-03-13 | Dynamics Inc. | Systems and methods for flexible components for powered cards and devices |
US9734669B1 (en) | 2012-04-02 | 2017-08-15 | Dynamics Inc. | Cards, devices, systems, and methods for advanced payment game of skill and game of chance functionality |
US11961147B1 (en) | 2012-04-15 | 2024-04-16 | K. Shane Cupp | Cards, devices, systems, and methods for financial management services |
US11418483B1 (en) | 2012-04-19 | 2022-08-16 | Dynamics Inc. | Cards, devices, systems, and methods for zone-based network management |
US10395156B1 (en) | 2012-05-15 | 2019-08-27 | Dynamics Inc. | Cards, devices, systems, methods and dynamic security codes |
US9033218B1 (en) | 2012-05-15 | 2015-05-19 | Dynamics Inc. | Cards, devices, systems, methods and dynamic security codes |
US9064195B2 (en) | 2012-06-29 | 2015-06-23 | Dynamics Inc. | Multiple layer card circuit boards |
USD675256S1 (en) | 2012-08-27 | 2013-01-29 | Dynamics Inc. | Interactive electronic card with display and button |
USD687887S1 (en) | 2012-08-27 | 2013-08-13 | Dynamics Inc. | Interactive electronic card with buttons |
USD673606S1 (en) | 2012-08-27 | 2013-01-01 | Dynamics Inc. | Interactive electronic card with display and buttons |
USD729871S1 (en) | 2012-08-27 | 2015-05-19 | Dynamics Inc. | Interactive electronic card with display and buttons |
USD676487S1 (en) | 2012-08-27 | 2013-02-19 | Dynamics Inc. | Interactive electronic card with display and buttons |
USD730439S1 (en) | 2012-08-27 | 2015-05-26 | Dynamics Inc. | Interactive electronic card with buttons |
USD687095S1 (en) | 2012-08-27 | 2013-07-30 | Dynamics Inc. | Interactive electronic card with buttons |
USD687488S1 (en) | 2012-08-27 | 2013-08-06 | Dynamics Inc. | Interactive electronic card with buttons |
USD687489S1 (en) | 2012-08-27 | 2013-08-06 | Dynamics Inc. | Interactive electronic card with buttons |
USD687487S1 (en) | 2012-08-27 | 2013-08-06 | Dynamics Inc. | Interactive electronic card with display and button |
USD687490S1 (en) | 2012-08-27 | 2013-08-06 | Dynamics Inc. | Interactive electronic card with display and button |
USD730438S1 (en) | 2012-08-27 | 2015-05-26 | Dynamics Inc. | Interactive electronic card with display and button |
USD688744S1 (en) | 2012-08-27 | 2013-08-27 | Dynamics Inc. | Interactive electronic card with display and button |
USD692053S1 (en) | 2012-08-27 | 2013-10-22 | Dynamics Inc. | Interactive electronic card with display and button |
USD729870S1 (en) | 2012-08-27 | 2015-05-19 | Dynamics Inc. | Interactive electronic card with display and button |
USD694322S1 (en) | 2012-08-27 | 2013-11-26 | Dynamics Inc. | Interactive electronic card with display buttons |
USD695636S1 (en) | 2012-08-27 | 2013-12-17 | Dynamics Inc. | Interactive electronic card with display and buttons |
USD828870S1 (en) | 2012-08-27 | 2018-09-18 | Dynamics Inc. | Display card |
USD729869S1 (en) | 2012-08-27 | 2015-05-19 | Dynamics Inc. | Interactive electronic card with display and button |
US11995642B1 (en) | 2012-09-05 | 2024-05-28 | Dynamics Inc. | Cards, devices, systems, and methods for a notification system |
US11126997B1 (en) | 2012-10-02 | 2021-09-21 | Dynamics Inc. | Cards, devices, systems, and methods for a fulfillment system |
US9010647B2 (en) | 2012-10-29 | 2015-04-21 | Dynamics Inc. | Multiple sensor detector systems and detection methods of magnetic cards and devices |
US10922597B1 (en) | 2012-11-05 | 2021-02-16 | Dynamics Inc. | Dynamic magnetic stripe communications device with beveled magnetic material for magnetic cards and devices |
US9659246B1 (en) | 2012-11-05 | 2017-05-23 | Dynamics Inc. | Dynamic magnetic stripe communications device with beveled magnetic material for magnetic cards and devices |
US11023796B1 (en) | 2012-11-30 | 2021-06-01 | Dynamics Inc. | Dynamic magnetic stripe communications device with stepped magnetic material for magnetic cards and devices |
US9010644B1 (en) | 2012-11-30 | 2015-04-21 | Dynamics Inc. | Dynamic magnetic stripe communications device with stepped magnetic material for magnetic cards and devices |
US10311349B1 (en) | 2012-11-30 | 2019-06-04 | Dynamics Inc. | Dynamic magnetic stripe communications device with stepped magnetic material for magnetic cards and devices |
US9646750B1 (en) | 2012-11-30 | 2017-05-09 | Dynamics Inc. | Dynamic magnetic stripe communications device with stepped magnetic material for magnetic cards and devices |
US10949627B2 (en) | 2012-12-20 | 2021-03-16 | Dynamics Inc. | Systems and methods for non-time smearing detection mechanisms for magnetic cards and devices |
USD765173S1 (en) | 2013-03-04 | 2016-08-30 | Dynamics Inc. | Interactive electronic card with display and button |
USD750167S1 (en) | 2013-03-04 | 2016-02-23 | Dynamics Inc. | Interactive electronic card with buttons |
USD750168S1 (en) | 2013-03-04 | 2016-02-23 | Dynamics Inc. | Interactive electronic card with display and button |
USD750166S1 (en) | 2013-03-04 | 2016-02-23 | Dynamics Inc. | Interactive electronic card with display and buttons |
USD751640S1 (en) | 2013-03-04 | 2016-03-15 | Dynamics Inc. | Interactive electronic card with display and button |
USD751639S1 (en) | 2013-03-04 | 2016-03-15 | Dynamics Inc. | Interactive electronic card with display and button |
USD764584S1 (en) | 2013-03-04 | 2016-08-23 | Dynamics Inc. | Interactive electronic card with buttons |
USD765174S1 (en) | 2013-03-04 | 2016-08-30 | Dynamics Inc. | Interactive electronic card with button |
USD777252S1 (en) | 2013-03-04 | 2017-01-24 | Dynamics Inc. | Interactive electronic card with buttons |
USD780184S1 (en) * | 2013-03-13 | 2017-02-28 | Nagrastar Llc | Smart card interface |
US12056684B2 (en) | 2013-03-15 | 2024-08-06 | Cardware, Inc. | Multi-function electronic payment card and device system |
USD767024S1 (en) | 2013-09-10 | 2016-09-20 | Dynamics Inc. | Interactive electronic card with contact connector |
USD737373S1 (en) | 2013-09-10 | 2015-08-25 | Dynamics Inc. | Interactive electronic card with contact connector |
US11062188B1 (en) | 2014-03-21 | 2021-07-13 | Dynamics Inc | Exchange coupled amorphous ribbons for electronic stripes |
US10108891B1 (en) | 2014-03-21 | 2018-10-23 | Dynamics Inc. | Exchange coupled amorphous ribbons for electronic stripes |
US9864599B2 (en) * | 2014-06-30 | 2018-01-09 | Feitian Technologies Co., Ltd. | Firmware update method in two-chip solution for secure terminal |
USD780763S1 (en) * | 2015-03-20 | 2017-03-07 | Nagrastar Llc | Smart card interface |
US10032049B2 (en) | 2016-02-23 | 2018-07-24 | Dynamics Inc. | Magnetic cards and devices for motorized readers |
RU2762299C2 (ru) * | 2016-08-08 | 2021-12-17 | Илипс Ворлд, Инк. | Способ для системы генерирования защитного кода предоплаченной, дебетовой и кредитной карт |
US11561593B2 (en) | 2017-04-28 | 2023-01-24 | Block, Inc. | Point of sale device power management and undervoltage protection |
US11899515B2 (en) | 2017-04-28 | 2024-02-13 | Block, Inc. | Point of sale device power management and undervoltage protection |
US20220164782A1 (en) * | 2017-10-30 | 2022-05-26 | Block, Inc. | Controlling access to output device between two processors |
US11257058B1 (en) * | 2017-10-30 | 2022-02-22 | Square, Inc. | Sharing output device between unsecured processor and secured processor |
US20240249265A1 (en) * | 2017-10-30 | 2024-07-25 | Block, Inc. | Controlling processor's access to interface device |
US11983688B2 (en) * | 2017-10-30 | 2024-05-14 | Block, Inc. | Controlling access to output device between two processors |
US20210216988A1 (en) * | 2017-12-08 | 2021-07-15 | Square, Inc. | Reader detection signal bypassing secure processor |
US20230410077A1 (en) * | 2017-12-08 | 2023-12-21 | Block, Inc. | Movement feedback based on reader interface |
US11797965B2 (en) * | 2017-12-08 | 2023-10-24 | Block, Inc. | Reader detection signal based proximity feedback |
US10970698B1 (en) | 2017-12-08 | 2021-04-06 | Square, Inc. | Reader detection signal bypassing secure processor |
US12141785B2 (en) | 2022-04-08 | 2024-11-12 | Cardware, Inc. | Multi-function electronic payment card and device system |
Also Published As
Publication number | Publication date |
---|---|
EP1882220A2 (fr) | 2008-01-30 |
WO2006105092A3 (fr) | 2009-04-09 |
JP5186359B2 (ja) | 2013-04-17 |
KR20070119051A (ko) | 2007-12-18 |
JP2008535097A (ja) | 2008-08-28 |
US20120188732A1 (en) | 2012-07-26 |
US8540165B2 (en) | 2013-09-24 |
WO2006105092A2 (fr) | 2006-10-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8286889B2 (en) | Electronic financial transaction cards and methods | |
US20080148394A1 (en) | Electronic financial transaction cards and methods | |
US6240517B1 (en) | Integrated circuit card, integrated circuit card processing system, and integrated circuit card authentication method | |
US6955299B1 (en) | System and method for using a smart card | |
CN101120364B (zh) | 智能卡和操作智能卡的方法 | |
EP3676746B1 (fr) | Système et procédé permettant de signer des transactions au moyen de clés privées à entrefer | |
CN104504563B (zh) | 一种移动信息安全设备及其工作方法 | |
CN104346648B (zh) | 多功能可视卡装置 | |
JPH10500504A (ja) | 暗号化モジュールをパソコンとインタフェースさせる方法および装置 | |
JPS61177585A (ja) | 携帯用電子装置密封体 | |
WO2006124652A2 (fr) | Systeme et procede de cryptage pour des dispositifs existants dans un commerce de detail | |
CN105184179A (zh) | 嵌入式加密移动存储设备及其操作方法 | |
CN104102934A (zh) | 一种便携式ic卡读写装置、系统及方法 | |
CN104123644A (zh) | 一种能与电容触摸屏通信的ic卡及其系统和方法 | |
WO2014094639A1 (fr) | Carte intelligente et procédé de commande de transaction pour carte intelligente | |
CN109615054A (zh) | 一种智能卡 | |
CN101523417A (zh) | 电子金融事务处理卡和方法 | |
CN104102870B (zh) | 电子签名认证扩展设备及信息处理方法 | |
CN104102869B (zh) | 电子签名认证扩展设备及信息处理方法 | |
EP1769450A2 (fr) | Saisie et verification en temps reel du numero d'identification personnel au terminal de vente | |
WO2009018684A1 (fr) | Clavier de chiffrement et d'authentification anti-cheval de troie à clef à usage unique | |
US20240160295A1 (en) | Method for controlling an apparatus | |
CN201259686Y (zh) | 一种新型集成电路卡 | |
CN110533423A (zh) | 支付装置、支付方法和支付卡 | |
CN105989475A (zh) | 数据交互方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: PRIVASYS, CALIFORNIA Free format text: CONSULTANT AGREEMENT;ASSIGNOR:MCGUIRE, CHUCK;REEL/FRAME:021166/0533 Effective date: 20031020 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |