US20180151391A1 - Systems and methods for flexible components for powered cards and devices - Google Patents

Systems and methods for flexible components for powered cards and devices Download PDF

Info

Publication number
US20180151391A1
US20180151391A1 US15/882,966 US201815882966A US2018151391A1 US 20180151391 A1 US20180151391 A1 US 20180151391A1 US 201815882966 A US201815882966 A US 201815882966A US 2018151391 A1 US2018151391 A1 US 2018151391A1
Authority
US
United States
Prior art keywords
die
card
stacked
processor
flexible
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
US15/882,966
Inventor
Jeffrey D. Mullen
Norman E. O'Shea
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dynamics Inc
Original Assignee
Dynamics Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dynamics Inc filed Critical Dynamics Inc
Priority to US15/882,966 priority Critical patent/US20180151391A1/en
Assigned to DYNAMICS INC. reassignment DYNAMICS INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: MULLEN, JEFFREY D., O'SHEA, NORMAN E
Publication of US20180151391A1 publication Critical patent/US20180151391A1/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H01ELECTRIC ELEMENTS
    • H01LSEMICONDUCTOR DEVICES NOT COVERED BY CLASS H10
    • H01L21/00Processes or apparatus adapted for the manufacture or treatment of semiconductor or solid state devices or of parts thereof
    • H01L21/02Manufacture or treatment of semiconductor devices or of parts thereof
    • H01L21/04Manufacture or treatment of semiconductor devices or of parts thereof the devices having at least one potential-jump barrier or surface barrier, e.g. PN junction, depletion layer or carrier concentration layer
    • H01L21/50Assembly of semiconductor devices using processes or apparatus not provided for in a single one of the subgroups H01L21/06 - H01L21/326, e.g. sealing of a cap to a base of a container
    • H01L21/56Encapsulations, e.g. encapsulation layers, coatings
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B5/00Recording by magnetisation or demagnetisation of a record carrier; Reproducing by magnetic means; Record carriers therefor
    • G11B5/008Recording on, or reproducing or erasing from, magnetic tapes, sheets, e.g. cards, or wires
    • G11B5/00804Recording on, or reproducing or erasing from, magnetic tapes, sheets, e.g. cards, or wires magnetic sheets
    • G11B5/00808Recording on, or reproducing or erasing from, magnetic tapes, sheets, e.g. cards, or wires magnetic sheets magnetic cards
    • HELECTRICITY
    • H01ELECTRIC ELEMENTS
    • H01LSEMICONDUCTOR DEVICES NOT COVERED BY CLASS H10
    • H01L21/00Processes or apparatus adapted for the manufacture or treatment of semiconductor or solid state devices or of parts thereof
    • H01L21/02Manufacture or treatment of semiconductor devices or of parts thereof
    • HELECTRICITY
    • H01ELECTRIC ELEMENTS
    • H01LSEMICONDUCTOR DEVICES NOT COVERED BY CLASS H10
    • H01L22/00Testing or measuring during manufacture or treatment; Reliability measurements, i.e. testing of parts without further processing to modify the parts as such; Structural arrangements therefor
    • H01L22/10Measuring as part of the manufacturing process
    • HELECTRICITY
    • H01ELECTRIC ELEMENTS
    • H01LSEMICONDUCTOR DEVICES NOT COVERED BY CLASS H10
    • H01L2224/00Indexing scheme for arrangements for connecting or disconnecting semiconductor or solid-state bodies and methods related thereto as covered by H01L24/00
    • H01L2224/01Means for bonding being attached to, or being formed on, the surface to be connected, e.g. chip-to-package, die-attach, "first-level" interconnects; Manufacturing methods related thereto
    • H01L2224/10Bump connectors; Manufacturing methods related thereto
    • H01L2224/15Structure, shape, material or disposition of the bump connectors after the connecting process
    • H01L2224/16Structure, shape, material or disposition of the bump connectors after the connecting process of an individual bump connector
    • H01L2224/161Disposition
    • H01L2224/16135Disposition the bump connector connecting between different semiconductor or solid-state bodies, i.e. chip-to-chip
    • H01L2224/16145Disposition the bump connector connecting between different semiconductor or solid-state bodies, i.e. chip-to-chip the bodies being stacked
    • HELECTRICITY
    • H01ELECTRIC ELEMENTS
    • H01LSEMICONDUCTOR DEVICES NOT COVERED BY CLASS H10
    • H01L2224/00Indexing scheme for arrangements for connecting or disconnecting semiconductor or solid-state bodies and methods related thereto as covered by H01L24/00
    • H01L2224/01Means for bonding being attached to, or being formed on, the surface to be connected, e.g. chip-to-package, die-attach, "first-level" interconnects; Manufacturing methods related thereto
    • H01L2224/10Bump connectors; Manufacturing methods related thereto
    • H01L2224/15Structure, shape, material or disposition of the bump connectors after the connecting process
    • H01L2224/16Structure, shape, material or disposition of the bump connectors after the connecting process of an individual bump connector
    • H01L2224/161Disposition
    • H01L2224/16151Disposition the bump connector connecting between a semiconductor or solid-state body and an item not being a semiconductor or solid-state body, e.g. chip-to-substrate, chip-to-passive
    • H01L2224/16221Disposition the bump connector connecting between a semiconductor or solid-state body and an item not being a semiconductor or solid-state body, e.g. chip-to-substrate, chip-to-passive the body and the item being stacked
    • H01L2224/16225Disposition the bump connector connecting between a semiconductor or solid-state body and an item not being a semiconductor or solid-state body, e.g. chip-to-substrate, chip-to-passive the body and the item being stacked the item being non-metallic, e.g. insulating substrate with or without metallisation
    • HELECTRICITY
    • H01ELECTRIC ELEMENTS
    • H01LSEMICONDUCTOR DEVICES NOT COVERED BY CLASS H10
    • H01L2224/00Indexing scheme for arrangements for connecting or disconnecting semiconductor or solid-state bodies and methods related thereto as covered by H01L24/00
    • H01L2224/01Means for bonding being attached to, or being formed on, the surface to be connected, e.g. chip-to-package, die-attach, "first-level" interconnects; Manufacturing methods related thereto
    • H01L2224/42Wire connectors; Manufacturing methods related thereto
    • H01L2224/47Structure, shape, material or disposition of the wire connectors after the connecting process
    • H01L2224/48Structure, shape, material or disposition of the wire connectors after the connecting process of an individual wire connector
    • H01L2224/4805Shape
    • H01L2224/4809Loop shape
    • H01L2224/48091Arched
    • HELECTRICITY
    • H01ELECTRIC ELEMENTS
    • H01LSEMICONDUCTOR DEVICES NOT COVERED BY CLASS H10
    • H01L2224/00Indexing scheme for arrangements for connecting or disconnecting semiconductor or solid-state bodies and methods related thereto as covered by H01L24/00
    • H01L2224/01Means for bonding being attached to, or being formed on, the surface to be connected, e.g. chip-to-package, die-attach, "first-level" interconnects; Manufacturing methods related thereto
    • H01L2224/42Wire connectors; Manufacturing methods related thereto
    • H01L2224/47Structure, shape, material or disposition of the wire connectors after the connecting process
    • H01L2224/48Structure, shape, material or disposition of the wire connectors after the connecting process of an individual wire connector
    • H01L2224/481Disposition
    • H01L2224/48135Connecting between different semiconductor or solid-state bodies, i.e. chip-to-chip
    • H01L2224/48145Connecting between different semiconductor or solid-state bodies, i.e. chip-to-chip the bodies being stacked
    • HELECTRICITY
    • H01ELECTRIC ELEMENTS
    • H01LSEMICONDUCTOR DEVICES NOT COVERED BY CLASS H10
    • H01L2224/00Indexing scheme for arrangements for connecting or disconnecting semiconductor or solid-state bodies and methods related thereto as covered by H01L24/00
    • H01L2224/73Means for bonding being of different types provided for in two or more of groups H01L2224/10, H01L2224/18, H01L2224/26, H01L2224/34, H01L2224/42, H01L2224/50, H01L2224/63, H01L2224/71
    • H01L2224/732Location after the connecting process
    • H01L2224/73251Location after the connecting process on different surfaces
    • H01L2224/73265Layer and wire connectors
    • HELECTRICITY
    • H01ELECTRIC ELEMENTS
    • H01LSEMICONDUCTOR DEVICES NOT COVERED BY CLASS H10
    • H01L2924/00Indexing scheme for arrangements or methods for connecting or disconnecting semiconductor or solid-state bodies as covered by H01L24/00
    • H01L2924/0001Technical content checked by a classifier
    • H01L2924/00012Relevant to the scope of the group, the symbol of which is combined with the symbol of this group
    • HELECTRICITY
    • H01ELECTRIC ELEMENTS
    • H01LSEMICONDUCTOR DEVICES NOT COVERED BY CLASS H10
    • H01L2924/00Indexing scheme for arrangements or methods for connecting or disconnecting semiconductor or solid-state bodies as covered by H01L24/00
    • H01L2924/0001Technical content checked by a classifier
    • H01L2924/00014Technical content checked by a classifier the subject-matter covered by the group, the symbol of which is combined with the symbol of this group, being disclosed without further technical details
    • HELECTRICITY
    • H05ELECTRIC TECHNIQUES NOT OTHERWISE PROVIDED FOR
    • H05KPRINTED CIRCUITS; CASINGS OR CONSTRUCTIONAL DETAILS OF ELECTRIC APPARATUS; MANUFACTURE OF ASSEMBLAGES OF ELECTRICAL COMPONENTS
    • H05K1/00Printed circuits
    • H05K1/18Printed circuits structurally associated with non-printed electric components
    • H05K1/189Printed circuits structurally associated with non-printed electric components characterised by the use of a flexible or folded printed circuit
    • HELECTRICITY
    • H05ELECTRIC TECHNIQUES NOT OTHERWISE PROVIDED FOR
    • H05KPRINTED CIRCUITS; CASINGS OR CONSTRUCTIONAL DETAILS OF ELECTRIC APPARATUS; MANUFACTURE OF ASSEMBLAGES OF ELECTRICAL COMPONENTS
    • H05K2201/00Indexing scheme relating to printed circuits covered by H05K1/00
    • H05K2201/10Details of components or other objects attached to or integrated in a printed circuit board
    • H05K2201/10613Details of electrical connections of non-printed components, e.g. special leads
    • H05K2201/10621Components characterised by their electrical contacts
    • H05K2201/10674Flip chip
    • HELECTRICITY
    • H05ELECTRIC TECHNIQUES NOT OTHERWISE PROVIDED FOR
    • H05KPRINTED CIRCUITS; CASINGS OR CONSTRUCTIONAL DETAILS OF ELECTRIC APPARATUS; MANUFACTURE OF ASSEMBLAGES OF ELECTRICAL COMPONENTS
    • H05K2203/00Indexing scheme relating to apparatus or processes for manufacturing printed circuits covered by H05K3/00
    • H05K2203/04Soldering or other types of metallurgic bonding
    • H05K2203/049Wire bonding

Definitions

  • This invention relates to powered cards and devices and related systems.
  • a card may include a dynamic magnetic communications device, which may take the form of a magnetic encoder or a magnetic emulator.
  • a magnetic encoder may be utilized to modify information that is located on a magnetic medium, such that a magnetic stripe reader may then be utilized to read the modified magnetic information from the magnetic medium.
  • a magnetic emulator may be provided to generate electromagnetic fields that directly communicate data to a read-head of a magnetic stripe reader.
  • a magnetic emulator may communicate data serially to a read-head of the magnetic stripe reader.
  • a magnetic emulator for example, may communicate data in parallel to a read-head of the magnetic stripe reader.
  • All, or substantially all, of the front surface, as well as the rear surface, of a card may be implemented as a display (e.g., bi-stable, non bi-stable, LCD, or electrochromic display). Electrodes of a display may be coupled to one or more touch sensors, such that a display may be sensitive to touch (e.g., using a finger or a pointing device) and may be further sensitive to a location of the touch. The display may be sensitive, for example, to objects that come within a proximity of the display without actually touching the display.
  • a dynamic magnetic stripe communications device may be implemented on a multiple layer board (e.g., a two-layer flexible printed circuit board).
  • a coil for each track of information that is to be communicated by the dynamic magnetic stripe communications device may then be provided by including wire segments on each layer and interconnecting the wire segments through layer interconnections to create a coil.
  • a dynamic magnetic stripe communications device may include two coils such that two tracks of information may be communicated to two different read-heads included in a read-head housing of a magnetic stripe reader.
  • a dynamic magnetic communications device may include, for example, three coils such that three tracks of information may be communicated to three different read-heads included in a read-head housing of a magnetic stripe reader.
  • Input and/or output devices may be included on a card, for example, to facilitate data exchange with the card.
  • an integrated circuit IC
  • Such a chip e.g., an EMV chip
  • a chip reader e.g., an EMV chip reader
  • An RFID antenna or module may be included on a card, for example, to send and/or receive information between an RFID writer/reader and the RFID included on the card.
  • One or more detectors may be provided on a card, for example, to sense the presence of an external object, such as a person or device, which in turn, may trigger the initiation of a communication sequence with the external object.
  • the sensed presence of the external object may then be communicated to a processor of the card, which in turn may direct the exchange of information between a card and the external object.
  • timing aspects of the information exchange between an external object and the various I/O devices provided on a card may also be determined by circuitry (e.g., a processor) provided on a card.
  • the sensed presence of the external object or device may include the type of object or device that is detected and, therefore, may then determine the type of communication that is to be used with the detected object or device.
  • a detected object may include a determination that the object is a read-head housing of a magnetic stripe reader.
  • Such an identifying detection may activate a dynamic magnetic stripe communications device so that information may be communicated to the read-head of the magnetic stripe reader.
  • Information may be communicated by a dynamic magnetic stripe communications device, for example, by re-writing magnetic information on a magnetic medium that is able to be read by a magnetic stripe reader or electromagnetically communicating data to the magnetic stripe reader.
  • One or more read-head detectors may be provided on a card.
  • the one or more read-head detectors may be provided as, for example, conductive pads that may be arranged along a length of a card having a variety of shapes.
  • a property e.g., a capacitance magnitude
  • a property of one or more of the conductive pads may, for example, change in response to contact with and/or the presence of an object.
  • a card may, for example, be formed as a laminate structure of two or more layers.
  • a card may, for example, include top and bottom layers of a plastic material (e.g., a polymer).
  • Electronics package circuitry e.g., one or more printed circuit boards, a dynamic magnetic stripe communications device, a battery, a display, a stacked-die processor, other stacked-die components, wire-bond interconnects, ball grid array interconnects, and buttons
  • a plastic material e.g., a polymer
  • Electronics package circuitry e.g., one or more printed circuit boards, a dynamic magnetic stripe communications device, a battery, a display, a stacked-die processor, other stacked-die components, wire-bond interconnects, ball grid array interconnects, and buttons
  • wire-bond interconnects e.g., wire-bond interconnects, ball grid array interconnects, and buttons
  • a material e.g., a polyurethane-based or silicon-based substance
  • a material may be injected between top and bottom layers and cured (e.g., solidified by an exposure to light, chemicals, or air) to form a hardened card that may include a flexible laminate structure having stacked structures sandwiched between layers of laminate.
  • a processor, application specific integrated circuit (ASIC), or other circuitry may, for example, be implemented on a semiconductor die.
  • a die may, for example, be made to be thinner than its original thickness (e.g., by utilizing a grinding and/or polishing process).
  • a die may, for example, be modified to a thickness of between approximately 20 microns and 0.010 inches.
  • a die may, for example, be modified to a preferable thickness of between approximately 0.00025 inches and 0.004 inches.
  • Modifying a thickness (e.g., via a grinding or polishing process) of a die may, for example, render a modified die having flexibility attributes.
  • a thinner die may exhibit a minimum bend radius or maximum bend angle without damaging the components on the die.
  • a flexible die may be encapsulated between two flexible sheets of lamination to form a flexible card or device, which may be flexed to a minimum bend radius without damaging the die.
  • the flexible die may be rolled to a maximum bend angle without damaging the die.
  • such flexible die may be arranged on a tape reel and rolled for storage.
  • a machine e.g., a pick-and-place machine
  • a mechanical carrier e.g., a printed circuit board
  • An operation of a flexible card or device may be altered when the card or device is flexed. For example, bending a card or device while the card or device is in operation may cause the card or device to function differently (e.g., an oscillator on the card or device may oscillate at a slightly different frequency as compared to operation when the card or device is not being flexed).
  • a processor on the card or device e.g., a software routine executing on the processor
  • a piezoelectric device may be used to detect flexing and a software component on the card or device may drive the resultant change in operation of a flexible card or device.
  • Other alternatives may, for example, use redundant components (e.g., geographically spaced oscillators or piezoelectric devices) to detect portions of a card or device that are being flexed (e.g., components in the flexed area change their operation) and other portions of the card or device that are not being flexed (e.g., components in the non-flexed area do not change their operation).
  • Still other alternatives may, for example, utilize thicker, non-flexible components and thinner, flexible components and compare the difference in operation between the flexible and non-flexible components to detect that a card or device may be flexing.
  • Decreasing a thickness of a die may, for example, allow two or more die to be stacked on top of one another without exceeding a height limit of the card or device.
  • multiple die may be ground to a thickness of between approximately 0.003 inches and 0.005 inches (e.g., approximately 0.004 inches) and may be stacked on top of one another.
  • two die may be stacked together to form a stacked assembly having a thickness of between approximately 0.006 and 0.010 inches (e.g., approximately 0.008 inches).
  • three die may be stacked together to form a stacked assembly having a thickness of between approximately 0.010 and 0.014 inches (e.g., approximately 0.012 inches).
  • Stacked die may be arranged on a mechanical carrier (e.g., a PCB) from bottom to top in order of decreasing diameters.
  • a bottom die may exhibit a larger diameter than a die that is stacked on top of the bottom die.
  • interconnections e.g., wire bonds
  • chip-to-chip interconnections e.g., flip-chip ball grid arrays
  • FIG. 1 is an illustration of a card constructed in accordance with the principles of the present invention
  • FIG. 2 is an illustration of a card constructed in accordance with the principles of the present invention
  • FIG. 3 is an illustration of a card constructed in accordance with the principles of the present invention.
  • FIG. 4 is an illustration of a system constructed in accordance with the principles of the present invention.
  • FIG. 5 is an illustration of a system constructed in accordance with the principles of the present invention.
  • FIG. 6 is an illustration of process flow charts constructed in accordance with the principles of the present invention.
  • FIG. 1 shows card 100 that may include, for example, a dynamic number that may be entirely, or partially, displayed using a display (e.g., display 106 ).
  • a dynamic number may include a permanent portion such as, for example, permanent portion 104 and a dynamic portion such as, for example, dynamic portion 106 .
  • Card 100 may include a dynamic number having permanent portion 104 and permanent portion 104 may be incorporated on card 100 so as to be visible to an observer of card 100 .
  • labeling techniques such as printing, embossing, laser etching, etc., may be utilized to visibly implement permanent portion 104 .
  • Card 100 may include a second dynamic number that may be entirely, or partially, displayed via a second display (e.g., display 108 ).
  • Display 108 may be utilized, for example, to display a dynamic code such as a dynamic security code.
  • Card 100 may also include third display 122 that may be used to display graphical information, such as logos and barcodes.
  • Third display 122 may also be utilized to display multiple rows and/or columns of textual and/or graphical information.
  • any one or more of displays 106 , 108 , and/or 122 may be implemented as a bi-stable display.
  • information provided on displays 106 , 108 , and/or 122 may be stable in at least two different states (e.g., a powered-on state and a powered-off state).
  • Any one or more of displays 106 , 108 , and/or 122 may be implemented as a non-bi-stable display.
  • the display is stable in response to operational power that is applied to the non-bi-stable display.
  • Other display types, such as LCD or electro-chromic may be provided as well.
  • Permanent information 120 may be included within card 100 , which may include user specific information, such as the cardholder's name or username.
  • Permanent information 120 may, for example, include information that is specific to card 100 (e.g., a card issue date and/or a card expiration date).
  • Information 120 may represent, for example, information that includes information that is both specific to the cardholder, as well as information that is specific to card 100 .
  • Card 100 may accept user input data via any one or more data input devices, such as buttons 110 - 118 .
  • Buttons 110 - 118 may be included to accept data entry through mechanical distortion, contact, or proximity.
  • Buttons 110 - 118 may be responsive to, for example, induced changes and/or deviations in light intensity, pressure magnitude, or electric and/or magnetic field strength. Such information exchange may then be determined and processed by a processor of card 100 as data input.
  • Card 100 may be flexible.
  • Card 100 may, for example, contain hardware and/or software (e.g., flex code stored in memory 152 ) that when executed by a processor of card 100 may detect when card 100 is being flexed.
  • Flex code 152 may, for example, provide processor executable applications that may detect a change in operation of card 100 based on the flexed condition of card 100 and may alter functions of card 100 based on the detected change in operation.
  • FIG. 1 shows architecture 150 , which may include one or more processors (e.g., in stacked-die processor arrangement 154 ).
  • Stacked-die processor 154 may be configured to utilize external memory 152 , internal memory of stacked-die processor 154 , or a combination of external memory 152 and internal memory for dynamically storing information, such as executable machine language (e.g., flex code), related dynamic machine data, and user input data values.
  • Stacked-die processor 154 may, for example, execute code contained within memory 152 to detect when a card (e.g., card 100 of FIG. 1 ) is being flexed. The executed code may, for example, change the operation of a card (e.g., card 100 of FIG. 1 ) based on the detected change in operation.
  • Stacked-die processor 154 may be a combination of two or more die stacked on top of one another.
  • the stacked arrangement may, for example, be attached to a mechanical carrier (e.g., a PCB) where a bottom die may exhibit a larger diameter than a die stacked on top of the bottom die.
  • interconnections e.g., wire bonds
  • stacked-die processor 154 may be a flip-chip combination, where die-to-die and/or die-to-PCB connections may be established using through-die connections and associated interconnections (e.g., a ball grid array). In so doing, for example, each of the stacked die may exhibit the same or different diameters.
  • One or more of the components shown in architecture 150 may be configured to transmit information to stacked-die processor 154 and/or may be configured to receive information as transmitted by stacked-die processor 154 .
  • one or more displays 156 may be coupled to receive data from stacked-die processor 154 .
  • the data received from stacked-die processor 154 may include, for example, at least a portion of dynamic numbers and/or dynamic codes.
  • One or more displays 156 may be, for example, touch sensitive and/or proximity sensitive. For example, objects such as fingers, pointing devices, etc., may be brought into contact with displays 156 , or in proximity to displays 156 . Detection of object proximity or object contact with displays 156 may be effective to perform any type of function (e.g., transmit data to stacked-die processor 154 ). Displays 156 may have multiple locations that are able to be determined as being touched, or determined as being in proximity to an object.
  • Input and/or output devices may be implemented on architecture 150 .
  • integrated circuit (IC) chip 160 e.g., an EMV chip
  • IC integrated circuit
  • chip reader e.g., an EMV chip reader
  • RFID Radio frequency identification
  • Other input and/or output devices 168 may be included within architecture 150 , for example, to provide any number of input and/or output capabilities.
  • other input and/or output devices 168 may include an audio device capable of receiving and/or transmitting audible information.
  • Other input and/or output devices 168 may include a device that exchanges analog and/or digital data using a visible data carrier.
  • Other input and/or output devices 168 may include a device, for example, that is sensitive to a non-visible data carrier, such as an infrared data carrier or an electromagnetic data carrier.
  • a card may, for example, contain stacked-die components on a mechanical carrier (e.g., a PCB) other than stacked-die processor 154 .
  • a mechanical carrier e.g., a PCB
  • RFID 162 , IC chip 160 , memory 153 , and/or other I/O 168 may, for example, each be implemented on a semiconductor die. Two or more of such components may be stacked and interconnected via wire-bonding, ball grid array, or other connection types. Accordingly, for example, surface area on the PCB may be conserved by adding components in vertical fashion rather than adding components laterally across the surface area of the PCB.
  • a card may, for example, be a self-contained device that derives its own operational power from one or more batteries 158 .
  • one or more batteries 158 may be included, for example, to provide operational power for a period of time (e.g., approximately 2-4 years).
  • One or more batteries 158 may be included, for example, as rechargeable batteries.
  • Electromagnetic field generators 170 - 174 may be included within architecture 150 to communicate information to, for example, a read-head of a magnetic stripe reader via, for example, electromagnetic signals.
  • electromagnetic field generators 170 - 174 may be included to communicate one or more tracks of electromagnetic data to read-heads of a magnetic stripe reader.
  • Electromagnetic field generators 170 - 174 may include, for example, a series of electromagnetic elements, where each electromagnetic element may be implemented as a coil wrapped around one or more materials (e.g., a magnetic material and/or a non-magnetic material). Additional materials may be placed outside the coil (e.g., a magnetic material and/or a non-magnetic material).
  • Electrode excitation by stacked-die processor 154 of one or more coils of one or more electromagnetic elements via, for example, driving circuitry 164 may be effective to generate electromagnetic fields from one or more electromagnetic elements.
  • One or more electromagnetic field generators 170 - 174 may be utilized to communicate electromagnetic information to, for example, one or more read-heads of a magnetic stripe reader.
  • Timing aspects of information exchange between architecture 150 and the various I/O devices implemented within architecture 150 may be determined by stacked-die processor 154 .
  • Detector 166 may be utilized, for example, to sense the proximity and/or actual contact, of an external device, which in turn, may trigger the initiation of a communication sequence.
  • the sensed presence and/or touch of the external device may then be communicated to a controller (e.g., stacked-die processor 154 ), which in turn may direct the exchange of information between architecture 150 and the external device.
  • the sensed presence and/or touch of the external device may be effective to, for example, determine the type of device or object detected.
  • the detection may include the detection of, for example, a read-head of a magnetic stripe reader.
  • stacked-die processor 154 may activate one or more electromagnetic field generators 170 - 174 to initiate a communications sequence with, for example, one or more read-heads of a magnetic stripe reader.
  • the timing relationships associated with communications between one or more electromagnetic field generators 170 - 174 and one or more read-heads of a magnetic stripe reader may be provided through use of the detection of the magnetic stripe reader.
  • stacked-die processor 154 may provide user-specific and/or card-specific information through utilization of any one or more of buttons 110 - 118 , RFID 162 , IC chip 160 , electromagnetic field generators 170 - 174 , and other input and/or output devices 168 .
  • FIG. 2 shows card 200 .
  • Card 200 may, for example, include a layer of plastic (e.g., polymer layer 202 ) that may be approximately between 0.003 inches and 0.007 inches (e.g., approximately 0.005 inches) thick.
  • Card 200 may, for example, include a layer of plastic (e.g., polymer layer 204 ) that may be approximately between 0.003 inches and 0.007 inches (e.g., approximately 0.005 inches) thick.
  • Stacked-die components 210 - 218 may, for example, include processors, ASICs, mixed-signal devices, transistor devices, and any other device.
  • Stacked-die components 210 - 218 may, for example, be thinned (e.g., via a grinding or polishing process). Such a thinning process may reduce a thickness of stacked-die components 210 - 218 to a thickness of between approximately 20 microns and 0.010 inches.
  • a thickness of a die may be thinned to approximately between 0.00025 inches and .008 inches (e.g., approximately 0.004 inches).
  • Stacked-die components 210 - 218 may be attached to a mechanical carrier (e.g., PCB 224 ).
  • Mechanical and/or electrical interconnections between die 210 and die 212 may, for example, include wire-bonds 208 .
  • Mechanical and/or electrical interconnections between die 210 and PCB 224 may, for example, include wire-bonds 206 .
  • Mechanical and/or electrical interconnections between die 212 and PCB 224 may, for example, include wire-bonds 226 .
  • Die 212 may exhibit a smaller diameter as compared to die 210 . Accordingly, for example, wire-bond connections between die 210 and 212 , between die 210 and PCB 224 , and between die 212 and PCB 224 may be facilitated.
  • a top-down (e.g., birds-eye) view (not shown) of die 210 , die 212 , and PCB 224 may, for example, illustrate that interconnect pads associated with wire bonds 206 , 208 , and 226 may be staggered so as to substantially reduce a possibility of shorting bonding wires to interconnect pads not associated with such bonding wires.
  • Electrical and/or mechanical interconnections between die 214 and die 216 may, for example, include flip-chip solder balls 220 of a ball grid array. Electrical and/or mechanical interconnections between die 216 and die 218 may, for example, include flip-chip solder balls 228 of a ball grid array. Electrical and/or mechanical interconnections between die 214 and PCB 224 may, for example, include flip-chip solder balls 230 of a ball grid array. Accordingly, for example, die 214 , 216 , and 218 may exhibit the same, or different, diameters.
  • Through-die vias may, for example, provide electrical connectivity between any one or more die 214 - 218 and PCB 224 .
  • electrical signals may be communicated between die 218 and 216 , between die 218 and 214 , between die 216 and 214 and between any one or more of die 214 - 218 and PCB 224 using conductive vias that may extend through die 214 - 218 and may be electrically interconnected via solder balls 220 , 228 and/or 230 of their respective ball grid arrays.
  • Card 200 may include an encapsulant, which may include a layer of material 222 (e.g., a material formed from one or more polyurethane-based or silicon-based substances).
  • Material 222 may be a substance that changes its physical state (e.g., changes from a liquid substance to a solid substance) when cured by one or more conditions (e.g., air, heat, pressure, light, or chemicals) for a period of time. Accordingly, for example, card 200 may be hardened, but may remain flexible, so that card 200 may be flexed to exhibit either of a convex or concave shape, while returning to a substantially flat orientation once flexing ceases.
  • FIG. 3 shows card or device 300 .
  • Card or device 300 may, for example, be a laminated assembly, which may include top and bottom layers of a plastic (e.g., polymer top and bottom layers) with components 302 , 304 and 306 encapsulated there between.
  • An encapsulant of card or device 300 may be cured (e.g., hardened) such that card or device 300 may be rigid, yet flexible.
  • Components 302 - 306 may be electrical devices (e.g., stacked or non-stacked die) and/or mechanical devices (e.g., buttons) that may be flexible, such that when card or device 300 is flexed, components 302 - 306 may also flex.
  • Card or device 300 may, for example, include other devices (not shown) that may not be flexible. Accordingly, for example, those devices of card or device 300 that may flex when card or device is flexed may also change their operation as compared to those devices that do not flex. In so doing, for example, detectors (not shown) may be placed within card or device 300 to detect such a change in operation and may take some action based upon such a detected change in operation.
  • Card or device 300 may be flexed in direction 328 and/or 330 to bend card or device 300 into a concave orientation having minimum bend radius 324 .
  • Components 302 - 306 may assume positions 308 , 312 and 316 , respectively, as a result of such flexing.
  • Components 302 - 306 may exhibit an adequately reduced thickness (e.g., via a grinding or polishing process) such that flexing does not destroy the operation of components 302 - 306 and may or may not change the operation of components 302 - 306 .
  • Card or device 300 may be flexed in direction 332 and/or 334 to bend card or device 300 into a convex orientation having minimum bend radius 326 .
  • Components 302 - 306 may assume positions 310 , 314 , and 318 , respectively, as a result of such flexing.
  • Components 302 - 306 may exhibit an adequately reduced thickness (e.g., via a grinding or polishing process) such that flexing does not destroy the operation of components 302 - 306 and may or may not change the operation of components 302 - 306 .
  • FIG. 4 shows system 400 of a card or device, which may include devices 402 and 404 , detector 406 , processor 410 , memory 408 , reaction process 412 , and device 414 .
  • Devices 402 and 404 may, for example, be devices that may be geographically spaced apart from one another on a card or device.
  • Devices 402 and 404 may, for example, be devices whose operation may change when flexed.
  • devices 402 and 404 may be provided on one or more die, where each die may exhibit a thickness between approximately 0.00025 inches and 0.007 inches (e.g., approximately 0.004 inches).
  • devices 402 and 404 may be mounted on a mechanical carrier (e.g., a PCB) that may also be flexible. Accordingly, for example, devices 402 and 404 may be flexed during operation of system 400 . In so doing, for example, the operation of devices 402 and 404 may change based upon such flexing.
  • a mechanical carrier e.g
  • Detector 406 may, for example, sample an output of device 402 and/or device 404 to determine whether device 402 and/or device 404 are being flexed during operation.
  • Device 402 and/or device 404 may, for example, be provided as an oscillating device (e.g., an oscillator or piezoelectric device). Accordingly, for example, an oscillation frequency of such devices may change and such a change in oscillation frequency may be detected by detector 406 .
  • the detected change in operation may, for example, be reported to processor 410 , which may be executing code (e.g., flex code), which may be resident within memory 408 .
  • a software process e.g., reaction process 412 executing on processor 410 may receive a detected change in operation from detector 406 that may be based upon a detected flexing of system 400 (e.g., the operation of device 402 and/or device 404 may change when a card or device is flexed) and may initiate a reaction (e.g., a reaction initiated by reaction process 412 ) that may be based upon the detected change in operation.
  • Reaction process 412 may, for example, control an operation of device 414 based upon the detected change in operation of device 402 and/or device 404 .
  • a geographic separation of device 402 and device 404 on a card or device may, for example, allow detector 406 to determine whether specific geographic regions of a card or device are being flexed. For example, detector 406 may detect a change in operation of device 402 , but may detect no change in operation of device 404 while the card or device is being flexed. Accordingly, for example, reaction process 412 , as executed by processor 410 , may determine that the geographic region of device 402 is being flexed while the geographic region of device 404 is not being flexed. In so doing, for example, reaction process 412 may effect a change in operation of a device (e.g., device 414 ) based upon a change in operation of device 402 .
  • a device e.g., device 414
  • device 402 and device 404 may exist in the same geographic region of a card or device.
  • Device 402 may, for example, be a non-flexible device.
  • Device 404 may, for example, be a flexible device. Accordingly, for example, while a card or device is being flexed, an operation of device 402 may not change while an operation of device 404 may change. Such a difference in operation may be detected by detector 406 .
  • reaction process 412 as executed by processor 410 , may determine that a difference in operation between devices 402 and 404 exists and may alter an operation of a device (e.g., device 414 ) based upon such a difference in operation.
  • FIG. 5 shows system 500 that may, for example, provide a detected change in operation of a flexed component (e.g., reference oscillator 502 ) of a flexed card or device.
  • System 500 may include a phase locked loop (e.g., PLL 520 ) that may include phase/frequency detector 504 , charge pump 506 , loop filter 510 , VCO 512 , and divider 514 .
  • PLL 520 may, for example, be implemented on a die that may not flex (e.g., PLL 520 may be implemented on a thicker die as compared to a thickness of a die that reference oscillator 502 may be implemented upon).
  • the operation of PLL 520 may not change when the card or device that PLL 520 is implemented upon may flex.
  • the operation of reference oscillator 502 may change when the card or device that reference oscillator 502 is implemented upon may flex.
  • phase/frequency detector 504 may provide signals (e.g., UP and DOWN), which may correspond to the phase/frequency error between f REF and f FEEDBACK .
  • signals e.g., UP and DOWN
  • UP and DOWN signals
  • phase/frequency of the output of divider 514 is lagging signal f REF
  • a pulse width of signal UP may increase and a pulse width of signal DOWN may decrease to cause the phase/frequency of VCO 512 to be advanced in phase/frequency.
  • the pulse width of signal UP may decrease and the pulse width of signal DOWN may increase to cause the phase/frequency of VCO 512 to be retarded in phase/frequency.
  • Charge pump 506 may react to signals UP and/or DOWN by generating an error signal. For example, if the pulse width of signal UP is increased, the magnitude of the error signal may also increase. If the pulse width of signal DOWN is increased, for example, then the magnitude of the error signal may also decrease.
  • the error signal may, for example, be filtered by loop filter 510 and provided to VCO 512 to set the output phase/frequency, f vco , of VCO 512 . Through negative feedback, the phase/frequency error between f REF and f FEEDBACK may be tracked and cancelled by PLL 520 .
  • a phase/frequency error between f REF and f FEEDBACK may, for example, occur when a flexing of a card or device causes reference oscillator 502 to change its operation (e.g., to change a phase or frequency of operation of reference oscillator 502 ).
  • Such a phase/frequency error may be detected by processor 516 , for example, by monitoring a magnitude of signal V ERROR .
  • processor 516 may detect when a component of a card or device (e.g., reference oscillator 502 ) changes its operation when flexed.
  • a software application executed by processor 516 may receive the detected change in operation and may implement a reactive change in operation of another component (e.g., movement detector 518 ) of a card or device.
  • Movement detector 518 may include an orientation of conductive pads, whereby one or more conductive pads may be arranged along a length of a card or device. Movement detector 518 may, for example, detect a location of an object (e.g., a read head of a magnetic card reader) by detecting a characteristic change (e.g., a capacitance change) in relation to the conductive pads of movement detector 518 . In addition, by monitoring a characteristic change (e.g., a capacitance change) associated with one or more of the conductive pads and by comparing a characteristic change of neighboring conductive pads, a position and/or velocity and/or acceleration estimate of an object moving in relation to such conductive pads may be obtained.
  • a characteristic change e.g., a capacitance change
  • a frequency at which a capacitance change in the conductive pads of movement detector 518 may be sampled may, for example, be adjusted based upon a detected change in operation of reference oscillator 502 . Accordingly, for example, if a decrease in a phase/frequency of operation of reference oscillator 502 is detected by processor 516 in relation to a flex event of a card or device, then processor 516 may increase a sampling frequency of movement detector 518 to compensate. Alternately, for example, if an increase in a phase/frequency of operation of reference oscillator 502 is detected by processor 516 in relation to a flex event of a card or device, then processor 516 may decrease a sampling frequency of movement detector 518 to compensate.
  • Step 611 of sequence 610 may, for example, reduce a thickness of one or more die by utilizing a thinning process (e.g., a grinding or polishing process).
  • a thickness of a die may, for example, be reduced to approximately between 20 microns and 0.010 inches (e.g., approximately 0.004 inches).
  • Such a reduced thickness die may, for example, contain components such as processors, ASICs, and mixed-mode circuitry (e.g., analog and digital circuitry).
  • Such a reduced thickness die may, for example, exhibit increased flexibility, such that the die may be flexed to a minimum bend radius (e.g., rolled) or to a maximum bend angle.
  • such flexible die may be rolled onto a tape reel (e.g., as in step 612 ).
  • the flexible die be retrieved from the tape reel and placed onto a mechanical carrier (e.g., a PCB) during a pick-and-place production operation (e.g., as in step 613 ) to produce devices, such as a powered card, a telephonic device (e.g., a cell phone), an electronic tablet, a watch, or any other device.
  • a mechanical carrier e.g., a PCB
  • a pick-and-place production operation e.g., as in step 613
  • devices such as a powered card, a telephonic device (e.g., a cell phone), an electronic tablet, a watch, or any other device.
  • Step 621 of sequence 620 may, for example, place reduced thickness die onto a mechanical carrier (e.g., a PCB).
  • a mechanical carrier e.g., a PCB
  • One or more reduced thickness die may be stacked onto the die placed in step 621 (e.g., as in step 622 ).
  • a die containing a processor may be placed onto a mechanical carrier (e.g., a PCB) and another die containing an ASIC may be stacked on top of the die containing the processor.
  • Yet another die e.g., a die containing mixed-mode electronics or other circuitry
  • surface area of the PCB may be conserved.
  • Such a stacked-die arrangement may be used to produce devices, such as a powered card, a telephonic device (e.g., a cell phone), an electronic tablet, a watch, or any other device.
  • a stacked-die arrangement may be encapsulated between two layers of laminate material (e.g., polymer material), injected with an encapsulant, and hardened to produce a rigid, yet flexible card or device.
  • Each of the stacked die may be interconnected to each other and/or one or more of the stacked die may be interconnected to signal traces on the PCB (e.g., as in step 623 ).
  • interconnections may be implemented via wire bonds, whereby wires may be attached to interconnect pads of each die.
  • wire bonding may be facilitated by placing larger diameter die at the bottom of the stack while placing smaller diameter die in order of decreasing diameter on top of the larger diameter die.
  • interconnect pads may be staggered (e.g., no interconnect pads of any die or substrate may be directly adjacent to one another from a bird's eye perspective) to reduce a possibility that wire bonds may make electrical contact with interconnect pads not intended for that wire bond.
  • each stacked die may be substantially the same diameter and may be interconnected to each other and the PCB using through-die vias and ball grid array interconnections.
  • Step 631 of sequence 630 may, for example, place one or more reduced thickness die onto a mechanical carrier, such as a PCB or substrate.
  • Detection circuitry may, for example, monitor operation of the reduced thickness die to detect that the mechanical carrier (and the reduced thickness die mounted onto the mechanical carrier) may be flexed (e.g., as in step 633 ).
  • reduced thickness die may be placed at different geographical regions of the mechanical carrier. Accordingly, for example, by detecting a changed operation of a flexed die (e.g., as in step 633 ), a processor may determine which geographical location of the mechanical carrier is being flexed.
  • both a flexible die and a non-flexible die may be placed onto a mechanical carrier.
  • a flex event may be detected (e.g., as in step 633 ) by detecting a difference in operation between the flexible die and the non-flexible die.
  • a processor of a card or device may react to a changed operation of a flexed die.
  • a card or device may be flexed such that a reference oscillator on the card or device changes frequency.
  • a software application executed by a processor of the card or device may, for example, react to the changed frequency by adjusting an operation of another component of the card or device.
  • a dynamic magnetic stripe communications device may not communicate magnetic stripe data having an adequate magnitude when the associated card or device is being flexed.
  • a drive current provided to the dynamic magnetic stripe communications device may be increased by a software application executed by a processor of the card or device (e.g., as in step 634 ) based upon the detected flexing of step 633 .

Abstract

Die may be thinned using a thinning and/or a polishing process. Such thinned die may be flexible and may change operational characteristics when flexed. The flexible die may be applied to a mechanical carrier (e.g., a PCB) of a card or device. Detection circuitry may also be provided on the PCB and may be used to detect changed operational characteristics. Such detection circuitry may cause a reaction to the changed characteristics by controlling other components on the card or device based upon the flex-induced changed characteristics. The thinned die may be stacked, interconnected, and encapsulated between sheets of laminate material to form a flexible card or device.

Description

    CROSS-REFERENCE TO RELATED APPLICATION
  • This application claims the benefit of U.S. Provisional Patent Application No. 61/600,950, titled “SYSTEMS AND METHODS FOR FLEXIBLE COMPONENTS FOR POWERED CARDS AND DEVICES,” filed Feb. 20, 2012 (Attorney Docket No. D/083 PROV), which is hereby incorporated by reference herein in its entirety.
  • BACKGROUND OF THE INVENTION
  • This invention relates to powered cards and devices and related systems.
  • SUMMARY OF THE INVENTION
  • A card may include a dynamic magnetic communications device, which may take the form of a magnetic encoder or a magnetic emulator. A magnetic encoder, for example, may be utilized to modify information that is located on a magnetic medium, such that a magnetic stripe reader may then be utilized to read the modified magnetic information from the magnetic medium. A magnetic emulator, for example, may be provided to generate electromagnetic fields that directly communicate data to a read-head of a magnetic stripe reader. A magnetic emulator, for example, may communicate data serially to a read-head of the magnetic stripe reader. A magnetic emulator, for example, may communicate data in parallel to a read-head of the magnetic stripe reader.
  • All, or substantially all, of the front surface, as well as the rear surface, of a card may be implemented as a display (e.g., bi-stable, non bi-stable, LCD, or electrochromic display). Electrodes of a display may be coupled to one or more touch sensors, such that a display may be sensitive to touch (e.g., using a finger or a pointing device) and may be further sensitive to a location of the touch. The display may be sensitive, for example, to objects that come within a proximity of the display without actually touching the display.
  • A dynamic magnetic stripe communications device may be implemented on a multiple layer board (e.g., a two-layer flexible printed circuit board). A coil for each track of information that is to be communicated by the dynamic magnetic stripe communications device may then be provided by including wire segments on each layer and interconnecting the wire segments through layer interconnections to create a coil. For example, a dynamic magnetic stripe communications device may include two coils such that two tracks of information may be communicated to two different read-heads included in a read-head housing of a magnetic stripe reader. A dynamic magnetic communications device may include, for example, three coils such that three tracks of information may be communicated to three different read-heads included in a read-head housing of a magnetic stripe reader.
  • Input and/or output devices may be included on a card, for example, to facilitate data exchange with the card. For example, an integrated circuit (IC) may be included on a card and exposed from the surface of the card. Such a chip (e.g., an EMV chip) may communicate information to a chip reader (e.g., an EMV chip reader). An RFID antenna or module may be included on a card, for example, to send and/or receive information between an RFID writer/reader and the RFID included on the card.
  • One or more detectors may be provided on a card, for example, to sense the presence of an external object, such as a person or device, which in turn, may trigger the initiation of a communication sequence with the external object. The sensed presence of the external object may then be communicated to a processor of the card, which in turn may direct the exchange of information between a card and the external object. Accordingly, timing aspects of the information exchange between an external object and the various I/O devices provided on a card may also be determined by circuitry (e.g., a processor) provided on a card.
  • The sensed presence of the external object or device may include the type of object or device that is detected and, therefore, may then determine the type of communication that is to be used with the detected object or device. For example, a detected object may include a determination that the object is a read-head housing of a magnetic stripe reader. Such an identifying detection, for example, may activate a dynamic magnetic stripe communications device so that information may be communicated to the read-head of the magnetic stripe reader. Information may be communicated by a dynamic magnetic stripe communications device, for example, by re-writing magnetic information on a magnetic medium that is able to be read by a magnetic stripe reader or electromagnetically communicating data to the magnetic stripe reader.
  • One or more read-head detectors, for example, may be provided on a card. The one or more read-head detectors may be provided as, for example, conductive pads that may be arranged along a length of a card having a variety of shapes. A property (e.g., a capacitance magnitude) of one or more of the conductive pads may, for example, change in response to contact with and/or the presence of an object.
  • A card may, for example, be formed as a laminate structure of two or more layers. A card may, for example, include top and bottom layers of a plastic material (e.g., a polymer). Electronics package circuitry (e.g., one or more printed circuit boards, a dynamic magnetic stripe communications device, a battery, a display, a stacked-die processor, other stacked-die components, wire-bond interconnects, ball grid array interconnects, and buttons) may be sandwiched between top and bottom layers of a laminate structure of a card. A material (e.g., a polyurethane-based or silicon-based substance) may be injected between top and bottom layers and cured (e.g., solidified by an exposure to light, chemicals, or air) to form a hardened card that may include a flexible laminate structure having stacked structures sandwiched between layers of laminate.
  • A processor, application specific integrated circuit (ASIC), or other circuitry may, for example, be implemented on a semiconductor die. Such a die may, for example, be made to be thinner than its original thickness (e.g., by utilizing a grinding and/or polishing process). A die may, for example, be modified to a thickness of between approximately 20 microns and 0.010 inches. A die may, for example, be modified to a preferable thickness of between approximately 0.00025 inches and 0.004 inches.
  • Modifying a thickness (e.g., via a grinding or polishing process) of a die may, for example, render a modified die having flexibility attributes. For example, a thinner die may exhibit a minimum bend radius or maximum bend angle without damaging the components on the die. Accordingly, for example, a flexible die may be encapsulated between two flexible sheets of lamination to form a flexible card or device, which may be flexed to a minimum bend radius without damaging the die. In so doing, for example, the flexible die may be rolled to a maximum bend angle without damaging the die. Alternately, for example, such flexible die may be arranged on a tape reel and rolled for storage. Once needed, a machine (e.g., a pick-and-place machine) may retrieve the flexible die by unrolling the tape reel and extracting the die from the tape reel to apply them to a mechanical carrier (e.g., a printed circuit board).
  • An operation of a flexible card or device may be altered when the card or device is flexed. For example, bending a card or device while the card or device is in operation may cause the card or device to function differently (e.g., an oscillator on the card or device may oscillate at a slightly different frequency as compared to operation when the card or device is not being flexed). A processor on the card or device (e.g., a software routine executing on the processor) may detect the change in operation and may cause a reactive change to occur based on the change in operation.
  • Alternately, for example, a piezoelectric device may be used to detect flexing and a software component on the card or device may drive the resultant change in operation of a flexible card or device. Other alternatives may, for example, use redundant components (e.g., geographically spaced oscillators or piezoelectric devices) to detect portions of a card or device that are being flexed (e.g., components in the flexed area change their operation) and other portions of the card or device that are not being flexed (e.g., components in the non-flexed area do not change their operation). Still other alternatives may, for example, utilize thicker, non-flexible components and thinner, flexible components and compare the difference in operation between the flexible and non-flexible components to detect that a card or device may be flexing.
  • Decreasing a thickness of a die may, for example, allow two or more die to be stacked on top of one another without exceeding a height limit of the card or device. For example, multiple die may be ground to a thickness of between approximately 0.003 inches and 0.005 inches (e.g., approximately 0.004 inches) and may be stacked on top of one another. Accordingly, for example, two die may be stacked together to form a stacked assembly having a thickness of between approximately 0.006 and 0.010 inches (e.g., approximately 0.008 inches). Alternately, for example, three die may be stacked together to form a stacked assembly having a thickness of between approximately 0.010 and 0.014 inches (e.g., approximately 0.012 inches).
  • Stacked die may be arranged on a mechanical carrier (e.g., a PCB) from bottom to top in order of decreasing diameters. For example, a bottom die may exhibit a larger diameter than a die that is stacked on top of the bottom die. Accordingly, for example, interconnections (e.g., wire bonds) may be extended from the top die to the bottom die, from the bottom die to the underlying PCB and/or from the top die to the underlying PCB. Alternately, for example, chip-to-chip interconnections (e.g., flip-chip ball grid arrays) may be used to interconnect the stacked die and/or the underlying PCB.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The principles and advantages of the present invention can be more clearly understood from the following detailed description considered in conjunction with the following drawings, in which the same reference numerals denote the same structural elements throughout, and in which:
  • FIG. 1 is an illustration of a card constructed in accordance with the principles of the present invention;
  • FIG. 2 is an illustration of a card constructed in accordance with the principles of the present invention;
  • FIG. 3 is an illustration of a card constructed in accordance with the principles of the present invention;
  • FIG. 4 is an illustration of a system constructed in accordance with the principles of the present invention;
  • FIG. 5 is an illustration of a system constructed in accordance with the principles of the present invention; and
  • FIG. 6 is an illustration of process flow charts constructed in accordance with the principles of the present invention.
  • DETAILED DESCRIPTION OF THE INVENTION
  • FIG. 1 shows card 100 that may include, for example, a dynamic number that may be entirely, or partially, displayed using a display (e.g., display 106). A dynamic number may include a permanent portion such as, for example, permanent portion 104 and a dynamic portion such as, for example, dynamic portion 106. Card 100 may include a dynamic number having permanent portion 104 and permanent portion 104 may be incorporated on card 100 so as to be visible to an observer of card 100. For example, labeling techniques, such as printing, embossing, laser etching, etc., may be utilized to visibly implement permanent portion 104.
  • Card 100 may include a second dynamic number that may be entirely, or partially, displayed via a second display (e.g., display 108). Display 108 may be utilized, for example, to display a dynamic code such as a dynamic security code. Card 100 may also include third display 122 that may be used to display graphical information, such as logos and barcodes. Third display 122 may also be utilized to display multiple rows and/or columns of textual and/or graphical information.
  • Persons skilled in the art will appreciate that any one or more of displays 106, 108, and/or 122 may be implemented as a bi-stable display. For example, information provided on displays 106, 108, and/or 122 may be stable in at least two different states (e.g., a powered-on state and a powered-off state). Any one or more of displays 106, 108, and/or 122 may be implemented as a non-bi-stable display. For example, the display is stable in response to operational power that is applied to the non-bi-stable display. Other display types, such as LCD or electro-chromic, may be provided as well.
  • Other permanent information, such as permanent information 120, may be included within card 100, which may include user specific information, such as the cardholder's name or username. Permanent information 120 may, for example, include information that is specific to card 100 (e.g., a card issue date and/or a card expiration date). Information 120 may represent, for example, information that includes information that is both specific to the cardholder, as well as information that is specific to card 100.
  • Card 100 may accept user input data via any one or more data input devices, such as buttons 110-118. Buttons 110-118 may be included to accept data entry through mechanical distortion, contact, or proximity. Buttons 110-118 may be responsive to, for example, induced changes and/or deviations in light intensity, pressure magnitude, or electric and/or magnetic field strength. Such information exchange may then be determined and processed by a processor of card 100 as data input.
  • Card 100 may be flexible. Card 100 may, for example, contain hardware and/or software (e.g., flex code stored in memory 152) that when executed by a processor of card 100 may detect when card 100 is being flexed. Flex code 152 may, for example, provide processor executable applications that may detect a change in operation of card 100 based on the flexed condition of card 100 and may alter functions of card 100 based on the detected change in operation.
  • FIG. 1 shows architecture 150, which may include one or more processors (e.g., in stacked-die processor arrangement 154). Stacked-die processor 154 may be configured to utilize external memory 152, internal memory of stacked-die processor 154, or a combination of external memory 152 and internal memory for dynamically storing information, such as executable machine language (e.g., flex code), related dynamic machine data, and user input data values. Stacked-die processor 154 may, for example, execute code contained within memory 152 to detect when a card (e.g., card 100 of FIG. 1) is being flexed. The executed code may, for example, change the operation of a card (e.g., card 100 of FIG. 1) based on the detected change in operation.
  • Stacked-die processor 154 may be a combination of two or more die stacked on top of one another. The stacked arrangement may, for example, be attached to a mechanical carrier (e.g., a PCB) where a bottom die may exhibit a larger diameter than a die stacked on top of the bottom die. Accordingly, for example, interconnections (e.g., wire bonds) may be placed from one die to another die and/or from each die to the underlying PCB. Alternately, for example, stacked-die processor 154 may be a flip-chip combination, where die-to-die and/or die-to-PCB connections may be established using through-die connections and associated interconnections (e.g., a ball grid array). In so doing, for example, each of the stacked die may exhibit the same or different diameters.
  • One or more of the components shown in architecture 150 may be configured to transmit information to stacked-die processor 154 and/or may be configured to receive information as transmitted by stacked-die processor 154. For example, one or more displays 156 may be coupled to receive data from stacked-die processor 154. The data received from stacked-die processor 154 may include, for example, at least a portion of dynamic numbers and/or dynamic codes.
  • One or more displays 156 may be, for example, touch sensitive and/or proximity sensitive. For example, objects such as fingers, pointing devices, etc., may be brought into contact with displays 156, or in proximity to displays 156. Detection of object proximity or object contact with displays 156 may be effective to perform any type of function (e.g., transmit data to stacked-die processor 154). Displays 156 may have multiple locations that are able to be determined as being touched, or determined as being in proximity to an object.
  • Input and/or output devices may be implemented on architecture 150. For example, integrated circuit (IC) chip 160 (e.g., an EMV chip) may be included within architecture 150, that may communicate information to a chip reader (e.g., an EMV chip reader). Radio frequency identification (RFID) module 162 may be included within architecture 150 to enable the exchange of information with an RFID reader/writer.
  • Other input and/or output devices 168 may be included within architecture 150, for example, to provide any number of input and/or output capabilities. For example, other input and/or output devices 168 may include an audio device capable of receiving and/or transmitting audible information.
  • Other input and/or output devices 168 may include a device that exchanges analog and/or digital data using a visible data carrier. Other input and/or output devices 168 may include a device, for example, that is sensitive to a non-visible data carrier, such as an infrared data carrier or an electromagnetic data carrier.
  • Persons skilled in the art will appreciate that a card (e.g., card 100 of FIG. 1) may, for example, contain stacked-die components on a mechanical carrier (e.g., a PCB) other than stacked-die processor 154. RFID 162, IC chip 160, memory 153, and/or other I/O 168 may, for example, each be implemented on a semiconductor die. Two or more of such components may be stacked and interconnected via wire-bonding, ball grid array, or other connection types. Accordingly, for example, surface area on the PCB may be conserved by adding components in vertical fashion rather than adding components laterally across the surface area of the PCB.
  • Persons skilled in the art will further appreciate that a card (e.g., card 100 of FIG. 1) may, for example, be a self-contained device that derives its own operational power from one or more batteries 158. Furthermore, one or more batteries 158 may be included, for example, to provide operational power for a period of time (e.g., approximately 2-4 years). One or more batteries 158 may be included, for example, as rechargeable batteries.
  • Electromagnetic field generators 170-174 may be included within architecture 150 to communicate information to, for example, a read-head of a magnetic stripe reader via, for example, electromagnetic signals. For example, electromagnetic field generators 170-174 may be included to communicate one or more tracks of electromagnetic data to read-heads of a magnetic stripe reader. Electromagnetic field generators 170-174 may include, for example, a series of electromagnetic elements, where each electromagnetic element may be implemented as a coil wrapped around one or more materials (e.g., a magnetic material and/or a non-magnetic material). Additional materials may be placed outside the coil (e.g., a magnetic material and/or a non-magnetic material).
  • Electrical excitation by stacked-die processor 154 of one or more coils of one or more electromagnetic elements via, for example, driving circuitry 164 may be effective to generate electromagnetic fields from one or more electromagnetic elements. One or more electromagnetic field generators 170-174 may be utilized to communicate electromagnetic information to, for example, one or more read-heads of a magnetic stripe reader.
  • Timing aspects of information exchange between architecture 150 and the various I/O devices implemented within architecture 150 may be determined by stacked-die processor 154. Detector 166 may be utilized, for example, to sense the proximity and/or actual contact, of an external device, which in turn, may trigger the initiation of a communication sequence. The sensed presence and/or touch of the external device may then be communicated to a controller (e.g., stacked-die processor 154), which in turn may direct the exchange of information between architecture 150 and the external device. The sensed presence and/or touch of the external device may be effective to, for example, determine the type of device or object detected.
  • For example, the detection may include the detection of, for example, a read-head of a magnetic stripe reader. In response, stacked-die processor 154 may activate one or more electromagnetic field generators 170-174 to initiate a communications sequence with, for example, one or more read-heads of a magnetic stripe reader. The timing relationships associated with communications between one or more electromagnetic field generators 170-174 and one or more read-heads of a magnetic stripe reader may be provided through use of the detection of the magnetic stripe reader.
  • Persons skilled in the art will appreciate that stacked-die processor 154 may provide user-specific and/or card-specific information through utilization of any one or more of buttons 110-118, RFID 162, IC chip 160, electromagnetic field generators 170-174, and other input and/or output devices 168.
  • FIG. 2 shows card 200. Card 200 may, for example, include a layer of plastic (e.g., polymer layer 202) that may be approximately between 0.003 inches and 0.007 inches (e.g., approximately 0.005 inches) thick. Card 200 may, for example, include a layer of plastic (e.g., polymer layer 204) that may be approximately between 0.003 inches and 0.007 inches (e.g., approximately 0.005 inches) thick.
  • Card 200 may include stacked-die components 210-218. Stacked-die components 210-218 may, for example, include processors, ASICs, mixed-signal devices, transistor devices, and any other device. Stacked-die components 210-218 may, for example, be thinned (e.g., via a grinding or polishing process). Such a thinning process may reduce a thickness of stacked-die components 210-218 to a thickness of between approximately 20 microns and 0.010 inches. A thickness of a die may be thinned to approximately between 0.00025 inches and .008 inches (e.g., approximately 0.004 inches). Stacked-die components 210-218 may be attached to a mechanical carrier (e.g., PCB 224).
  • Mechanical and/or electrical interconnections between die 210 and die 212 may, for example, include wire-bonds 208. Mechanical and/or electrical interconnections between die 210 and PCB 224 may, for example, include wire-bonds 206. Mechanical and/or electrical interconnections between die 212 and PCB 224 may, for example, include wire-bonds 226. Die 212 may exhibit a smaller diameter as compared to die 210. Accordingly, for example, wire-bond connections between die 210 and 212, between die 210 and PCB 224, and between die 212 and PCB 224 may be facilitated. A top-down (e.g., birds-eye) view (not shown) of die 210, die 212, and PCB 224 may, for example, illustrate that interconnect pads associated with wire bonds 206, 208, and 226 may be staggered so as to substantially reduce a possibility of shorting bonding wires to interconnect pads not associated with such bonding wires.
  • Electrical and/or mechanical interconnections between die 214 and die 216 may, for example, include flip-chip solder balls 220 of a ball grid array. Electrical and/or mechanical interconnections between die 216 and die 218 may, for example, include flip-chip solder balls 228 of a ball grid array. Electrical and/or mechanical interconnections between die 214 and PCB 224 may, for example, include flip-chip solder balls 230 of a ball grid array. Accordingly, for example, die 214, 216, and 218 may exhibit the same, or different, diameters.
  • Through-die vias may, for example, provide electrical connectivity between any one or more die 214-218 and PCB 224. For example, electrical signals may be communicated between die 218 and 216, between die 218 and 214, between die 216 and 214 and between any one or more of die 214-218 and PCB 224 using conductive vias that may extend through die 214-218 and may be electrically interconnected via solder balls 220, 228 and/or 230 of their respective ball grid arrays.
  • Card 200 may include an encapsulant, which may include a layer of material 222 (e.g., a material formed from one or more polyurethane-based or silicon-based substances). Material 222 may be a substance that changes its physical state (e.g., changes from a liquid substance to a solid substance) when cured by one or more conditions (e.g., air, heat, pressure, light, or chemicals) for a period of time. Accordingly, for example, card 200 may be hardened, but may remain flexible, so that card 200 may be flexed to exhibit either of a convex or concave shape, while returning to a substantially flat orientation once flexing ceases.
  • FIG. 3 shows card or device 300. Card or device 300 may, for example, be a laminated assembly, which may include top and bottom layers of a plastic (e.g., polymer top and bottom layers) with components 302, 304 and 306 encapsulated there between. An encapsulant of card or device 300 may be cured (e.g., hardened) such that card or device 300 may be rigid, yet flexible.
  • Components 302-306 may be electrical devices (e.g., stacked or non-stacked die) and/or mechanical devices (e.g., buttons) that may be flexible, such that when card or device 300 is flexed, components 302-306 may also flex. Card or device 300 may, for example, include other devices (not shown) that may not be flexible. Accordingly, for example, those devices of card or device 300 that may flex when card or device is flexed may also change their operation as compared to those devices that do not flex. In so doing, for example, detectors (not shown) may be placed within card or device 300 to detect such a change in operation and may take some action based upon such a detected change in operation.
  • Card or device 300 may be flexed in direction 328 and/or 330 to bend card or device 300 into a concave orientation having minimum bend radius 324. Components 302-306 may assume positions 308, 312 and 316, respectively, as a result of such flexing. Components 302-306 may exhibit an adequately reduced thickness (e.g., via a grinding or polishing process) such that flexing does not destroy the operation of components 302-306 and may or may not change the operation of components 302-306.
  • Card or device 300 may be flexed in direction 332 and/or 334 to bend card or device 300 into a convex orientation having minimum bend radius 326. Components 302-306 may assume positions 310, 314, and 318, respectively, as a result of such flexing. Components 302-306 may exhibit an adequately reduced thickness (e.g., via a grinding or polishing process) such that flexing does not destroy the operation of components 302-306 and may or may not change the operation of components 302-306.
  • FIG. 4 shows system 400 of a card or device, which may include devices 402 and 404, detector 406, processor 410, memory 408, reaction process 412, and device 414. Devices 402 and 404 may, for example, be devices that may be geographically spaced apart from one another on a card or device. Devices 402 and 404 may, for example, be devices whose operation may change when flexed. For example, devices 402 and 404 may be provided on one or more die, where each die may exhibit a thickness between approximately 0.00025 inches and 0.007 inches (e.g., approximately 0.004 inches). Further, devices 402 and 404 may be mounted on a mechanical carrier (e.g., a PCB) that may also be flexible. Accordingly, for example, devices 402 and 404 may be flexed during operation of system 400. In so doing, for example, the operation of devices 402 and 404 may change based upon such flexing.
  • Detector 406 may, for example, sample an output of device 402 and/or device 404 to determine whether device 402 and/or device 404 are being flexed during operation. Device 402 and/or device 404 may, for example, be provided as an oscillating device (e.g., an oscillator or piezoelectric device). Accordingly, for example, an oscillation frequency of such devices may change and such a change in oscillation frequency may be detected by detector 406.
  • The detected change in operation may, for example, be reported to processor 410, which may be executing code (e.g., flex code), which may be resident within memory 408. Accordingly, for example, a software process (e.g., reaction process 412) executing on processor 410 may receive a detected change in operation from detector 406 that may be based upon a detected flexing of system 400 (e.g., the operation of device 402 and/or device 404 may change when a card or device is flexed) and may initiate a reaction (e.g., a reaction initiated by reaction process 412) that may be based upon the detected change in operation. Reaction process 412 may, for example, control an operation of device 414 based upon the detected change in operation of device 402 and/or device 404.
  • A geographic separation of device 402 and device 404 on a card or device may, for example, allow detector 406 to determine whether specific geographic regions of a card or device are being flexed. For example, detector 406 may detect a change in operation of device 402, but may detect no change in operation of device 404 while the card or device is being flexed. Accordingly, for example, reaction process 412, as executed by processor 410, may determine that the geographic region of device 402 is being flexed while the geographic region of device 404 is not being flexed. In so doing, for example, reaction process 412 may effect a change in operation of a device (e.g., device 414) based upon a change in operation of device 402.
  • In an alternate example, device 402 and device 404 may exist in the same geographic region of a card or device. Device 402 may, for example, be a non-flexible device. Device 404 may, for example, be a flexible device. Accordingly, for example, while a card or device is being flexed, an operation of device 402 may not change while an operation of device 404 may change. Such a difference in operation may be detected by detector 406. In so doing, for example, reaction process 412, as executed by processor 410, may determine that a difference in operation between devices 402 and 404 exists and may alter an operation of a device (e.g., device 414) based upon such a difference in operation.
  • FIG. 5 shows system 500 that may, for example, provide a detected change in operation of a flexed component (e.g., reference oscillator 502) of a flexed card or device. System 500 may include a phase locked loop (e.g., PLL 520) that may include phase/frequency detector 504, charge pump 506, loop filter 510, VCO 512, and divider 514. PLL 520 may, for example, be implemented on a die that may not flex (e.g., PLL 520 may be implemented on a thicker die as compared to a thickness of a die that reference oscillator 502 may be implemented upon). Accordingly, for example, the operation of PLL 520 may not change when the card or device that PLL 520 is implemented upon may flex. Further, for example, the operation of reference oscillator 502 may change when the card or device that reference oscillator 502 is implemented upon may flex.
  • In operation, phase/frequency detector 504 may provide signals (e.g., UP and DOWN), which may correspond to the phase/frequency error between fREF and fFEEDBACK. For example, if the phase/frequency of the output of divider 514 is lagging signal fREF, then a pulse width of signal UP may increase and a pulse width of signal DOWN may decrease to cause the phase/frequency of VCO 512 to be advanced in phase/frequency. Conversely, if the phase/frequency of the output of divider 514 is advanced with respect to signal fREF, then the pulse width of signal UP may decrease and the pulse width of signal DOWN may increase to cause the phase/frequency of VCO 512 to be retarded in phase/frequency.
  • Charge pump 506 may react to signals UP and/or DOWN by generating an error signal. For example, if the pulse width of signal UP is increased, the magnitude of the error signal may also increase. If the pulse width of signal DOWN is increased, for example, then the magnitude of the error signal may also decrease. The error signal may, for example, be filtered by loop filter 510 and provided to VCO 512 to set the output phase/frequency, fvco, of VCO 512. Through negative feedback, the phase/frequency error between fREF and fFEEDBACK may be tracked and cancelled by PLL 520.
  • A phase/frequency error between fREF and fFEEDBACK may, for example, occur when a flexing of a card or device causes reference oscillator 502 to change its operation (e.g., to change a phase or frequency of operation of reference oscillator 502). Such a phase/frequency error may be detected by processor 516, for example, by monitoring a magnitude of signal VERROR. Accordingly, for example, processor 516 may detect when a component of a card or device (e.g., reference oscillator 502) changes its operation when flexed. In so doing, for example, a software application executed by processor 516 may receive the detected change in operation and may implement a reactive change in operation of another component (e.g., movement detector 518) of a card or device.
  • Movement detector 518 may include an orientation of conductive pads, whereby one or more conductive pads may be arranged along a length of a card or device. Movement detector 518 may, for example, detect a location of an object (e.g., a read head of a magnetic card reader) by detecting a characteristic change (e.g., a capacitance change) in relation to the conductive pads of movement detector 518. In addition, by monitoring a characteristic change (e.g., a capacitance change) associated with one or more of the conductive pads and by comparing a characteristic change of neighboring conductive pads, a position and/or velocity and/or acceleration estimate of an object moving in relation to such conductive pads may be obtained.
  • A frequency at which a capacitance change in the conductive pads of movement detector 518 may be sampled may, for example, be adjusted based upon a detected change in operation of reference oscillator 502. Accordingly, for example, if a decrease in a phase/frequency of operation of reference oscillator 502 is detected by processor 516 in relation to a flex event of a card or device, then processor 516 may increase a sampling frequency of movement detector 518 to compensate. Alternately, for example, if an increase in a phase/frequency of operation of reference oscillator 502 is detected by processor 516 in relation to a flex event of a card or device, then processor 516 may decrease a sampling frequency of movement detector 518 to compensate.
  • A flow diagram of process sequences is shown in FIG. 6. Step 611 of sequence 610 may, for example, reduce a thickness of one or more die by utilizing a thinning process (e.g., a grinding or polishing process). A thickness of a die may, for example, be reduced to approximately between 20 microns and 0.010 inches (e.g., approximately 0.004 inches). Such a reduced thickness die may, for example, contain components such as processors, ASICs, and mixed-mode circuitry (e.g., analog and digital circuitry). Such a reduced thickness die may, for example, exhibit increased flexibility, such that the die may be flexed to a minimum bend radius (e.g., rolled) or to a maximum bend angle. Accordingly, for example, such flexible die may be rolled onto a tape reel (e.g., as in step 612). In so doing, for example, the flexible die be retrieved from the tape reel and placed onto a mechanical carrier (e.g., a PCB) during a pick-and-place production operation (e.g., as in step 613) to produce devices, such as a powered card, a telephonic device (e.g., a cell phone), an electronic tablet, a watch, or any other device.
  • Step 621 of sequence 620 may, for example, place reduced thickness die onto a mechanical carrier (e.g., a PCB). One or more reduced thickness die may be stacked onto the die placed in step 621 (e.g., as in step 622). For example, a die containing a processor may be placed onto a mechanical carrier (e.g., a PCB) and another die containing an ASIC may be stacked on top of the die containing the processor. Yet another die (e.g., a die containing mixed-mode electronics or other circuitry) may be stacked onto the die containing the ASIC to yield a three-die stack. Accordingly, for example, by stacking die, surface area of the PCB may be conserved. Such a stacked-die arrangement may be used to produce devices, such as a powered card, a telephonic device (e.g., a cell phone), an electronic tablet, a watch, or any other device. Such a stacked-die arrangement may be encapsulated between two layers of laminate material (e.g., polymer material), injected with an encapsulant, and hardened to produce a rigid, yet flexible card or device.
  • Each of the stacked die may be interconnected to each other and/or one or more of the stacked die may be interconnected to signal traces on the PCB (e.g., as in step 623). By way of example, such interconnections may be implemented via wire bonds, whereby wires may be attached to interconnect pads of each die. Such wire bonding may be facilitated by placing larger diameter die at the bottom of the stack while placing smaller diameter die in order of decreasing diameter on top of the larger diameter die. In addition, interconnect pads may be staggered (e.g., no interconnect pads of any die or substrate may be directly adjacent to one another from a bird's eye perspective) to reduce a possibility that wire bonds may make electrical contact with interconnect pads not intended for that wire bond. Alternately, for example, each stacked die may be substantially the same diameter and may be interconnected to each other and the PCB using through-die vias and ball grid array interconnections.
  • Step 631 of sequence 630 may, for example, place one or more reduced thickness die onto a mechanical carrier, such as a PCB or substrate. Detection circuitry may, for example, monitor operation of the reduced thickness die to detect that the mechanical carrier (and the reduced thickness die mounted onto the mechanical carrier) may be flexed (e.g., as in step 633).
  • For example, reduced thickness die may be placed at different geographical regions of the mechanical carrier. Accordingly, for example, by detecting a changed operation of a flexed die (e.g., as in step 633), a processor may determine which geographical location of the mechanical carrier is being flexed.
  • As per another example, both a flexible die and a non-flexible die may be placed onto a mechanical carrier. By monitoring operation of both die, a flex event may be detected (e.g., as in step 633) by detecting a difference in operation between the flexible die and the non-flexible die.
  • In step 634, a processor of a card or device may react to a changed operation of a flexed die. For example, a card or device may be flexed such that a reference oscillator on the card or device changes frequency. A software application executed by a processor of the card or device may, for example, react to the changed frequency by adjusting an operation of another component of the card or device. As per another example, a dynamic magnetic stripe communications device may not communicate magnetic stripe data having an adequate magnitude when the associated card or device is being flexed. Accordingly, for example, a drive current provided to the dynamic magnetic stripe communications device may be increased by a software application executed by a processor of the card or device (e.g., as in step 634) based upon the detected flexing of step 633.
  • Persons skilled in the art will appreciate that the present invention is not limited to only the embodiments described. Instead, the present invention more generally involves dynamic information and the exchange thereof. Persons skilled in the art will also appreciate that the apparatus of the present invention may be implemented in other ways than those described herein. All such modifications are within the scope of the present invention, which is limited only by the claims that follow.

Claims (5)

1-3. (canceled)
4. A method of making a device, comprising:
reducing a thickness of two or more die;
stacking said two or more die onto a PCB;
encapsulating said die between sheets of a laminate material; and
hardening said encapsulation to form said device.
5. (canceled)
6. The method of claim 4, wherein:
a thickness of each of said two or more die is between approximately 0.003 inches and 0.005 inches.
7. The method of claim 4, wherein:
a thickness of each of said two or more die is approximately 0.004 inches.
US15/882,966 2012-02-20 2018-01-29 Systems and methods for flexible components for powered cards and devices Pending US20180151391A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US15/882,966 US20180151391A1 (en) 2012-02-20 2018-01-29 Systems and methods for flexible components for powered cards and devices

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US201261600950P 2012-02-20 2012-02-20
US13/770,484 US9916992B2 (en) 2012-02-20 2013-02-19 Systems and methods for flexible components for powered cards and devices
US15/882,966 US20180151391A1 (en) 2012-02-20 2018-01-29 Systems and methods for flexible components for powered cards and devices

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US13/770,484 Continuation US9916992B2 (en) 2012-02-20 2013-02-19 Systems and methods for flexible components for powered cards and devices

Publications (1)

Publication Number Publication Date
US20180151391A1 true US20180151391A1 (en) 2018-05-31

Family

ID=48982574

Family Applications (2)

Application Number Title Priority Date Filing Date
US13/770,484 Active US9916992B2 (en) 2012-02-20 2013-02-19 Systems and methods for flexible components for powered cards and devices
US15/882,966 Pending US20180151391A1 (en) 2012-02-20 2018-01-29 Systems and methods for flexible components for powered cards and devices

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US13/770,484 Active US9916992B2 (en) 2012-02-20 2013-02-19 Systems and methods for flexible components for powered cards and devices

Country Status (1)

Country Link
US (2) US9916992B2 (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10395156B1 (en) 2012-05-15 2019-08-27 Dynamics Inc. Cards, devices, systems, methods and dynamic security codes
US10922597B1 (en) 2012-11-05 2021-02-16 Dynamics Inc. Dynamic magnetic stripe communications device with beveled magnetic material for magnetic cards and devices
US10949627B2 (en) 2012-12-20 2021-03-16 Dynamics Inc. Systems and methods for non-time smearing detection mechanisms for magnetic cards and devices
US11023796B1 (en) 2012-11-30 2021-06-01 Dynamics Inc. Dynamic magnetic stripe communications device with stepped magnetic material for magnetic cards and devices
US11062188B1 (en) 2014-03-21 2021-07-13 Dynamics Inc Exchange coupled amorphous ribbons for electronic stripes
US11126997B1 (en) 2012-10-02 2021-09-21 Dynamics Inc. Cards, devices, systems, and methods for a fulfillment system
US11418483B1 (en) 2012-04-19 2022-08-16 Dynamics Inc. Cards, devices, systems, and methods for zone-based network management
US11961147B1 (en) 2012-04-15 2024-04-16 K. Shane Cupp Cards, devices, systems, and methods for financial management services

Families Citing this family (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090159701A1 (en) * 2007-12-24 2009-06-25 Dynamics Inc. Payment cards and devices with enhanced magnetic emulators
US8511574B1 (en) 2009-08-17 2013-08-20 Dynamics Inc. Advanced loyalty applications for powered cards and devices
US8348172B1 (en) 2010-03-02 2013-01-08 Dynamics Inc. Systems and methods for detection mechanisms for magnetic cards and devices
US10489774B2 (en) 2011-10-17 2019-11-26 Capital One Services, Llc System, method, and apparatus for updating an existing dynamic transaction card
US9978058B2 (en) 2011-10-17 2018-05-22 Capital One Services, Llc System, method, and apparatus for a dynamic transaction card
US10332102B2 (en) 2011-10-17 2019-06-25 Capital One Services, Llc System, method, and apparatus for a dynamic transaction card
US10380471B2 (en) 2013-07-23 2019-08-13 Capital One Services, Llc Dynamic transaction card power management
US10210505B2 (en) 2013-07-23 2019-02-19 Capital One Services, Llc Dynamic transaction card optimization
US10880741B2 (en) 2013-07-23 2020-12-29 Capital One Services, Llc Automated bluetooth pairing
US9965632B2 (en) 2014-12-22 2018-05-08 Capital One Services, Llc System and methods for secure firmware validation
CN108140138A (en) 2015-04-14 2018-06-08 第资本服务公司 Dynamic transaction card and manufacturing method with EMV interfaces
EP3284049B1 (en) 2015-04-14 2022-01-26 Capital One Services, LLC A system, method, and apparatus for updating an existing dynamic transaction card
US10360557B2 (en) 2015-04-14 2019-07-23 Capital One Services, Llc Dynamic transaction card protected by dropped card detection
US10474941B2 (en) 2015-04-14 2019-11-12 Capital One Services, Llc Dynamic transaction card antenna mounting
US9710744B2 (en) 2015-04-14 2017-07-18 Capital One Services, Llc Tamper-resistant dynamic transaction card and method of providing a tamper-resistant dynamic transaction card
US9990795B2 (en) 2015-04-14 2018-06-05 Capital One Services, Llc Dynamic transaction card with EMV interface and method of manufacturing
WO2016168475A1 (en) 2015-04-14 2016-10-20 Capital One Services, Llc Systems and methods for secure firmware validation
US10997588B2 (en) 2015-04-14 2021-05-04 Capital One Services, Llc Dynamic transaction card protected by dropped card detection
EP3284027B1 (en) 2015-04-14 2021-09-22 Capital One Services, LLC Tamper-resistant dynamic transaction card and method of providing a tamper-resistant dynamic transaction card
EP3284182B1 (en) 2015-04-14 2020-11-04 Capital One Services, LLC Automated bluetooth pairing
CN107924513A (en) 2015-04-14 2018-04-17 第资本服务公司 System, method and apparatus for dynamic transaction card
EP3284067B1 (en) 2015-04-14 2020-02-26 Capital One Services, LLC Dynamic transaction card optimization
US10482453B2 (en) 2015-04-14 2019-11-19 Capital One Services, Llc Dynamic transaction card protected by gesture and voice recognition
US10339433B2 (en) 2015-11-04 2019-07-02 Visa International Service Association Integrated power source on a payment device
US9965911B2 (en) 2015-12-07 2018-05-08 Capital One Services, Llc Electronic access control system
WO2023034642A1 (en) 2021-09-06 2023-03-09 Metaland Llc Encapsulating a metal inlay with thermosetting resin and method for making a metal transaction card

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060286717A1 (en) * 2005-05-06 2006-12-21 Tessera, Inc. Stacked microelectronic assemblies having basal compliant layers
US20090014889A1 (en) * 2005-05-12 2009-01-15 Hans-Joachim Barth Method for producing chip stacks, and associated chip stacks
US7959085B2 (en) * 2006-04-10 2011-06-14 Innovatier, Inc. Electronic inlay module used for electronic cards and tags
US20110316158A1 (en) * 2010-06-29 2011-12-29 Lai Nguk Chin Method and system for thin multi chip stack package with film on wire and copper wire
US20130228628A1 (en) * 2010-11-23 2013-09-05 X-Card Holdings, Llc One-time password card for secure transactions

Family Cites Families (197)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE3014882C2 (en) 1980-04-17 1983-08-11 Porst, Hannsheinz, 8500 Nürnberg Authorization ID
US4353064A (en) 1981-01-14 1982-10-05 Honeywell Inc. Battery operated access control card
US4614861A (en) 1984-11-15 1986-09-30 Intellicard International, Inc. Unitary, self-contained card verification and validation system and method
US4720860A (en) 1984-11-30 1988-01-19 Security Dynamics Technologies, Inc. Method and apparatus for positively identifying an individual
US5168520A (en) 1984-11-30 1992-12-01 Security Dynamics Technologies, Inc. Method and apparatus for personal identification
US4701601A (en) 1985-04-26 1987-10-20 Visa International Service Association Transaction card with magnetic stripe emulator
JPS62179994A (en) 1986-02-04 1987-08-07 カシオ計算機株式会社 Electronic card
US4667087A (en) 1986-03-31 1987-05-19 Max A. Quintana Secure credit card
US4791283A (en) 1986-06-03 1988-12-13 Intellicard International, Inc. Transaction card magnetic stripe emulator
US4786791A (en) 1987-02-10 1988-11-22 Gateway Technology Data processing apparatus with portable card having magnetic strip simulator
KR910004797B1 (en) 1987-04-08 1991-07-13 가시오 게이상기 가부시기가이샤 Mini-electronic device and its manufacturing method
DE3906349A1 (en) 1989-03-01 1990-09-13 Hartmut Hennige METHOD AND DEVICE FOR SIMPLIFYING THE USE OF A VARIETY OF CREDIT CARDS AND THE LIKE
US5657388A (en) 1993-05-25 1997-08-12 Security Dynamics Technologies, Inc. Method and apparatus for utilizing a token for resource access
US5237614A (en) 1991-06-07 1993-08-17 Security Dynamics Technologies, Inc. Integrated network security system
US5485519A (en) 1991-06-07 1996-01-16 Security Dynamics Technologies, Inc. Enhanced security for a secure token code
US5479512A (en) 1991-06-07 1995-12-26 Security Dynamics Technologies, Inc. Method and apparatus for performing concryption
US5585787A (en) 1991-12-09 1996-12-17 Wallerstein; Robert S. Programmable credit card
JPH05210770A (en) 1992-01-31 1993-08-20 Mitsubishi Electric Corp Contactless card and card reader/writer
US6817532B2 (en) 1992-02-12 2004-11-16 Lenscard U.S., Llc Wallet card with built-in light
US5412199A (en) 1992-02-12 1995-05-02 Finkelstein; Alan Credit card with magnifying lens
US6176430B1 (en) 1992-02-12 2001-01-23 Lenscard U.S. Llc Method for making a wallet card with an integral magnifying lens
US5856661A (en) 1993-02-12 1999-01-05 Universal Magnifier Llc Credit card with magnifying lens formed with a radiation-curable resin
US5608203A (en) 1992-02-12 1997-03-04 Finkelstein; Alan Credit card with magnifying lens
US6769618B1 (en) 1992-02-12 2004-08-03 Lenscard U.S., Llc Wallet card with a magnifying lens and light
EP0566811A1 (en) 1992-04-23 1993-10-27 International Business Machines Corporation Authentication method and system with a smartcard
US6130621A (en) 1992-07-09 2000-10-10 Rsa Security Inc. Method and apparatus for inhibiting unauthorized access to or utilization of a protected device
US5361062A (en) 1992-11-25 1994-11-01 Security Dynamics Technologies, Inc. Personal security system
US5484997A (en) 1993-12-07 1996-01-16 Haynes; George W. Identification card with RF downlink capability
US5623552A (en) 1994-01-21 1997-04-22 Cardguard International, Inc. Self-authenticating identification card with fingerprint identification
US5434398A (en) 1994-02-22 1995-07-18 Haim Labenski Magnetic smartcard
US5478994A (en) 1994-07-13 1995-12-26 Rahman; Sam Secure credit card which prevents unauthorized transactions
US5834747A (en) 1994-11-04 1998-11-10 Pixel Instruments Universal credit card apparatus and method
US8280682B2 (en) 2000-12-15 2012-10-02 Tvipr, Llc Device for monitoring movement of shipped goods
US5591949A (en) 1995-01-06 1997-01-07 Bernstein; Robert J. Automatic portable account controller for remotely arranging for payment of debt to a vendor
US5907142A (en) 1995-12-12 1999-05-25 Kelsey; Craig E. Fraud resistant personally activated transaction card
US6085320A (en) 1996-05-15 2000-07-04 Rsa Security Inc. Client/server protocol for proving authenticity
US5834756A (en) 1996-06-03 1998-11-10 Motorola, Inc. Magnetically communicative card
US5864623A (en) 1996-07-15 1999-01-26 Intellicheck Inc. Authentication system for driver licenses
US5913203A (en) 1996-10-03 1999-06-15 Jaesent Inc. System and method for pseudo cash transactions
US5866949A (en) 1996-12-02 1999-02-02 Minnesota Mining And Manufacturing Company Chip scale ball grid array for integrated circuit packaging
IL119943A (en) 1996-12-31 2000-11-21 On Track Innovations Ltd Contact/contactless data transaction card
US5955021A (en) 1997-05-19 1999-09-21 Cardxx, Llc Method of making smart cards
US6240184B1 (en) 1997-09-05 2001-05-29 Rsa Security Inc. Password synchronization
US6025054A (en) 1997-09-08 2000-02-15 Cardxx, Inc. Smart cards having glue-positioned electronic components
US6076163A (en) 1997-10-20 2000-06-13 Rsa Security Inc. Secure user identification based on constrained polynomials
US6411715B1 (en) 1997-11-10 2002-06-25 Rsa Security, Inc. Methods and apparatus for verifying the cryptographic security of a selected private and public key pair without knowing the private key
US6286022B1 (en) 1997-11-18 2001-09-04 Rsa Security Inc. Efficient finite field basis conversion involving a dual basis
WO1999026207A1 (en) 1997-11-19 1999-05-27 Rsa Security Inc. Digital coin tracing using trustee tokens
US6157920A (en) 1997-11-19 2000-12-05 Lucent Technologies Inc. Executable digital cash for electronic commerce
US6389442B1 (en) 1997-12-30 2002-05-14 Rsa Security Inc. Efficient finite field multiplication in normal basis
US6095416A (en) 1998-02-24 2000-08-01 Privicom, Inc. Method and device for preventing unauthorized use of credit cards
US6161181A (en) 1998-03-06 2000-12-12 Deloitte & Touche Usa Llp Secure electronic transactions using a trusted intermediary
US6199052B1 (en) 1998-03-06 2001-03-06 Deloitte & Touche Usa Llp Secure electronic transactions using a trusted intermediary with archive and verification request services
US6145079A (en) 1998-03-06 2000-11-07 Deloitte & Touche Usa Llp Secure electronic transactions using a trusted intermediary to perform electronic services
US6256873B1 (en) 1998-03-17 2001-07-10 Cardxx, Inc. Method for making smart cards using isotropic thermoset adhesive materials
US6241153B1 (en) 1998-03-17 2001-06-05 Cardxx, Inc. Method for making tamper-preventing, contact-type, smart cards
US7207477B1 (en) 2004-03-08 2007-04-24 Diebold, Incorporated Wireless transfer of account data and signature from hand-held device to electronic check generator
US6655585B2 (en) 1998-05-11 2003-12-02 Citicorp Development Center, Inc. System and method of biometric smart card user authentication
US6269163B1 (en) 1998-06-15 2001-07-31 Rsa Security Inc. Enhanced block ciphers with data-dependent rotations
US6393447B1 (en) 1998-10-22 2002-05-21 Lucent Technologies Inc. Method and apparatus for extracting unbiased random bits from a potentially biased source of randomness
US6460141B1 (en) 1998-10-28 2002-10-01 Rsa Security Inc. Security and access management system for web-enabled and non-web-enabled applications and content on a computer network
US6182894B1 (en) 1998-10-28 2001-02-06 American Express Travel Related Services Company, Inc. Systems and methods for authorizing a transaction card
US6473740B2 (en) 1998-11-29 2002-10-29 Qpass, Inc. Electronic commerce using a transaction network
US7197639B1 (en) 1999-02-05 2007-03-27 Rsa Security Inc. Cryptographic countermeasures against connection depletion attacks
US7219368B2 (en) 1999-02-11 2007-05-15 Rsa Security Inc. Robust visual passwords
US20040139004A1 (en) 1999-04-08 2004-07-15 Aceinc Pty Ltd. Secure online commerce transactions
US6985583B1 (en) 1999-05-04 2006-01-10 Rsa Security Inc. System and method for authentication seed distribution
US7111172B1 (en) 1999-07-19 2006-09-19 Rsa Security Inc. System and methods for maintaining and distributing personal security devices
US7461250B1 (en) 1999-07-22 2008-12-02 Rsa Security, Inc. System and method for certificate exchange
US6873974B1 (en) 1999-08-17 2005-03-29 Citibank, N.A. System and method for use of distributed electronic wallets
EP1077436A3 (en) 1999-08-19 2005-06-22 Citicorp Development Center, Inc. System and method for performing an on-line transaction using a single-use payment instrument
AU7621300A (en) 1999-09-28 2001-04-30 Chameleon Network Inc. Portable electronic authorization system and associated method
US6705520B1 (en) 1999-11-15 2004-03-16 Satyan G. Pitroda Point of sale adapter for electronic transaction device
US20010034702A1 (en) 2000-02-04 2001-10-25 Mockett Gregory P. System and method for dynamically issuing and processing transaction specific digital credit or debit cards
US7472093B2 (en) 2000-03-08 2008-12-30 Rsa Security Inc. Targeted delivery of informational content with privacy protection
US6813354B1 (en) 2000-03-09 2004-11-02 Lucent Technologies Inc. Mixing in small batches
US7359507B2 (en) 2000-03-10 2008-04-15 Rsa Security Inc. Server-assisted regeneration of a strong secret from a weak secret
US20010047335A1 (en) 2000-04-28 2001-11-29 Martin Arndt Secure payment method and apparatus
US6609654B1 (en) 2000-05-15 2003-08-26 Privasys, Inc. Method for allowing a user to customize use of a payment card that generates a different payment card number for multiple transactions
US6592044B1 (en) 2000-05-15 2003-07-15 Jacob Y. Wong Anonymous electronic card for generating personal coupons useful in commercial and security transactions
US6755341B1 (en) 2000-05-15 2004-06-29 Jacob Y. Wong Method for storing data in payment card transaction
US6805288B2 (en) 2000-05-15 2004-10-19 Larry Routhenstein Method for generating customer secure card numbers subject to use restrictions by an electronic card
US20030173409A1 (en) 2000-06-28 2003-09-18 Werner Vogt Transport or conveyor unit for a chip, particularly a telephone chip
US7356696B1 (en) 2000-08-01 2008-04-08 Lucent Technologies Inc. Proofs of work and bread pudding protocols
WO2002029702A1 (en) 2000-10-04 2002-04-11 American Express Travel Related Services Company, Inc. System and method for providing feedback in an interactive payment system
US7360688B1 (en) 2000-10-16 2008-04-22 Harris Scott C Intelligent credit card system
US8015592B2 (en) 2002-03-28 2011-09-06 Innovation Connection Corporation System, method and apparatus for enabling transactions using a biometrically enabled programmable magnetic stripe
US6980969B1 (en) 2000-11-16 2005-12-27 Sears, Roebuck And Co. Methods and apparatus for allowing internet based purchases based on a temporary credit card number
US7660902B2 (en) 2000-11-20 2010-02-09 Rsa Security, Inc. Dynamic file access control and management
US7602904B2 (en) 2000-11-27 2009-10-13 Rsa Security, Inc. Order invariant fuzzy commitment system
US6681988B2 (en) 2000-11-28 2004-01-27 Citibank, N.A. Method and system for managing a transaction card account
US6631849B2 (en) 2000-12-06 2003-10-14 Bank One, Delaware, National Association Selectable multi-purpose card
WO2002047019A1 (en) 2000-12-08 2002-06-13 Silverman Martin S Dynamic virtual magnetic stripe
US6313724B1 (en) 2000-12-12 2001-11-06 Josef Osterweil Multifaceted balanced magnetic proximity sensor
US7606771B2 (en) 2001-01-11 2009-10-20 Cardinalcommerce Corporation Dynamic number authentication for credit/debit cards
US20020096570A1 (en) 2001-01-25 2002-07-25 Wong Jacob Y. Card with a dynamic embossing apparatus
US7044394B2 (en) 2003-12-17 2006-05-16 Kerry Dennis Brown Programmable magnetic data storage card
US20040177045A1 (en) 2001-04-17 2004-09-09 Brown Kerry Dennis Three-legacy mode payment card with parametric authentication and data input elements
US6811082B2 (en) 2001-09-18 2004-11-02 Jacob Y. Wong Advanced magnetic stripe bridge (AMSB)
US6607127B2 (en) 2001-09-18 2003-08-19 Jacob Y. Wong Magnetic stripe bridge
US7195154B2 (en) 2001-09-21 2007-03-27 Privasys, Inc. Method for generating customer secure card numbers
US6604686B1 (en) 2001-10-09 2003-08-12 Vahid Taban High speed system for embedding wire antennas in an array of smart cards
US6991155B2 (en) 2001-11-19 2006-01-31 Laser Card, Llc Transaction card system having security against unauthorized usage
US7363494B2 (en) 2001-12-04 2008-04-22 Rsa Security Inc. Method and apparatus for performing enhanced time-based authentication
US20040035942A1 (en) 2001-12-07 2004-02-26 Silverman Martin S. Dynamic virtual magnetic stripe
US7013030B2 (en) 2002-02-14 2006-03-14 Wong Jacob Y Personal choice biometric signature
US7039223B2 (en) 2002-02-14 2006-05-02 Wong Jacob Y Authentication method utilizing a sequence of linear partial fingerprint signatures selected by a personal code
US7035443B2 (en) 2002-03-22 2006-04-25 Wong Jacob Y Personal choice biometric signature
EP1535421A4 (en) 2002-03-28 2005-09-07 Innovation Connection Corp Apparatus and method for transactions security using biometric identity validation and contactless smartcard.
US7562222B2 (en) 2002-05-10 2009-07-14 Rsa Security Inc. System and method for authenticating entities to users
US7100049B2 (en) 2002-05-10 2006-08-29 Rsa Security Inc. Method and apparatus for authentication of users and web sites
US7225994B2 (en) 2002-08-06 2007-06-05 Innovative Card Technologies, Inc. Financial transaction card with sound recording
US7494055B2 (en) 2002-09-17 2009-02-24 Vivotech, Inc. Collaborative negotiation techniques for mobile personal trusted device financial transactions
JP4471563B2 (en) 2002-10-25 2010-06-02 株式会社ルネサステクノロジ Manufacturing method of semiconductor device
US7502933B2 (en) 2002-11-27 2009-03-10 Rsa Security Inc. Identity authentication system and method
US20040162732A1 (en) 2003-02-14 2004-08-19 Rubens Rahim System and method for credit card replenishment of a wireless subscriber's account balance
US7591426B2 (en) 2003-04-21 2009-09-22 Josef Osterweil Method and system for data writing/reading onto/from and emulating a magnetic stripe
US7532104B2 (en) 2003-05-06 2009-05-12 Rsa Security, Inc. Low-complexity cryptographic techniques for use with radio frequency identification devices
US6970070B2 (en) 2003-05-08 2005-11-29 Rsa Security Inc. Method and apparatus for selective blocking of radio frequency identification devices
US7100821B2 (en) 2003-05-15 2006-09-05 Mehran Randall Rasti Charge card and debit transactions using a variable charge number
US7761374B2 (en) 2003-08-18 2010-07-20 Visa International Service Association Method and system for generating a dynamic verification value
US7954151B1 (en) 2003-10-28 2011-05-31 Emc Corporation Partial document content matching using sectional analysis
US7523301B2 (en) 2003-10-28 2009-04-21 Rsa Security Inferring content sensitivity from partial content matching
US7298243B2 (en) 2003-11-12 2007-11-20 Rsa Security Inc. Radio frequency identification system with privacy policy implementation based on device classification
US8032416B2 (en) 2003-12-01 2011-10-04 Incard Sa Method for the decomposition in modules of smart-card event-driven applications
US7454349B2 (en) 2003-12-15 2008-11-18 Rsa Security Inc. Virtual voiceprint system and method for generating voiceprints
US7404087B2 (en) 2003-12-15 2008-07-22 Rsa Security Inc. System and method for providing improved claimant authentication
US7543739B2 (en) 2003-12-17 2009-06-09 Qsecure, Inc. Automated payment card fraud detection and location
US7641124B2 (en) 2003-12-17 2010-01-05 Qsecure, Inc. Magnetic data recording device
US20050154643A1 (en) 2004-01-08 2005-07-14 International Business Machines Corporation Purchasing information requested and conveyed on demand
US8386376B2 (en) 2004-02-09 2013-02-26 American Express Travel Related Services Company, Inc. System and method using enhanced authorization data to reduce travel-related transaction fraud
US7580898B2 (en) 2004-03-15 2009-08-25 Qsecure, Inc. Financial transactions with dynamic personal account numbers
US7472829B2 (en) 2004-12-10 2009-01-06 Qsecure, Inc. Payment card with internally generated virtual account numbers for its magnetic stripe encoder and user display
US7584153B2 (en) 2004-03-15 2009-09-01 Qsecure, Inc. Financial transactions with dynamic card verification values
US7294961B2 (en) * 2004-03-29 2007-11-13 Articulated Technologies, Llc Photo-radiation source provided with emissive particles dispersed in a charge-transport matrix
US7424570B2 (en) 2004-04-08 2008-09-09 Incard Sa Method for patching ROM instructions in an electronic embedded system including at least a further memory portion
EP1612639A1 (en) 2004-06-30 2006-01-04 ST Incard S.r.l. Method for detecting and reacting against possible attack to security enforcing operation performed by a cryptographic token or card
US7886345B2 (en) 2004-07-02 2011-02-08 Emc Corporation Password-protection module
US7461399B2 (en) 2004-07-30 2008-12-02 Rsa Security Inc. PIN recovery in a smart card
US7591427B2 (en) 2004-09-10 2009-09-22 Josef Osterweil Method and system for a static magnetic read/write head
US7051929B2 (en) 2004-10-18 2006-05-30 Gongling Li Secure credit card having daily changed security number
US7097108B2 (en) 2004-10-28 2006-08-29 Bellsouth Intellectual Property Corporation Multiple function electronic cards
US8224753B2 (en) 2004-12-07 2012-07-17 Farsheed Atef System and method for identity verification and management
JP2008524751A (en) 2004-12-20 2008-07-10 アールエスエイ セキュリティー インク Consumer Internet authentication service
JP4960883B2 (en) 2004-12-21 2012-06-27 エミュー ホールディングス ピーティワイ リミテッド Authentication device and / or method
US7357319B1 (en) 2005-01-24 2008-04-15 Vivotech, Inc. External adapter for magnetic stripe card reader
US7225537B2 (en) 2005-01-27 2007-06-05 Cardxx, Inc. Method for making memory cards and similar devices using isotropic thermoset materials with high quality exterior surfaces
EP1849119B1 (en) 2005-02-18 2019-07-10 EMC Corporation Derivative seeds
US8820637B1 (en) 2005-02-26 2014-09-02 James A. Roskind Time-varying security code for enabling authorizations and other uses of financial accounts
US7628322B2 (en) 2005-03-07 2009-12-08 Nokia Corporation Methods, system and mobile device capable of enabling credit card personalization using a wireless network
US20060231611A1 (en) 2005-03-23 2006-10-19 Chakiris Phil M Radio frequency identification purchase transactions
BRPI0520452A2 (en) 2005-03-23 2009-05-12 Cardxx Inc method for manufacturing an advanced smart card or similar device
US20070034700A1 (en) 2005-04-27 2007-02-15 Mark Poidomani Electronic cards and methods for making same
EP1882220A2 (en) 2005-03-26 2008-01-30 Privasys, Inc. Electronic financial transaction cards and methods
US7365371B2 (en) * 2005-08-04 2008-04-29 Cree, Inc. Packages for semiconductor light emitting devices utilizing dispensed encapsulants
US7562221B2 (en) 2005-09-21 2009-07-14 Rsa Security Inc. Authentication method and apparatus utilizing proof-of-authentication module
US7739733B2 (en) 2005-11-02 2010-06-15 Emc Corporation Storing digital secrets in a vault
US7568631B2 (en) 2005-11-21 2009-08-04 Sony Corporation System, apparatus and method for obtaining one-time credit card numbers using a smart card
EP1791055A1 (en) 2005-11-23 2007-05-30 Incard SA IC card file system
US7810147B2 (en) 2005-12-01 2010-10-05 Emc Corporation Detecting and preventing replay in authentication systems
DE602005013807D1 (en) 2005-12-30 2009-05-20 Incard Sa IC card with improved printed circuit board
DE602005014498D1 (en) 2005-12-30 2009-06-25 Incard Sa Module of an IC card
US8234696B2 (en) 2006-02-10 2012-07-31 Emc Corporation Method and system for providing a one time password to work in conjunction with a browser
US7818264B2 (en) 2006-06-19 2010-10-19 Visa U.S.A. Inc. Track data encryption
US20070241183A1 (en) 2006-04-14 2007-10-18 Brown Kerry D Pin-secured dynamic magnetic stripe payment card
US7380710B2 (en) 2006-04-28 2008-06-03 Qsecure, Inc. Payment card preloaded with unique numbers
WO2007142819A2 (en) 2006-05-18 2007-12-13 Icache, Inc. Method and apparatus for biometrically secured encrypted data storage and retrieval
EP1860589B1 (en) 2006-05-26 2013-11-27 Incard SA Method for accessing structured data in IC Cards
ATE533289T1 (en) 2006-05-26 2011-11-15 Incard Sa METHOD FOR IMPLEMENTING VOICE OVER IP USING AN ELECTRONIC DEVICE CONNECTED TO A PACKET-ORIENTED NETWORK
ATE440417T1 (en) 2006-06-29 2009-09-15 Incard Sa METHOD FOR DIVERSIFYING A KEY ON A CHIP CARD
DE602006008598D1 (en) 2006-06-29 2009-10-01 Incard Sa Transaction method for memory management of persistent data in a transaction stack
ES2331323T3 (en) 2006-06-29 2009-12-29 Incard Sa COMPRESSION METHOD FOR MANAGING THE STORAGE OF PERSISTENT DATA FROM A NON-VOLATILE MEMORY TO AN INTERMEDIATE SECURITY COPY MEMORY.
DE602006008599D1 (en) 2006-06-29 2009-10-01 Incard Sa Method for protecting IC cards from power analysis attacks
EP1873960B1 (en) 2006-06-29 2013-06-05 Incard SA Method for session key derivation in a IC card
EP1873963A1 (en) 2006-06-29 2008-01-02 Incard SA Authentication method for IC cards
EP1873728B1 (en) 2006-06-29 2013-11-27 Incard SA Method for configuring an IC Card in order to receive personalization commands
EP1895789B1 (en) 2006-08-31 2009-11-04 Incard SA A method for accessing an additional service provided by an IC card toolkit applet
WO2008064403A1 (en) 2006-11-27 2008-06-05 Emue Holdings Pty Ltd Remote service authentication method
EP1927956A1 (en) 2006-11-30 2008-06-04 Incard SA Multi-applications IC Card with secure management of applications
US20080201264A1 (en) 2007-02-17 2008-08-21 Brown Kerry D Payment card financial transaction authenticator
US7400135B1 (en) * 2007-02-23 2008-07-15 Quality One Test Fixturing, Inc. Test fixture and method for circuit board testing
ITMI20070996A1 (en) 2007-05-17 2008-11-18 Incard Sa METHOD FOR CHECKING THE EXECUTION OF AN APPLICATION FOR AN IC CARD
ITMI20070997A1 (en) 2007-05-17 2008-11-18 Incard Sa IC CARD WITH LOW PRECISION CLOCK
ITMI20071085A1 (en) 2007-05-28 2008-11-29 Incard Sa INTEGRATED CIRCUIT CARD INCLUDING A MAIN DEVICE AND AN ADDITIONAL DEVICE.
ITMI20071601A1 (en) 2007-08-02 2009-02-03 Incard Sa METHOD OF WRITING DATA INTO A NON-VOLATILE MEMORY UNIT.
ITMI20071607A1 (en) 2007-08-03 2009-02-04 Incard Sa METHOD FOR ACCESSING MULTIMEDIA CONTENT ASSOCIATED WITH A GEOGRAPHICAL AREA.
JP4460015B2 (en) 2007-11-09 2010-05-12 シャープ株式会社 Semiconductor device packaging structure and semiconductor device packaging method
US20090150295A1 (en) 2007-12-09 2009-06-11 Jeffrey Alan Hatch Validation service for payment cards with preloaded dynamic card verification values
US7823794B2 (en) 2007-12-12 2010-11-02 Qsecure, Inc. Stripline magnetic writing of dynamic magnetic data bits in surrounding regions of static magnetic data bits
US20090159701A1 (en) 2007-12-24 2009-06-25 Dynamics Inc. Payment cards and devices with enhanced magnetic emulators
ITMI20080537A1 (en) 2008-03-28 2009-09-29 Incard Sa DEVICE AND METHOD OF INITIALIZING AN IC CARD.
ITMI20080536A1 (en) 2008-03-28 2009-09-29 Incard Sa METHOD TO PROTECT A CAP FILE FOR AN INTEGRATED CIRCUIT CARD.
ITMI20080533A1 (en) 2008-03-28 2009-09-29 Incard Sa PROCEDURE FOR TESTING AN IC CARD INCLUDING A ZIGBEE DEVICE
ITMI20080550A1 (en) 2008-03-31 2009-10-01 Incard Sa INTEGRATED CIRCUIT BOARD WITH WIRELESS FUNCTIONS.
ITMI20080543A1 (en) 2008-03-31 2009-10-01 Incard Sa INTEGRATED CIRCUIT CARD INCLUDING REFINED ELECTRICAL CONTACTS.
WO2009121793A2 (en) * 2008-04-01 2009-10-08 Agfa Gevaert Lamination process for producung security laminates
US8717111B2 (en) * 2008-10-08 2014-05-06 Nxp, B.V. Oscillator device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060286717A1 (en) * 2005-05-06 2006-12-21 Tessera, Inc. Stacked microelectronic assemblies having basal compliant layers
US20090014889A1 (en) * 2005-05-12 2009-01-15 Hans-Joachim Barth Method for producing chip stacks, and associated chip stacks
US7959085B2 (en) * 2006-04-10 2011-06-14 Innovatier, Inc. Electronic inlay module used for electronic cards and tags
US20110316158A1 (en) * 2010-06-29 2011-12-29 Lai Nguk Chin Method and system for thin multi chip stack package with film on wire and copper wire
US20130228628A1 (en) * 2010-11-23 2013-09-05 X-Card Holdings, Llc One-time password card for secure transactions

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11961147B1 (en) 2012-04-15 2024-04-16 K. Shane Cupp Cards, devices, systems, and methods for financial management services
US11418483B1 (en) 2012-04-19 2022-08-16 Dynamics Inc. Cards, devices, systems, and methods for zone-based network management
US10395156B1 (en) 2012-05-15 2019-08-27 Dynamics Inc. Cards, devices, systems, methods and dynamic security codes
US11126997B1 (en) 2012-10-02 2021-09-21 Dynamics Inc. Cards, devices, systems, and methods for a fulfillment system
US10922597B1 (en) 2012-11-05 2021-02-16 Dynamics Inc. Dynamic magnetic stripe communications device with beveled magnetic material for magnetic cards and devices
US11023796B1 (en) 2012-11-30 2021-06-01 Dynamics Inc. Dynamic magnetic stripe communications device with stepped magnetic material for magnetic cards and devices
US10949627B2 (en) 2012-12-20 2021-03-16 Dynamics Inc. Systems and methods for non-time smearing detection mechanisms for magnetic cards and devices
US11062188B1 (en) 2014-03-21 2021-07-13 Dynamics Inc Exchange coupled amorphous ribbons for electronic stripes

Also Published As

Publication number Publication date
US9916992B2 (en) 2018-03-13
US20130217152A1 (en) 2013-08-22

Similar Documents

Publication Publication Date Title
US20180151391A1 (en) Systems and methods for flexible components for powered cards and devices
US20140233166A1 (en) Flexible powered cards and devices, and methods of manufacturing flexible powered cards and devices
US9064195B2 (en) Multiple layer card circuit boards
US11023796B1 (en) Dynamic magnetic stripe communications device with stepped magnetic material for magnetic cards and devices
US20220327435A1 (en) Systems and methods for contactless communication mechanisms for cards and mobile devices
EP3336759B1 (en) Fingerprint sensing module and method for manufacturing the fingerprint sensing module
CN108495587B (en) Flexible card with fingerprint sensor
AU2018227071B2 (en) Chip card and method for fabricating a chip card
US8485446B1 (en) Shielded magnetic stripe for magnetic cards and devices
US11392860B2 (en) Systems and methods for contactless communication mechanisms for cards and mobile devices
US20140203902A1 (en) Cards, devices, electromagnetic field generators and methods of manufacturing electromagnetic field generators
US11941469B1 (en) Systems and methods for synchronization mechanisms for magnetic cards and devices
EP2805348B1 (en) Device and method for detecting an external object by means of a capacitive sensor and an inductive sensor in a card
AU2018377602B2 (en) Electronic device having light absorbing member arranged between display panel and ultrasonic sensor
US10922597B1 (en) Dynamic magnetic stripe communications device with beveled magnetic material for magnetic cards and devices
US20180232612A1 (en) Dynamic magnetic stripe communications device for cards and devices
US8803658B2 (en) Method, portable data carrier, and system for releasing a transaction using an acceleration sensor to sense mechanical oscillations
US20240127621A1 (en) Fingerprint sensor module for a smartcard and method for fingerprint recognition in a smartcard
WO2023121548A1 (en) Communication arrangement and method of controlling communication in a smartcard comprising a fingerprint sensor module
US11551046B1 (en) Stacked dynamic magnetic stripe commmunications device for magnetic cards and devices

Legal Events

Date Code Title Description
AS Assignment

Owner name: DYNAMICS INC., PENNSYLVANIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:MULLEN, JEFFREY D.;O'SHEA, NORMAN E;SIGNING DATES FROM 20130213 TO 20130215;REEL/FRAME:044760/0223

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED